Greg Szabo 4240e60612 | 8 years ago | |
---|---|---|
.. | ||
app_options_files | 8 years ago | |
group_vars | 8 years ago | |
img | 8 years ago | |
inventory | 8 years ago | |
roles | 8 years ago | |
.gitignore | 8 years ago | |
LICENSE | 8 years ago | |
README.md | 8 years ago | |
Vagrantfile | 8 years ago | |
ansible.cfg | 8 years ago | |
install.yml | 8 years ago | |
reset.yml | 8 years ago | |
restart.yml | 8 years ago | |
start.yml | 8 years ago | |
status.yml | 8 years ago | |
stop.yml | 8 years ago | |
ubuntu16-patch.yml | 8 years ago | |
upgrade-reset.yml | 8 years ago | |
upgrade.yml | 8 years ago |
The playbooks in this folder run ansible roles which:
Optional for DigitalOcean droplets:
Head over to the Terraform folder for a description on how to get a DigitalOcean API Token.
Optional for Amazon AWS instances:
The cloud inventory scripts come from the ansible team at their GitHub page. You can get the latest version from the contrib/inventory folder.
Ansible requires a "command machine" or "local machine" or "orchestrator machine" to run on. This can be your laptop or any machine that can run ansible. (It does not have to be part of the cloud network that hosts your servers.)
Use the official Ansible installation guide to install Ansible. Here are a few examples on basic installation commands:
Ubuntu/Debian:
sudo apt-get install ansible
CentOS/RedHat:
sudo yum install epel-release
sudo yum install ansible
Mac OSX: If you have (Homebrew)[https://brew.sh] installed, then it's simply
brew install ansible
If not, you can install it using pip
:
sudo easy_install pip
sudo pip install ansible
To make life easier, you can start an SSH Agent and load your SSH key(s). This way ansible will have an uninterrupted way of connecting to your servers.
ssh-agent > ~/.ssh/ssh.env
source ~/.ssh/ssh.env
ssh-add private.key
Subsequently, as long as the agent is running, you can use source ~/.ssh/ssh.env
to load the keys to the current session.
Note: On Mac OSX, you can add the -K
option to ssh-add to store the passphrase in your keychain. The security of this feature is debated but it is convenient.
If you are using a cloud provider to host your servers, you need the below dependencies installed on your local machine.
Ubuntu/Debian:
sudo apt-get install python-pip
sudo pip install dopy
CentOS/RedHat:
sudo yum install python-pip
sudo pip install dopy
Mac OSX:
sudo pip install dopy
Ubuntu/Debian:
sudo apt-get install python-boto
CentOS/RedHat:
sudo yum install python-boto
Mac OSX:
sudo pip install boto
If you just finished creating droplets, the local DigitalOcean inventory cache is not up-to-date. To refresh it, run:
DO_API_TOKEN="<The API token received from DigitalOcean>"
python -u inventory/digital_ocean.py --refresh-cache 1> /dev/null
If you just finished creating Amazon AWS EC2 instances, the local AWS inventory cache is not up-to-date. To refresh it, run:
AWS_ACCESS_KEY_ID='<The API access key ID received from Amazon>'
AWS_SECRET_ACCESS_KEY='<The API secret access key received from Amazon>'
python -u inventory/ec2.py --refresh-cache 1> /dev/null
Note: you don't need the access key and secret key set, if you are running ansible on an Amazon AMI instance with the proper IAM permissions set.
The playbooks are locked down to only run if the environment variable TF_VAR_TESTNET_NAME
is populated. This is a precaution so you don't accidentally run the playbook on all your servers.
The variable TF_VAR_TESTNET_NAME
contains the testnet name which ansible translates into an ansible group. If you used Terraform to create the servers, it was the testnet name used there.
If the playbook cannot connect to the servers because of public key denial, your SSH Agent is not set up properly. Alternatively you can add the SSH key to ansible using the --private-key
option.
If you need to connect to the nodes as root but your local username is different, use the ansible option -u root
to tell ansible to connect to the servers and authenticate as the root user.
If you secured your server and you need to sudo
for root access, use the the -b
or --become
option to tell ansible to sudo to root after connecting to the server. In the Terraform-DigitalOcean example, if you created the ec2-user by adding the noroot=true
option (or if you are simply on Amazon AWS), you need to add the options -u ec2-user -b
to ansible to tell it to connect as the ec2-user and then sudo to root to run the playbook.
DO_API_TOKEN="<The API token received from DigitalOcean>"
TF_VAR_TESTNET_NAME="testnet-servers"
ansible-playbook -i inventory/digital_ocean.py install.yml -e service=basecoin
AWS_ACCESS_KEY_ID='<The API access key ID received from Amazon>'
AWS_SECRET_ACCESS_KEY='<The API secret access key received from Amazon>'
TF_VAR_TESTNET_NAME="testnet-servers"
ansible-playbook -i inventory/ec2.py install.yml -e service=basecoin
By default ansible installs the tendermint, basecoin or ethermint binary versions from the latest release in the repository. If you build your own version of the binaries, you can tell ansible to install that instead.
GOPATH="<your go path>"
go get -u github.com/tendermint/basecoin/cmd/basecoin
DO_API_TOKEN="<The API token received from DigitalOcean>"
TF_VAR_TESTNET_NAME="testnet-servers"
ansible-playbook -i inventory/digital_ocean.py install.yml -e service=basecoin -e release_install=false
Alternatively you can change the variable settings in group_vars/all
.
There are few extra playbooks to make life easier managing your servers.
service
parameter to define which application to install. Defaults to basecoin
.-e service=<servicename>
, like -e service=basecoin
. It will restart the underlying tendermint application too.-e service=<servicename>
, like -e service=basecoin
. It will restart the underlying tendermint application too.-e service=<servicename>
.-e service=<servicename>
.-e service=<servicename>
.service
on your testnet. It will stop the service and restart it at the end. It will only work if the upgraded version is backward compatible with the installed version.service
on your testnet and reset the database. It will stop the service and restart it at the end. It will work for upgrades where the new version is not backward-compatible with the installed version - however it will reset the testnet to its default.The roles are self-sufficient under the roles/
folder.
service
parameter. It can install release packages and update them with custom-compiled binaries.service
. It also configures the underlying tendermint service. Check group_vars/all
for options.service
parameter set.service
parameter set.service
parameter set.Default variables are documented under group_vars/all
. You can the parameters there to deploy a previously created genesis.json file (instead of dynamically creating it) or if you want to deploy custom built binaries instead of deploying a released version.