Chapter 2. Installing Red Hat Ansible Automation Platform components on a single machine
You can install Red Hat Ansible Automation Platform components on a single machine in one of the following supported scenarios.
2.1. Installing automation controller with a database on the same node
You can use these instructions to install a standalone instance of automation controller with a database on the same node, or a non-installer managed database. This scenario includes installation of automation controller, including the web frontend, REST API backend, and database on a single machine. It installs PostgreSQL, and configures the automation controller to use that as its database. This is considered the standard automation controller installation scenario.
2.1.1. Prerequisites
- You chose and obtained a platform installer
- You are installing on a machine that meets base system requirements.
2.1.2. Editing the Red Hat Ansible Automation Platform installer inventory file
You can use the Red Hat Ansible Automation Platform installer inventory file to specify your installation scenario.
- Using external databases: ensure the database sections of your inventory file are properly setup.
-
Add automation hub information in the
[automationhub]
group - automation hub and automation controller cannot be installed on the same node.
- automation controller will not configure replication or failover for the database that it uses. automation controller should work with any replication you have.
- The database server should be on the same network or in the same data center as the automation controller server for performance reasons.
- For upgrading an existing cluster: When upgrading a cluster, you may decide that you want to also reconfigure your cluster to omit existing instances or instance groups. Omitting the instance or the instance group from the inventory file will not be enough to remove them from the cluster. In addition to omitting instances or instance groups from the inventory file, you must also deprovision instances or instance groups before starting the upgrade. Otherwise, omitted instances or instance groups will continue to communicate with the cluster, which can cause issues with tower services during the upgrade.
-
For clustered installations: If you are creating a clustered setup, you must replace
localhost
with the hostname or IP address of all instances. All nodes/instances must be able to reach any others using this hostname or address. In other words, you cannot use thelocalhost ansible_connection=local
on one of the nodes AND all of the nodes should use the same format for the host names.
- Root access to remote machines is required. With Ansible, this can be achieved in different ways:
-
ansible_user=root ansible_ssh_pass=”your_password_here”
inventory host or group variables -
ansible_user=root ansible_ssh_private_key_file=”path_to_your_keyfile.pem”
inventory host or group variables -
ANSIBLE_BECOME_METHOD=’sudo’ ANSIBLE_BECOME=True ./setup.sh
For more information on become
plugins, see Understanding privilege escalation.
Procedure
Navigate to the installer
[bundled installer]
$ cd ansible-automation-platform-setup-bundle-<latest-version>
[online installer]
$ cd ansible-automation-platform-setup-<latest-version>
-
Open the
inventory
file with a text editor. -
Edit
inventory
file parameters to specify your installation scenario. Follow the example below.
2.1.3. Example Red Hat Ansible Automation Platform single node inventory file
This example describes how you can populate the inventory file for a single node installation of automation controller.
Do not use special characters for pg_password
. It may cause the setup to fail.
[automationcontroller] 127.0.0.1 ansible_connection=local [database] [all:vars] admin_password='password' pg_host='' pg_port='' pg_database='awx' pg_username='awx' pg_password='password'
2.1.4. Flags and extra vars
You can pass flags and extra variables when installing automation controller.
:
Table 2.1. Flags
Argument | Description |
---|---|
| Show this help message and exit |
|
Path to Ansible inventory file (default: |
| Set additional Ansible variables as key=value or YAML/JSON |
| Perform a database backup in lieu of installing |
| Perform a database restore in lieu of installing |
| Generate and dsitribute a SECRET_KEY |
Use the --
separator to add any Ansible arguments you wish to apply. For example: ./setup.sh -i my_awesome_inventory.yml -e matburt_is_country_gold=True — -K
.
