Getting Started with DebOps
Welcome to DebOps!
You have installed DebOps and are wondering where to go next? Here you can read about creating your first DebOps project and managing remote hosts.
An example environment
Ansible and DebOps are installed on your workstation or laptop, a so called "Ansible Controller" - this machine is used to control Ansible and issue commands. The machine you will configure using DebOps is known as a "remote host".
DebOps is designed to manage a host from the ground up. A good base installation is a Debian Stable netinst, with only SSH server enabled and configured. Everything else will be installed as needed.
Note
If you are using Debian Jessie or later, or other distributions based on it
as the base install, by default OpenSSH server configured by the installer
will disallow password authentication on the root
account. You can
either enable it manually in the /etc/ssh/sshd_config
file, use
public key authentication (see authorized_keys(5) and
ssh-copy-id(1)), or configure a separate admin account and use that
to bootstrap the host.
An important part of the environment is correctly configured DNS. Some of the DebOps roles expect a configured domain - it doesn't need to be a real, global domain, but it should be resolvable by the host. A good way to check if a remote host has a correctly configured domain is to use the hostname --fqdn command. If the output has at least 1 dot, you should be good to go.
Do not use the domain apex (example.com
) as the host name - this will
confuse Ansible and leave you with a broken configuration. Instead, create
separate hostnames inside the domain (server.example.com
), this will be
used by Ansible correctly. It's good to use only one subdomain level per
subnet, this will make wildcard certificates work without issues. If you want,
you can create separate subdomains per subnet.
If your host does not have a domain configured, you will be able to do that during the bootstrapping process.
In this guide, we will manage an example host called server.example.com
.
This host is a virtual machine, and we can connect to it using commands like:
alice@laptop:~$ ssh root@server.example.com
alice@laptop:~$ ssh root@server
The root
account requires a password, SSH keys are not installed yet and
there's no administrator account.
Ansible commands are executed on the Ansible Controller from an unprivileged
account alice
. This user has an SSH key pair stored in ~/.ssh/id_rsa
or
has its SSH key available in the SSH Agent. An administrator account with the
same name will be created on the remote host during the bootstrap process.
Your first project
Begin by creating a "DebOps project". It's a directory which contains all of
the data related to a given environment - Ansible inventory, passwords and
other secrets, custom playbooks and roles. To do this, use the debops-init
command:
alice@laptop:~$ debops-init ~/myproject
This will create a new directory called myproject
and populate it with some
example directories and files. You will perform most of the commands from the
main project directory, so let's cd
into it:
alice@laptop:~$ cd ~/myproject
Ansible uses a hosts
file to identify hosts that are under its control. In
the project directory this file is located in ansible/inventory/hosts
. Open
it in your favorite text editor and add the remote host in the main DebOps
host group:
[debops_all_hosts]
server ansible_host=server.example.com
Using a short inventory name allows you to run Ansible commands without specifying the fully qualified domain name of the host.
Important inventory variables
Some of the configuration used by DebOps cannot be auto-detected - examples include IP addresses or network subnets that can connect to a SSH service remotely, the administrator e-mail account which should receive important notifications, and so on. Here you can find a list of the most important variables which, when set correctly in inventory, can save you a trip to the data center.
To make sure that these variables apply to all hosts in your environment, you
can include them in ansible/inventory/group_vars/all/ directory. A
common practice is to name the files inside inventory directories after
variable prefixes, separately for each Ansible role. For example, variables
related to debops.sshd role are stored in
ansible/inventory/group_vars/all/sshd.yml
, variables used by the
debops.postfix role are written in
ansible/inventory/group_vars/all/postfix.yml
, and so on. The same
scheme can be used in other inventory groups or for separate hosts.
ansible_user
This is an internal Ansible variable which is used to determine what remote user account will be used to login to the server. If it's not explicitly set, Ansible depends on SSH defaults which conventionally use the name of the current user as the remote username.
You can use the ansible_user
inventory variable to create a shared
administrator account if multiple admins are involved. In such case you also
should define the same name for the account managed by the
debops.system_users role (see Centralized "control user" UNIX account for
more details).
It's customary to specify this variable directly in the
ansible/inventory/hosts
file, that way it can be unique for each host:
[debops_all_hosts]
server ansible_host=server.example.com ansible_user=ansible-admin
server system_users__self_name=ansible-admin
On specific platforms you can set this variable to an automatically created username to make the remote host administration easier:
Ubuntu-based hosts usually use the
ubuntu
username;Raspberry Pi / Pi 2 Linux distributions use the
pi
user account for this purpose;
netbase__domain
If hosts that you want to manage don't have a DNS domain set, or it's incorrect (for example your VPS provider's domain instead of your own), the debops.netbase role included in the DebOps bootstrap playbook can be used to easily fix that and configure your own domain. By setting this variable to, for example:
---
netbase__domain: 'example.com'
By running the debops bootstrap
command (see further down), your domain
will be configured in the remote hosts' /etc/hosts
file. Additionally, the
hostname will be changed to the one you specified in the Ansible inventory.
