Ansible的介绍与安装

第一章、Ansible的介绍与安装

一、自动化与linux系统管理(为什么要学习自动化运维)

大多系统管理和基础架构管理都依赖于通过图形或者命令行用户界面执行的手动任务,系统管理员通常使用检查清单、其他文档或者记忆的例程来执行标准任务,这样的做法容易出错,系统管理员很容易跳过某个步骤或者错误的执行某个步骤,对步骤执行是否正确或者产生的预期的结果的验证通常有限。
自动化可以帮助我们避免手动管理系统和基础架构造成的问题。作为系统管理员,我们可以使用它来确保快速、正确地部署和配置所有系统。这样,我们可以自动执行日常计划中的重复性任务,从而空出时间并专注于更重要的事情。

二、什么是ansible

Ansible是新出现的自动化运维工具,基于Python开发,集合了众多运维工具的优点,实现了批量系统配置、批量程序部署、批量运行命令等功能。
Ansible是一款开源自动化平台,它是一种简单的自动化语言,能够在ansible playbook中完美地描述IT应用基础架构。它也是一个自动化引擎,可运行ansible playbook。
Ansible功能很强大,可以利用ansible部署应用,也可将它用于配置管理、工作流自动化和网络自动化。Ansible可以用于编排整个应用生命周期。
Ansible围绕无代理架构构建。通常而言,ansible通过OpenSSH或WinRM连接它所管理的主机并且运行任务,方法通常是(但不总是)将称为ansible模块的小程序推送至这些主机。这些程序用于将系统置于需要的特定状态。在ansible运行完其任务后,推送的所有模块都会被删除。
Ansible是基于 paramiko 开发的,并且基于模块化工作,本身没有批量部署的能力。真正具有批量部署的是ansible所运行的模块,ansible只是提供一种框架。ansible不需要在远程主机上安装client/agents,因为它们是基于ssh来和远程主机通讯的。ansible目前已经已经被红帽官方收购

三、ansible优点

  • 1、跨平台支持:ansible提供Linux、windows、unix和网络设备的无代理支持,适用于物理、虚拟、云和容器环境。
  • 2、人类可读的自动化:ansible playbook采用YAML文本文件编写,易于阅读,有助于确保所有人都能理解它们的用途。
  • 3、完美描述应用:可以通过ansible playbook进行每一种更改,并描述和记录应用环境的每一个方面。
  • 4、轻松管理版本控制:ansible playbook和项目是纯文本,它们可以视作源代码,放在您的现有版本控制系统中。
  • 5、支持动态清单:可以从外部来源动态更新ansible管理的计算机的列表,随时获取所有受管服务器的当前正确列表,不受基础架构或位置的影响。
  • 6、编排可与其他系统轻松集成:能够利用环境中现有的HP SA、Puppet、Jenkins、红帽卫星和其他系统,并且集成到您的ansible工作中。

四、ansible管理方式

Ansible是一个模型驱动的配置管理器,支持多节点发布、远程任务执行。默认使用SSH进行远程连接。无需在被管节点上安装附加软件,可使用各种编程语言进行扩展。Ansible管理系统由控制主机和一组被管节点组成。控制主机直接通过SSH控制被管节点,被管节点通过 Ansible的资源清单 (inventory)来进行分组管理。

五、ansible系统架构

在控制主机时,ansible是如何知道哪些主机是被自己控制的呢?
这就需要一个Host Inventory(主机清单),用于记录ansible可以控制网络中的哪些主机。另外,要配置和管理这些主机,可以采用两种方式,一种是单一的命令实现,另外一种也可以使用palybook实现。单一的命令模式是采用不同的模块进行管理,一个模块类似于一些管理的命令,如top,ls,ping等等,适用于临时性的操作任务。如果需要执行一些例行性或经常性的操作,则需要采用playbook的方式,playbook类似于一个脚本,将多个模块按一定的逻辑关系进行组合,然后执行。ansible还支持一些插件,如邮件、日志等,在和远程主机通信时,也会采用类似的连接插件,这里使用则是SSH协议的插件进行通信。