When passing
-r
to perform a database restore default restore path is used unless EXTRA_VARS are provided with a non-default path. See the example below that passed an EXTRA_VAR specifying the restore path:./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
You can force an online installation by passing
-e bundle_install=false
:$ ./setup.sh -e bundle_install=false
Table 2.2. Extra variables
Variable | Description | Default |
---|---|---|
| When installing automation controller make sure Ansible is also up to date |
|
| When installing Tower also create the Demo Org, project, credential, Job Template, etc. |
|
| When installing from a bundle where to put the bundled repos |
|
| Disable HTTPS traffic through nginx, this is useful if offloading HTTPS to a load balancer |
|
| Disable HSTS web-security policy mechanism |
|
| Port to configure nginx to listen to for HTTP |
|
| Port to configure nginx to listen to for HTTPS |
|
| A temp location to use when backing up |
|
| Specify an alternative backup file to restore from | None |
| The minimum RAM required to install Tower (should only be changed for test installation) |
|
| The minimum open file descriptions (should only be changed for test installations) | None |
|
Ignore preflight checks, useful when installing into a template or other non-system image (overrides |
|
Examples
- To upgrade core:
./setup.sh -e upgrade_ansible_with_tower=1
- To disable https handling at nginx:
./setup.sh -e nginx_disable_https=true
- To specify a non-default path when restoring from a backup file:
./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
*
To override an inventory file used by passing it as an argument to the setup script:
2.1.5. Running the Red Hat Ansible Automation Platform installer setup script
You can run the setup script once you finish updating the inventory
file with required parameters for installing your Private Automation Hub.
Procedure
Run the
setup.sh
script$ ./setup.sh
The installation will begin.
2.1.6. Verifying automation controller installation
Once the installation completes, you can verify your automation controller has been installed successfully by logging in with the admin credentials you inserted into the inventory
file.
Procedure
-
Navigate to the IP address specified for the automation controller node in the
inventory
file. -
Log in with the Admin credentials you set in the
inventory
file.
The automation controller server is accessible from port 80 (https://<TOWER_SERVER_NAME>/) but will redirect to port 443 so 443 needs to be available also.
If the installation fails and you are a customer who has purchased a valid license for Red Hat Ansible Automation Platform, please contact Ansible via the Red Hat Customer portal at https://access.redhat.com/.
Your automation controller is now ready for initial configuration.
2.1.6.1. Next steps
- See Automation Controller Administration Guide for administration through customer scripts, management jobs, and more.
- For quick setup of automation controller, see the Automation Controller Quick Setup Guide.
- Review automation controller functionality in the Automation Controller User Guide.
2.1.7. Next steps
- Review Configuring proxy support for Red Hat Ansible Automation Platform if setting up automation controller with a proxy server.
- See Managing usability analytics and data collection from automation controller for information on controlling what information you share with Red Hat.
- See the Ansible Tower Quick Setup Guide to learn more about using automation controller.
2.2. Installing automation controller with an external managed database
You can use these instructions to install a standalone automation controller server on a single machine configured to communicate with a remote PostgreSQL instance as its database. This remote PostgreSQL can be a server you manage, or can be provided by a cloud service such as Amazon RDS.
2.2.1. Prerequisites
- You chose and obtained a platform installer
- You are installing on a machine that meets base system requirements.
2.2.2. Editing the Red Hat Ansible Automation Platform installer inventory file
You can use the Red Hat Ansible Automation Platform installer inventory file to specify your installation scenario.
- Using external databases: ensure the database sections of your inventory file are properly setup.
-
Add automation hub information in the
[automationhub]
group - automation hub and automation controller cannot be installed on the same node.
- automation controller will not configure replication or failover for the database that it uses. automation controller should work with any replication you have.
- The database server should be on the same network or in the same data center as the automation controller server for performance reasons.
- For upgrading an existing cluster: When upgrading a cluster, you may decide that you want to also reconfigure your cluster to omit existing instances or instance groups. Omitting the instance or the instance group from the inventory file will not be enough to remove them from the cluster. In addition to omitting instances or instance groups from the inventory file, you must also deprovision instances or instance groups before starting the upgrade. Otherwise, omitted instances or instance groups will continue to communicate with the cluster, which can cause issues with tower services during the upgrade.
-
For clustered installations: If you are creating a clustered setup, you must replace
localhost
with the hostname or IP address of all instances. All nodes/instances must be able to reach any others using this hostname or address. In other words, you cannot use thelocalhost ansible_connection=local
on one of the nodes AND all of the nodes should use the same format for the host names.
- Root access to remote machines is required. With Ansible, this can be achieved in different ways:
-
ansible_user=root ansible_ssh_pass=”your_password_here”
inventory host or group variables -
ansible_user=root ansible_ssh_private_key_file=”path_to_your_keyfile.pem”
inventory host or group variables -
ANSIBLE_BECOME_METHOD=’sudo’ ANSIBLE_BECOME=True ./setup.sh
For more information on become
plugins, see Understanding privilege escalation.
