Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 3. Ansible Automation Platform Controller Configuration Details
This reference architecture focuses on the deployment of Ansible Automation Platform 2.1 using automation mesh on Red Hat Enterprise Linux 8.4 x86_64. The configuration is intended to provide a comprehensive Ansible Automation Platform solution. The key solution components covered within this reference archtiecture consists of:
- Red Hat Enterprise Linux 8.4
- Ansible Automation Platform 2.1
- automation mesh
- private automation hub
3.1. Network Configuration Link kopierenLink in die Zwischenablage kopiert!
3.1.1. Chrony Configuration Link kopierenLink in die Zwischenablage kopiert!
Each Ansible Automation Platform node in the cluster must have access to an NTP server. The chronyd
is a daemon for synchronization of the system clock. It can synchronize the clock with NTP servers. This ensures that when cluster nodes use SSL certificates that require validation, they don’t fail if the date and time between the nodes are not in sync.
On all the nodes,
If not installed, install
chrony
as followsdnf install chrony --assumeyes
# dnf install chrony --assumeyes
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the
/etc/chrony.conf
file with a text editor such asvi
.vi /etc/chrony.conf
# vi /etc/chrony.conf
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Locate the following public server pool section, and modify to include the appropriate servers. Only one server is required, but three is recommended. The iburst option is added to speed up the time that it takes to properly sync with the servers.
Use public servers from the pool.ntp.org project. Please consider joining the pool (http://www.pool.ntp.org/join.html).
# Use public servers from the pool.ntp.org project. # Please consider joining the pool (http://www.pool.ntp.org/join.html). server <ntp-server-address> iburst
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Save all the changes within the
/etc/chrony.conf
file. Start and enable that the
chronyd
daemon is started when the host is booted.systemctl --now enable chronyd.service
# systemctl --now enable chronyd.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Verify the chronyd daemon status.
systemctl status chronyd.service
# systemctl status chronyd.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.2. OS Configuration Link kopierenLink in die Zwischenablage kopiert!
3.2.1. Red Hat Subscription Manager Link kopierenLink in die Zwischenablage kopiert!
The subscription-manager
command registers a system to the Red Hat Network (RHN) and manages the subscription entitlements for a system. The --help
option specifies on the command line to query the command for the available options. If the --help
option is issued along with a command directive, then options available for the specific command directive are listed.
To use Red Hat Subscription Management for providing packages to a system, the system must first register with the service. In order to register a system, use the subscription-manager
command and pass the register
command directive. If the --username
and --password
options are specified, then the command does not prompt for the RHN Network authentication credentials.
An example of registering a system using subscription-manager
is shown below.
subscription-manager register --username [User] --password '[Password]'
# subscription-manager register --username [User] --password '[Password]'
The system has been registered with id: abcd1234-ab12-ab12-ab12-481ba8187f60
After a system is registered, it must be attached to an entitlement pool. For the purposes of this reference environment, the Red Hat Ansible Automation Platform is the pool chosen. Identify and subscribe to the Red Hat Ansible Automation Platform entitlement pool, the following command directives are required.
subscription-manager attach --pool <pool_id>
# subscription-manager attach --pool <pool_id>
Successfully attached a subscription for: Red Hat Ansible Automation Platform, Premium (5000 Managed Nodes)
subscription-manager repos --enable=ansible-automation-platform-2.1-for-rhel-8-x86_64-rpms
# subscription-manager repos --enable=ansible-automation-platform-2.1-for-rhel-8-x86_64-rpms
3.2.2. User Accounts Link kopierenLink in die Zwischenablage kopiert!
Prior to the installation of Ansible Automation Platform 2.1, it is recommended to create a non-root user with sudo
privileges for the deployment process. This user is used for:
- SSH connectivity
- passwordless authentication during installation
For the purposes of this reference environment, the user ansible
was chosen, however, any user name would suffice.
On all nodes, create a user named ansible
and generate an ssh
key.
Create a non-root user
useradd ansible
# useradd ansible
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Set a password for your
ansible
user.passwd ansible
# passwd ansible
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Generate an
ssh
key as theansible
user.ssh-keygen -t rsa
$ ssh-keygen -t rsa
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Disable password requirements when using
sudo
as theansible
userecho "ansible ALL=(ALL) NOPASSWD:ALL" | sudo tee -a /etc/sudoers.d/ansible
# echo "ansible ALL=(ALL) NOPASSWD:ALL" | sudo tee -a /etc/sudoers.d/ansible
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
3.2.3. Copying SSH keys to all nodes Link kopierenLink in die Zwischenablage kopiert!
With the ansible
user created, as the ansible
user, copy the ssh
key to all the nodes. This ensures that when the Ansible Automation Platform installation runs, it can ssh
to all the nodes without a password.
This can be done using the ssh-copy-id
command as follows:
ssh-copy-id ansible@hostname.example.com
$ ssh-copy-id ansible@hostname.example.com
If running within a cloud provider, you may need to instead create an ~/.ssh/authorized_keys
file containing the public key for the ansible
user on all your nodes and set the permissions to the authorized_keys
file to only the owner (ansible
) having read and write access (permissions 644).
3.2.4. Configuring Firewall Settings Link kopierenLink in die Zwischenablage kopiert!
Firewall access and restrictions play a critical role in securing Ansible Automation Platform 2.1 environment. The use of Red Hat Enterprise Linux 8.4 defaults to using firewalld
, a dynamic firewall daemon. firewalld
works by assigning network zones to assign a level of trust to a network and its associated connections and interfaces.
It is recommended that firewall settings be configured to permit access to the appropriate services and ports for a success Ansible Automation Platform 2.1 installation.
On all nodes, ensure that firewalld
is installed, started and enabled.
Install the
firewalld
packagednf install firewalld --assumeyes
# dnf install firewalld --assumeyes
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Start the
firewalld
servicesystemctl start firewalld
# systemctl start firewalld
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Enable the
firewalld
servicesystemctl enable firewalld
# systemctl enable firewalld
Copy to Clipboard Copied! Toggle word wrap Toggle overflow