Skip to content

tableflip/landexplorer-infrastructure

Repository files navigation

landexplorer infrastructure

Ansible scripts for deploying the service

Prerequisites

  • Install VirtualBox @latest
  • Install Vagrant @1.8.7 (1.9 fails hashicorp/vagrant#8125)
  • Install Ansible >= 2.1.2.0
  • You will need the vault password. Talk to your friendly tableflipper.

Usage

To bootstrap a local test server with vagrant

  • Add 10.100.121.100 dev.api.landexplorer.uk to your local /etc/hosts
# Download and provision a vm
vagrant up

# Update vm with our roles
ansible-playbook -i dev deploy.yml

You now have a test vm, running locally

To bootstrap a new production vm

  • Add the new remote to the relevant inventory
  • Add your public ssh key in /root/.ssh/authorized_keys on the remote
# bootstrap ansible user
ansible-playbook -i production bootstrap.yml --extra-vars "ansible_user=root"

# Intall app and dependencies
ansible-playbook -i production deploy.yml

Populate the database

Once the vm is boostrapped as above, next we need to grab the data. This'll take about 1hr, so go have some lunch.

As root do:

cd /home/landexplorer-api/current/src/bin
./init.sh --create-db
parallel --jobs +1 --eta ./init.sh < files.txt
./init.sh --index

More info on Ansible

β”œβ”€β”€ Vagrantfile        # Test the scripts locally with `vagrant up`
β”œβ”€β”€ group_vars         # Common variables and deploy secrets
β”œβ”€β”€ dev                # Inventory of hosts used in local dev
β”œβ”€β”€ next               # Inventory of staging hosts
β”œβ”€β”€ production         # Inventory of LIVE hosts
β”œβ”€β”€ roles              # Define the tasks that set up a given role.
β”œβ”€β”€ bootstrap.yml      # Playbook for getting new vms up to spec
└── deploy.yml         # Playbook for updating our app

Ansible works by assigning roles to hosts.

  • A host is any server in our infrastructure.
  • A role can be things like api, db, etc.

Roles contain the tasks and and files to install and configure the services needed.

e.g: api clones our app code, installs npm deps, and configures nginx as a proxy.

Key to making it work is ensuring tasks are idempotent. We can run all the tasks at any time. Either the task changes the system as required, or has no effect if that change is already in place.

An inventory defines named groups of servers. We use playbooks to assign roles those groups. We have a playbook that bootstraps a brand new vm to be used by ansible, which we assume will be run once on against each machine.

ansible-playbook -i production bootstrap.yml --extra-vars "ansible_user=root"

where:

  • -i production limits the hosts affected to just those listed in production/inventory
  • bootstrap.yml is the playbook to run.
  • --extra-vars "ansible_user=root" tells ansible to connect as root for this run. It's only needed while we don't have an ansible user.

bootstrap.yml sets up an ansible user on the system, so we can use that instead of root for subsequent runs.

- hosts: app
  roles:
    - bootstrap

By assigning the role bootstrap to app hosts, it's telling ansible to run the tasks defined in roles/boostrap/tasks/main.yml

- name: Ensure ansible user exists
  become: yes
  user: name=ansible comment="Ansible" groups="ansible,sudo"
...

Once we have an ansible user, we can forget about about bootstrap.yml, and get on with setting up our roles, as defined in deploy.yml

At the start of a project, it's normal to have all the roles on the same host; a single vm dealing with the frontend, api and db, as it's then much easier to roll out additional VMs for staging and test.

When we need to scale the infrastructure we can add additional hosts to an inventory, to scale a roll horizontally across many identically configured servers, and we can split roles our to separate hosts, to create optimised VMs with a single purpose; e.g. a separate db server.

Secrets - Ansible Vault

See: http://docs.ansible.com/ansible/playbooks_vault.html

Creating Encrypting Files

Encrypt a list of files. You'll be prompted for a passphrase which'll be the key for decrypting them.

ansible-vault encrypt [files]

For example, to encrypt our deploy keys and secrets, we do:

ansible-vault encrypt group_vars/all/secrets.yml group_vars/dev/dev_secrets.yml group_vars/next/next_secrets.yml group_vars/production/production_secrets.yml

Editing Encrypted Files

ansible-vault edit group_vars/production/production_secrets.yml

Will prompt you for the passphrase and open the file in your default $EDITOR as configured in your shell.