Chapter 2. Installing the Ansible plug-ins with a Helm chart on OpenShift Container Platform
The following procedures describe how to install Ansible plug-ins in Red Hat Developer Hub instances on Red Hat OpenShift Container Platform using a Helm chart.
The workflow is as follows:
- Download the Ansible plug-ins files.
- Create a plug-in registry in your OpenShift cluster to host the Ansible plug-ins.
- Add the plug-ins to the Helm chart.
- Create a custom ConfigMap.
- Add your custom ConfigMap to your Helm chart.
Edit your custom ConfigMap and Helm chart according to the required and optional configuration procedures.
NoteYou can save changes to your Helm and ConfigMap after each update to your configuration. You do not have to make all the changes to these files in a single session.
2.1. Prerequisites Copy linkLink copied to clipboard!
Red Hat Developer Hub installed on Red Hat OpenShift Container Platform.
- For Helm installation, follow the steps in the Installing Red Hat Developer Hub on OpenShift Container Platform with the Helm chart section of Installing Red Hat Developer Hub on OpenShift Container Platform.
- For Operator installation, follow the steps in the Installing Red Hat Developer Hub on OpenShift Container Platform with the Operator section of Installing Red Hat Developer Hub on OpenShift Container Platform.
- A valid subscription to Red Hat Ansible Automation Platform.
- An OpenShift Container Platform instance with the appropriate permissions within your project to create an application.
- The Red Hat Developer Hub instance can query the automation controller API.
- Optional: To use the integrated learning paths, you must have outbound access to developers.redhat.com.
2.2. Recommended RHDH preconfiguration Copy linkLink copied to clipboard!
Red Hat recommends performing the following initial configuration tasks in RHDH. However, you can install the Ansible plug-ins for Red Hat Developer Hub before completing these tasks.
Red Hat provides a repository of software templates for RHDH that uses the publish:github action. To use these software templates, you must install the required GitHub dynamic plugins.
2.3. Downloading the Ansible plug-ins files Copy linkLink copied to clipboard!
-
Download the latest
.tarfile for the plug-ins from the Red Hat Ansible Automation Platform Product Software downloads page. The format of the filename isansible-backstage-rhaap-bundle-x.y.z.tar.gz. Substitute the Ansible plug-ins release version, for example1.0.0, forx.y.z. Create a directory on your local machine to store the
.tarfiles.mkdir /path/to/<ansible-backstage-plugins-local-dir-changeme>
$ mkdir /path/to/<ansible-backstage-plugins-local-dir-changeme>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Set an environment variable (
$DYNAMIC_PLUGIN_ROOT_DIR) to represent the directory path.export DYNAMIC_PLUGIN_ROOT_DIR=/path/to/<ansible-backstage-plugins-local-dir-changeme>
$ export DYNAMIC_PLUGIN_ROOT_DIR=/path/to/<ansible-backstage-plugins-local-dir-changeme>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Extract the
ansible-backstage-rhaap-bundle-<version-number>.tar.gzcontents to$DYNAMIC_PLUGIN_ROOT_DIR.tar --exclude='*code*' -xzf ansible-backstage-rhaap-bundle-x.y.z.tar.gz -C $DYNAMIC_PLUGIN_ROOT_DIR
$ tar --exclude='*code*' -xzf ansible-backstage-rhaap-bundle-x.y.z.tar.gz -C $DYNAMIC_PLUGIN_ROOT_DIRCopy to Clipboard Copied! Toggle word wrap Toggle overflow Substitute the Ansible plug-ins release version, for example
1.0.0, forx.y.z.
Verification
Run ls to verify that the extracted files are in the $DYNAMIC_PLUGIN_ROOT_DIR directory:
The files with the .integrity file type contain the plugin SHA value. The SHA value is used during the plug-in configuration.
2.4. Creating a registry for the Ansible plug-ins Copy linkLink copied to clipboard!
Set up a registry in your OpenShift cluster to host the Ansible plug-ins and make them available for installation in Red Hat Developer Hub (RHDH).
Procedure
- Log in to your OpenShift Container Platform instance with credentials to create a new application.
Open your Red Hat Developer Hub OpenShift project.
oc project <YOUR_DEVELOPER_HUB_PROJECT>
$ oc project <YOUR_DEVELOPER_HUB_PROJECT>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Run the following commands to create a plug-in registry build in the OpenShift cluster.
oc new-build httpd --name=plugin-registry --binary oc start-build plugin-registry --from-dir=$DYNAMIC_PLUGIN_ROOT_DIR --wait oc new-app --image-stream=plugin-registry
$ oc new-build httpd --name=plugin-registry --binary $ oc start-build plugin-registry --from-dir=$DYNAMIC_PLUGIN_ROOT_DIR --wait $ oc new-app --image-stream=plugin-registryCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
To verify that the plugin-registry was deployed successfully, open the Topology view in the Developer perspective on the Red Hat Developer Hub application in the OpenShift Web console.
Click the plug-in registry to view the log.
(1) Developer hub instance
(2) Plug-in registry
- Click the terminal tab and login to the container.
