Ansible快速開始-指揮集羣

Ansible能夠集中地控制多個節點,批量地執行ssh命令。因爲其使用ssh進行操做,所以遠端服務器除了安裝openssh-server(通常服務器已經內置)以外,不須要安裝額外的軟件,所以使用很是簡單和方便。這裏以Ubuntu上的使用爲例,說明其安裝和使用方法。html

一、快速安裝

包括Ansible和sshpass,其中sshpass是用於交互輸入密碼的組件。由於咱們要批量處理大量節點,所以節點的密碼設爲同樣能夠大大簡化配置過程,但這會增長安全性風險,須要設置足夠強度的密碼並妥善保存。node

運行命令以下:python

sudo apt install -y ansible sshpass

二、建立Hosts清單

這是Ansible要操做的節點主機名或IP地址的清單,能夠分組和指定登陸帳號、密碼等參數。該清單有一個系統級的默認存儲位置(參考/etc/ansible/hosts),但不建議應用使用。能夠在本身的目錄下建立一個清單,而後使用環境變量 ANSIBLE_HOSTS 來指示文件位置,或者直接放在當前目錄下,使用-i來指定清單的文件名。git

建立主機清單

  • 建立一個hosts主機清單文件:
echo "127.0.0.1" > ~/ansible_hosts
  • 將環境變量加入啓動文件:
# 將hosts清單放在home目錄,每次系統啓動時自動加載。
echo "export ANSIBLE_HOSTS=~/ansible_hosts" >> ~/.profile

# 當即使用。
source ~/.proflie

更復雜的主機清單

  • 單獨指定主機參數的例子:
[local]
192.168.199.188 ansible_ssh_port=22 ansible_ssh_host=192.168.199.188 ansible_ssh_user=superwork ansible_ssh_pass=SuperMap
192.168.199.249 ansible_ssh_port=22 ansible_ssh_host=192.168.199.249 ansible_ssh_user=supermap ansible_ssh_pass=SuperMap
192.168.199.174 ansible_ssh_port=22 ansible_ssh_host=192.168.199.174 ansible_ssh_user=smt ansible_ssh_pass=SuperMap
  • 更多的主機清單格式:
# ansible主機清單格式

# This is the default ansible 'hosts' file.
#
# It should live in /etc/ansible/hosts
#
#   - Comments begin with the '#' character
#   - Blank lines are ignored
#   - Groups of hosts are delimited by [header] elements
#   - You can enter hostnames or ip addresses
#   - A hostname/ip can be a member of multiple groups

# Ex 1: Ungrouped hosts, specify before any group headers.

#green.example.com
#blue.example.com
#192.168.100.1
#192.168.100.10

# Ex 2: A collection of hosts belonging to the 'webservers' group

#[webservers]
#alpha.example.org
#beta.example.org
#192.168.1.100
#192.168.1.110

# If you have multiple hosts following a pattern you can specify
# them like this:

#www[001:006].example.com

# Ex 3: A collection of database servers in the 'dbservers' group

#[dbservers]
#
#db01.intranet.mydomain.net
#db02.intranet.mydomain.net
#10.25.1.56
#10.25.1.57

# Here's another example of host ranges, this time there are no
# leading 0s:

#db-[99:101]-node.example.com

三、操做多臺主機

ansible能夠自動按照清單在多個主機上經過ssh執行命令。github

立刻試一下

  • 如今來試一下,ping清單中全部的機器:
ansible all -m ping
  • 或者提示輸入 ssh 密碼:
ansible all -m ping --ask-pass

使用--ask-pass提示用戶在運行時輸入密碼,避免將密碼保存在配置文件中,增長必定程度上的安全性。web

  • 指定清單文件,遠程獲取清單中全部機器的hostname:
ansible all -m shell -a "hostname" --ask-pass -i ~/ansible_hosts
  • 獲取Docker信息:
ansible all -m shell -a "docker info" --ask-pass
  • 獲取主機信息:
ansible all -m shell -a "uname -a" --ask-pass

執行sudo操做

下面的命令執行apt update操做,遠程更新各個主機的軟件包。sql

ansible all -m shell -a "apt update && apt upgrade -y" --ask-sudo-pass --become --become-method=sudo