Procedure
Navigate to the installer
[bundled installer]
$ cd ansible-automation-platform-setup-bundle-<latest-version>
[online installer]
$ cd ansible-automation-platform-setup-<latest-version>
-
Open the
inventory
file with a text editor. -
Edit
inventory
file parameters to specify your installation scenario. Follow the example below.
2.2.3. Example inventory file for a standalone automation controller with an external managed database
This example describes how you can populate the inventory file to deploy an installation of automation controller with an external database.
Do not use special characters for pg_password
. It may cause the setup to fail.
[automationcontroller] 127.0.0.1 ansible_connection=local [database] database.example.com [all:vars] admin_password='password' pg_password='password' pg_host='database.example.com' pg_port='5432' pg_database='awx' pg_username='awx'
2.2.4. Flags and extra vars
You can pass flags and extra variables when installing automation controller.
:
Table 2.3. Flags
Argument | Description |
---|---|
| Show this help message and exit |
|
Path to Ansible inventory file (default: |
| Set additional Ansible variables as key=value or YAML/JSON |
| Perform a database backup in lieu of installing |
| Perform a database restore in lieu of installing |
| Generate and dsitribute a SECRET_KEY |
Use the --
separator to add any Ansible arguments you wish to apply. For example: ./setup.sh -i my_awesome_inventory.yml -e matburt_is_country_gold=True — -K
.
When passing
-r
to perform a database restore default restore path is used unless EXTRA_VARS are provided with a non-default path. See the example below that passed an EXTRA_VAR specifying the restore path:./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
You can force an online installation by passing
-e bundle_install=false
:$ ./setup.sh -e bundle_install=false
Table 2.4. Extra variables
Variable | Description | Default |
---|---|---|
| When installing automation controller make sure Ansible is also up to date |
|
| When installing Tower also create the Demo Org, project, credential, Job Template, etc. |
|
| When installing from a bundle where to put the bundled repos |
|
| Disable HTTPS traffic through nginx, this is useful if offloading HTTPS to a load balancer |
|
| Disable HSTS web-security policy mechanism |
|
| Port to configure nginx to listen to for HTTP |
|
| Port to configure nginx to listen to for HTTPS |
|
| A temp location to use when backing up |
|
| Specify an alternative backup file to restore from | None |
| The minimum RAM required to install Tower (should only be changed for test installation) |
|
| The minimum open file descriptions (should only be changed for test installations) | None |
|
Ignore preflight checks, useful when installing into a template or other non-system image (overrides |
|
Examples
- To upgrade core:
./setup.sh -e upgrade_ansible_with_tower=1
- To disable https handling at nginx:
./setup.sh -e nginx_disable_https=true
- To specify a non-default path when restoring from a backup file:
./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
*
To override an inventory file used by passing it as an argument to the setup script:
2.2.5. Running the Red Hat Ansible Automation Platform installer setup script
You can run the setup script once you finish updating the inventory
file with required parameters for installing your Private Automation Hub.
Procedure
Run the
setup.sh
script$ ./setup.sh
The installation will begin.
2.2.6. Verifying automation controller installation
Once the installation completes, you can verify your automation controller has been installed successfully by logging in with the admin credentials you inserted into the inventory
file.
Procedure
-
Navigate to the IP address specified for the automation controller node in the
inventory
file. -
Log in with the Admin credentials you set in the
inventory
file.
The automation controller server is accessible from port 80 (https://<TOWER_SERVER_NAME>/) but will redirect to port 443 so 443 needs to be available also.
If the installation fails and you are a customer who has purchased a valid license for Red Hat Ansible Automation Platform, please contact Ansible via the Red Hat Customer portal at https://access.redhat.com/.
Your automation controller is now ready for initial configuration.
2.2.6.1. Next steps
- See Automation Controller Administration Guide for administration through customer scripts, management jobs, and more.
- For quick setup of automation controller, see the Automation Controller Quick Setup Guide.
- Review automation controller functionality in the Automation Controller User Guide.
2.2.7. Next steps
- Review Configuring proxy support for Red Hat Ansible Automation Platform if setting up automation controller with a proxy server.
- See Managing usability analytics and data collection from automation controller for information on controlling what information you share with Red Hat.