After that is done, it's best to reboot the machine to make sure all of the
changed settings are applied and are persistent.
This variable won't have any effect on hosts that are not "bootstrapped", and are instead configured using Debian preseeding or LXC templates - these hosts will presumably get the needed information like hostname and domain from your own DHCP server.
sshd__whitelist
Protection of the SSH service is very important. Hosts configured by DebOps use a firewall and TCP Wrappers to restrict what hosts can connect to it and automatically block repeated offenders for certain amount of time.
To not block the Ansible Controller, DebOps tries to detect the IP address from which the connection is made. For the most part it should work as expected, but if you still are getting blocked, or to be sure that remote access won't be interrupted, you can define a list of IP addresses or CIDR subnets that will be allowed to connect to SSH without restrictions.
To do that, in ansible/inventory/group_vars/all/sshd.yml
add:
---
sshd__whitelist: [ '192.0.2.0/24', '2001:db8::/32' ]
This will configure the debops.ferm and debops.tcpwrappers roles to allow connections to the ssh service from specified networks.
The debops.sshd role has many more variables you can check out to see the default configuration used by DebOps and what can be changed as needed.
tzdata__timezone
By default, DebOps does not try to change the remote host timezone and tries to
use the detected one in roles that need that information for the configuration.
If you need to change the timezone, you can do it by setting the
tzdata__timezone
variable like this:
---
tzdata__timezone: 'America/New_York'
For UTC timezone (the default), use this format:
---
tzdata__timezone: 'Etc/UTC'
nullmailer__relayhost
The default SMTP server used by DebOps is nullmailer
. It's a simple,
forward-only Mail Transport Agent which sends all mail to another SMTP server
for processing. It does not provide support for local mail accounts.
By default, nullmailer
will send mail messages to the
smtp.<your-domain>
host (it does not support MX record lookups). If this
host doesn't exist, or your local SMTP server has a different address, you can
change it by setting the variable:
---
nullmailer__relayhost: 'internal-mx.{{ ansible_domain }}'
Only one relayhost is supported at a time. The specified host should accept
messages from hosts controlled by Ansible for this to work correctly. The SMTP
connections will be encrypted using STARTTLS
command, therefore the SMTP
should use a set of X.509 certificates which are trusted by the host.
The nullmailer
service can be configured to a large extent using the
debops.nullmailer role variables - you can use them to configure SMTP
authentication, use multiple relay servers, and so on.
If you need a more powerful SMTP server, DebOps includes support for Postfix as well - check the debops.postfix Ansible role.
apt__default_mirrors_lookup, apt__default_sources_lookup
DebOps tries to detect the operating system a given host is using and configure it accordingly. Currently selected Debian and Ubuntu releases are recognized and the package sources for these operating systems should be configured without issues.
The Raspbian operating system is a little difficult to detect, because Ansible currently classifies it as "Debian", however its package repositories are completely different. To avoid issues with incompatible package sources on your Raspberry Pi/Pi2, you should change the default debops.apt configuration manually to use the Raspbian repositories. To do that, add these values in relevant inventory files:
---
apt__default_mirrors_lookup: 'raspbian'
apt__default_sources_lookup: 'raspbian'
Bootstrap a new host
Warning
Bootstrapping a host without a configured netbase__domain
will result in
a broken host configuration.
At this point you most likely have to connect to that host using the root
account and specifying a password. To make that easier, you can use a special
"bootstrap" Ansible playbook to prepare a host for easier management. To do
this, execute the command:
alice@laptop:~/myproject$ debops bootstrap --limit server --user root --ask-pass
Or, for short:
alice@laptop:~/myproject$ debops bootstrap -l server -u root -k
If you defined the ansible_user
variable in the Ansible intentory for
a given host to use a different UNIX account than your regular local account,
you need to use a modified version of the above command to override that
variable from the command line using Ansible "extra vars":
alice@laptop:~/myproject$ debops bootstrap -l server -e 'ansible_user=root' -k
This command will execute the DebOps bootstrap playbook and use it to
install a base set of packages needed by Ansible like python3
and
sudo, prepare a new administrator account named after your system
user (alice
in our example) and allow that account full access to the
root
account using sudo. Your SSH keys will be installed on
both the root
and administrator accounts.
