forked from redhat-cop/agnosticd
-
Notifications
You must be signed in to change notification settings - Fork 0
/
env_vars.yml
230 lines (191 loc) · 7.27 KB
/
env_vars.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
###### VARIABLES YOU SHOULD CONFIGURE FOR YOUR DEPLOYEMNT
###### OR PASS as "-e" args to ansible-playbook command
### Common Host settings
# Repo Method. One of file, satellite and rhn
repo_method: file
#If using repo_method: satellite, you must set these values as well.
# satellite_url: satellite.example.com
# satellite_org: Sat_org_name
# satellite_activationkey: "rhel7basic"
# Do you want to run a full yum update
update_packages: false
## guid is the deployment unique identifier, it will be appended to all tags,
## files and anything that identifies this environment from another "just like it"
#guid: defaultguid
# The next flag is 1 by default. If it is set to more than 1 then instead of creating
# clientvm.guid.baseurl it will create clientvm{1..num_users}.guid.baseurl
num_users: 1
install_bastion: true
install_common: true
install_opentlc_integration: true
install_ipa_client: false
install_student_user: false
install_ftl: false
# install openshift python modules on bastion
install_k8s_modules: true
## Automatically deploy ocp4 cluster using the installer
# Next Settings for released versions of OpenShift
install_ocp4: true
ocp4_installer_version: "4.1.0"
# Next settings are for Dev Preview releases of OpenShift
# These will override the installer version with the direct downloads
# Set ocp4_installer_use_dev_preview=True to enable the installer and client URLs
#ocp4_installer_use_dev_preview: False
#ocp4_installer_url: https://mirror.openshift.com/pub/openshift-v4/clients/ocp-dev-preview/4.2.0-0.nightly-2019-08-27-072819/openshift-install-linux-4.2.0-0.nightly-2019-08-27-072819.tar.gz
#ocp4_client_url: https://mirror.openshift.com/pub/openshift-v4/clients/ocp-dev-preview/4.2.0-0.nightly-2019-08-27-072819/openshift-client-linux-4.2.0-0.nightly-2019-08-27-072819.tar.gz
# Run logic to enable cluster shutdown before 24h initial certificate rotation (default is true)
ocp4_enable_cluster_shutdown: true
cluster_name: "cluster-{{ guid }}"
cloud_tags:
env_type: "{{ env_type }}"
guid: "{{ guid }}"
course_name: "{{ course_name | d('unknown') }}"
platform: "{{ platform | d('unknown') }}"
# Smoke tests
# if set to true, the playbook will fail if the smoke tests failed.
# if set to false, the smoke tests are just informative.
smoke_tests: false
## Install Authentication.
## Valid options are none, htpasswd, ldap (and maybe in the future sso)
## For LDAP a bindPassword needs to be passed via the command line
## Another valid option is local-ldap if you use the ocp4-workload-idm workload
install_idm: "none"
idm_ca_url: http://ipa.opentlc.com/ipa/config/ca.crt
auth_remove_kubeadmin: true
### If you want a Key Pair name created and injected into the hosts,
# set `set_env_authorized_key` to true and set the keyname in `env_authorized_key`
# you can use the key used to create the environment or use your own self generated key
# if you set "use_own_key" to false your PRIVATE key will be copied to the bastion. (This is {{key_name}})
use_own_key: true
env_authorized_key: "{{guid}}key"
ansible_ssh_private_key_file: ~/.ssh/{{key_name}}.pem
set_env_authorized_key: true
# Is this running from Red Hat Ansible Tower
#tower_run: false
### AWS EC2 Environment settings
### Route 53 Zone ID (AWS)
# This is the Route53 HostedZoneId where you will create your Public DNS entries
# This only needs to be defined if your CF template uses route53
HostedZoneId: Z3IHLWJZOU9SRT
# The region to be used, if not specified by -e in the command line
aws_region: us-east-1
# The key that is used to
key_name: "default_key_name"
## Networking (AWS)
subdomain_base_short: "{{ guid }}"
subdomain_base_suffix: ".example.opentlc.com"
subdomain_base: "{{subdomain_base_short}}{{subdomain_base_suffix}}"
## OCP 4 Environment Sizing
clientvm_instance_type: "t2.medium"
clientvm_instance_count: 1
master_instance_type: "m4.xlarge"
master_instance_count: 3
master_storage_type: "gp2"
worker_instance_type: "m4.4xlarge"
worker_instance_count: 3
worker_storage_type: "gp2"
# YAML List of Default Workloads. REQUIRES Ansible 2.7+ on
# the deployer host
# Empty by default - to be set by specific configurations
default_workloads: []
# reference workload order:
# - ocp4-workload-infra-nodes
# - ocp4-workload-sleep
# - ocp4-workload-project-request-template
# - ocp4-workload-enable-service-broker
# - ocp4-workload-template-service-broker
# - ocp4-workload-automation-broker
# - ocp4-workload-logging
# - ocp4-workload-opentlc-production
# - ocp4-workload-nexus-operator
# - ocp-workload-terminal
# - ocp4-workload-userquota-operator
# - ocp4-workload-enable-lets-encrypt-certificates
# - ocp4-workload-metering
# Some workloads create infrastructure that needs to be removed
# when deleting the software or infrastructure
remove_workloads: []
