All Projects → 89luca89 → Terrible

89luca89 / Terrible

Licence: gpl-3.0
An Ansible playbook that apply the principle of the Infrastructure as Code on a QEMU/KVM environment.

Projects that are alternatives of or similar to Terrible

Rocket.chat.ansible
Deploy Rocket.Chat with Ansible!
Stars: ✭ 80 (-50.31%)
Mutual labels:  automation, ansible, playbook, ubuntu, debian
Serverfarmer
Manage multiple servers with different operating systems, configurations, requirements etc. for many separate customers in an outsourcing model.
Stars: ✭ 122 (-24.22%)
Mutual labels:  redhat, ansible, ubuntu, debian, freebsd
Ansible Role Docker
Ansible Role - Docker
Stars: ✭ 845 (+424.84%)
Mutual labels:  redhat, ansible, ubuntu, debian, infrastructure
Mattermost Ansible
Ansible playbook to provide a turnkey solution for the Team Edition of Mattermost
Stars: ✭ 126 (-21.74%)
Mutual labels:  redhat, ansible, playbook, ubuntu, debian
Kvm Install Vm
Bash script to build local virtual machines using KVM/libvirt and cloud-init.
Stars: ✭ 248 (+54.04%)
Mutual labels:  ubuntu, debian, kvm, libvirt
Packer Build
Packer Automated VM Image and Vagrant Box Builds
Stars: ✭ 199 (+23.6%)
Mutual labels:  ubuntu, debian, qemu, kvm
Ansipress
AnsiPress - Simple L(Linux) E(NGINX) M(MariaDB) P(PHP7) Shared Hosting Setup
Stars: ✭ 184 (+14.29%)
Mutual labels:  automation, ansible, ubuntu, debian
Tks
Enable enthusiasts and administrators alike to easily provision highly available and production-ready Kubernetes clusters on Proxmox VE.
Stars: ✭ 319 (+98.14%)
Mutual labels:  ansible, terraform, qemu, kvm
Robox
The tools needed to robotically create/configure/provision a large number of operating systems, for a variety of hypervisors, using packer.
Stars: ✭ 303 (+88.2%)
Mutual labels:  ubuntu, debian, freebsd, libvirt
Ansible Role Apache
Ansible Role - Apache 2.x.
Stars: ✭ 341 (+111.8%)
Mutual labels:  redhat, ansible, ubuntu, debian
Debops
DebOps - Your Debian-based data center in a box
Stars: ✭ 734 (+355.9%)
Mutual labels:  ansible, playbook, ubuntu, debian
Ansible Mariadb Galera Cluster
Stars: ✭ 49 (-69.57%)
Mutual labels:  redhat, ansible, ubuntu, debian
Ansible Role Security
Ansible Role - Security
Stars: ✭ 398 (+147.2%)
Mutual labels:  redhat, ansible, ubuntu, debian
Postinstall
💻 Bash Script to automate post-installation steps
Stars: ✭ 104 (-35.4%)
Mutual labels:  redhat, ubuntu, debian, freebsd
Oracle Java
Ansible role to install Oracle Java 8/11 on Debian and RedHat based distributions.
Stars: ✭ 144 (-10.56%)
Mutual labels:  redhat, ansible, ubuntu, debian
Terrahub
Terraform Automation and Orchestration Tool (Open Source)
Stars: ✭ 148 (-8.07%)
Mutual labels:  automation, terraform, infrastructure
Terraform Null Ansible
Terraform Module to run ansible playbooks
Stars: ✭ 114 (-29.19%)
Mutual labels:  ansible, terraform, playbook
Terrascan
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+1568.94%)
Mutual labels:  terraform, infrastructure-as-code, infrastructure
Toc
A Table of Contents of all Gruntwork Code
Stars: ✭ 111 (-31.06%)
Mutual labels:  terraform, infrastructure-as-code, infrastructure
Democratic Csi
csi storage for container orchestration systems
Stars: ✭ 120 (-25.47%)
Mutual labels:  ubuntu, debian, freebsd

Terrible: IaC for QEMU/KVM

License: GPL v3 Terraform Version Ansible Version terraform_provider_libvirt Made_with_love

logo

Workflows Status

Ansible-Lint Terrible Validate Travis (.org) branch

This Ansible playbook allows you to initialize and then deploy an entire infrastructure through the aid of Terraform, on a QEMU/KVM environment.

