Skip to main content
Version: 2.0

Inventory configuration

info

This documentation page may be outdated

Deployment

Introduction

This page covers some of the possibilities offered by our inventory, specially the file regards-playbook/inventories/regards-cnes/group_vars/all/main.yml.

Users & groups

Let's see how users created by the demo inventory are used:

UserGroupDescriptionTips
dockermapuiddockermapgidUsed by the docker daemonThis group is internal to the server
gregards_adminRegroup all users that are allowed to monitor the stackFacultative, johndoe can also replace this one
docker-regards-datagregards_dataIPA User/Group owning all files created by REGARDS, must be able to access network disk group_workdir_networkYour user should be inside that group
johndoejohndoe, dockermapgid, gregards_admin, gregards_dataYour personnal userYour user has access to Docker, to the stack and data
mariecuriemariecurie, gregards_dataSome userShe has access to data, not the stack itself

To setup these users and groups, you must follow these requirements:

User or groupValue requirement
dockermapuidname_space_uid
dockermapgidname_space_gid
johndoe,mariecurieAny value inferior to name_space_uid
gregards_adminAny value inferior to name_space_gid. That user can be no login.
docker-regards-datagroup_container_run_uid + name_space_uid
gregards_datagroup_container_run_gid + name_space_gid

Inventories configuration properties

Global properties :

PathTypeDescriptionConstraints
group_workdir_networkStringNetwork disk shared accross every nodesRequired
group_workdir_network_allow_rootBoolDo we allow root inside the network volume?Required
group_workdir_localStringLocal folder where regards is installed on every nodeRequired
group_stack_nameStringUnique stack name (for swarm)Required. [a-z-]+
group_setypeStringSELinux typeRequired
group_seuserStringSELinux userRequired
group_container_root_userStringUser owning the REGARDS folder tree, Docker must have read/write accessRequired
group_container_root_groupStringGroup owning the REGARDS folder treeRequired
group_enable_setup_regards_usersBoolDo we need to create root_group, run_group and run_user locally ?Facultative. Default to true.
group_container_run_userStringAll files created by containers will use this userRequired
group_container_run_groupStringAll files created by containers will use this groupRequired
group_container_run_uidIntRun user id. (See group_container_run_user)Required
group_container_run_gidIntRun group id. (See group_container_run_group)Required
group_docker_network_nameStringDocker network name. Automatically created by AnsibleRequired
group_docker_network_ip_networkStringDocker network ipRequired. If a basic IPV4 looks like A.B.C.D, you must provide A.B.C.
group_docker_registryStringDocker registry holding REGARDS imagesRequired

If you don't have mutualised COTS, don't worry. You can deploy yours and use mutualised ones later.

PathTypeDescriptionConstraints
group_docker_cots_configurationObjectList COTS specific configurationRequired. Can be empty
group_docker_cots_configuration.postgres.nbTenantIntUse to deduce the number of connections Postgres should allowRequired when group_docker_cots.postgres is defined
group_docker_cots_configuration.elasticsearch.cluster_nameIntElasticsearch cluster nameRequired when group_docker_cots.elasticsearch is defined
group_docker_cots_configuration.elasticsearch_logs.cluster_nameIntLogging elasticsearch cluster nameRequired when group_docker_cots.elasticsearch_logs is defined