Skip to content

dev10 server config

Tom Purucker edited this page Jun 7, 2018 · 1 revision

cgi access

provisioning virtual machines on cgi

original cgi access

email or call cloud service desk.

1-877-505-2736 – option1 Cloud.ServiceDesk.INFRA@cgi.com

yum on red hat

yum cheat sheet

installing R and shinyR

sudo cat yum.log
yum list installed
sudo yum install -y epel-release
sudo yum update -y 
sudo yum install -y R

Ansible configuration of servers

We manage CGI servers through the use of ansible, we have a private repository that contains our ansible configuration scripts. These scripts are deployed on server 7 and can also be used from a machine with the appropriate firewall rules exemptions if ansible is yum/pip installed locally.

Ansible server setup

We are using 7 as an ansible server within cgi. There is a shell script cgi_server_setup.sh that registers with red hat, updates yum, installs epel and installs ansible so that the ansible tools are available. This repo is currently kept in ~/git/qed_anisible directory.

#confirm installation
cat /etc/redhat-release
ansible --version

Hosts file

Ansible uses a hosts file that creates named keys for controlling hosts. Ours is located here. On servers it may be located in /etc/ansible/hosts.

[cgi1]
172.20.100.11
[cgi3]
172.20.100.13
etc..

Only machines added to the Ansible hosts file can be controlled with Ansible

Testing connectivity

We can test the ansible hosts by pinging them with the following commands. We do not have keys set up on cgi yet so this needs to be done one at a time.

ansible all -m ping # only if keys set up
ansible cgi3 -k -u cgifadmin -m ping
#-u => username to SSH into server with (cgifadmin)
#-k => prompt for user’s login password (since we do not currently use SSH keys)

Executing QED Environment Configuration playbook

private config doc

ansible-playbook -k -K qed-cgi-environ.yml --extra-vars="host=cgiX"

Executing QED Django Server Pull Code playbook

ansible-playbook -k -K qed-pull-code.yml --extra-vars="host=cgiX"    
Enter in SSH password for server 1
enter in sudo password = blank
enter in git credentials for private repos

security resources

Clone this wiki locally