- See the Ansible Tower Quick Setup Guide to learn more about using automation controller.
2.3. Installing automation hub with a database on the same node
You can use these instructions to install a standalone instance of automation hub with a database on the same node, or a non-installer managed database.
2.3.1. Prerequisites
- You chose and obtained a platform installer
- You are installing on a machine that meets base system requirements.
2.3.2. Red Hat Ansible Automation Platform installation settings
You can use the following settings when installing automation hub:
-
automationhub_importer_settings
: Dictionary of settings/configuration to pass togalaxy-importer
. It will end up in/etc/galaxy-importer/galaxy-importer.cfg
-
automationhub_require_content_approval
: Whether or not automation hub enforces the approval mechanism before collections are made available -
automationhub_disable_https
: Whether or not automation hub should be deployed with TLS enabled -
automationhub_disable_hsts
: Whether or not automation hub should be deployed with the HTTP Strict Transport Security (HSTS) web-security policy mechanism enabled -
automationhub_ssl_validate_certs
: Whether or not automation hub should validate certificate when requesting itself (default = False) because by default, Platform deploys with self-signed certificates -
automationhub_ssl_cert
: Same asweb_server_ssl_cert
but for automation hub UI and API -
automationhub_ssl_key
: Same asweb_server_ssl_key
but for automation hub UI and API -
automationhub_backup_collections
: automation hub provides artifacts in/var/lib/pulp
. By default, this is set totrue
so automation controller automatically backs up the artifacts by default. If a partition (e.g., LVM, NFS, CephFS, etc.) was mounted there, an enterprise organization would ensure it is always backed up. If this is the case, you can setautomationhub_backup_collections = false
and the backup/restore process will not have to backup/restore/var/lib/pulp
.
2.3.3. Editing the Red Hat Ansible Automation Platform installer inventory file
You can use the Red Hat Ansible Automation Platform installer inventory file to specify your installation scenario.
- Using external databases: ensure the database sections of your inventory file are properly setup.
-
Add automation hub information in the
[automationhub]
group - automation hub and automation controller cannot be installed on the same node.
- automation controller will not configure replication or failover for the database that it uses. automation controller should work with any replication you have.
- The database server should be on the same network or in the same data center as the automation controller server for performance reasons.
- For upgrading an existing cluster: When upgrading a cluster, you may decide that you want to also reconfigure your cluster to omit existing instances or instance groups. Omitting the instance or the instance group from the inventory file will not be enough to remove them from the cluster. In addition to omitting instances or instance groups from the inventory file, you must also deprovision instances or instance groups before starting the upgrade. Otherwise, omitted instances or instance groups will continue to communicate with the cluster, which can cause issues with tower services during the upgrade.
-
For clustered installations: If you are creating a clustered setup, you must replace
localhost
with the hostname or IP address of all instances. All nodes/instances must be able to reach any others using this hostname or address. In other words, you cannot use thelocalhost ansible_connection=local
on one of the nodes AND all of the nodes should use the same format for the host names.
- Root access to remote machines is required. With Ansible, this can be achieved in different ways:
-
ansible_user=root ansible_ssh_pass=”your_password_here”
inventory host or group variables -
ansible_user=root ansible_ssh_private_key_file=”path_to_your_keyfile.pem”
inventory host or group variables -
ANSIBLE_BECOME_METHOD=’sudo’ ANSIBLE_BECOME=True ./setup.sh
For more information on become
plugins, see Understanding privilege escalation.
Procedure
Navigate to the installer
[bundled installer]
$ cd ansible-automation-platform-setup-bundle-<latest-version>
[online installer]
$ cd ansible-automation-platform-setup-<latest-version>
-
Open the
inventory
file with a text editor. -
Edit
inventory
file parameters to specify your installation scenario. Follow the example below.
2.3.4. Example standalone automation hub inventory file
This example describes how you can populate the inventory file to deploy a standalone instance of automation hub.
-
For Red Hat Ansible Automation Platform or automation hub: Add an automation hub host in the
[automationhub]
group. You cannot install automation controller and automation hub on the same node. -
Provide a reachable IP address or fully qualified domain name (FDQN) for the
[automationhub]
host to ensure users can sync and install content from automation hub from a different node. Do not use 'localhost'.
