Este conteúdo não está disponível no idioma selecionado.
Chapter 4. Disconnected installation
If you are not connected to the internet or do not have access to online repositories, you can install Red Hat Ansible Automation Platform without an active internet connection.
4.1. Prerequisites Copiar o linkLink copiado para a área de transferência!
Before installing Ansible Automation Platform on a disconnected network, you must meet the following prerequisites:
- A created subscription manifest. See Obtaining a manifest file for more information.
- The Ansible Automation Platform setup bundle at Customer Portal is downloaded.
- The DNS records for the automation controller and private automation hub servers are created.
4.2. Ansible Automation Platform installation on disconnected RHEL Copiar o linkLink copiado para a área de transferência!
You can install Ansible Automation Platform automation controller and private automation hub without an internet connection by using the installer-managed database located on the automation controller. Use the setup bundle for a disconnected installation as it includes additional components that make installing Ansible Automation Platform easier in a disconnected environment. These include the Ansible Automation Platform Red Hat package managers (RPMs) and the default execution environment (EE) images.
4.2.1. System requirements for disconnected installation Copiar o linkLink copiado para a área de transferência!
Ensure that your system has all the hardware requirements before performing a disconnected installation of Ansible Automation Platform. For more information about hardware requirements, see Chapter 2. System requirements.
4.2.2. RPM Source Copiar o linkLink copiado para a área de transferência!
RPM dependencies for Ansible Automation Platform that come from the BaseOS and AppStream repositories are not included in the setup bundle. To add these dependencies, you must first obtain access to BaseOS and AppStream repositories. Use Satellite to sync repositories and add dependencies. If you prefer an alternative tool, you can choose between the following options:
- Reposync
- The RHEL Binary DVD
The RHEL Binary DVD method requires the DVD for supported versions of RHEL, including version 8.6 or higher. See Red Hat Enterprise Linux Life Cycle for information about which versions of RHEL are currently supported.
Additional Resources
4.3. Synchronizing RPM repositories using reposync Copiar o linkLink copiado para a área de transferência!
To perform a reposync you need a RHEL host that has access to the internet. After the repositories are synced, you can move the repositories to the disconnected network hosted from a web server.
Procedure
Attach the BaseOS and AppStream required repositories:
subscription-manager repos \ --enable rhel-8-for-x86_64-baseos-rpms \ --enable rhel-8-for-x86_64-appstream-rpms# subscription-manager repos \ --enable rhel-8-for-x86_64-baseos-rpms \ --enable rhel-8-for-x86_64-appstream-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Perform the reposync:
dnf install yum-utils reposync -m --download-metadata --gpgcheck \ -p /path/to/download# dnf install yum-utils # reposync -m --download-metadata --gpgcheck \ -p /path/to/downloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow Use reposync with
--download-metadataand without--newest-only. See RHEL 8 Reposync.-
If you are not using
--newest-only,the repos downloaded will be ~90GB. -
If you are using
--newest-only,the repos downloaded will be ~14GB.
-
If you are not using
If you plan to use Red Hat Single Sign-On, sync these repositories:
- jb-eap-7.3-for-rhel-8-x86_64-rpms
- rh-sso-7.4-for-rhel-8-x86_64-rpms
After the reposync is completed, your repositories are ready to use with a web server.
- Move the repositories to your disconnected network.
4.4. Creating a new web server to host repositories Copiar o linkLink copiado para a área de transferência!
If you do not have an existing web server to host your repositories, you can create one with your synced repositories.
Procedure
Install prerequisites:
sudo dnf install httpd
$ sudo dnf install httpdCopy to Clipboard Copied! Toggle word wrap Toggle overflow Configure httpd to serve the repo directory:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the directory is readable by an apache user:
sudo chown -R apache /path/to/repos
$ sudo chown -R apache /path/to/reposCopy to Clipboard Copied! Toggle word wrap Toggle overflow Configure SELinux:
sudo semanage fcontext -a -t httpd_sys_content_t "/path/to/repos(/.*)?" sudo restorecon -ir /path/to/repos
$ sudo semanage fcontext -a -t httpd_sys_content_t "/path/to/repos(/.*)?" $ sudo restorecon -ir /path/to/reposCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enable httpd:
sudo systemctl enable --now httpd.service
$ sudo systemctl enable --now httpd.serviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow Open firewall:
sudo firewall-cmd --zone=public --add-service=http –add-service=https --permanent sudo firewall-cmd --reload
$ sudo firewall-cmd --zone=public --add-service=http –add-service=https --permanent $ sudo firewall-cmd --reloadCopy to Clipboard Copied! Toggle word wrap Toggle overflow On automation controller and automation hub, add a repo file at /etc/yum.repos.d/local.repo, and add the optional repos if needed:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