Terraform + Ansible

Table of Contents

  1. Abstract
  2. Requirements
  3. Configuration
  4. Compatibility
  5. Installation
  6. Usage
  7. Authors
  8. License

Abstract

The Infrastructure as Code had considerable growth in the cloud in the last years. However, a separate discussion has to be done regarding the private cloud. For various reasons, companies may need to use an internal infrastructure instead of the cloud. Unfortunately, there aren't as many solutions for the private cloud as for the cloud. Our idea has been to implement a flexible and powerful solution to easily build an infrastructure from scratch. It uses the flexibility of Ansible and the power of Terraform allowing you to abstract both the creation and the provisioning of the infrastructure, describing the whole process in a single file.

Why not just use a single tool?

On our side, the decision has been driven by the need to create a single source of truth for both the creation and provisioning of the infrastructure. It has been possible by leveraging Ansible and Jinja2 flexibility to easily generate highly dynamical HCL files for Terraform and leverage its power and compatibility to build the infrastructure.

How It Works

The idea comes from the difficulty to automate the deployment of the VMs on a QEMU/KVM environment.

For this reason we decided to automate as much as possible the process of the deployment, using Ansible and Jinja2.

First of all we provided a basic HCL file (templated with Jinja2) to describe a basic VM implementation. This is what is usually called IaC.

Then using Terraform and its amazing provider for libvirt (https://github.com/dmacvicar/terraform-provider-libvirt), we deploy the resultants HCL files generated by Ansible.

The figure below describe the process in an easy way.

kvm-deployment

As you can see, we start having the templated file (terraform-vm.tf.j2).

When Ansible run, it generates n .tf files, depending on the VM specified into the inventory. This is the result of the initialization phase. Once finished this task, the files are completed and ready to be used by Terraform.

At this time, Ansible takes these files and use Terraform for each instance of them. Once finished this task, the VMs, previously described into the inventory, are correctly deployed into the QEMU/KVM server(s).

Requirements

Dependency Minimum Version Reference
Ansible 2.9+ https://docs.ansible.com/
Terraform 0.12+ https://www.terraform.io/docs/index.html
Terraform Provider Libvirt 0.6+ https://github.com/dmacvicar/terraform-provider-libvirt/
Libvirt (on the target) 1.2.14+ https://libvirt.org/docs.html

Configuration

First of all you have to compose the inventory file in a right way. This means you have to describe the VMs you want to deploy into the server.

As you are going to check, there are some interesting variables you are allowed to use to properly describe your infrastructure. Some of them are required and some others are optional.

Below you can check the basic structure for the inventory.

all:
    vars:
        ...
    hosts:
        terraform_node:
            ...
        hypervisor_1:
            ...
        hypervisor_2:
            ...
    children:
        deploy:
            vars:
                pool_name: ...
                ...
            children:
                group_1:
                    hosts:
                        host_1:
                            ...
                    vars:
                        ...
                group_2:
                    hosts:
                        host_2:
                            ...
                        host_3:
                            ...
                group_3:
                    hosts:
                        host_4:
                            ...
                    vars:
                        ...
                group_4:
                    hosts:
                        host_5:
                            ...

Under the 1st vars tag, you can specify the various hypervisors you want to use to distribute your infrastructure.

Here's a little example:

all:
    hosts:
        terraform_node:
            ansible_host: 127.0.0.1
            ansible_connection: local
    vars:
        ...
    children:
        deploy:
            vars:
                pool_name: defaul
        ...

In this example we specified the uri of the QEMU/KVM server (which is going to be common for all the VMs in this hypervisor group), the storage pool name of the QEMU/KVM server and the terraform node address, which specify where Terraform is installed and where is going to be ran.

Now, for each VM we want to specify some property such as the number of the cpu(s), memory ram, mac_address, etc.

