Breakout Operators

Total Page:16

File Type:pdf, Size:1020Kb

Breakout Operators Breakout Operators Robert Bohne SR. SPECIALIST SOLUTION ARCHITECT | OPENSHIFT Twitter: @RobertBohne 1 What is an Operator? Operator is a automated software manager that deals with the installation and life cycle of an applications on top of Kubernetes/OpenShift. 2 Controller Custom Resource Definition (CRD) Piece of software that deals OpenShift API extension to interact and with the installation and life cycle of communicate with the Controller. an applications on top of OpenShift. 3 Custom Resource Definition (CRD) Custom Resource (CR) apiVersion: apiextensions.k8s.io/v1beta1 apiVersion: openshift.pub/v1 kind: CustomResourceDefinition kind: Car metadata: metadata: name: cars.openshift.pub name: bmw spec: spec: group: openshift.pub date_of_manufacturing: "2014-07-01T00:00:00Z" names: engine: N57D30 kind: Car listKind: CarList plural: cars singular: car scope: Namespaced subresources: status: {} version: v1 4 Custom Resource Definition (CRD) [..snipped..] additionalPrinterColumns: - JSONPath: .status.conditions[?(@.type=="Succeeded")].status name: Succeeded type: string - JSONPath: .status.conditions[?(@.type=="Succeeded")].reason name: Reason type: string - JSONPath: .spec.date_of_manufacturing name: Produced type: date - JSONPath: .spec.engine name: Engine type: string priority: 1 5 apiVersion: apps/v1 kind: Deployment metadata: name: operator spec: replicas: 1 selector: matchLabels: name: operator template: Controller metadata: labels: Piece of software running name: operator on top of OpenShift spec: containers: - name: operator Image: "quay.io/org/operator:v0.0.1" 6 { } Custom Resource 7 { } Custom Resource 8 k8s API Operator Pattern My Application Custom Resource MyApplication Kubernetes Resources State for My App Controller Watch Events Reconciliation 9 How to create an Operator? 10 Operator Framework in Action OPERATOR SDK “create new operator” DEVELOPER + = KUBERNETES OPERATOR implemented as a container image plus: scaffolding custom logic Deployment Role ClusterRole RoleBinding ClusterRoleBinding ServiceAccount 11 CustomResourceDefinition Operator Adoption Patterns Ansible Playbooks Helm Chart APBs Helm SDK Ansible SDK Go SDK Build operators from Build operators from Build advanced operators Helm chart, without any Ansible playbooks and for full lifecycle coding APBs management 12 Types of Operators 13 Use Cases ideal for operator development ● stateful applications (such as databases) ● clustered or high-availability applications (clustered databases, key value stores such as etcd, in-memory cache clusters such as redis) ● multiservice applications (an application which needs dependent services to come online first) ● microservices (numerous small components that together make up a cohesive product or app) Use cases less ideal for operator development ● stateless apps (most web apps or front-ends) ● infrastructure/host agents (monitoring agents or log forwarders) 14 Demo https://examples.openshift.pub/operator#ansible-operator-example 15 k8s API Ansible Operator My Application Custom Resource Kubernetes Resources for My App MyApplication State Ansible Operator Operator-S Ansible DK Role Ansible k8s modules will be File Mapping used to create resources in kubernetes 16 What you need to create an Ansible Operator ● A CustomResourceDefinition (CRD) ● An Ansible Playbook or Role ● A mapping from CRD to Ansible playbook / roles ● operator-sdk 17 Create the Operator with the SDK $ operator-sdk new memcached-operator \ --api-version=cache.example.com/v1alpha1 \ --kind=Memcached --type=ansible Creates: ● Ansible Role ● Mapping File (watches.yaml) ● Custom Resource Definition ● Deploy manifest for the new Operator 18 Custom Resource (CR) Ansible Operator apiVersion: <Group/Version> kind: <kind> metadata: Spec values will be translated to Ansible