Validated Patterns

About the Ansible GitOps framework (AGOF) for validated patterns

The Ansible GitOps Framework provides an extensible framework to do GitOps with Ansible Automation Platform (AAP). It offers useful facilities for developing patterns (community and validated) that work with AAP as the GitOps engine.

When there is no access to OpenShift Container Platform, AGOF provides a standalone solution for deploying and managing validated patterns. This framework leverages GitOps principles without relying on OpenShift.

Administrators can use the Ansible Automation Platform, which includes automation controller, a web-based UI interface to define, operate, scale, and delegate automation across their enterprise.

The repository at Ansible GitOps Framework provides code for installing VMs on AWS, if needed. It can also be used with existing VMs or a functional AAP Controller endpoint.

The Ansible GitOps Framework repository contains code to set up the infrastructure for applying controller_configuration to an AAP instance. It includes some predefined configurations and practices to make the infrastructure as code repository more user-friendly and standardized. An AGOF pattern for example demo is primarily an IaC infrastructure as code (IaC) artifact designed to be used with the controller_configuration collection.

Role of the Ansible Controller

In the Ansible GitOps framework, the Ansible Controller refers to any machine that initiates and runs playbooks. This includes systems running Ansible Core or open source Ansible, where the machine executing the playbooks also acts as the controller. The Ansible Automation Platform (AAP) provides the Automation Controller, which is Red Hat’s productized Ansible Controller.

The Automation controller is the command and control center for Red Hat Ansible Automation Platform, replacing Ansible Tower. It includes a web UI, API, role-based access control (RBAC), a workflow visualizer, and continuous integration and continuous delivery (CI/CD) integrations to help you organize and manage automation across your enterprise.

The Automation Controller serves as the centralized platform for managing and executing automation across infrastructure. Use the Automation Controller to create job templates that standardize the deployment and execution of Ansible playbooks, making automation more consistent and reusable. It integrates essential components such as execution environments for consistent automation execution, projects (repositories for automation content), inventories (target endpoints), and credentials (for secure access to resources).

The webUI provides an intuitive interface to build, monitor, and manage automation workflows, while the API offers seamless integration with other tools, such as CI/CD pipelines or orchestration platforms. Overall, the Automation Controller streamlines the automation lifecycle, ensuring a scalable, secure, and maintainable automation environment.

Ansible framework methods

The main methods for setting up an Ansible framework are as follows:

The focus here is primarily on the AWS-based installation method.

AWS based install

This method is ideal for organizations deploying AAP on AWS infrastructure. In AAP 2.4, the default installation process uses AWS and offers a fully automated setup. It requires AWS credentials and builds an AWS image with Red Hat’s ImageBuilder, setting up AAP within an AWS VPC and subnet. The installation program creates all necessary resources, including AAP Controllers and, optionally, additional components such as the Automation Hub.

This is the easiest method if you already use AWS, as it automates the provisioning of resources, including VMs and network configurations. This requires AWS infrastructure and credentials.

Custom Ansible controller (API install)

In this method, you provide an existing Ansible Automation Platform (AAP) Controller endpoint, either on bare metal or in a private cloud, without needing AWS or pre-configured VMs. You specify the manifest, endpoint hostname, admin credentials, and pass the installation process to a predefined controller_config_dir. This is suitable for complex or custom topologies where you want full control over the deployment.

This method provides maximum flexibility and is designed for advanced users who have their own AAP installations, either on-prem or in complex environments that do not fit into the default or AWS-centric model. You need an existing AAP controller, which might not be ideal for users new to AAP or those looking for more hands-off installation

Creating a validated pattern using the AGOF framework

To deploy a validated pattern, follow these steps:

  1. Clone the Ansible GitOps Framework Minimal Configuration Demo repository by running the following command:

    $ git clone git@github.com:mhjacks/agof_demo_config.git

    This is a minimal pattern that demonstrates how to use the Ansible GitOps Framework.