4.5. Accessing RPM repositories from a locally mounted DVD Copiar o linkLink copiado para a área de transferência!
If you plan to access the repositories from the RHEL binary DVD, you must first set up a local repository.
Procedure
Mount DVD or ISO:
DVD
mkdir /media/rheldvd && mount /dev/sr0 /media/rheldvd
# mkdir /media/rheldvd && mount /dev/sr0 /media/rheldvdCopy to Clipboard Copied! Toggle word wrap Toggle overflow ISO
mkdir /media/rheldvd && mount -o loop rhrhel-8.6-x86_64-dvd.iso /media/rheldvd
# mkdir /media/rheldvd && mount -o loop rhrhel-8.6-x86_64-dvd.iso /media/rheldvdCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Create yum repo file at
/etc/yum.repos.d/dvd.repoCopy to Clipboard Copied! Toggle word wrap Toggle overflow Import the gpg key:
rpm --import /media/rheldvd/RPM-GPG-KEY-redhat-release
# rpm --import /media/rheldvd/RPM-GPG-KEY-redhat-releaseCopy to Clipboard Copied! Toggle word wrap Toggle overflow
If the key is not imported you will see an error similar to
Curl error (6): Couldn't resolve host name for
# Curl error (6): Couldn't resolve host name for
https://www.redhat.com/security/data/fd431d51.txt [Could not resolve host:
www.redhat.com]
Additional Resources
For further detail on setting up a repository see Need to set up yum repository for locally-mounted DVD on Red Hat Enterprise Linux 8.
4.6. Adding a subscription manifest to Ansible Automation Platform without an internet connection Copiar o linkLink copiado para a área de transferência!
To add a subscription to Ansible Automation Platform without an internet connection, create and import a subscription manifest.
Procedure
- Log in to the Red Hat Customer Portal.
- From the menu bar, select and select the Subscriptions Allocations tab .
- Click .
- Name the new subscription allocation.
- Select Satellite 6.8 from the Type list.
- Click . The Details tab opens for your subscription allocation.
- Select the Subscriptions tab.
- Click .
- Find your Ansible Automation Platform subscription, and in the Entitlements box, add the number of entitlements you want to assign to your environment. A single entitlement is needed for each node that will be managed by Ansible Automation Platform: server, network device, etc.
- Click .
- Click .
This downloads a file manifest_<allocation name>_<date>.zip that be imported with automation controller after installation.
4.7. Downloading and installing the Ansible Automation Platform setup bundle Copiar o linkLink copiado para a área de transferência!
Choose the setup bundle to download Ansible Automation Platform for disconnected installations. This bundle includes the RPM content for Ansible Automation Platform and the default execution environment images that will be uploaded to your private automation hub during the installation process.
Procedure
- Download the Ansible Automation Platform setup bundle package by navigating to the Red Hat Ansible Automation Platform download page and clicking for the Ansible Automation Platform 2.4 Setup Bundle.
From automation controller, untar the bundle:
tar xvf \ ansible-automation-platform-setup-bundle-2.4-1.tar.gz cd ansible-automation-platform-setup-bundle-2.4-1
$ tar xvf \ ansible-automation-platform-setup-bundle-2.4-1.tar.gz $ cd ansible-automation-platform-setup-bundle-2.4-1Copy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the inventory file to include the required options:
- automationcontroller group
- automationhub group
- admin_password
- pg_password
- automationhub_admin_password
- automationhub_pg_host, automationhub_pg_port
automationhub_pg_password
Example Inventory file
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Run the Ansible Automation Platform setup bundle executable as the root user:
sudo -i cd /path/to/ansible-automation-platform-setup-bundle-2.4-1 ./setup.sh
$ sudo -i # cd /path/to/ansible-automation-platform-setup-bundle-2.4-1 # ./setup.shCopy to Clipboard Copied! Toggle word wrap Toggle overflow - When installation is complete, navigate to the Fully Qualified Domain Name (FQDN) for the automation controller node that was specified in the installation inventory file.
