mirror of https://github.com/ansible/ansible.git
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
159 lines
7.9 KiB
ReStructuredText
159 lines
7.9 KiB
ReStructuredText
12 years ago
|
Amazon Web Services
|
||
|
===================
|
||
12 years ago
|
|
||
|
.. contents::
|
||
|
:depth: 2
|
||
|
|
||
|
Introduction
|
||
|
````````````
|
||
|
|
||
12 years ago
|
Ansible contains a number of core modules for interacting with Amazon Web Services (AWS) and other API compatible private clouds, such as Eucalyptus. (There are other supported cloud systems, but this documentation is about AWS ones). This page illustrates some use cases for provisioning and managing hosts EC2 resources.
|
||
12 years ago
|
|
||
12 years ago
|
Requirements for the AWS modules are minimal. All of the modules require and are tested against boto 2.5 or higher. You'll need this Python module installed on the execution host. If you are using Red Hat Enterprise Linux or CentOS, install boto from `EPEL <http://fedoraproject.org/wiki/EPEL>`_:
|
||
12 years ago
|
|
||
|
.. code-block:: bash
|
||
|
|
||
|
$ yum install python-boto
|
||
|
|
||
|
Provisioning
|
||
|
````````````
|
||
|
|
||
12 years ago
|
The ec2 module provides the ability to provision instance(s) within EC2. Typically the provisioning task will be performed against your Ansible master server as a local_action.
|
||
12 years ago
|
|
||
|
.. note::
|
||
|
|
||
|
Authentication with the AWS-related modules is handled by either
|
||
|
specifying your access and secret key as ENV variables or passing
|
||
|
them as module arguments.
|
||
|
|
||
|
.. note::
|
||
|
|
||
|
To talk to specific endpoints, the environmental variable EC2_URL
|
||
|
can be set. This is useful if using a private cloud like Eucalyptus,
|
||
12 years ago
|
exporting the variable as EC2_URL=https://myhost:8773/services/Eucalyptus.
|
||
|
This can be set using the 'environment' keyword in Ansible if you like.
|
||
12 years ago
|
|
||
12 years ago
|
Provisioning a number of instances in ad-hoc mode mode:
|
||
12 years ago
|
|
||
|
.. code-block:: bash
|
||
|
|
||
|
# ansible localhost -m ec2 -a "image=ami-6e649707 instance_type=m1.large keypair=mykey group=webservers wait=yes"
|
||
|
|
||
|
In a play, this might look like (assuming the parameters are held as vars)::
|
||
|
|
||
|
tasks:
|
||
|
- name: Provision a set of instances
|
||
12 years ago
|
local_action: ec2 keypair={{mykeypair}} group={{security_group}} instance_type={{instance_type}} image={{image}} wait=true count={{number}}
|
||
12 years ago
|
register: ec2
|
||
|
|
||
12 years ago
|
By registering the return its then possible to dynamically create a host group consisting of these new instances. This facilitates performing configuration actions on the hosts immediately in a subsequent play::
|
||
12 years ago
|
|
||
|
tasks:
|
||
|
- name: Add all instance public IPs to host group
|
||
|
local_action: add_host hostname={{ item.public_ip }} groupname=ec2hosts
|
||
12 years ago
|
with_items: ec2.instances
|
||
12 years ago
|
|
||
|
With the host group now created, the second play in your provision playbook might now have some configuration steps::
|
||
|
|
||
|
- name: Configuration play
|
||
|
hosts: ec2hosts
|
||
|
user: ec2-user
|
||
|
gather_facts: true
|
||
|
|
||
|
tasks:
|
||
|
- name: Check NTP service
|
||
|
action: service name=ntpd state=started
|
||
|
|
||
|
The method above ties the configuration of a host with the provisioning step. This isn't always ideal and leads us onto the next section.
|
||
|
|
||
|
Advanced Usage
|
||
|
``````````````
|
||
|
|
||
|
Host Inventory
|
||
|
++++++++++++++
|
||
|
|
||
12 years ago
|
Once your nodes are spun up, you'll probably want to talk to them again. The best way to handle his is to use the ec2 inventory plugin.
|
||
12 years ago
|
|
||
12 years ago
|
Even for larger environments, you might have nodes spun up from Cloud Formations or other tooling. You don't have to use Ansible to spin up guests. Once these are created and you wish to configure them, the EC2 API can be used to return system grouping with the help of the EC2 inventory script. This script can be used to group resources by their security group or tags. Tagging is highly recommended in EC2 and can provide an easy way to sort between host groups and roles. The inventory script is documented `in the API chapter <http://www.ansibleworks.com/docs/api.html#external-inventory-scripts>`_.