[automationcontroller] [automationhub] 127.0.0.1 ansible_connection=local [all:vars] automationhub_admin_password= <PASSWORD> automationhub_pg_host='' automationhub_pg_port='' automationhub_pg_database='automationhub' automationhub_pg_username='automationhub' automationhub_pg_password=<PASSWORD> automationhub_pg_sslmode='prefer' # The default install will deploy a TLS enabled Automation Hub. # If for some reason this is not the behavior wanted one can # disable TLS enabled deployment. # # automationhub_disable_https = False # The default install will generate self-signed certificates for the Automation # Hub service. If you are providing valid certificate via automationhub_ssl_cert # and automationhub_ssl_key, one should toggle that value to True. # # automationhub_ssl_validate_certs = False # SSL-related variables # If set, this will install a custom CA certificate to the system trust store. # custom_ca_cert=/path/to/ca.crt # Certificate and key to install in Automation Hub node # automationhub_ssl_cert=/path/to/automationhub.cert # automationhub_ssl_key=/path/to/automationhub.key
2.3.5. Flags and extra vars
You can pass flags and extra variables when installing automation controller.
:
Table 2.5. Flags
Argument | Description |
---|---|
| Show this help message and exit |
|
Path to Ansible inventory file (default: |
| Set additional Ansible variables as key=value or YAML/JSON |
| Perform a database backup in lieu of installing |
| Perform a database restore in lieu of installing |
| Generate and dsitribute a SECRET_KEY |
Use the --
separator to add any Ansible arguments you wish to apply. For example: ./setup.sh -i my_awesome_inventory.yml -e matburt_is_country_gold=True — -K
.
When passing
-r
to perform a database restore default restore path is used unless EXTRA_VARS are provided with a non-default path. See the example below that passed an EXTRA_VAR specifying the restore path:./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
You can force an online installation by passing
-e bundle_install=false
:$ ./setup.sh -e bundle_install=false
Table 2.6. Extra variables
Variable | Description | Default |
---|---|---|
| When installing automation controller make sure Ansible is also up to date |
|
| When installing Tower also create the Demo Org, project, credential, Job Template, etc. |
|
| When installing from a bundle where to put the bundled repos |
|
| Disable HTTPS traffic through nginx, this is useful if offloading HTTPS to a load balancer |
|
| Disable HSTS web-security policy mechanism |
|
| Port to configure nginx to listen to for HTTP |
|
| Port to configure nginx to listen to for HTTPS |
|
| A temp location to use when backing up |
|
| Specify an alternative backup file to restore from | None |
| The minimum RAM required to install Tower (should only be changed for test installation) |
|
| The minimum open file descriptions (should only be changed for test installations) | None |
|
Ignore preflight checks, useful when installing into a template or other non-system image (overrides |
|
Examples
- To upgrade core:
./setup.sh -e upgrade_ansible_with_tower=1
- To disable https handling at nginx:
./setup.sh -e nginx_disable_https=true
- To specify a non-default path when restoring from a backup file:
./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
*
To override an inventory file used by passing it as an argument to the setup script:
2.3.6. Running the Red Hat Ansible Automation Platform installer setup script
You can run the setup script once you finish updating the inventory
file with required parameters for installing your Private Automation Hub.
Procedure
Run the
setup.sh
script$ ./setup.sh
The installation will begin.
2.3.7. Verifying automation hub installation
Once the installation completes, you can verify your automation hub has been installed successfully by logging in with the admin credentials you inserted into the inventory
file.
Procedure
-
Navigate to the IP address specified for the automation hub node in the
inventory
file. -
Log in with the Admin credentials you set in the
inventory
file.
If the installation fails and you are a customer who has purchased a valid license for Red Hat Ansible Automation Platform, please contact Ansible via the Red Hat Customer portal at https://access.redhat.com/.
Your automation hub is now ready for initial configuration.
2.3.8. Next steps
- To configure user access for automation hub, see the Managing user access in private automation hub.
- See Managing Red Hat Certified and Ansiblre Galaxy collections in automation hub to learn how to add content to your automation hub.
- Learn more about publishing internally developed collections in your automation hub in Publishing proprietary content collections in {Hub Name}.
2.4. Installing automation hub with an external database
You can use these instructions to install a standalone instance of automation hub with an external managed database. This installs the {HubNam} server on a single machine and installs a remote PostgreSQL database using the Ansible Automation Platform installer.