Note
Bootstrapping a host this way is not needed if you already have an administrator account that can use sudo without a password. This includes hosts configured using Debian Preseed provided by DebOps as well as OpenVZ/LXC containers configured using provided templates.
When the DebOps bootstrap playbook has finished and there are no errors, you can check if you are able to connect to the server on the administrator account without a password:
alice@laptop:~/myproject$ ssh server
After logging in, check if you can run commands using sudo without a password:
alice@server:~$ sudo -l
Configure the remote host
When a new remote host has been prepared for Ansible management, you can start the configuration:
alice@laptop:~/myproject$ debops -l server
This will start the ansible-playbook command with the main DebOps playbook. This by default includes the DebOps common playbook with a default set of roles, and any additional playbooks, if they have been enabled.
The initial configuration might take 5-10 minutes on a reasonably fast machine. There are some steps, like Diffie-Hellman parameter generation, which might take significantly more time to complete.
When the playbook run has been finished, your remote host should be configured with:
a correct set of APT repositories for your operating system release;
automatic updates of the installed packages with related e-mail messages sent to your admin account;
a set of Diffie-Hellman parameters and SSL certificates ready to use by different services (encrypted TLS/SSL connections out of the box);
configured iptables/ip6tables firewall and TCP Wrappers;
enabled network time synchronization as needed;
a set of useful management software installed on the host (
htop
,mtr-tiny
,mc
,vim
, among other things);
Example application - DokuWiki
Each host configured by DebOps common playbook should have the same set of base services. After a host is configured, you can enable additional Ansible roles to install and configure software and applications of your choice.
We will use DokuWiki as an example application. The role that manages the installation is called debops.dokuwiki it uses debops.nginx and debops.php roles to configure a webserver and PHP5 environment. The debops.nginx role calls some additional roles, such as debops.ferm to configure needed services.
To install DokuWiki on your new remote host, you need to enable the respective
role in Ansible inventory. This is done by creating a new host group,
[debops_service_dokuwiki]
in the hosts
file, and adding the desired
hosts to it:
[debops_all_hosts]
server ansible_ssh_host=server.example.com
[debops_service_dokuwiki]
server
As you can see, you don't need to copy the whole host entry, only the short name is enough.
The debops.dokuwiki role has many default variables you can use to
customize the installation. One of the more useful ones is
dokuwiki_main_domain
; it's a list which specifies what DNS subdomains are
used to access the wiki (each application in the DebOps set of roles is
configured on a separate subdomain). By default DokuWiki will be accessible on
the wiki.{{ ansible_domain }}
subdomain, if you want to change it, you can
do so by creating the ansible/inventory/host_vars/server/dokuwiki.yml
configuration file and specifying the subdomain(s) in it:
---
dokuwiki__fqdn: 'wiki.{{ ansible_domain }}'
Remember that the chosen subdomain (wiki.
or your own) needs to be
configured in your DNS server to point to the specified remote host.
When everything is configured, you can execute the debops
script to apply
new configuration on the host:
alice@laptop:~/myproject$ debops -l server
This will apply the whole playbook with all the configuration on the specified
server. However, to make this process faster, DebOps provides separate "service
playbooks" for each of the roles. To use these playbooks, you can specify them
as the first argument to the debops
command:
alice@laptop:~/myproject$ debops service/dokuwiki -l server
This will tell the script to look for the playbook in several places:
playbooks/
and ansible/playbooks/ subdirectories in the project directory;debops-playbooks/playbooks/
subdirectory of the project directory, if DebOps playbooks and roles are installed inside of it;~/.local/share/debops/debops-playbooks/playbooks/
directory (default install location);
The first one found will be executed. You can use this to your advantage by
adding custom playbooks in playbooks/
or ansible/playbooks/
directories, they need to be named with .yml
extension. Custom roles can
be placed in the roles/
or ansible/roles/ subdirectories located in the
project directory.
After Ansible finishes the configuration, you will need to go to the
https://wiki.<domain>/install.php
page to complete the installation
process.
At this time you might find that the web browser you are using does not recognize the CA certificates served by the host. This happens when the server uses certificates signed by internal DebOps Certificate Authority instead of the "regular" ones. To fix that, consult the debops.pki role documentation (when it's available).
Where to go from here
You can add more hosts to the Ansible inventory and configure them in a cluster. Hosts should automatically trust each other using an internal Certificate Authority, so encrypted connections between them should work out of the box.
DebOps contains multiple Ansible roles that allow you to install and configure useful software, like GitLab, phpIPAM, ownCloud and others. You should check the documentation of the respective roles to see some example configurations and useful tips. Note that parts of the documentation are currently outdated - if a given role has only one page, you should check the role files directly.
You can check the DebOps Changelog for updates related to roles and playbooks.