  2. Clone the AGOF repository by running the following command.

    $ git clone git@github.com:validatedpatterns/agof.git

    This serves as the provisioner for the pattern

Deploying using the AWS-based install method

This method:

  1. Builds an AWS image using Red Hat’s ImageBuilder.

  2. Deploys that image onto a new AWS VPC and subnet.

  3. Deploys AAP on that image using the command line installer.

  4. Hands over the configuration of the AAP installation to the specified agof_controller_config_dir.

Prerequisites

You need to provide some key information to a file named agof_vault.yml created in your home directory. The key pieces of information needed are:

  • The name of a hosted zone created under Route 53 in AWS. For example this could be aws.validatedpatterns.io.

  • Your AWS account Account ID

  • Your aws key

  • Your secret access key

Procedure
  1. Copy the agof_vault_template.yml from the cloned agof directory to your home directory and rename it agof_vault.yml.

    $ cp ~/agof/agof_vault_template.yml ~/agof_vault.yml
    Table 1. Agof vault settings
    ArgumentDescription

    aws_account_nbr_vault

    Your AWS account number. This is needed for sharing composer images.

    aws_access_key_vault

    Your AWS access key.

    aws_secret_key_vault

    Your AWS secret key.

    pattern_prefix

    A unique prefix to distinguish instances in AWS. Used as the pattern name and in public DNS entries.

    ec2_region

    An AWS region that your account has access to.

    offline_token

    A Red Hat offline token used to build the RHEL image on console.redhat.com.

    Click the GENERATE TOKEN link at Red Hat API Tokens to create the token.

    redhat_username

    Red Hat Subscription username, used to log in to registry.redhat.io.

    redhat_password

    Red Hat Subscription password, used to log in to registry.redhat.io.

    admin_password

    An admin password for AAP Controller and Automation Hub.

    manifest_content

    Content for a manifest file to entitle AAP Controller. See below for an example of how to point to a local file.

    org_number_vault

    The Organization Number (Org ID) attached to your Red Hat Subscription for RHEL and AAP.

    activation_key_vault

    The name of an Activation Key to embed in the imagebuilder image.

    Click the Create Activation Keys link at console.redhat.com > Red Hat Enterprise Linux > Inventory > System Configuration > Activation Keys to create an activation key.

    skip_imagebuilder_build

    Set these variables to provide your own AMI, or to re-use an AMI previously generated with this process. When a previously built AMI is found this check does not take place. #imagebuilder_ami: 'The ID of an AWS AMI image, preferably one that was built with this toolkit'

    automation_hub_token_vault

    A token associated with your AAP subscription used to retrieve Automation Hub content.

    Click the Load token link at console.redhat.com > Ansible Automation Platform > Automation Hub > Connect to Hub to generate a token.

    automation_hub_url_certified_vault

    Optional: The private automation hub URL for certified content.

    automation_hub_url_validated_vault

    Optional: The private automation hub URL for validated content.

  2. Edit the file and add the following:

    • agof_controller_config_dir: set it’s value to {{ '~/agof_minimal_demo' | expanduser }}.

    • db_password: sets an appropriate value for the postgres password for the DB instance for example test.

    • agof_statedir: set its value to "{{ '~/agof' | expanduser }}"

    • agof_iac_repo: set its value to "https://github.com/mhjacks/agof_demo_config.git"

  3. Optional: Create a subscription manifest by following the guidance at Obtaining a manifest file.

    1. Update your agof_vault.yml file with the path to the downloaded manifest zip file. For example add the following:

      controller_license_src_file: '~/Downloads/<manifest_filename>.zip'
      manifest_content: "{{ lookup('file', controller_license_src_file) | b64encode }}"
      Example agof_vault.yml file
      ---
      aws_account_nbr_vault: '<AWS_account_ID>'
      aws_access_key_vault: '<AWS_access_key>'
      aws_secret_key_vault: '<AWS_secret_key>'
      
      pattern_prefix: 'foga'
      pattern_dns_zone: 'aws.validatedpatterns.io'
      
      ec2_name_prefix: 'foga-testing'
      ec2_region: 'us-east-1'
      
      offline_token: '<insert-token-here>'
      
      redhat_username: 'rhn-support-myusername'
      redhat_password: 'passwd01'
      
      admin_password: 'redhat123!'
      