extra vars. name: <name> spec: <key>: <value> …. status: <key>: <value> Status will be a generic status defined …. by the operator. This will use ansible runner output to generate meaningful output for the user. 19 Ansible Role memcached/ ├── defaults │ └── main.yml ├── files ├── handlers │ └── main.yml ├── meta Create a Role that deploys and │ └── main.yml ├── README.md manages your application ├── tasks │ └── main.yml ├── templates ├── tests │ ├── inventory │ └── test.yml └── vars └── main.yml 20 Mapping between CRDs and Ansible Maps a Group Version Kind (GVK) to a role or playbook. # watches.yaml --- - version: v1alpha1 - group: cache.example.com kind: Memcached playbook: /path/to/playbook 21 Build the Operator with the SDK $ operator-sdk build memcached-operator:v0.0.1 Creates: ● A Dockerfile that creates the Operator ● Builds the container on top of ansible-runner image 22 What is an Operator? ● Container Image ( contains the software manager ) ● Deployment ● Custom Resource Definition (CRD) Metadata ● Role Bindings ● ... 23 What is an Operator? OPERATOR SDK “create new package DEVELOPER operator” KUBERNETES + = OPERATOR + scaffolding custom logic metadata 24 How to ship an Operator? Catalog Source quay.io / OPERATOR Image Registry OPERATOR LIFECYCLE SDK MANAGER “create new package DEVELOPER operator” “list packages” KUBERNETES + = OPERATOR + scaffolding custom logic metadata ADMINISTRATOR Package Discovery: $ oc get packagemanifests 25 How to ship an Operator? Catalog Source quay.io / OPERATOR Image Registry OPERATOR LIFECYCLE SDK MANAGER “create new package DEVELOPER operator” “list packages” KUBERNETES + = OPERATOR + scaffolding custom logic metadata ADMINISTRATOR Package Discovery: $ oc get packagemanifests 26 27 Deployment Role OPERATOR YourOperator v1.1.2 ClusterRole Bundle LIFECYCLE MANAGER RoleBinding Operator Deployment ClusterRoleBinding Custom Resource Definitions RBAC ServiceAccount API Dependencies Update Path CustomResourceDefinition Metadata 28 OperatorHub Deployment Role OPERATOR LIFECYCLE MANAGER ClusterRole RoleBinding ClusterRoleBinding ServiceAccount CustomResourceDefinition 29 OperatorHub data sources Operator Metadata from quay.io ● Backend for all default sources, cluster needs to be online ● Supplies Red Hat Operators, ISV Operators and Community Operator Operator Package Metadata ● Custom sources supported in customer-owned quay.io Package name namespaces e.g. prometheus Channel name Operator Operator e.g. stable Bundle 1 Bundle 2 ... Operator Metadata in container images ● Already used internally used by OLM Channel name Operator e.g. tech-preview Bundle 3 ● Operator package data is served from a SQlite database, bundled up in a container image ● Custom sources supported in customer-owned image registries ● Cluster can be disconnected / air-gapped 30 ● Certified Operators submitted through Red Hat Connect - listed in OpenShift OperatorHub ● Community Operators submitted through GitHub - listed in both OpenShift and OKD OperatorHub ● Upstream Community Operators also submitted through GitHub - listed in the OperatorHub.io community website 31 CONFIDENTIAL INTERNAL USE How Operator Catalogs are downloaded Operator Metadata from quay.io apiVersion: operators.coreos.com/v1 ● Backend for all default sources, cluster needs to be online kind: OperatorSource metadata: ● Supplies Red Hat Operators, ISV Operators and Community name: johndoe-operators namespace: marketplace Operator spec: type: appregistry ● Custom sources supported in customer-owned quay.io endpoint: https://quay.io/cnr registryNamespace: johndoe namespaces, data uploaded via operator-courier Operator Metadata in container images ● Already used internally used by OLM apiVersion: operators.coreos.com/v1alpha1 kind: CatalogSource ● Operator package data is served from a SQlite database, metadata: name: johndoe-operators bundled up in a container