- Log in using the administrator credentials specified in the installation inventory file.
The inventory file must be kept intact after installation because it is used for backup, restore, and upgrade functions. Keep a backup copy in a secure location, given that the inventory file contains passwords.
4.8. Completing post installation tasks Copiar o linkLink copiado para a área de transferência!
After you have completed the installation of Ansible Automation Platform, ensure that automation hub and automation controller deploy properly.
4.8.1. Adding a controller subscription Copiar o linkLink copiado para a área de transferência!
Procedure
-
Navigate to the FQDN of the Automation controller. Log in with the username admin and the password you specified as
admin_passwordin your inventory file. - Click and select the manifest.zip you created earlier.
- Click .
- Uncheck and . These rely on an internet connection and must be turned off.
- Click .
- Read the End User License Agreement and click if you agree.
4.8.2. Updating the CA trust store Copiar o linkLink copiado para a área de transferência!
As part of your post-installation tasks, you must update the software’s certificates. By default, Ansible Automation Platform automation hub and automation controller are installed using self-signed certificates. Because of this, the controller does not trust the hub’s certificate and will not download the execution environment from the hub.
To ensure that automation controller downloads the execution environment from automation hub, you must import the hub’s Certificate Authority (CA) certificate as a trusted certificate on the controller.
Additional Resources
- For further information on unknown certificate authority, see Project sync fails with unknown certificate authority error in Ansible Automation Platform 2.1.
4.9. Importing collections into private automation hub Copiar o linkLink copiado para a área de transferência!
You can download a collection as a tarball file from Ansible automation hub for use in your private automation hub. Certified collections are available on the automation hub Hybrid Cloud Console, and community collections are on Ansible Galaxy. You must also download and install any dependencies needed for the collection.
Procedure
- Navigate to link: console.redhat.com and log in with your Red Hat credentials.
- Click on the collection you want to download.
- Click
- To verify if a collection has dependencies, click the Dependencies tab.
- Download any dependencies needed for this collection.
4.10. Creating a collection namespace Copiar o linkLink copiado para a área de transferência!
Before importing a collection, you must first create a namespace for the collection in your private automation hub. You can find the namespace name by looking at the first part of the collection tarball filename. For example, the namespace of the collection ansible-netcommon-3.0.0.tar.gz is ansible.
Procedure
- Log in to the automation hub Hybrid Cloud Console.
-
From the navigation panel, select
. - Click .
- Provide the namespace name.
- Click .
4.10.1. Importing the collection tarball by using the web console Copiar o linkLink copiado para a área de transferência!
Once the namespace has been created, you can import the collection by using the web console.
Procedure
- Log in to automation hub Hybrid Cloud Console.
-
From the navigation panel, select
. - Click next to the namespace you will be importing the collection into.
- Click .
- Click the folder icon and select the tarball of the collection.
- Click .
This opens the 'My Imports' page. You can see the status of the import and various details of the files and modules that have been imported.
4.10.2. Importing the collection tarball by using the CLI Copiar o linkLink copiado para a área de transferência!
You can import collections into your private automation hub by using the command-line interface rather than the GUI.
Procedure
- Copy the collection tarballs to the private automation hub.
- Log in to the private automation hub server via SSH.
Add the self-signed root CA cert to the trust store on automation hub.
cp /etc/pulp/certs/root.crt \ /etc/pki/ca-trust/source/anchors/automationhub-root.crt update-ca-trust# cp /etc/pulp/certs/root.crt \ /etc/pki/ca-trust/source/anchors/automationhub-root.crt # update-ca-trustCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the
/etc/ansible/ansible.cfgfile with your automation hub configuration. Use either a token or a username and password for authentication.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Import the collection using the ansible-galaxy command.
ansible-galaxy collection publish <collection_tarball>
$ ansible-galaxy collection publish <collection_tarball>
4.11. Approving the imported collections Copiar o linkLink copiado para a área de transferência!
After you have imported collections by using either the GUI or the CLI method, you must approve them by using the GUI. After they are approved, they are available for use.