Here's a little example:

        ...
all:
    hosts:
        terraform_node:
            ansible_host: 127.0.0.1
            ansible_connection: local
        hypervisor_1:
            ansible_host: 127.0.0.1
            ansible_connection: local
    children:
        deploy:
            vars:
                pool_name: default
                disk_source: "~/VirtualMachines/centos8-terraform.qcow2"
            children:
                group_1:
                    hosts:
                        host_1:
                            os_family: RedHat
                            cpu: 4
                            memory: 8192
                            hypervisor: hypervisor_1
                            network_interfaces:
                                ...
                group_2:
                    hosts:
                        host_2:
                            os_family: RedHat
                            cpu: 2
                            hypervisor: hypervisor_1
                        host_3:
                            os_family: Suse
                            disk_source: "~/VirtualMachines/opensuse15.2-terraform.qcow2"
                            cpu: 4
                            memory: 4096
                            set_new_passowrd: password123
                            hypervisor: hypervisor_1
                            network_interfaces:
                                ...

In this example, we specified 2 main groups (group_1, group_2) and linked the VMs to hypervisor_1. These groups are composed overall by 3 VMs (host_1, host_2, host_3). As you can see, not all the properties are specified for each machine. This is due to the default values of the variables provided by this playbook.

Thanks to the variabe hierarchy in Ansible, you can configure variables:

  • Hypervisor wise
  • VM groups wise
  • Single VM wise

This will make easier to manage large homogeneous clusters, still retaining the power of per-VM customization.

Workflow

In the example above, we can see, for hypervisor_1, the default OS for VMs is Centos, but we specified for host_3 to be an OpenSuse node. Similarly for the hypervisor_2, the default OS for VMs is Ubuntu, but we specified for the host_4 to be a Centos node.

This is valid for any variable in the playbook.

You can check the default values under default/main.yml.

Variables

Once you understand how to fill the inventory file, you are ready to check all the available variables to generate your infrastructure.

These variables are required:

  • ansible_host: required. Specify the ip address for the VM. If not specified, a random ip is assigned.
  • ansible_jump_hosts: required if terraform_bastion_enabled is True. Specify one or more jumphost/bastions for the ansible provisioning part.
  • cloud_init: optional. Specify if the VM uses a cloud-init image or not. False If not specified.
  • disk_source: required. Specify the (local) path to the virtual disk you want to use to deploy the VMs.
  • data_disks: optional. Specify additional disks to be added to the VM. Check disks section for internal required varibles: HERE
  • network_interfaces: required. Specify VM's network interfaces, check network section for internal required variables: HERE
  • os_family: required. Specify the OS family for the installation. Possible values are: RedHat, Debian, Suse, Alpine, FreeBSD.
  • pool_name: required. Specify the storage pool name where you want to deploy the VMs on the QEMU/KVM server.
  • ssh_password: required. Specify the password to access the deployed VMs.
  • ssh_port: required. Specify the port to access the deployed VMs.
  • ssh_user: required. Specify the user to access the deployed VMs.
  • ssh_public_key_file: required. Specify the ssh public key file to deploy on the VMs.
  • hypervisor: required. Specify on which hypervisor to deploy the Infrastructure.

Ansible hosts required outside the deploy group:

  • terraform_node: required. Specify the the machine that performs the Terraform tasks.
  • hypvervisor_[0-9+]: required. Specify at least one machine that is the QEMU/KVM hypervisor. The default value of 127.0.0.1 indicates that the machine that perform the Terraform tasks is the same that runs the Ansible playbook. In case the Terraform machine is not the local machine, you can specify the ip/hostname of the Terraform node. More details could be found here: HERE

These variable are optional, there are sensible defaults set up, most of them can be declared from hypervisor scope to vm-group scope and per-vm scope:

  • change_passwd_command: optional. Specify a different command to be used to change the password to the user. If not specified the default command is used. Default: echo root:{{ set_new_password }} | chpasswd. This variable become really useful when you are using a FreeBSD OS.
  • cpu: optional. Specify the cpu number for the VM. If not specified, the default value is taken. Default: 1
  • memory: optional. Specify the memory ram for the VM. If not specified, the default value is taken. Default: 1024
  • set_new_password: optional. Specify a new password to access the Vm. If not specified, the default value (ssh_password) is taken.
  • vm_autoboot: optional. Specify if the VM should be automatically started at boot. Default: False

Terraform Node, Bastions & Jumphosts

The following section will describe some different scenarios that may appear during a typical deployment day.