In the terminal, run
lsto confirm that the.tarfiles are in the plugin registry.ansible-plugin-backstage-rhaap-dynamic-x.y.z.tgz ansible-plugin-backstage-rhaap-backend-dynamic-x.y.z.tgz ansible-plugin-scaffolder-backend-module-backstage-rhaap-dynamic-x.y.z.tgz
ansible-plugin-backstage-rhaap-dynamic-x.y.z.tgz ansible-plugin-backstage-rhaap-backend-dynamic-x.y.z.tgz ansible-plugin-scaffolder-backend-module-backstage-rhaap-dynamic-x.y.z.tgzCopy to Clipboard Copied! Toggle word wrap Toggle overflow The version numbers and file names can differ.
2.5. Required configuration Copy linkLink copied to clipboard!
2.5.1. Adding the Ansible plug-ins configuration Copy linkLink copied to clipboard!
-
In the OpenShift Developer UI, navigate to
. Update the Helm chart configuration to add the dynamic plug-ins in the Red Hat Developer Hub instance. Under the
pluginssection in the YAML file, add the dynamic plug-ins that you want to enable.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
In the
packagesections, replacex.y.zin the plug-in filenames with the correct version numbers for the Ansible plug-ins. -
For each Ansible plug-in, update the integrity values using the corresponding
.integrityfile content. Click .
The developer hub pods restart and the plug-ins are installed.
Verification
To verify that the plug-ins have been installed, open the install-dynamic-plugin container logs and check that the Ansible plug-ins are visible in Red Hat Developer Hub:
- Open the Developer perspective for the Red Hat Developer Hub application in the OpenShift Web console.
- Select the Topology view.
- Select the Red Hat Developer Hub deployment pod to open an information pane.
- Select the Resources tab of the information pane.
- In the Pods section, click View logs to open the Pod details page.
- In the Pod details page, select the Logs tab.
-
Select
install-dynamic-pluginsfrom the drop-down list of containers to view the container log. In the
install-dynamic-plugincontainer logs, search for the Ansible plug-ins.The following example from the log indicates a successful installation for one of the plug-ins:
=> Successfully installed dynamic plugin http://plugin-registry-1:8080/ansible-plugin-backstage-rhaap-dynamic-1.1.0.tgz
=> Successfully installed dynamic plugin http://plugin-registry-1:8080/ansible-plugin-backstage-rhaap-dynamic-1.1.0.tgzCopy to Clipboard Copied! Toggle word wrap Toggle overflow The following image shows the container log in the Pod details page. The version numbers and file names can differ.
2.5.2. Adding the Ansible Development Tools sidecar container Copy linkLink copied to clipboard!
After the plug-ins are loaded, add the Ansible Development Container (ansible-devtools-server) in the Red Hat Developer Hub pod as a sidecar container.
2.5.2.1. Adding a pull secret to the Red Hat Developer Hub Helm configuration Copy linkLink copied to clipboard!
Prerequisite
The Ansible Development Container download requires a Red Hat Customer Portal account and Red Hat Service Registry account.
Procedure
- Create a new Red Hat Registry Service account, if required.
- Click the token name under the Account name column.
- Select the OpenShift Secret tab and follow the instructions to add the pull secret to your Red Hat Developer Hub OpenShift project.
Add the new secret to the Red Hat Developer Hub Helm configuration, replacing
<your-redhat-registry-pull-secret>with the name of the secret you generated on the Red Hat Registry Service Account website:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
For more information, refer to the Red Hat Container Registry documentation.
2.5.2.2. Adding the Ansible Developer Tools container Copy linkLink copied to clipboard!
You must update the Helm chart configuration to add an extra container.
Procedure
- Log in to the OpenShift UI.
-
Navigate to
to open the Helm chart. Update the
extraContainerssection in the YAML file.Add the following code:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe image pull policy is
imagePullPolicy: IfNotPresent. The image is pulled only if it does not already exist on the node. Update it toimagePullPolicy: Alwaysif you always want to use the latest image.- Click .
Verification
To verify that the container is running, check the container log:
2.5.3. Adding a custom ConfigMap Copy linkLink copied to clipboard!
Create a Red Hat Developer Hub ConfigMap following the procedure in the Creating and using config maps section of the OpenShift Container Platform Nodes guide. The following examples use a custom ConfigMap named app-config-rhdh.
To edit your custom ConfigMap, log in to the OpenShift UI and navigate to
2.5.4. Configuring the Ansible Dev Tools Server Copy linkLink copied to clipboard!
The creatorService URL is required for the Ansible plug-ins to provision new projects using the provided software templates.
Procedure
-
Edit your custom Red Hat Developer Hub config map,
app-config-rhdh, that you created in Adding a custom ConfigMap. Add the following code to your Red Hat Developer Hub
app-config-rhdh.yamlfile.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.5.5. Configuring Ansible Automation Platform details Copy linkLink copied to clipboard!
The Ansible plug-ins query your Ansible Automation Platform subscription status with the controller API using a token.
The Ansible plug-ins continue to function regardless of the Ansible Automation Platform subscription status.
Procedure
- Create a Personal Access Token (PAT) with “Read” scope in automation controller, following the Adding tokens section of the Automation controller user guide.