image (created via operator-registry) namespace: olm spec: ● Custom sources supported in customer-owner image registries sourceType: grpc ● Cluster can be disconnected / air-gapped image: johndoe-catalog:latest 32 Operator Framework in Action OPERATOR LIFECYCLE MANAGER Subscription for Catalog containing Release Channel for Instance of YourOperator YourOperator YourOperator YourOperator To install an Operator an administrator... apiVersion: operators.coreos.com/v1alpha1 kind: Subscription 1. Picks an Operator from the Catalog metadata: 2. (Selects a distribution channel from the Operators package) name: johns-subsription namespace: default 3. (Selects a version of the Operators from the channel) spec: channel: stable 4. Creates a Subscription pointing to the Catalog, Operator, Version and Channel name: my-operator a. If no channel is specified, the default channel is used source: johndoe-operators sourceNamespace: olm b. If no version is specified, the latest is used 33 Operator Updates Operator Catalog Version YourOperator v1.2.2 YourOperator v1.2.0 OPERATOR LIFECYCLE MANAGER YourOperator v1.1.3 Subscription for YourOperator YourOperator v1.1.2 Time 34 Proxy Support OpenShift 4.2 Cluster OPERATOR LIFECYCLE MANAGER Cluster Proxy spec: Config containers: Operator - name: my-container image: ... env: - name: HTTP_PROXY Pod value: "..." - name: HTTPS_PROXY value: "..." 35 4.2 Automated Dependency Resolution Operator Framework Dependency Graphs resolves to installed by requires jaeger.jaegertracing.io/v1 Jaeger Operator OPERATOR LIFECYCLE MANAGER requires YourOperator v1.1.2 resolves to installed by cockroachdb.charts.helm.k8s.io/v1alpha1 CockroachDB Operator 36 Namespace / Project SA Role Allow regular users to install Operators ● cluster-admin Service In 4.1: only users carrying roles are allowed Account to install Operators cannot be greater than be greater cannot
Recommended publications
  • IBM Red Hat Ansible Health Check Is Your Red Hat Ansible Environment Working As Hard As You Are?
    IBM Red Hat Ansible health check Is your Red Hat Ansible environment working as hard as you are? Highlights Your journey to cloud has many stops along the way. And, as with all journeys, it’s crucial to know where you want to be and how you’ll get there. No one solution is perfect without some tweaking of the software and tools. And, not all individuals Understand your progress and have experience in Red Hat® solutions and cloud environment management to align to your vision and roadmap. finetune tools as they progress. And, that’s where IBM can help. IBM Services® offers IBM Red Hat Ansible Health Check service to help you get Work to further achieve the goals the most from your Red Hat Ansible®, Ansible Tower and cloud investments by of Ansible and Ansible Tower— highlighting areas for you to adjust. The IBM specialists perform an assessment simplicity, security and stability. based on common challenges, such as provisioning, orchestration, automation, playbooks and processes, including continuous integration or continuous delivery Gain operational efficiencies (CI/CD). Following the 2.5-hour assessment session, you’ll receive a report that with Ansible in the areas of: will identify areas of concern, provide recommendations and help you make more – Infrastructure as code informed decisions for your enterprise and cloud environment. and provisioning – Compliance as code, Helping understand the complexities of automating, configuration management and security automation optimizing and allocating resources – Application deployment, While Ansible is incredibly flexible and adaptable, automation and provisioning orchestration and CI/CD can be complex with the number of technologies that are required to complete the tasks across multiple vendor environments, operating systems, hybrid clouds, – Network automation networks, plugins, modules and APIs.