|
||
12 years ago
|
|
||
11 years ago
|
You may wish to schedule a regular refresh of the inventory cache to accommodate for frequent changes in resources:
|
||
12 years ago
|
|
||
|
.. code-block:: bash
|
||
|
|
||
|
# ./ec2.py --refresh-cache
|
||
|
|
||
|
Put this into a crontab as appropriate to make calls from your Ansible master server to the EC2 API endpoints and gather host information. The aim is to keep the view of hosts as up-to-date as possible, so schedule accordingly. Playbook calls could then also be scheduled to act on the refreshed hosts inventory after each refresh. This approach means that machine images can remain "raw", containing no payload and OS-only. Configuration of the workload is handled entirely by Ansible.
|
||
|
|
||
|
Pull Configuration
|
||
|
++++++++++++++++++
|
||
|
|
||
12 years ago
|
For some the delay between refreshing host information and acting on that host information (i.e. running Ansible tasks against the hosts) may be too long. This may be the case in such scenarios where EC2 AutoScaling is being used to scale the number of instances as a result of a particular event. Such an event may require that hosts come online and are configured as soon as possible (even a 1 minute delay may be undesirable). Its possible to pre-bake machine images which contain the necessary ansible-pull script and components to pull and run a playbook via git. The machine images could be configured to run ansible-pull upon boot as part of the bootstrapping procedure.
|
||
12 years ago
|
|
||
12 years ago
|
More information on pull-mode playbooks can be found `here <http://www.ansibleworks.com/docs/playbooks2.html#pull-mode-playbooks>`_.
|
||
12 years ago
|
|
||
12 years ago
|
(Various developments around Ansible are also going to make this easier in the near future. Stay tuned!)
|
||
|
|
||
12 years ago
|
Use Cases
|
||
|
`````````
|
||
|
|
||
|
This section covers some usage examples built around a specific use case.
|
||
|
|
||
|
Example 1
|
||
|
+++++++++
|
||
|
|
||
|
Example 1: I'm using CloudFormation to deploy a specific infrastructure stack. I'd like to manage configuration of the instances with Ansible.
|
||
|
|
||
|
Provision instances with your tool of choice and consider using the inventory plugin to group hosts based on particular tags or security group. Consider tagging instances you wish to managed with Ansible with a suitably unique key=value tag.
|
||
|
|
||
|
Example 2
|
||
|
+++++++++
|
||
|
|
||
12 years ago
|
Example 2: I'm using AutoScaling to dynamically scale up and scale down the number of instances. This means the number of hosts is constantly fluctuating but I'm letting EC2 automatically handle the provisioning of these instances. I don't want to fully bake a machine image, I'd like to use Ansible to configure the hosts.
|
||
12 years ago
|
|
||
|
There are two approaches to this use case. The first is to use the inventory plugin to regularly refresh host information and then target hosts based on the latest inventory data. The second is to use ansible-pull triggered by a user-data script (specified in the launch configuration) which would then mean that each instance would fetch Ansible and the latest playbook from a git repository and run locally to configure itself.
|
||
|
|
||
|
Example 3
|
||
|
+++++++++
|
||
|
|
||
|
Example 3: I don't want to use Ansible to manage my instances but I'd like to consider using Ansible to build my fully-baked machine images.
|
||
|
|
||
12 years ago
|
There's nothing to stop you doing this. If you like working with Ansible's playbook format then writing a playbook to create an image; create an image file with dd, give it a filesystem and then install packages and finally chroot into it for further configuration. Ansible has the 'chroot' plugin for this purpose, just add the following to your inventory file::
|
||
|
|
||
|
/chroot/path ansible_connection=chroot
|
||
|
|
||
|
And in your playbook::
|
||
|
|
||
|
hosts: /chroot/path
|
||
|
|
||
|
Pending Information
|
||
12 years ago
|
```````````````````
|
||
12 years ago
|
|
||
12 years ago
|
In the future look here for more topics.
|
||
12 years ago
|
|
||
12 years ago
|
Using Ansible's S3 module
|
||
12 years ago
|
+++++++++++++++++++++++++
|
||
12 years ago
|
|
||
|
these modules are documented on the module page, more walk throughs coming soon
|
||
12 years ago
|
|
||
|
Using Ansible's Elastic Load Balancer Support
|
||
12 years ago
|
+++++++++++++++++++++++++++++++++++++++++++++
|
||
12 years ago
|
|
||
|
these modules are documented on the module page, more walk throughs coming soon
|
||
12 years ago
|
|
||
12 years ago
|
Using Ansible's Cloud Formation Module
|
||
12 years ago
|
++++++++++++++++++++++++++++++++++++++
|
||
12 years ago
|
|
||
|
these modules are documented on the module page, more walk throughs coming soon
|
||
12 years ago
|
|
||
|
.. seealso::
|
||
|
|
||
|
:doc:`examples`
|
||
|
Examples of basic commands
|
||
|
:doc:`playbooks`
|
||
|
Learning ansible's configuration management language
|
||
|
`Mailing List <http://groups.google.com/group/ansible-project>`_
|
||
|
Questions? Help? Ideas? Stop by the list on Google Groups
|
||
|
`irc.freenode.net <http://irc.freenode.net>`_
|
||
|
#ansible IRC chat channel
|
||
|
|