Ansible Tower and Automation Hub have converged to offer a unified platform experience called, Ansible Automation Platform. Starting with Ansible Tower 3.8, what used to be the Tower installer can now install Automation Platform as a whole. Refer to Installing Ansible Automation Platform for further detail.
Automation Platform requires Ansible 2.9. Ansible 2.9.x will be the only supported version installed on Tower 3.8.
Starting with Ansible Tower 3.8, Automation Hub will act as a content provider for Ansible Tower, which requires both an Ansible Tower deployment and an Automation Hub deployment running alongside each other. Tower and Automation Hub can run on either RHEL 7 or 8, but only Tower (not Automation Hub) is supported on an OpenShift Container Platform (OCP).
Starting with Ansible Tower 3.8, you must have valid subscriptions attached before installing and running the Ansible Automation Platform. Even if you already have valid licenses from previous versions, you must still provide your credentials or a subscriptions manifest again upon upgrading to Tower 3.8. A valid subscription needs to be attached to the Automation Hub node only. Other nodes do not need to have a valid subscription/pool attached. See Attaching Subscriptions for detail.
For customers installing Tower behind Satellite, prepare your Tower nodes by installing the Katello RPM specific to your satellite instance. See Installing Satellite instances on Tower for more information.
Newly created configurations for inventory sources will contain the default plugin configuration values. If you want your newly created inventory sources in 3.8 to match the output of a 3.7 source, you must apply a specific set of configuration values for that source. To ensure backward compatibility, Tower uses “templates” for each of these sources to force the output of inventory plugins into the legacy format. Refer to Supported Inventory Plugin Templates in the Ansible Automation Platform Installation and Reference Guide for each source and their respective templates to help you migrate to the new style inventory plugin output.
If you need to access a HTTP proxy to install software from your OS vendor, ensure that the environment variable “HTTP_PROXY” is set accordingly before running setup.sh
.
The Tower installer creates a self-signed SSL certificate and keyfile at /etc/tower/tower.cert
and /etc/tower/tower.key
for HTTPS communication. These can be replaced after install with your own custom SSL certificates if you desire, but the filenames are required to be the same. See Using custom certificates.
Installing Ansible Automation Platform automatically installs the necessary versions of Node.js to run the Tower User Interface.
If using Ansible version 1.8 or later, ensure that fact caching using Redis is not enabled in ansible.cfg
on the Tower machine.
Note that the Tower installation must be run from an internet connected machine that can install software from trusted 3rd-party places such as Ansible’s software repository, and your OS vendor’s software repositories. In some cases, access to the Python Package Index (PyPI) is necessary as well. If you need to be able to install in a disconnected environment and the bundled installation program is not a solution for you (refer to Using the Bundled Ansible Automation Platform Installer), please contact Ansible via the Red Hat Customer portal at https://access.redhat.com/.
If installing Tower on OpenShift, refer to OpenShift Deployment and Configuration.
Flags and/or extra variables that you can use with the Ansible Tower installer include (but are not limited to) the following:
Usage: setup.sh [Options] [-- Ansible Options]
Options:
-i INVENTORY_FILE Path to ansible inventory file (default: inventory)
-e EXTRA_VARS Set additional ansible variables as key=value or YAML/JSON
i.e. -e bundle_install=false will force an online install
-b Perform a database backup in lieu of installing
-r Perform a database restore in lieu of installing
-k Generate and distribute a new SECRET_KEY
-h Show this help message and exit
Ansible Options:
Additional options to be passed to ansible-playbook can be added following the -- separator
Use the --
separator to add any Ansible arguments you wish to apply. For example: ./setup.sh -i my_awesome_inventory.yml -e matburt_is_country_gold=True -- -K
The following table shows some extra variables that can be used during the installation of Tower.
Variable |
Description |
Default |
|
When installing Tower make sure Ansible is also up to date |
|
|
When installing Tower also create the Demo Org, project, credential, Job Template, etc. |
|
|
When installing from a bundle where to put the bundled repos |
|
|
Disable HTTPS traffic through nginx, this is useful if offloading HTTPS to a load balancer |
|
|
Disable HSTS web-security policy mechanism |
|
|
Port to configure nginx to listen to for HTTP |
|
|
Port to configure nginx to listen to for HTTPS |
|
|
Where to place the backup from setup.sh -b |
|
|
A temp location to use when backing up |
|
|
Specify an alternative backup file to restore from |
(None) |
|
The minimum RAM required to install Tower (should only be changed for test installation) |
|
|
The minimum open file descriptions (should only be changed for test installations) |
|
|
Ignore preflight checks, useful when installing into a template or other non-system image (overrides |
|
The following are examples of common scenarios - be sure to supply your own values appropriate to your specific case.