    [Show full text]
  • Release 3.11.0
    CEKit Release 3.11.0 May 17, 2021 Contents 1 About 3 2 Main features 5 3 I’m new, where to start? 7 4 Releases and changelog 9 5 Contact 11 6 Documentation 13 6.1 Getting started guide........................................... 13 6.2 Handbook................................................ 19 6.3 Guidelines................................................ 61 6.4 Descriptor documentation........................................ 75 6.5 Contribution guide............................................ 137 7 Sponsor 143 8 License 145 i ii CEKit, Release 3.11.0 Contents 1 CEKit, Release 3.11.0 2 Contents CHAPTER 1 About Container image creation tool. CEKit helps to build container images from image definition files with strong focus on modularity and code reuse. 3 CEKit, Release 3.11.0 4 Chapter 1. About CHAPTER 2 Main features • Building container images from YAML image definitions using many different builder engines • Integration/unit testing of images 5 CEKit, Release 3.11.0 6 Chapter 2. Main features CHAPTER 3 I’m new, where to start? We suggest looking at the getting started guide. It’s probably the best place to start. Once get through this tutorial, look at handbook which describes how things work. Later you may be interested in the guidelines sections. 7 CEKit, Release 3.11.0 8 Chapter 3. I’m new, where to start? CHAPTER 4 Releases and changelog See the releases page for latest releases and changelogs. 9 CEKit, Release 3.11.0 10 Chapter 4. Releases and changelog CHAPTER 5 Contact • Please join the #cekit IRC channel on Freenode • You can always mail us at: cekit at cekit dot io 11 CEKit, Release 3.11.0 12 Chapter 5.
    [Show full text]
  • Automating the F5 BIG-IP Platform with Ansible | F5 Technical White
    + TECHNICAL WHITE PAPER Automating the F5 BIG-IP Platform with Ansible TECHNICAL WHITE PAPER Automating the F5 BIG-IP Platform with Ansible Contents Introduction 3 The programmable network 3 A comprehensive joint solution 4 Use case: configure an HTTPS application on the BIG-IP platform 4 Conclusion 9 2 TECHNICAL WHITE PAPER Automating the F5 BIG-IP Platform with Ansible Introduction “The key drivers for the use of DevOps-related frameworks and toolsets remain scalability and reduction of operational expenses.”1 Traditionally, organizations deploy infrastructure and applications using a combination of various documents such as deployment guides along with many manual processes and operations. It’s a time-consuming approach that doesn’t align with ever-increasing requirements for speed and agility. The need to deploy full application stacks and services more quickly and more often in a repeatable manner has driven both development and operational teams toward automation and orchestration. In addition to enabling organizations to better manage applications, infrastructure deployments, and the process of provisioning and de-provisioning, automation reduces the amount of IT resources required and ensures increased reliability, efficiency, and agility. The programmable network Through a deep understanding of best practices for networking and application delivery, F5 empowers organizations to take advantage of the benefits of automation and programmability as they configure and manage devices on the BIG-IP platform. Both the hardware and virtual editions of F5 Application Delivery Controllers (ADCs) feature flexible and programmable management, control and data planes. F5 ADCs achieve programmability through the following features: 1. Traffic Management Shell (tmsh): Allows complete access to configure system features and set up and manage network elements.
    [Show full text]
  • Ansible in Depth
    ansible.com WHITEPAPER ANSIBLE IN DEPTH “Ansible is quite fun INTRODUCTION to use right away. As Ansible is an open source IT configuration management, deployment, and orchestration tool. It is unique from other management tools in many respects, aiming to provide large productivity gains to a wide soon as you write five variety of automation challenges as a more productive drop-in replacement for many core capabilities lines of code it works. in other automation solutions. Furthermore, Ansible seeks to solve major unsolved IT challenges such as With SSH and Ansible clear orchestration of complex multi- tier workflows and cleanly unifying OS configuration and application I can send commands software deployment under a single banner. to 500 servers without Ansible is designed to be minimal in nature, consistent, secure, and highly reliable, with an extremely having even used the low learning curve for administrators, developers, and IT managers. Ansible seeks to keep descriptions servers before.” of IT easy to build, and easy to understand - such that new users can be quickly brought into new IT projects, and longstanding automation content is easily understood even after months of being away from a project. Ansible seeks to make things powerful for expert users, but equally accessible for all skill MARK MAAS UNIX/LINUX SYSTEMS levels, ensuring a quicker time to market for IT projects and faster, less-error prone turnaround on IT ADMINISTRATOR configuration change. BINCKBANK ARCHITECTURE, AGENTS, AND SECURITY One of the primary differentiators between Ansible and many other tools in this space is its architecture. Ansible is an agentless tool that runs in a ‘push’ model - no software is required to be installed on remote machines to make them manageable.