  • 核心: ansible
  • Core Modules: ansible自带的模块
  • Custom Modules: 核心模块功能不足时,用户可以添加扩展模块
  • Plugins: 通过插件来实现记录日志,发送邮件或其他功能
  • Playbooks: 剧本,YAML格式文件,多个任务定义在一个文件中,定义主机需要调用哪些模块来完成的功能
  • Connection Plugins: ansible基于连接插件连接到各个主机上,默认是使用ssh
  • Host Inventory: 记录由Ansible管理的主机信息,包括端口、密码、ip等

六、ansible任务执行模式

Ansible系统由控制主机对被管节点的操作方式可分为两类,即ad-hoc和playbook:

  • ad-hoc模式(点对点模式)
    使用单个模块,支持批量执行单条命令。ad-hoc 命令是一种可以快速输入的命令,而且不需要保存起来的命令。就相当于bash中的一句话shell。

  • playbook模式(剧本模式)
    是Ansible主要管理方式,也是Ansible功能强大的关键所在。playbook通过多个task集合完成一类功能,如Web服务的安装部署、数据库服务器的批量备份等。可以简单地把playbook理解为通过组合多条ad-hoc操作的配置文件。

七、ansible工作流程
Ansible的介绍与安装_第1张图片

八,ansible部署

[root@ansible ~]#  cd /etc/yum.repos.d/
[root@ansible yum.repos.d]#  curl -o /etc/yum.repos.d/CentOS-Base.repo https://mirrors.aliyun.com/repo/Centos-vault-8.5.2111.repo
[root@ansible yum.repos.d]#  yum install -y https://mirrors.aliyun.com/epel/epel-release-latest-8.noarch.rpm
[root@ansible yum.repos.d]# dnf -y install ansible

查看ansible版本

[root@ansible yum.repos.d]# ansible --version
ansible 2.9.27
  config file = /etc/ansible/ansible.cfg
  configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules']
  ansible python module location = /usr/lib/python3.6/site-packages/ansible
  executable location = /usr/bin/ansible
  python version = 3.6.8 (default, Dec  5 2019, 15:45:45) [GCC 8.3.1 20191121 (Red Hat 8.3.1-5)]
//通过使用setup模块验证localhost上的ansible_python_version
[root@ansible yum.repos.d]# ansible -m setup localhost | grep ansible_python_version
        "ansible_python_version": "3.6.8",

配置/etc/hosts

[root@ansible ~]# vim /etc/hosts
192.168.253.133  ansible.example.com   ansible
192.168.253.134  node1.example.com   node1
192.168.253.150  node2.example.com   node2
192.168.253.136  node3.example.com   node3

配置ssh的基于密钥认证

[root@ansible ~]# ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa): 
Created directory '/root/.ssh'.
Enter passphrase (empty for no passphrase): 
Enter same passphrase again: 
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:smaLiXVfLVNU8UmUOwH2cBcjgZg7bTEoPG6jdlXFu7Q root@ansible
The key's randomart image is:
+---[RSA 3072]----+
|      .   + +B*B+|
|       + + =.o*++|
|      . o + + .o+|
|       + + + o o |
|      + S o o o .|
|     o +   o E   |
|    o *   + .    |
|   o * o . o     |
|  . o . .        |
+----[SHA256]-----+
[root@ansible ~]# ssh-copy-id -i ~/.ssh/id_rsa.pub root@node1
/usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub"
The authenticity of host 'node1 (192.168.253.134)' can't be established.
ECDSA key fingerprint is SHA256:0SudoRZFS5zEY+/L/2oBlWOsVpajrJbhludr+ZTVUxU.
Are you sure you want to continue connecting (yes/no/[fingerprint])? 
/usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
The authenticity of host 'node1 (192.168.253.134)' can't be established.
ECDSA key fingerprint is SHA256:0SudoRZFS5zEY+/L/2oBlWOsVpajrJbhludr+ZTVUxU.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
root@node1's password: 

Number of key(s) added: 1

Now try logging into the machine, with:   "ssh 'root@node1'"
and check to make sure that only the key(s) you wanted were added.

[root@ansible ~]# ssh-copy-id  -i  ~/.ssh/id_rsa.pub  root@node2
/usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub"
The authenticity of host 'node2 (192.168.253.150)' can't be established.
ECDSA key fingerprint is SHA256:o/EYwrxFqON0ylVn9cGm9HC6SfGO9Q2DigMKRohCnBg.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
/usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
root@node2's password: 

Number of key(s) added: 1

Now try logging into the machine, with:   "ssh 'root@node2'"
and check to make sure that only the key(s) you wanted were added.