# Variables for workloads (like Infra Nodes / Logging / ...)
# _infra_node_replicas: 1
# _infra_node_instance_type: "m5.2xlarge"
# _infra_node_elasticsearch_nodes: true
# _infra_node_elasticsearch_instance_type: "m5.4xlarge"
# _infra_node_elasticsearch_replicas: 1
# _logging_use_dedicated_nodes: "elasticsearch"
# _logging_elasticsearch_replicas: "{{ _infra_node_elasticsearch_replicas }}"
_opentlc_production_remove_self_provisioner: False
###### VARIABLES YOU SHOULD ***NOT*** CONFIGURE FOR YOUR DEPLOYEMNT
ansible_user: ec2-user
remote_user: ec2-user
common_packages:
- python
- unzip
- bash-completion
- tmux
- bind-utils
- wget
- ansible
- git
- vim-enhanced
- iptables-services
- httpd-tools
- openldap-clients
rhel_repos:
- rhel-7-server-rpms
- rhel-7-server-extras-rpms
- rhel-7-server-ansible-2.7-rpms
- rhel-7-server-optional-rpms
# use_subscription_manager: false
# use_own_repos: true
#
rhn_pool_id_string: OpenShift Container Platform
### CLOUDFORMATIONS vars
project_tag: "{{ env_type }}-{{ guid }}"
zone_internal_dns: "{{guid}}.internal."
chomped_zone_internal_dns: "{{guid}}.internal"
bastion_public_dns: "bastion.{{subdomain_base}}."
bastion_public_dns_chomped: "bastion.{{subdomain_base}}"
vpcid_name_tag: "{{subdomain_base}}"
az_1_name: "{{ aws_region }}a"
az_2_name: "{{ aws_region }}b"
# subnet_private_1_cidr_block: "192.168.2.0/24"
# subnet_private_1_az: "{{ az_2_name }}"
# subnet_private_1_name_tag: "{{subdomain_base}}-private"
#
# subnet_private_2_cidr_block: "192.168.1.0/24"
# subnet_private_2_az: "{{ az_1_name }}"
# subnet_private_2_name_tag: "{{subdomain_base}}-private"
#
# subnet_public_1_cidr_block: "192.168.10.0/24"
# subnet_public_1_az: "{{ az_1_name }}"
# subnet_public_1_name_tag: "{{subdomain_base}}-public"
#
# subnet_public_2_cidr_block: "192.168.20.0/24"
# subnet_public_2_az: "{{ az_2_name }}"
# subnet_public_2_name_tag: "{{subdomain_base}}-public"
#
# dopt_domain_name: "{{ aws_region }}.compute.internal"
#
# rtb_public_name_tag: "{{subdomain_base}}-public"
# rtb_private_name_tag: "{{subdomain_base}}-private"
#
# cf_template_description: "{{ env_type }}-{{ guid }} template "
# cloudformation_retries: 2
# ocp_report: false
instances:
- name: "clientvm"
count: "{{clientvm_instance_count}}"
unique: "{{ true if clientvm_instance_count | int <= 1 else false }}"
public_dns: true
alt_name:
- bastion
flavor:
"ec2": "{{clientvm_instance_type}}"
tags:
- key: "AnsibleGroup"
value: "bastions,clientvms"
- key: "ostype"
value: "linux"
rootfs_size: 30
security_groups:
- BastionSG