    [Show full text]
  • Ansible Tower Upgrade and Migration Release Ansible Tower 3.7.3
    Ansible Tower Upgrade and Migration Release Ansible Tower 3.7.3 Red Hat, Inc. Sep 29, 2021 CONTENTS 1 Release Notes for Ansible Tower Version 3.7.32 1.1 Ansible Tower Version 3.7.3.......................................2 2 Upgrading Ansible Tower 3 2.1 Upgrade Planning............................................3 2.2 Obtaining Ansible Tower.........................................4 2.3 Setting up the Inventory File.......................................4 2.4 The Setup Playbook...........................................7 3 Role-Based Access Controls 9 3.1 Organization field on Job Templates...................................9 4 Using virtualenv with Ansible Tower 10 4.1 Preparing a new custom virtualenv.................................... 10 4.2 Assigning custom virtualenvs...................................... 12 5 Index 15 6 Copyright © Red Hat, Inc. 16 Index 17 i Ansible Tower Upgrade and Migration, Release Ansible Tower 3.7.3 Thank you for your interest in Ansible Tower. Ansible Tower is a commercial offering that helps teams manage complex multi-tier deployments by adding control, knowledge, and delegation to Ansible-powered environments. Note: You must upgrade your Ansible Tower to Ansible Tower 3.5 before you can upgrade to Ansible Tower 3.7.0. We Need Feedback! If you spot a typo in this documentation, or if you have thought of a way to make this manual better, we would love to hear from you! Please send an email to: [email protected] If you have a suggestion, try to be as specific as possible when describing it. If you have found an error, please include the manual’s title, chapter number/section number, and some of the surrounding text so we can find it easily.
    [Show full text]
  • Red Hat Ceph Storage 3 Installation Guide for Ubuntu
    Red Hat Ceph Storage 3 Installation Guide for Ubuntu Installing Red Hat Ceph Storage on Ubuntu Last Updated: 2021-07-23 Red Hat Ceph Storage 3 Installation Guide for Ubuntu Installing Red Hat Ceph Storage on Ubuntu Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Automating the Enterprise with Ansible
    AUTOMATING THE ENTERPRISE WITH ANSIBLE Dustin Boyd Solutions Architect September 12, 2017 EVERY ORGANIZATION IS A DIGITAL ORGANIZATION. Today, IT is driving innovation. If you can’t deliver software fast, your organization can’t meet the mission, period. Digital organizations are essentially software. If they expect to thrive in a digital environment, they must have an improved competence in software delivery. Gartner 2015 2 COMPLEXITY KILLS PRODUCTIVITY. Complexity is the enemy of innovation, which is why today’s enterprises are looking to automation and DevOps tools and practices. DevOps can help organizations that are pushing to implement a bimodal strategy to support their digitalization efforts. Gartner 2015 3 WHEN YOU AUTOMATE, YOU ACCELERATE. Ansible loves the repetitive work your people hate. It helps smart people do smarter work. All with fewer errors and better accountability. Automation can crush complexity and it gives you the one thing you can’t get enough of… time. 4 “Ansible delivers DevOps to a broader class of enterprise users that include those inside the business units and teams where agile practices and fast provisioning of infrastructure are in demand.” JAY LYMAN, 451 RESEARCH – NOV 2013 GARTNER COOL VENDOR 2015 “Previous vendors in this [DevOps] market often require unique programming skills. Ansible’s simple language reduces the barrier to adoption and opens it up to a variety of skill sets…” 5 AUTOMATION = ACCELERATION “With Ansible Tower, we just click a button and deploy to production in 5 minutes. It used to take us 5 hours with 6 people sitting in a room, making sure we didn’t do anything wrong (and we usually still had errors).