注意上面的--ask-sudo-pass和--become參數,在Ubuntu裏遠程使用sudo來執行系統級的命令。docker

四、密鑰登陸設置

上面使用的是密碼登陸ssh,另一種方法是使用密鑰進行登陸,安全性更強一些,使用也更爲方便。shell

  • 建立密鑰:
ssh-keygen -t rsa
  • 上傳密鑰到遠程主機:
ansible all -m copy -a "src=/home/openthings/.ssh/id_rsa.pub dest=/tmp/id_rsa.pub" --ask-pass
  • 把公鑰文件追加到遠程服務器的受權清單裏。輸入:apache

ansible all -m shell -a "cat /tmp/id_rsa.pub >> /root/.ssh/authorized_keys" --ask-pass -u root
  • 而後,把 /tmp 中的公鑰文件刪除:

ansible all -m file -a "dest=/tmp/id_rsa.pub state=absent" -u root
  • 試一下(如今不須要輸入密碼了,也不需使用--ask-pass參數):
ansible all -m shell -a "hostname" -u root
  • 注意:
    • 使用mass裝機的節點,能夠(設置)自動注入maas controller的ssh密鑰,不須要再次配置。

五、Playbook使用

Playbook將主機清單和命令合成爲一個yaml文件,使用更爲方便。

  • 把上面的ssh密鑰分發的過程編寫爲一個playbook文件,以下:
---
- hosts: SUSEBased
  remote_user: mike
  sudo: yes
  tasks:
    - authorized_key: user=root key="{{ lookup('file', '/home/openthings/.ssh/id_rsa.pub') }}" path=/root/.ssh/authorized_keys manage_dir=no

- hosts: RHELBased
  remote_user: mdonlon
  sudo: yes
  tasks:
    - authorized_key: user=root key="{{ lookup('file', '/home/openthings/.ssh/id_rsa.pub') }}" path=/root/.ssh/authorized_keys manage_dir=no

仍是比較簡明的,下面進一步解釋playbook的格式。

Playbook格式

一個簡單的例子:

---
- hosts: showtermClients
  remote_user: root
  tasks:
    - yum: name=rubygems state=latest
    - yum: name=ruby-devel state=latest
    - yum: name=gcc state=latest
    - gem: name=showterm state=latest user_install=no

主要包括hosts、user和tasks三個主要部分,即主機、用戶和命令。

一個完整的主機配置playbook以下:

---
    - hosts: showtermServers
      remote_user: root
      tasks:
        - name: ensure packages are installed
          yum: name={{item}} state=latest
          with_items:
            - postgresql
            - postgresql-server
            - postgresql-devel
            - python-psycopg2
            - git
            - ruby21
            - ruby21-passenger
        - name: showterm server from github
          git: repo=https://github.com/ConradIrwin/showterm.io dest=/root/showterm
        - name: Initdb
          command: service postgresql initdb
                   creates=/var/lib/pgsql/data/postgresql.conf
     
        - name: Start PostgreSQL and enable at boot
          service: name=postgresql
                   enabled=yes
                   state=started
        - gem: name=pg state=latest user_install=no
      handlers:
       - name: restart postgresql
         service: name=postgresql state=restarted
     
    - hosts: showtermServers
      remote_user: root
      sudo: yes
      sudo_user: postgres
      vars:
        dbname: showterm
        dbuser: showterm
        dbpassword: showtermpassword
      tasks:
        - name: create db
          postgresql_db: name={{dbname}}
     
        - name: create user with ALL priv
          postgresql_user: db={{dbname}} name={{dbuser}} password={{dbpassword}} priv=ALL
    - hosts: showtermServers
      remote_user: root
      tasks:
        - name: database.yml
          template: src=database.yml dest=/root/showterm/config/database.yml
    - hosts: showtermServers
      remote_user: root
      tasks:
        - name: run bundle install
          shell: bundle install
          args:
            chdir: /root/showterm
    - hosts: showtermServers
      remote_user: root
      tasks:
        - name: run rake db tasks
          shell: 'bundle exec rake db:create db:migrate db:seed'
          args:
            chdir: /root/showterm
    - hosts: showtermServers
      remote_user: root
      tasks:
        - name: apache config
          template: src=showterm.conf dest=/etc/httpd/conf.d/showterm.conf

Playbook使用

使用ansible playbook的命令是ansible-playbook,其它參數與ansible是基本一致的。

ansible-playbook testPlaybook.yaml -f 10

注意,上面的 -f 參數指的是並行執行的數量。

六、Ansible命令參考

使用 ansible -h  能夠獲取ansible的命令詳細列表,以下:

Usage: ansible <host-pattern> [options]

Define and run a single task 'playbook' against a set of hosts

Options:
  -a MODULE_ARGS, --args=MODULE_ARGS
                        module arguments
  --ask-vault-pass      ask for vault password

  -B SECONDS, --background=SECONDS
                        run asynchronously, failing after X seconds
                        異步運行,能夠指定超時的時長。
                        (default=N/A)

  -C, --check           don't make any changes; instead, try to predict some
                        of the changes that may occur
  -D, --diff            when changing (small) files and templates, show the
                        differences in those files; works great with --check

  -e EXTRA_VARS, --extra-vars=EXTRA_VARS
                        set additional variables as key=value or YAML/JSON, if
                        filename prepend with @