-
Edit your custom Red Hat Developer Hub config map, for example
app-config-rhdh. Add your Ansible Automation Platform details to
app-config-rhdh.yaml.-
Set the
baseURLkey with your automation controller URL. -
Set the
tokenkey with the generated token value that you created in Step 1. Set the
checkSSLkey totrueorfalse.If
checkSSLis set totrue, the Ansible plug-ins verify whether the SSL certificate is valid.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
-
Set the
You are responsible for protecting your Red Hat Developer Hub installation from external and unauthorized access. Manage the backend authentication key like any other secret. Meet strong password requirements, do not expose it in any configuration files, and only inject it into configuration files as an environment variable.
2.5.6. Configuring showCaseLocation Copy linkLink copied to clipboard!
You must configure showCaseLocation in your custom config map.
Procedure
-
Edit your custom Red Hat Developer Hub config map,
app-config-rhdh, that you created in Adding a custom ConfigMap. Add the following code to your Red Hat Developer Hub
app-config-rhdh.yamlfile.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
2.5.7. Adding Ansible plug-ins software templates Copy linkLink copied to clipboard!
Red Hat Ansible provides software templates for Red Hat Developer Hub to provision new playbooks and collection projects based on Ansible best practices.
Procedure
-
Edit your custom Red Hat Developer Hub config map, for example
app-config-rhdh. -
Add the following code to your Red Hat Developer Hub
app-config-rhdh.yamlfile.
For more information, refer to the Managing templates section of the Administration guide for Red Hat Developer Hub.
2.5.8. Configuring Role Based Access Control Copy linkLink copied to clipboard!
Red Hat Developer Hub offers Role-based Access Control (RBAC) functionality. RBAC can then be applied to the Ansible plug-ins content.
Assign the following roles:
-
Members of the
admin:superUsersgroup can select templates in the Create tab of the Ansible plug-ins to create playbook and collection projects. -
Members of the
admin:usersgroup can view templates in the Create tab of the Ansible plug-ins.
The following example adds RBAC to Red Hat Developer Hub.
For more information about permission policies and managing RBAC, refer to the Authorization guide for Red Hat Developer Hub.
2.6. Optional configuration for Ansible plug-ins Copy linkLink copied to clipboard!
2.6.1. Enabling Red Hat Developer Hub authentication Copy linkLink copied to clipboard!
Red Hat Developer Hub (RHDH) provides integrations for multiple Source Control Management (SCM) systems. This is required by the plug-ins to create repositories.
Refer to the Enabling authentication in Red Hat Developer Hub chapter of the Administration guide for Red Hat Developer Hub.
2.6.2. Configuring Ansible plug-ins optional integrations Copy linkLink copied to clipboard!
The Ansible plug-ins provide integrations with Ansible Automation Platform and other optional Red Hat products.
To edit your custom ConfigMap, log in to the OpenShift UI and navigate to
2.6.2.1. Configuring OpenShift Dev Spaces Copy linkLink copied to clipboard!
When OpenShift Dev Spaces is configured for the Ansible plug-ins, users can click a link from the catalog item view in Red Hat Developer Hub and edit their provisioned Ansible Git projects using Dev Spaces.
OpenShift Dev Spaces is a separate product and it is optional. The plug-ins will function without it.
It is a separate Red Hat product and is not included in the Ansible Automation Platform or Red Hat Developer Hub subscription.
If the OpenShift Dev Spaces link is not configured in the Ansible plug-ins, the Go to OpenShift Dev Spaces dashboard link in the DEVELOP section of the Ansible plug-ins landing page redirects users to the Ansible development tools home page.
Prerequisites
- A Dev Spaces installation. Refer to the Installing Dev Spaces section of the Red Hat OpenShift Dev Spaces Administration guide.
Procedure
-
Edit your custom Red Hat Developer Hub config map, for example
app-config-rhdh. Add the following code to your Red Hat Developer Hub
app-config-rhdh.yamlfile.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<Your OpenShft Dev Spaces URL>with your OpenShift Dev Spaces URL. -
In the OpenShift Developer UI, select the
Red Hat Developer Hubpod. - Open Actions.
- Click Restart rollout.
2.6.2.2. Configuring the private automation hub URL Copy linkLink copied to clipboard!
Private automation hub provides a centralized, on-premise repository for certified Ansible collections, execution environments and any additional, vetted content provided by your organization.
If the private automation hub URL is not configured in the Ansible plug-ins, users are redirected to the Red Hat Hybrid Cloud Console automation hub.
The private automation hub configuration is optional but recommended. The Ansible plug-ins will function without it.
Prerequisites:
A private automation hub instance.
For more information on installing private automation hub, refer to the Installation and Upgrade guides in the Ansible Automation Platform documentation.
Procedure:
-
Edit your custom Red Hat Developer Hub config map, fpr example
app-config-rhdh. Add the following code to your Red Hat Developer Hub
app-config-rhdh.yamlfile.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<https://MyOwnPAHUrl/>with your private automation hub URL. -
In the OpenShift Developer UI, select the
Red Hat Developer Hubpod. - Open Actions.
- Click Restart rollout.