To upgrade core:
./setup.sh -e upgrade_ansible_with_tower=1
To disable https handling at nginx:
./setup.sh -e nginx_disable_https=true
To specify a non-default path when restoring from a backup file:
./setup.sh -e 'restore_backup_file=/path/to/nondefault/location' -r
To override an inventory file used by passing it as an argument to the setup script:
setup.sh -i <inventory file>
You may bring your own certificates as part of the default install and therefore, not rely on the self-signed one provided. The Ansible Tower installer provides three variables that allows you to configure the Tower deployment TLS-wise:
|
Path on the installer node to the custom certificate the Tower web server will serve. It will be copied as |
|
Path on the installer node to the private key the certificate has been generated with. It will be copied as |
|
Custom Certification Authority to add as trustworthy in the system bundle. It will be loaded into the Tower CA trusted store. |
You may want to consider how to configure your proxies and websockets as part of the installation of Ansible Tower to align the websocket config with your nginx / load balancer configuration. See Proxy Support in the following section of this guide for further detail.
Ansible Automation Platform can run on systems where FIPS mode is enabled, though there are a few limitations to keep in mind:
Only Enterprise Linux 7+ is supported. The standard python that ships with RHEL must be used for Ansible Tower to work in FIPS mode. Using any non-standard, non-system python for Tower is therefore, unsupported.
By default, Tower configures PostgreSQL using password-based authentication, and this process relies on the usage of md5
when CREATE USER
is run at install time. To run the Tower installer from a FIPS-enabled system, specify pg_password
in your inventory file. DO NOT use special characters in pg_password
as it may cause the setup to fail:
pg_password='choose-a-password'
For further detail, see Setting up the Inventory File.
If you supply a password in the inventory file for the installer (pg_password
), that password will be SCRAM-SHA-256 hashed by PostgreSQL as part of the installation process.
The ssh-keygen
command generates keys in a format (RFC4716) which uses the md5
digest algorithm at some point in the process (as part of a transformation performed on the input passphrase). On a FIPS-enforcing system, md5
is completely disabled, so these types of encrypted SSH keys (RFC4716 private keys protected by a passphrase) will not be usable. When FIPS mode is enabled, any encrypted SSH key you import into Ansible Tower must be a PKCS8
-formatted key. Existing AES128
keys can be converted to PKCS8
by running the following openssl
command:
$ openssl pkcs8 -topk8 -v2 aes128 -in <INPUT_KEY> -out <NEW_OUTPUT_KEY>
For more details, see: https://access.redhat.com/solutions/1519083
Use of Ansible features that use the paramiko
library will not be FIPS compliant. This includes setting ansible_connection=paramiko
as a transport and using network modules that utilize the ncclient
NETCONF library.
The TACACS+ protocol uses md5
to obfuscate the content of authorization packets; TACACS+ Authentication is not supported for systems where FIPS mode is enabled.
The RADIUS protocol uses md5
to encrypt passwords in Access-Request
queries; RADIUS Authentication is not supported for systems where FIPS mode is enabled.
PackageKit can frequently interfere with the installation/update mechanism. Consider disabling or removing PackageKit if installed prior to running the setup process.
Only the “targeted” SELinux policy is supported. The targeted policy can be set to disabled, permissive, or enforcing.
When performing a bundled install, refer to Using the Bundled Ansible Automation Platform Installer for more information.
When installing Ansible Tower, you only need to run setup.sh
, any repositories needed by Tower are installed automatically.
The latest version of Ansible is installed automatically during the setup process. No additional installation or configuration is required.
Ansible Tower no longer supports Ubuntu. Refer to previous versions of the Ansible Automation Platform Installation and Reference Guide for details on Ubuntu.
For OpenShift-based deployments, refer to OpenShift Deployment and Configuration.
Satellite users will need to install the Katello RPM for your Satellite instance on the Tower node prior to installing Tower. This RPM automatically configures Subscription Manager to use Satellite as its content source, and the hostname
value gets updated in /etc/rhsm/rhsm.conf
.
Note
If you were to install the Katello RPM after installing Tower, Tower would not have access to the rhsm.conf
– which it relies on for applying a subscription from Satellite. This is because the Tower installer sets an ACL rule on the rhsm.conf
file, therefore, a subscription is unable to be applied if that file does not exist, gets later overwritten, or the user does not have the right permissions to access the file.
For detail on how to register a host with a Satellite server, refer to the Registration section of the Satellite documentation.