As described above, the terraform_node variable is required. The terraform_node could be local or remote.

A really common scenario will have a local Terraform node. This could be declared as follow:

all:
    vars:
        ...
    hosts:
        terraform_node:
            ansible_host: 127.0.0.1
            ansible_connection: local
        hypervisor_1:
            ansible_host: 127.0.0.1
            ansible_connection: local

This scenario assumes that the terraform_node is the same host that is running the Ansible playbook. This case will ask Terraform to connect to QEMU/KVM using the uri qemu:///system.

local-all


If you want to use a remote QEMU/KVM server instead, you can do this as follow:

all:
    vars:
        ...
    hosts:
        terraform_node:
          ansible_host: 127.0.0.1
          ansible_connection: local
        hypervisor_1:
          ansible_host: remote_kvm_machine.domain
          ansible_user: root
          ansible_port: 22
          ansible_ssh_pass: password

This case will ask Terraform to connect to the QEMU/KVM server using the following uri: qemu+ssh://[email protected]_kvm_machine.domain/system. This also setup the Terraform internal ssh connection to use it as a bastion host to connect to his VMs.

remote-kvm


Also, Terraform could be separated from Ansible, and be located on a remote server. You can declare it simply by using the ansible_host variable, as follow:

all:
    vars:
        ...
    hosts:
        terraform_node:
          ansible_host: remote_terraform_node.domain
          ansible_connection: ssh # or paramiko or whatever NOT local
        hypervisor_1:
          ansible_host: remote_terraform_node.domain
          ansible_connection: ssh # or paramiko or whatever NOT local
          ansible_user: root
          ansible_port: 22
          ansible_ssh_pass: password

This assumes that the terraform_node is the same host that is running the QEMU/KVM hypervisor. This case will ask Terraform to connect to QEMU/KVM using the uri qemu:///system. The post-deployment task of this Ansible playbook, has to use a jumphost to get access to the VMs of the internal network. For this reason we need to use the terraform_node as jumphost to reach them.

remote-terraform


Also, if you have a remote QEMU/KVM server and a remote Terraform server, you can use them as follow:

all:
    vars:
        ...
    hosts:
        terraform_node:
          ansible_host: remote_terraform_node.test.com
          ansible_connection: ssh # or paramiko or whatever NOT local
        hypervisor_1:
          ansible_host: remote_kvm_machine.domain
          ansible_user: root
          ansible_port: 22
          ansible_ssh_pass: password

This case will ask Terraform to connect to QEMU/KVM using the uri: qemu+ssh://[email protected]_kvm_machine.domain/system. This also setup the Terraform internal ssh connection to use it as a bastion to connect to its VMs. Being already remote, this will set up 2 jumphost(s) for Ansible, one is the terraform_node, the other one is the ansible_host.

remote-all

Network

Network declaration is mandatory and per-vm.

Declare each device you want to add inside the network_interfaces dictionary.

Be aware that:

  • the order of declaration is important
  • the NAT device should always be present (unless you can control your DHCP leases for the external devices) and that should be the first device. It is important because it's the way the playbook has to communicate with the VM before setting up all the userspace networks.
  • the default_route should be assigned to one interface to function properly. If not set it's equal to False.