2.4.1. Prerequisites
- You chose and obtained a platform installer
- You are installing on a machine that meets base system requirements.
2.4.2. Red Hat Ansible Automation Platform installation settings
You can use the following settings when installing automation hub:
-
automationhub_importer_settings
: Dictionary of settings/configuration to pass togalaxy-importer
. It will end up in/etc/galaxy-importer/galaxy-importer.cfg
-
automationhub_require_content_approval
: Whether or not automation hub enforces the approval mechanism before collections are made available -
automationhub_disable_https
: Whether or not automation hub should be deployed with TLS enabled -
automationhub_disable_hsts
: Whether or not automation hub should be deployed with the HTTP Strict Transport Security (HSTS) web-security policy mechanism enabled -
automationhub_ssl_validate_certs
: Whether or not automation hub should validate certificate when requesting itself (default = False) because by default, Platform deploys with self-signed certificates -
automationhub_ssl_cert
: Same asweb_server_ssl_cert
but for automation hub UI and API -
automationhub_ssl_key
: Same asweb_server_ssl_key
but for automation hub UI and API -
automationhub_backup_collections
: automation hub provides artifacts in/var/lib/pulp
. By default, this is set totrue
so automation controller automatically backs up the artifacts by default. If a partition (e.g., LVM, NFS, CephFS, etc.) was mounted there, an enterprise organization would ensure it is always backed up. If this is the case, you can setautomationhub_backup_collections = false
and the backup/restore process will not have to backup/restore/var/lib/pulp
.
2.4.3. Editing the Red Hat Ansible Automation Platform installer inventory file
You can use the Red Hat Ansible Automation Platform installer inventory file to specify your installation scenario.
- Using external databases: ensure the database sections of your inventory file are properly setup.
-
Add automation hub information in the
[automationhub]
group - automation hub and automation controller cannot be installed on the same node.
- automation controller will not configure replication or failover for the database that it uses. automation controller should work with any replication you have.
- The database server should be on the same network or in the same data center as the automation controller server for performance reasons.
- For upgrading an existing cluster: When upgrading a cluster, you may decide that you want to also reconfigure your cluster to omit existing instances or instance groups. Omitting the instance or the instance group from the inventory file will not be enough to remove them from the cluster. In addition to omitting instances or instance groups from the inventory file, you must also deprovision instances or instance groups before starting the upgrade. Otherwise, omitted instances or instance groups will continue to communicate with the cluster, which can cause issues with tower services during the upgrade.
-
For clustered installations: If you are creating a clustered setup, you must replace
localhost
with the hostname or IP address of all instances. All nodes/instances must be able to reach any others using this hostname or address. In other words, you cannot use thelocalhost ansible_connection=local
on one of the nodes AND all of the nodes should use the same format for the host names.
- Root access to remote machines is required. With Ansible, this can be achieved in different ways:
-
ansible_user=root ansible_ssh_pass=”your_password_here”
inventory host or group variables -
ansible_user=root ansible_ssh_private_key_file=”path_to_your_keyfile.pem”
inventory host or group variables -
ANSIBLE_BECOME_METHOD=’sudo’ ANSIBLE_BECOME=True ./setup.sh
For more information on become
plugins, see Understanding privilege escalation.
Procedure
Navigate to the installer
[bundled installer]
$ cd ansible-automation-platform-setup-bundle-<latest-version>
[online installer]
$ cd ansible-automation-platform-setup-<latest-version>
-
Open the
inventory
file with a text editor. -
Edit
inventory
file parameters to specify your installation scenario. Follow the example below.
2.4.4. Example standalone automation hub inventory file
This example describes how you can populate the inventory file to deploy a standalone instance of automation hub.
- For Red Hat Ansible Automation Platform or automation hub: Add an automation hub host in the `[automationhub] group. You cannot install automation controller and automation hub on the same node.
-
Provide a reachable IP address or fully qualified domain name (FDQN) for the
[automationhub]
host to ensure users can sync and install content from automation hub from a different node. Do not use 'localhost'.