      manifest_content: "Content for a manifest file to entitle AAP Controller. See below for an example of how to point to a local file"
      #manifest_content: "{{ lookup('file', '~/Downloads/manifest_AVP_20230510T202608Z.zip') | b64encode }}"
      
      org_number_vault: "<Org-ID>"
      activation_key_vault: "kevs-agof-key"
      
      # Set these variables to provide your own AMI, or to re-use an AMI previously generated with this process
      #skip_imagebuilder_build: 'boolean: skips imagebuilder build process'
      #imagebuilder_ami: 'The ID of an AWS AMI image, preferably one that was built with this toolkit'
      
      automation_hub_token_vault: '<insert-token-here>'
      
      # These variables can be set but are optional. The previous (before AAP 2.4) conncept of sync-list was private
      # to an account.
      #automation_hub_url_certified_vault: 'The private automation hub URL for certified content'
      #automation_hub_url_validated_vault: 'The private automation hub URL for validated content'
      
      controller_config_dir: "{{ '~/agof_minimal_demo' | expanduser }}"
      
      db_password: 'test'
      
      agof_statedir: "{{ '~/agof' | expanduser }}"
      
      agof_iac_repo: "https://github.com/mhjacks/agof_demo_config.git"
  4. Run the following command from the AGOF repository directory:

    $ ./pattern.sh make install

    This command invokes the controller_configuration dispatch role on the controller endpoint based on the configuration found in the controller_configuration_dir and in your agof_vault.yml file. This controls all of the controller configuration. Based on the variables defined in the controller configuration, dispatch calls the necessary roles and modules in the right order to configure AAP to run your pattern.

Verification

The default installation provides an AAP 2.4 installation deployed by using the containerized installer, with services deployed this way:

Table 2. agof_vault settings
URLService

https:{{ ec2_name_prefix }}.{{ domain }}:8443

Controller API.

https:{{ ec2_name_prefix }}.{{ domain }}:8444/

Private Automation Hub

https:/{{ ec2_name_prefix }}.{{ domain }}:8445/`

EDA Automation Controller

Once the install completes, you will have a project, an inventory (consisting of the AAP controller), a credential (the private key from ec2), a job template (which runs a fact gather on the AAP controller) and a schedule that will run the job template every 5 minutes.

  1. Log in to https://aap.{{ ec2_name_prefix }}.{{ domain }}:8443 with the username admin and the password as configured in admin_password field of agof_vault.yml.

  2. Under Resources > Projects verify the project Ansible GitOps Framework Minimal Demo is created with status Successful.

  3. Under Resources > Inventories verify the inventory AGOF Demo Inventory is created with sync status Success.

  4. Under Resources > Templates verify the job template Ping Playbook is created.

  5. Under Resources > Credentials verify the ec2 ssh credential ec2_ssh_credential is created.

  6. Under Views > Schedules verify the schedules are created.

Custom Ansible controller (API install)

In this method, you provide an existing Ansible Automation Platform (AAP) Controller endpoint, either on bare metal or in a private cloud, without needing AWS or pre-configured VMs.

You supply the manifest contents, endpoint hostname, admin username (defaults to "admin"), and admin password, and then the installation hands off to a controller_config_dir you define.

  • Run the following command to install by using this method:

    $ ./pattern.sh make api_install

Tearing down the installation

  • To tear down the installation run the following command:

    $ ./pattern.sh make aws_uninstall