Supported interface types:

  • nat
  • macvtap
  • bridge

Structure:

        all:
            vars:
                pool_name: default
                disk_source: "~/VirtualMachines/centos8-terraform.qcow2"
            hosts:
                terraform_node:
                    ansible_host: 127.0.0.1
                    ansible_connection: local
                hypervisor_1:
                    ansible_host: 127.0.0.1
                    ansible_connection: local
            children:
                group_1:
                    hosts:
                        host_1:
                            ansible_host: 172.16.0.155
                            os_family: RedHat
                            cpu: 4
                            memory: 8192
                            hypervisor: hypervisor_1
                            network_interfaces:
                                # Nat interface, it should always be the first one you declare.
                                # it does not necessary have to be your default_route or main ansible_host,
                                # but it's important to declare it so ansible has a way to communicate with
                                # the VM and setup all the remaining networks.
                                iface_1:
                                  name: nat             # mandatory
                                  type: nat             # mandatory
                                  ip: 192.168.122.47    # mandatory
                                  gw: 192.168.122.1     # mandatory
                                  dns:                  # mandatory
                                   - 1.1.1.1
                                   - 8.8.8.8
                                  mac_address: "AA:BB:CC:11:24:68"   # optional
                                  # default_route: False
                                iface_2:
                                  name: ens1p0      # mandatory
                                  type: macvtap     # mandatory
                                  ip: 172.16.0.155  # mandatory
                                  gw: 172.16.0.1    # mandatory
                                  dns:              # optional
                                   - 1.1.1.1
                                   - 8.8.8.8
                                  default_route: True # at least one true mandatory, false is optional.

Variables explanation:

  • name: required Specify the name for the connection, this is important for bridge and macvtap types as it will be the interface/bridge on the host on which they will be created.
  • type: required Specify the type of the interface, supported types are nat, macvtap, bridge.
  • ip: required Specify the IP to assign to this interface.
  • gw: required Specify the Gateway of this interface.
  • default_route: at least one required Specify if this interface is the default route or not. At least one interface at True.
  • dns: required Specify the dns list for this interface, this is an array of IPs.
  • mac_address: optional Specify the mac address for this interface.

The playbook will use the available IP returned from the terraform apply command to access the machines and use the os_family way to setup the user-space part of the network:

  • static IPs
  • routes
  • gateways
  • DNS

After this, the playbook will set the ansible_host variable to its original value, and proceed with the provisioning.

This is important because it will make ansible_host independent from the internal management interface needed for this network bootstrap tasks, making it easily compatible with any type of role that you want to perform after this.

During this process, virtual networks (bridges, VLANs, etc...) inside the vm will be ignored, this will improve detection of the networks we want to manage, improving compatibility with docker, k8s, nested-virtualization, etc...

Storage

This section explain how you can add some additional disk to the VMs.

Suppose you want to create a VM that needs a large amount of storage space, and a separated disk just to store the configurations. Doing this is quite simple.

The main variable you need is data_disks. The you have to specify the disks and the related properties for each of them.

If data_disks is mentioned in your inventory, the following variables are required:

  • size: required. Specify the disk size expressed in GB. (es. size: 1 means 1GB)
  • pool: required. Specify the pool where you want to store the additional disks.
  • format: require. Specify the filesystem format you want to apply to the disk. Available filesystems are specified below.
  • mount_point: required. Specify the mount point you want to create for the disk, use none if declaring a swap disk.
  • encryption: required. Specify the mount point of the disk. Available values could be True or False.

N.B. Each disk declared needs to have a unique name (ex. you can't have the name disk0 declared twice).

OS Family Supported Disk Format Encryption Supported
Debian ext2, ext3, ext4, swap yes
Alpine ext2, ext3, ext4, swap yes
FreeBSD ufs, swap no
RedHat ext2, ext3, ext4, xfs, swap yes
Suse ext2, ext3, ext4, xfs, swap yes

Let's take a look at how the inventory file is going to be fill.

        all:
            vars:
                provider_uri: "qemu:///system"
                pool_name: default
                disk_source: "~/VirtualMachines/centos8-terraform.qcow2"
            hosts:
                terraform_node:
                    ansible_host: 127.0.0.1
                    ansible_connection: local
                hypervisor_1:
                    ansible_host: 127.0.0.1
                    ansible_connection: local
            children:
                group_1:
                    hosts:
                        host_1:
                            ansible_host: 172.16.0.155
                            os_family: RedHat
                            cpu: 4
                            memory: 8192
                            hypervisor: hypervisor_1
                            # Here we start to declare
                            # the additional disk.
                            data_disks:
                                # Here we declare the disk name
                            	disk-storage:                       # Uniqe name to identify the disk unit.
                            		size: 100                       # Disk size = 100 GB
                            		pool: default                   # Store the disk image into the pool = default.
                            		format: xfs                     # Disk Filesystem = xfs
                            		mount_point: /mnt/data_storage  # The path where the disk is mounted, none is using swap
                            		encryption: True                # Enable disk encryption