[automationcontroller] [automationhub] 127.0.0.1 ansible_connection=local [database] host2 [all:vars] automationhub_admin_password= <PASSWORD> automationhub_pg_host='' automationhub_pg_port='' automationhub_pg_database='automationhub' automationhub_pg_username='automationhub' automationhub_pg_password=<PASSWORD> automationhub_pg_sslmode='prefer' # The default install will deploy a TLS enabled Automation Hub. # If for some reason this is not the behavior wanted one can # disable TLS enabled deployment. # # automationhub_disable_https = False # The default install will generate self-signed certificates for the Automation # Hub service. If you are providing valid certificate via automationhub_ssl_cert # and automationhub_ssl_key, one should toggle that value to True. # # automationhub_ssl_validate_certs = False # SSL-related variables # If set, this will install a custom CA certificate to the system trust store. # custom_ca_cert=/path/to/ca.crt # Certificate and key to install in Automation Hub node # automationhub_ssl_cert=/path/to/automationhub.cert # automationhub_ssl_key=/path/to/automationhub.key
2.4.5. Flags and extra vars
You can pass flags and extra variables when installing automation controller.
:
Table 2.7. Flags
Argument | Description |
---|---|
| Show this help message and exit |
|
Path to Ansible inventory file (default: |
| Set additional Ansible variables as key=value or YAML/JSON |
| Perform a database backup in lieu of installing |
| Perform a database restore in lieu of installing |
| Generate and dsitribute a SECRET_KEY |
Use the --
separator to add any Ansible arguments you wish to apply. For example: ./setup.sh -i my_awesome_inventory.yml -e matburt_is_country_gold=True — -K
.
When passing
-r
to perform a database restore default restore path is used unless EXTRA_VARS are provided with a non-default path. See the example below that passed an EXTRA_VAR specifying the restore path:./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
You can force an online installation by passing
-e bundle_install=false
:$ ./setup.sh -e bundle_install=false
Table 2.8. Extra variables
Variable | Description | Default |
---|---|---|
| When installing automation controller make sure Ansible is also up to date |
|
| When installing Tower also create the Demo Org, project, credential, Job Template, etc. |
|
| When installing from a bundle where to put the bundled repos |
|
| Disable HTTPS traffic through nginx, this is useful if offloading HTTPS to a load balancer |
|
| Disable HSTS web-security policy mechanism |
|
| Port to configure nginx to listen to for HTTP |
|
| Port to configure nginx to listen to for HTTPS |
|
| A temp location to use when backing up |
|
| Specify an alternative backup file to restore from | None |
| The minimum RAM required to install Tower (should only be changed for test installation) |
|
| The minimum open file descriptions (should only be changed for test installations) | None |
|
Ignore preflight checks, useful when installing into a template or other non-system image (overrides |
|
Examples
- To upgrade core:
./setup.sh -e upgrade_ansible_with_tower=1
- To disable https handling at nginx:
./setup.sh -e nginx_disable_https=true
- To specify a non-default path when restoring from a backup file:
./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
*
To override an inventory file used by passing it as an argument to the setup script:
2.4.6. Running the Red Hat Ansible Automation Platform installer setup script
You can run the setup script once you finish updating the inventory
file with required parameters for installing your Private Automation Hub.
Procedure
Run the
setup.sh
script$ ./setup.sh
The installation will begin.
2.4.7. Verifying automation controller installation
Once the installation completes, you can verify your automation controller has been installed successfully by logging in with the admin credentials you inserted into the inventory
file.
Procedure
-
Navigate to the IP address specified for the automation controller node in the
inventory
file. -
Log in with the Admin credentials you set in the
inventory
file.
The automation controller server is accessible from port 80 (https://<TOWER_SERVER_NAME>/) but will redirect to port 443 so 443 needs to be available also.
If the installation fails and you are a customer who has purchased a valid license for Red Hat Ansible Automation Platform, please contact Ansible via the Red Hat Customer portal at https://access.redhat.com/.
Your automation controller is now ready for initial configuration.
2.4.7.1. Next steps
- See Automation Controller Administration Guide for administration through customer scripts, management jobs, and more.
- For quick setup of automation controller, see the Automation Controller Quick Setup Guide.
- Review automation controller functionality in the Automation Controller User Guide.
2.4.8. Next steps
- To configure user access for automation hub, see the Managing user access in private automation hub.
- See Managing Red Hat Certified and Ansiblre Galaxy collections in automation hub to learn how to add content to your automation hub.
- Learn more about publishing internally developed collections in your automation hub in Publishing proprietary content collections in {Hub Name}.