[root@ansible ~]# ssh-copy-id  -i  ~/.ssh/id_rsa.pub  root@node3
/usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub"
The authenticity of host 'node3 (192.168.253.136)' can't be established.
ECDSA key fingerprint is SHA256:rlK59mkXlsNDphRFJsfr/hNfWBBbT/JYlYbNN0oG8xQ.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
/usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
root@node3's password: 

Number of key(s) added: 1

Now try logging into the machine, with:   "ssh 'root@node3'"
and check to make sure that only the key(s) you wanted were added.

将ansible本地的/etc/hosts文件发送给受控主机

[root@ansible ~]# scp /etc/hosts root@node1:/etc/hosts
hosts                                                                100%  334   386.8KB/s   00:00    
[root@ansible ~]# scp /etc/hosts root@node2:/etc/hosts
hosts                                                                100%  334   167.0KB/s   00:00    
[root@ansible ~]# scp /etc/hosts root@node3:/etc/hosts
hosts                                                                100%  334   335.8KB/s   00:00 

验证能不能链接到node1、node2、node3

[root@ansible ~]# ssh root@node1
Last login: Thu Oct 20 02:15:26 2022 from 192.168.253.1
[root@node1 ~]# exit
注销
Connection to node1 closed.
[root@ansible ~]# ssh root@node2
Last login: Thu Oct 20 22:13:22 2022 from 192.168.253.1
[root@node2 ~]# exit
logout
Connection to node2 closed.
[root@ansible ~]# ssh root@node3
Activate the web console with: systemctl enable --now cockpit.socket

This system is not registered to Red Hat Insights. See https://cloud.redhat.com/
To register this system, run: insights-client --register

Last login: Thu Oct 20 16:10:09 2022
[root@node3 ~]# exit
logout
Connection to node3 closed.

在ansible主机和所有受控主机中创建student用户,并设置密码为redhat

[root@ansible ~]# useradd student
[root@ansible ~]# echo redhat | passwd --stdin student
Changing password for user student.
passwd: all authentication tokens updated successfully.

[root@node1 ~]# useradd student
[root@node1 ~]# echo redhat | passwd --stdin student
更改用户 student 的密码 。
passwd:所有的身份验证令牌已经成功更新。

[root@node2 ~]# useradd student
[root@node2 ~]# echo redhat | passwd --stdin student
Changing password for user student.
passwd: all authentication tokens updated successfully.

[root@node3 ~]# useradd student
[root@node3 ~]# echo redhat | passwd --stdin student
Changing password for user student.
passwd: all authentication tokens updated successfully.

发送到node1、node2、node3的root用户

[student@ansible ~]$ ssh-copy-id -i ~/.ssh/id_rsa.pub root@node1
[student@ansible ~]$ ssh-copy-id -i ~/.ssh/id_rsa.pub root@node2
[student@ansible ~]$ ssh-copy-id -i ~/.ssh/id_rsa.pub root@node3

发送到node1、node2、node3的student用户

[student@ansible ~]$ ssh-copy-id -i ~/.ssh/id_rsa.pub student@node1
[student@ansible ~]$ ssh-copy-id -i ~/.ssh/id_rsa.pub student@node2
[student@ansible ~]$ ssh-copy-id -i ~/.ssh/id_rsa.pub student@node3

列一个清单,并检测

[student@ansible ansible]$ vim inventory
[student@ansible ansible]$ cat inventory 
node1
node2
node3
[student@ansible ansible]$ ansible all -m ping
node1 | SUCCESS => {
    "ansible_facts": {
        "discovered_interpreter_python": "/usr/libexec/platform-python"
    },
    "changed": false,
    "ping": "pong"
}
node2 | SUCCESS => {
    "ansible_facts": {
        "discovered_interpreter_python": "/usr/libexec/platform-python"
    },
    "changed": false,
    "ping": "pong"
}
node3 | SUCCESS => {
    "ansible_facts": {
        "discovered_interpreter_python": "/usr/libexec/platform-python"
    },
    "changed": false,
    "ping": "pong"
}

你可能感兴趣的:(linux,运维,网络)