Procedure
- Log in to automation hub Hybrid Cloud Console.
-
From the navigation panel, select
. - Click for the collection you want to approve.
- The collection is now available for use in your private automation hub.
- Import any dependency for the collection by repeating steps 2 and 3.
The collection is added to the "Published" repository regardless of its source.
Recommended collections depend on your use case. Ansible and Red Hat provide these collections.
4.11.1. Custom automation execution environments Copiar o linkLink copiado para a área de transferência!
Use the ansible-builder program to create custom execution environment images. For disconnected environments, custom execution environment images can be built in the following ways:
- Build an execution environment image on an internet-facing system and import it to the disconnected environment.
- Build an execution environment image entirely on the disconnected environment with some modifications to the normal process of using ansible-builder.
- Create a minimal base container image that includes all of the necessary modifications for a disconnected environment, then build custom execution environment images from the base container image.
4.11.1.1. Transferring custom execution environment images across a disconnected boundary Copiar o linkLink copiado para a área de transferência!
You can build a custom execution environment image on an internet-facing machine. After you create an execution environment, it is available in the local podman image cache. You can then transfer the custom execution environment image across a disconnected boundary.
Procedure
Save the image:
podman image save localhost/custom-ee:latest | gzip -c custom-ee-latest.tar.gz
$ podman image save localhost/custom-ee:latest | gzip -c custom-ee-latest.tar.gzCopy to Clipboard Copied! Toggle word wrap Toggle overflow Transfer the file across the disconnected boundary by using an existing mechanism such as sneakernet or one-way diode.
- After the image is available on the disconnected side, import it into the local podman cache, tag it, and push it to the disconnected hub:
podman image load -i custom-ee-latest.tar.gz podman image tag localhost/custom-ee <hub_fqdn>/custom-ee:latest podman login <hub_fqdn> --tls-verify=false podman push <hub_fqdn>/custom-ee:latest
$ podman image load -i custom-ee-latest.tar.gz
$ podman image tag localhost/custom-ee <hub_fqdn>/custom-ee:latest
$ podman login <hub_fqdn> --tls-verify=false
$ podman push <hub_fqdn>/custom-ee:latest
4.12. Building an execution environment in a disconnected environment Copiar o linkLink copiado para a área de transferência!
Creating execution environments for Ansible Automation Platform is a common task which works differently in disconnected environments. When building a custom execution environment, the ansible-builder tool defaults to downloading content from the following locations on the internet:
- Red Hat Automation hub (console.redhat.com) or Ansible Galaxy (galaxy.ansible.com) for any Ansible content collections added to the execution environment image.
- PyPI (pypi.org) for any python packages required as collection dependencies.
- RPM repositories such as the RHEL or UBI repositories (cdn.redhat.com) for adding or updating RPMs to the execution environment image, if needed.
- registry.redhat.io for access to the base container images.
Building an execution environment image in a disconnected environment requires mirroring content from these locations. See Importing Collections into private automation hub for information about importing collections from Ansible Galaxy or automation hub into a private automation hub.
Mirrored PyPI content once transferred into the disconnected network can be made available by using a web server or an artifact repository such as Nexus. The RHEL and UBI repository content can be exported from an internet-facing Red Hat Satellite Server, copied into the disconnected environment, then imported into a disconnected Satellite so it is available for building custom execution environments. See ISS Export Sync in an Air-Gapped Scenario for details.
The default base container image, ee-minimal-rhel8, is used to create custom execution environment images and is included with the bundled installer. This image is added to the private automation hub at install time. If a different base container image such as ee-minimal-rhel9 is required, it must be imported to the disconnected network and added to the private automation hub container registry.
Once all of the prerequisites are available on the disconnected network, the ansible-builder command can be used to create custom execution environment images.
4.12.1. Installing the Ansible Builder RPM Copiar o linkLink copiado para a área de transferência!
On the RHEL system where custom execution environments will be built, you will install the Ansible Builder RPM by using a Satellite Server that already exists in the environment. This method is preferred because the execution environment images can use any RHEL content from the pre-existing Satellite if required.
Procedure
Install the Ansible Builder RPM from the Ansible Automation Platform repository.
- Subscribe the RHEL system to a Satellite on the disconnected network.