    [Show full text]
  • Dell EMC Ready Stack for Red Hat Openshift Container Platform 4.3 Enabled by Dell EMC Poweredge R-Series Servers and Powerswitch Networking
    Dell EMC Ready Stack for Red Hat OpenShift Container Platform 4.3 Enabled by Dell EMC PowerEdge R-Series Servers and PowerSwitch Networking January 2021 H18212.1 Deployment Guide Abstract This deployment guide provides a validated procedure for deploying Red Hat OpenShift Container Platform 4.3 on Dell EMC PowerEdge servers. Dell Technologies Solutions Copyright The information in this publication is provided as is. Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2021 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Intel, the Intel logo, the Intel Inside logo and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. Other trademarks may be trademarks of their respective owners. Published in the USA 01/21 Deployment Guide H18212.1. Dell Inc. believes the information in this document is accurate as of its publication date. The information is subject to change without notice. s 2 Dell EMC Ready Stack for Red Hat OpenShift Container Platform 4.3 Enabled by Dell EMC PowerEdge R-Series Servers and PowerSwitch Networking Deployment Guide Contents Contents Chapter 1 Introduction 5 Solution overview ..................................................................................................
    [Show full text]
  • Foreman Basics Be Smart
    Foreman Basics Be smart. Think open source. Foreman - Basics Lifecycle management of physical and virtual machines made easy! Agenda Introduction to Foreman Architecture Setup Provisioning Configuration Monitoring Advanced features Introduction to Foreman What's it all about? Facts Project started in 2009 Licensed under the GPLv3 Development pushed by Red Hat Very active & helpful community Overview Tool for provisioning of VMs & bare metal Provides config management & monitoring integration Rails & JavaScript application Exposes a web interface, REST API & CLI Ecosystem Foreman Smart Proxy (foreman-proxy) Katello Tons of plugins Strong suite Very flexible Offers tons of features Active development & open community Modular setup, start small then expand Strong suite Can serve as a source of truth (CMDB) Can be used as an ENC Proper ACL implementation Enterprise Support available (Red Hat Satellite 6) Weak spots Somewhat steep learning curve Can be quite tricky to debug an issue API has room for improvement Offers sometimes too many possible ways to implement a task Architecture Overview of the different components Bird's-eye view Foreman Heart of the whole stack Stores all resources & information Rails stack, use Passenger + nginx / Apache to run it Stores most data in a DB (SQLite, MySQL or PostgreSQL) Local or LDAP users for authentication Smart Proxy Small autonomous HTTP application Exposes a REST API to provide different services Allows Foreman to control components in isolated networks Also called foreman-proxy Smart Proxy DHCP DNS TFTP BMC / IPMI Puppet / Salt / Chef / Ansible Realm / FreeIPA Smart Proxy - DHCP Takes care of reserving the required IPs Provides IP auto-assignment Supports ISC DHCP, MS DHCP & libvirt More providers can be installed or developed (e.g.
