Are you over 18 and want to see adult content?
More Annotations
A complete backup of oxybookstore.com
Are you over 18 and want to see adult content?
A complete backup of spanelskavina.com
Are you over 18 and want to see adult content?
A complete backup of race-brewers.com
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of push-start.co.uk
Are you over 18 and want to see adult content?
A complete backup of memoriesahead.com
Are you over 18 and want to see adult content?
A complete backup of convergenceindia.org
Are you over 18 and want to see adult content?
A complete backup of worldofgothic.de
Are you over 18 and want to see adult content?
Text
* Home
* Linux
* CentOS
* Ubuntu
* Mikrotik
* Networking
* Cisco
* Windows
* Misc.
* Amazon EC2
* Samba
* Solaris
* About
LAZY GEEK -:)
Home
RABBITMQ CLUSTERING ON AWS USING ANSIBLELeave a comment
Posted by rbgeek onSeptember 20, 2018
In this short post, I’ll show you the steps to configure the RabbitMQ clustering on AWS using Ansible. We decided to use the RabbtiMQ instead of AWS SQS because we want better performance and also require some flexibility. In this setup, we have created 3 EC2 servers(Ubuntu 14.04 LTS) and 1 classic ELB on AWS. Clients both providers and consumers connect to the RabbitMQ servers through ELB, so system will be functional even one or more server will be down in other words system will be operational as long as one of the server is running. RABBITMQ REQUIREMENT(Copied from official RabbitMQ Site): RabbitMQ nodes address each other using domain names, either short or fully-qualified (FQDNs). Therefore hostnames of all cluster members must be resolvable from all cluster nodes, as well as machines on which command line tools such as rabbitmqctl might be used. Hostname resolution can use any of the standard OS-provided methods:DNS records
Local host files (e.g. /etc/hosts) SETTINGS ON AWS: Read more of this postAdvertisements
Report this ad
Report this ad
SHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Amazon EC2 ,
Ansible , AWS
, Ubuntu
rabbitmq
, rabbitmq ansible
, rabbitmq cluster
, RabbitMQ
Clustering on AWS
,
RabbitMQ Clustering using ansible,
RabbitMQ Clustering with Ubuntu JENKINS INSTALLATION AND GITHUB OAUTH INTEGRATION USING ANSIBLELeave a comment
Posted by rbgeek onOctober 10, 2016
In this tutorial, we’ll use Ansible to automate the installation of Jenkins CI on a fresh Ubuntu 14.04 LTS and integrate it with the GitHub OAuth. Ansible will also assign the matrix based permission on the Jenkins like which github user or group(s) have what rights on the Jenkins. Beside that, it will also install the Apache which serves as frontend for all the Jenkins requests. In short, in this tutorial we’ll do the following tasks usingAnsible:
* Install the JAVA 7 * Install the mentioned version of Jenkins(in this case it will be1.658)
* Install the desired plugins * Install the Apache and configure it as frontend for Jenkins * Install the SSL certificate for Apache Virtual Host that act as frontend for Jenkins * Integrate the Jenkins with GitHub using OAuth for Authenication * Configure the matrix based security using the github username orgroup
Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Amazon EC2 ,
Ansible , AWS
, Jenkins
, Linux
, Ubuntu
ansible
, github oauth
, Jenkins
, jenkins with ansible, jenkins with
github oauth
, oauth
ANSIBLE ROLE TO CREATE LINUX USERS WITH GITHUB ACCOUNTS SSH KEYLeave a comment
Posted by rbgeek on July17, 2016
In this short tutorial we’ll learn how to create or delete the linux user accounts with public ssh keys associated with their Github accounts using Ansible, so please create a Github account if you don’t already have one, and follow the instructionsfor
associated SSH keys with your account, if you didn’t perform italready.
First, download this Repository from the GitHub: git clone https://github.com/arbabnazar/ansible-roles.git Note: If git is not installed then you can simply download the zipfile.