-
Attach the Ansible Automation Platform subscription and enable the Ansible Automation Platform repository. The repository name is either
ansible-automation-platform-2.4-for-rhel-8-x86_64-rpmsoransible-automation-platform-2.4-for-rhel-9-x86_64-rpmsdepending on the version of RHEL used on the underlying system. - Install the Ansible Builder RPM. The version of the Ansible Builder RPM must be 3.0.0 or later in order for the examples below to work properly.
Install the Ansible Builder RPM from the Ansible Automation Platform setup bundle. Use this method if a Satellite Server is not available on your disconnected network.
- Unarchive the Ansible Automation Platform setup bundle.
- Install the Ansible Builder RPM and its dependencies from the included content.
The specific versions may be slightly different depending on the version of the setup bundle being used.
4.12.2. Creating the custom execution environment definition Copiar o linkLink copiado para a área de transferência!
Once the Ansible Builder RPM is installed, use the following steps to create your custom execution environment.
Create a directory for the build artifacts used when creating your custom execution environment. Any new files created with the steps below will be created under this directory.
mkdir $HOME/custom-ee $HOME/custom-ee/files cd $HOME/custom-ee/
$ mkdir $HOME/custom-ee $HOME/custom-ee/files $ cd $HOME/custom-ee/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create an
execution-environment.ymlfile that defines the requirements for your custom execution environment.NoteVersion 3 of the execution environment definition format is required, so ensure the
execution-environment.ymlfile containsversion: 3explicitly before continuing.- Override the base image to point to the minimal execution environment available in your private automation hub.
-
Define the additional build files needed to point to any disconnected content sources that will be used in the build process. Your custom
execution-environment.ymlfile should look similar to the following example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create an
ansible.cfgfile under thefiles/subdirectory that points to your private automation hub.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
pip.conffile under thefiles/subdirectory which points to the internal PyPI mirror (a web server or something like Nexus):cat files/pip.conf [global] index-url = https://<pypi_mirror_fqdn>/ trusted-host = <pypi_mirror_fqdn>
$ cat files/pip.conf [global] index-url = https://<pypi_mirror_fqdn>/ trusted-host = <pypi_mirror_fqdn>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: If you use a
bindep.txtfile to add RPMs the custom execution environment, create acustom.repofile under thefiles/subdirectory that points to your disconnected Satellite or other location hosting the RPM repositories. If this step is necessary, uncomment the steps in the exampleexecution-environment.ymlfile that correspond with thecustom.repofile.The following example is for the UBI repos. Other local repos can be added to this file as well. The URL path may need to change depending on where the mirror content is located on the web server.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the CA certificate used to sign the private automation hub web server certificate. If the private automation hub uses self-signed certificates provided by the installer:
-
Copy the file
/etc/pulp/certs/pulp_webserver.crtfrom your private automation hub and name ithub-ca.crt. -
Add the
hub-ca.crtfile to thefiles/subdirectory.
-
Copy the file
If the private automation hub uses user-provided certificates signed by a certificate authority:
-
Make a copy of that CA certificate and name it
hub-ca.crt. -
Add the
hub-ca.crtfile to thefiles/subdirectory.
-
Make a copy of that CA certificate and name it
Once the preceeding steps have been completed, create your python
requirements.txtand Ansible collectionrequirements.ymlfiles, with the content needed for your custom execution environment image.NoteAny required collections must already be uploaded into your private automation hub.
The following files should exist under the
custom-ee/directory, withbindep.txtandfiles/custom.repobeing optional:
4.12.3. Building the custom execution environment Copiar o linkLink copiado para a área de transferência!
Before creating the new custom execution environment, an API token from the private hub will be needed in order to download content.
Generate a token by taking the following steps:
- Log in to your private hub.
- Choose "Collections" from the left-hand menu.
- Choose the"API token" under the "Collections" section of the menu.