    [Show full text]
  • MASS-MIGRATION of 5000 SERVERS to FOREMAN/KATELLO with BOOTSTRAP.PY Evgeni Golov
    MASS-MIGRATION OF 5000 SERVERS TO FOREMAN/KATELLO WITH BOOTSTRAP.PY Evgeni Golov 1 $ WHOAMI Evgeni Golov Software Engineer at Red Hat ex-Consultant at Red Hat Debian and Grml Developer ♥ FOSS ♥ ♥ automation ♥ 2 SITUATION 10k RHEL (5k RHEL5, 4k RHEL6, 1k RHEL7) most of them subscribed to Satellite5/Spacewalk want to move to Satellite6/Foreman this requires a plan 3 TOOLING Satellite 6.1 (Foreman 1.7, Katello 2.2) this was done about a year ago the learnings also apply to Foreman itself bootstrap.py script for registration of machines to Foreman/Katello at that time not even part of the Katello project mimicks the idea of bootstrap.sh from Spacewalk 4 BOOTSTRAP.PY install katello-ca-consumer RPM subscribe the machine using subscription- manager or rhn-migrate-classic-to- rhsm congure katello-agent congure Puppet 5 STEP 1: EL5?! ain't nobody got time for that just let it bit-rot on the old infra there is an migration to EL6/7 planned anyways (guess who is still up and running today?) no need to care for the old content but also no insight if there are any gotchas 6 STEP 2: SIZE THE INFRASTRUCTURE main VM: 12vCore, 32GB RAM, 1TB ash 6 proxies: 8vCore, 24GB RAM, 500G ash rough setup: no machines connect directly to Foreman no more than 1000 clients per proxy most machines don't do Puppet 7 STEP 3: WAIT FOR FIREWALLS there is always a rewall somewhere and it for sure will make you unhappy request the new rewall rules early and broadly (allow ALL the networks!) 8 STEP 4: DESIGN CONTENT the old setup provided almost only RHEL, apps were delivered
    [Show full text]
  • CEPH Filesystem
    Course: Cluster, Grid, Clouds CEPH FileSystem Reported by: An Pham Course: Cluster - Grid - Cloud Computing ITMO University - St. Petersburg, Russia Instructed by: Prof. Andrey Y Shevel June 7, 2018 Table of Content CEPH - Distributed File System .................................................................................2 Architecture ................................................................................................................3 CEPH File System (CEPH FS) ....................................................................................5 Hands-on Lab ............................................................................................................8 References ...............................................................................................................14 An Pham ITMO Seminars - 2018 !1 Course: Cluster, Grid, Clouds CEPH - DISTRIBUTED FILE SYSTEM Introduction As the size and performance requirements of storage systems have increased, file system designers have looked to new architectures to facilitate system scalability. Ceph is a fully open source distributed file system supporting block, object and file based storage, designed for reliability, performance, and scalability from terabytes to exabytes. It consists of MON nodes, OSD nodes and optionally an MDS node. All of these are fully distributed, and may run on the same set of servers. Clients directly interact with all of them. Ceph utilizes a novel placement algorithm (CRUSH), active storage nodes, and peer- to-peer gossip protocols
    [Show full text]
  • Ansible Automation at Tjx
    ANSIBLE AUTOMATION AT TJX Ansible Introduction and TJX Use Case Overview Priya Zambre Infrastructure Engineer Tyler Cross Senior Cloud Specialist Solution Architect AGENDA ● Ansible Engine - what is it and how does it work? ● Ansible Tower - what is it and how does it work? ● TJX - infrastructure challenges ● TJX - why Ansible? ● TJX - Ansible Automation use cases AUTOMATION IS CRITICAL 86% 79% Automation is either mission Of IT organizations will need to critical or very important to their deploy new management and future Cloud strategy automation software between now and 2020 Source: IDC Infobrief sponsored by Red Hat, Automation, DevOps and the Demands of a Multicloud World, March 2018 N= 1171 Worldwide It Operations Decision Makers EVERYBODY NEEDS AUTOMATION ENABLE REUSE Leverage existing people, processes, and (often) technology INCREASE SAVINGS Free up time to work on more important things SPAN SILOS Empower teams to work efficiently CREATE REPEATABILITY Lather, rinse, repeat WHAT IS ANSIBLE AUTOMATION? Ansible Automation provides the glue needed to bridge together all layers of an enterprise architecture. It includes both Ansible Engine and Ansible Tower. Ansible Engine is a simple, cross-platform automation tool for individual engineers, administrators, and operators. Ansible Tower is the enterprise automation platform for controlling, managing, integrating, securing and scaling out execution of Ansible Engine. RED HAT ANSIBLE TOWER Scale + operationalize your automation CONTROL KNOWLEDGE DELEGATION RED HAT ANSIBLE ENGINE Support
    [Show full text]