  -f FORKS, --forks=FORKS
                        specify number of parallel processes to use
                        並行執行,可指定併發數,缺省爲5。
                        (default=5)

  -h, --help            show this help message and exit

  -i INVENTORY, --inventory=INVENTORY, --inventory-file=INVENTORY
                        specify inventory host path or comma separated host
                        list. --inventory-file is deprecated
                        指定host文件路徑或者分隔的host清單。

  -l SUBSET, --limit=SUBSET
                        further limit selected hosts to an additional pattern

  --list-hosts          outputs a list of matching hosts; does not execute
                        anything else
                        列出hosts主機清單。

  -m MODULE_NAME, --module-name=MODULE_NAME
                        module name to execute (default=command)
  -M MODULE_PATH, --module-path=MODULE_PATH
                        prepend colon-separated path(s) to module library (def
                        ault=[u'/home/openswitch/.ansible/plugins/modules',
                        u'/usr/share/ansible/plugins/modules'])
  -o, --one-line        condense output

  --playbook-dir=BASEDIR
                        Since this tool does not use playbooks, use this as a
                        subsitute playbook directory.This sets the relative
                        path for many features including roles/ group_vars/
                        etc.
                        指定playbook的主目錄。

  -P POLL_INTERVAL, --poll=POLL_INTERVAL
                        set the poll interval if using -B (default=15)
                        pull的時間間隔。

  --syntax-check        perform a syntax check on the playbook, but do not
                        execute it

  -t TREE, --tree=TREE  log output to this directory
                        日誌輸出目錄。

  --vault-id=VAULT_IDS  the vault identity to use
  --vault-password-file=VAULT_PASSWORD_FILES
                        vault password file
  -v, --verbose         verbose mode (-vvv for more, -vvvv to enable
                        connection debugging)
  --version             show program's version number and exit

  Connection Options:
    control as whom and how to connect to hosts

    -k, --ask-pass      ask for connection password
                        詢問密碼。
    --private-key=PRIVATE_KEY_FILE, --key-file=PRIVATE_KEY_FILE
                        use this file to authenticate the connection

    -u REMOTE_USER, --user=REMOTE_USER
                        指定遠端主機上的用戶名,將用該用戶操做。
                        connect as this user (default=None)

    -c CONNECTION, --connection=CONNECTION
                        connection type to use (default=smart)
    -T TIMEOUT, --timeout=TIMEOUT
                        override the connection timeout in seconds
                        指定鏈接超時,缺省爲1
                        (default=10)

    --ssh-common-args=SSH_COMMON_ARGS
                        specify common arguments to pass to sftp/scp/ssh (e.g.
                        ProxyCommand)
    --sftp-extra-args=SFTP_EXTRA_ARGS
                        specify extra arguments to pass to sftp only (e.g. -f,
                        -l)
    --scp-extra-args=SCP_EXTRA_ARGS
                        specify extra arguments to pass to scp only (e.g. -l)
    --ssh-extra-args=SSH_EXTRA_ARGS
                        specify extra arguments to pass to ssh only (e.g. -R)

  Privilege Escalation Options:
    control how and which user you become as on target hosts

    -s, --sudo          run operations with sudo (nopasswd) (deprecated, use
                        become)
                        指定使用sudo操做,已過期,使用become。
    -U SUDO_USER, --sudo-user=SUDO_USER
                        desired sudo user (default=root) (deprecated, use
                        become)
                        已過期,使用become。
    -S, --su            run operations with su (deprecated, use become)
                        已過期,使用become。
    -R SU_USER, --su-user=SU_USER
                        run operations with su as this user (default=None)
                        (deprecated, use become)
                        已過期,使用become。

    -b, --become        run operations with become (does not imply password
                        prompting)
                        使用become操做。
    --become-method=BECOME_METHOD
                        privilege escalation method to use (default=sudo),
                        valid choices: [ sudo | su | pbrun | pfexec | doas |
                        dzdo | ksu | runas | pmrun | enable ]
                        become操做方法,缺省爲sudo。
    --become-user=BECOME_USER
                        run operations as this user (default=root)
                        become操做的用戶名,缺省爲root。

    --ask-sudo-pass     ask for sudo password (deprecated, use become)
                        已過期,使用become。
    --ask-su-pass       ask for su password (deprecated, use become)
                        已過期,使用become。
    -K, --ask-become-pass
                        ask for privilege escalation password

Some modules do not make sense in Ad-Hoc (include, meta, etc)

MAAS裝機後的設置和應用軟件安裝

從空機交互安裝MAAS,而後經過網絡啓動來部署節點。

或者使用playbook來安裝mass服務,參考:

而後,能夠經過mass cli的api動態獲取節點的列表,用於ansible的後續操做。參考:

更多參考

相關文章
相關標籤/搜索