Once you have the token, set the following environment variable so that Ansible Builder can access the token:
export ANSIBLE_GALAXY_SERVER_PRIVATE_HUB_TOKEN=<your_token>
$ export ANSIBLE_GALAXY_SERVER_PRIVATE_HUB_TOKEN=<your_token>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the custom execution environment by using the command:
cd $HOME/custom-ee ansible-builder build -f execution-environment.yml -t private-hub.example.com/custom-ee:latest -v 3
$ cd $HOME/custom-ee $ ansible-builder build -f execution-environment.yml -t private-hub.example.com/custom-ee:latest -v 3Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf the build fails with an error that the private hub certificate is signed by an unknown authority, you can pull the required image into the local image cache by running the command:
podman pull private-hub.example.com/ee-minimal-rhel8:latest --tls-verify=false
$ podman pull private-hub.example.com/ee-minimal-rhel8:latest --tls-verify=falseCopy to Clipboard Copied! Toggle word wrap Toggle overflow Alternately, you can add the private hub CA certificate to the podman certificate store:
sudo mkdir /etc/containers/certs.d/private-hub.example.com sudo cp $HOME/custom-ee/files/hub-ca.crt /etc/containers/certs.d/private-hub.example.com
$ sudo mkdir /etc/containers/certs.d/private-hub.example.com $ sudo cp $HOME/custom-ee/files/hub-ca.crt /etc/containers/certs.d/private-hub.example.comCopy to Clipboard Copied! Toggle word wrap Toggle overflow
4.12.4. Uploading the custom execution environment to the private automation hub Copiar o linkLink copiado para a área de transferência!
Before the new execution environment image can be used for automation jobs, it must be uploaded to the private automation hub.
First, verify that the execution environment image can be seen in the local podman cache:
podman images --format "table {{.ID}} {{.Repository}} {{.Tag}}"
$ podman images --format "table {{.ID}} {{.Repository}} {{.Tag}}"
IMAGE ID REPOSITORY TAG
b38e3299a65e private-hub.example.com/custom-ee latest
8e38be53b486 private-hub.example.com/ee-minimal-rhel8 latest
Then log in to the private automation hub’s container registry and push the image to make it available for use with job templates and workflows:
podman login private-hub.example.com -u admin podman push private-hub.example.com/custom-ee:latest
$ podman login private-hub.example.com -u admin
Password:
Login Succeeded!
$ podman push private-hub.example.com/custom-ee:latest
4.13. Upgrading between minor Ansible Automation Platform releases Copiar o linkLink copiado para a área de transferência!
To upgrade between minor releases of Ansible Automation Platform 2, use this general workflow.
With the 2.4-8 installer you can restore a backup created with 2.4-8 or later. However, you cannot restore backups with the 2.4-1 to 2.4-7 installer.
Ensure that you make a backup before and after the upgrade to 2.4-8 or later:
- Make a backup before the upgrade in case the upgrade fails. You can then roll back to the earlier install and apply the backup compatible with that Ansible Automation Platform version.
- Make a postinstall backup that is compatible with the most recent change.
Procedure
- Download and unarchive the latest Ansible Automation Platform 2 setup bundle.
- Create a backup of the existing installation.
- Copy the existing installation inventory file into the new setup bundle directory.
-
Run
./setup.shto upgrade the installation.
For example, to upgrade from version 2.2.0-7 to 2.3-1.2, make sure that both setup bundles are on the initial controller node where the installation occurred:
ls -1F
$ ls -1F
ansible-automation-platform-setup-bundle-2.2.0-7/
ansible-automation-platform-setup-bundle-2.2.0-7.tar.gz
ansible-automation-platform-setup-bundle-2.3-1.2/
ansible-automation-platform-setup-bundle-2.3-1.2.tar.gz
Back up the 2.2.0-7 installation:
cd ansible-automation-platform-setup-bundle-2.2.0-7 sudo ./setup.sh -b cd ..
$ cd ansible-automation-platform-setup-bundle-2.2.0-7
$ sudo ./setup.sh -b
$ cd ..
Copy the 2.2.0-7 inventory file into the 2.3-1.2 bundle directory:
cd ansible-automation-platform-setup-bundle-2.2.0-7 cp inventory ../ansible-automation-platform-setup-bundle-2.3-1.2/ cd ..
$ cd ansible-automation-platform-setup-bundle-2.2.0-7
$ cp inventory ../ansible-automation-platform-setup-bundle-2.3-1.2/
$ cd ..
Upgrade from 2.2.0-7 to 2.3-1.2 with the setup.sh script:
cd ansible-automation-platform-setup-bundle-2.3-1.2 sudo ./setup.sh
$ cd ansible-automation-platform-setup-bundle-2.3-1.2
$ sudo ./setup.sh