                                # Here we declare the disk name
                            	disk-swap:                          # Uniqe name to identify the disk unit.
                            		size: 1                         # Disk size = 1 GB
                            		pool: default                   # Store the disk image into the pool = default.
                            		format: swap                    # Disk Filesystem = swap
                            		mount_point: none               # The path where the disk is mounted, none if using swap
                            		encryption: False               # Does not enable disk encryption

Compatibility

Actually the playbook is supporting the most common 4 OS families for the Guests:

  • RedHat (including Centos, Fedora and derivates)
  • Debian (Including Ubuntu and derivates)
  • Alpine
  • Suse (Thumbleweed and Leap)
  • FreeBSD

This means you are able to generate the infrastructure using the OS listed above.

Hypervisor OS is agnostic, as long as requirements are met.

Installation

Before using Terrible, the following system dependencies needs to be installed: dependencies.

Use the following command to satisfy the project dependencies:

pip3 install --user -r requirements.txt

Container Image

To avoid boring dependencies installation to make Terrible works and speed up your infrastructure deployment, we provided a Dockerfile to build by yourself a minimal image with all you need inside.

We use a debian:buster-slim image to have a compact system, combined with a full compatibility with required tools. The container image uses the latest Terrible tag's release.

The minimum packages required to run the container image is Docker (or Podman) and QEMU/KVM installed on the system.

Pull

If you are a lazy person (just like us), you can directly pull the latest image release from DockerHub.

docker pull 89luca89/terrible:latest

Build

To build the image, instead, type the following command:

docker build -t terrible .

This will take some minutes.

Run

Once you built the image, you are ready to run it as in the example below:

docker run \
    -it \
    --rm \
    -v /var/run/libvirt/libvirt-sock:/var/run/libvirt/libvirt-sock \
    -v ./inventory-test.yml:/root/terrible-1.1.1/inventory-test.yml \
    -v ~/VirtualMachines/:/opt/ \
    -v ~/.ssh/:/root/.ssh/ \
    89luca89/terrible

N.B. If you are using RHEL, CentOS or Fedora you need to add the --privileged flag because otherwise SELinux does not allow it to access the libvirt socket.

N.B. If you are using your local QEMU/KVM instance, remember to add --net=host to the command.

Notes:

  • The volume /var/run/libvirt/libvirt-sock is mandatory if you want to run Terrible locally (a local QEMU/KVM instance). In this way you directly interact with the QEMU/KVM api, provided by the system.

  • The volume ./inventory-test.yml is to include the inventory inside the container, to deploy the infrastructure.

  • The volume ~/VirtualMachines/ is to include the qcow2 images inside the container to deploy them.

  • The volume ~/.ssh is to include your ssh keys into the container and deploy them inside the infrastructure machines.

Usage

To speed up your deployment process, we have made available our Packer template files.

The other repository could be found here: packer-terraform-kvm.

Once composed the inventory file, it's time to run your playbook.

To pull up infrastructure:

ansible-playbook -i inventory.yml -u root main.yml

To validate the inventory file:

ansible-playbook -i inventory.yml -u root main.yml --tags validate

To pull down infrastructure (maintaining the resources in place):

ansible-playbook -i inventory.yml -u root main.yml --tags destroy

To completely delete the infrastructure:

ansible-playbook -i inventory.yml -u root main.yml --tags purge

Outputs

Based on your inventory, the complete state of the infrastructure (TF files, TF states, LUKS keys etc...) will be recorded to ${INVENTORY_NAME}-state.tar.gz this file is important to track the state of an infrastructure.

You can (and should) save this state file to keep track of the infrastructure complete state, the *.tar.gz will be restored and saved on each run.

Authors

License

  • GNU GPLv3, See LICENSE file.

FOSSA Status

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].