Customize your Installation
Pre-Deployment Configuration
Before launching the playbook, configure your deployment settings by following these steps:
Cluster Architecture Configuration:
Refer to the architecture guide to set up the following sections.
Hosts File Configuration:
Location:
~/nodeum/inventory/
Services Configuration:
Options file:
~/nodeum/group_vars/all/options.yml
Password Configuration:
Passwords file:
~/nodeum/group_vars/all/passwords-v1.yml
Configuration of Hosts Files
Refer to the architecture guide for detailed information. Different file templates are available for deploying services across various nodes:
00-server-local: For standalone installation.
00-server-ssh: For multi-node environments.
10-mariadb-standalone: Deploys MariaDB service in standalone mode.
11-mariadb-cluster: Deploys MariaDB service in cluster mode.
20-web-standalone: Deploys standalone web services.
21-web-haproxy: Deploys a cluster of web services with HAProxy.
30-redis-standalone: Deploys standalone Redis.
31-redis-sentinel: Deploys Redis with Sentinel in cluster mode.
40-main: Defines the remaining service deployment strategy across all nodes.
50-monitoring: Defines the deployment of monitoring services.
Services Configuration:
Service Mapping
To configure the network interface mapping in the group_vars/all/options.yml, follow the example below. It sets the default interface as em0 and assigns a specific service, rails, to interface em1.
Web Server Name
To customize the web server name, you can specify a preferred name instead of using the default 'nodename'.
Configure OpenID
Listening Ports Configuration
By default, the services Front, Scheduler, Monitoring, Dispatcher, Mover, and Finalizer use random listening ports, as specified in the architecture guide. However, you can configure specific ports for each service.
To set specific listening ports, edit the file group_vars/all/options.yml. Within each service's definition, provide the desired port number. This allows you to control the listening ports instead of relying on the default random assignment.
Example for the front service which has the port 8093 defined.
Define the # of parallel movement for the mover
The information is specified in the group_vars/all/options.yml file under the mover section. You can configure the number of mover processes on the server (default is 1) and the maximum number of parallel mover executions. This can be either a formula based on the number of processors or a specified value.
Configuring Finalizer Parallelism
The number of parallel movements for the finalizer can be defined in the group_vars/all/options.yml file under the finalizer section.
By default, one finalizer process is deployed on the server, but this can be adjusted. You can either use a formula based on the number of processors or specify an exact number for the maximum parallel finalizer executions. For more details, refer to the architecture guide.
Activate LDAP plugin
This section explains how to set up the LDAP plugin to retrieve a user's UID and GID using a JWT token.
The list of primary pools are the storage locations where the plugin will be applied.
Activate S3 and SWIFT plugins
To enable Object Storage plugins, navigate to group_vars/all/options.yml in the Mover configuration section.
Activate Mounted File System Storage connections
To configure the Mounted File System Storage, navigate to group_vars/all/options.yml, under the Mover section. Ensure the following options are configured:
type: The type of storage.
parent_name: The logical name of the storage to be recognized during task movement.
always_mounted: Specifies if the storage is mounted outside the data mover.
Activate Object Storage using OpenID authentication
To configure the object storage, edit the group_vars/all/options.yml file in the "Mover" section. Ensure the following options are set:
region_name: Set to your default region.
Auth_url: Provide the Keystone URL.
Identity_provider: Specify your identity provider.
Auth_protocol: Use "openid".
Configure Prometheus
In group_vars/all/options.yml, you can configure Prometheus and Node Exporter. Various options are available to fine-tune your Node Exporter and Prometheus deployment, including interface binding and port mapping. Additionally, settings like the prometheus_scrap_interval can be customized.
Configure Fluentd Loki exporter
To configure Nodeum Logs export to Grafana Loki, modify the group_vars/all/options.yml file with the Fluentd Loki exporter settings.
Input:
localhost: This is the server name for your Grafana Loki setup.3100: This is the port number where the Grafana Loki server is listening.
Password Encryption with Ansible Vault
Ansible Vault allows you to encrypt password files securely. Explore these features to ensure your passwords are protected:
Encryption Options
Prompted Password Encryption: Securely encrypt files by entering the password when prompted during encryption.
Ansible Vault Commands
Encrypt a File:
Edit an Encrypted File:
Change the Vault Password:
Ansible Vault Operations
Encrypt a Password File:
Edit an Encrypted File:
Change the Vault Password:
Utilize these commands to ensure the security and confidentiality of your sensitive information with Ansible Vault.
Last updated
Was this helpful?