Move inside the cloned directory:cd ansible-roles
Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Amazon EC2 ,
Ansible , CentOS
, DevOps
, Linux
, Ubuntu
ansible
, ansible and github key, create
linux user with ansible,
github key
AUTOSCALING WITH AWS INSTANCES USING ANSIBLE-PULL1 Comment
Posted by rbgeek on May15, 2016
Ansible has an excellent feature called ansible-pull, which many people don’t know or don’t use. This feature works best for self healing infrastructure, best example is AWS Autoscaling in which new ec2 instance is created from vanilla ami, then pull the code from somewhere (version control system) and configure itself before announcing that it is ready to serve (mean add to the serving ELB). The steps for ansible-pull are: 1. Pull the git repo containing your playbooks. 2. That repo is cloned to the mentioned directory. 3. ansible-pull starts executing the local.yml found in your clonedrepo directory.
Let’s assume that you want to pull the code from the private git repo and for this you need the ssh private key but you have taken the updated vanilla ubuntu ami from the Marketplace, then how you will clone this private repo? For this we’ll use the BOOTSTRAP PATTERN: – Put the private part of ssh key for the git repository on S3. – Getting ssh key from s3 bucket using IAM role credentials For this, create a S3 bucket(in my case it is named “tendo-github-key-s3“): Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Amazon EC2 ,
Ansible , AWS
, DevOps
ansible-pull
, autoscaling
, autoscaling with
ansible-pull
,
self healing infrastructure CREATE AWS CLOUDFRONT DISTRIBUTION USING TERRAFORMLeave a comment
Posted by rbgeek onApril 25, 2016
In this post, we’ll create the AWS Cloudfront Distribution using Terraform and for this, we need the latest version of Terraform.Terraform v0.6.15
* Complete Cloudfront Terraform Plan as gist * Complete Variables as gist Before using the terraform, we need to export AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY as environment variables: export AWS_ACCESS_KEY_ID="xxxxxxxxxxxxxxxx" export AWS_SECRET_ACCESS_KEY="yyyyyyyyyyyyyyyyyyyy" Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
AWS , Terraform
aws terraform
, cloudfront
terraform ,
create cloudfront with terraform,
route53 , route53 terraform, s3
, s3 terraform
HOW TO COMPILE A DEVELOPMENT VERSION OF TERRAFORMLeave a comment
Posted by rbgeek onApril 19, 2016
In this tutorial I’ll describe all the steps to build the development version of Terraform. At the end of this process, it will generate a set of binaries for each supported platforms(Linux, Mac OSX, Windows etc..).
First we need to clone the terraform’s github offical repo: git clone https://github.com/hashicorp/terraform.git Move inside the cloned repo:cd terraform
Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Linux , Terraform
, Ubuntu
build terraform
, build terraform
from source
,
compile terraform
, Terraform
HIGHLY-AVAILABLE WORDPRESS SETUP INSIDE AWS VPC USING TERRAFORM& ANSIBLE
1 Comment
Posted by rbgeek onMarch 28, 2016
In this post,we’ll create the Infrastructure for Highly-Available WordPress website over AWS using Terraform and then install the WordPress using Ansible. If you don’t know about the Terraform, please check this link . We’ll use the Terraform to create the fully operational AWS VPC infrastructure(subnets,routeing tables,igw etc), it will also create everything that need to be for creating EC2 and RDS instances (security key, security group, subnet group). It will also create the Elastic Load Balancer and add the EC2 instance(s) automatically to it as well as creating the Route53 entry for this wordpress site and add the ELB alias to it. Ansible will be used to deploy the wordpress on the EC2 instances that have been created via Terraform, that will be fault tolerant andhighly available.
REQUIREMENTS:
*
Terraform
*
Ansible
*
AWS admin access
TOOLS USED: Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Amazon EC2 ,
Ansible , DevOps
, Linux
, Terraform
amazon ec2
, amazon vpc
, ansible
, ansible vpc
, aws ec2
, aws terraform
, aws terraform
ansible , aws
vpc , aws with ansible, ec2 instance
, ec2 key pair
, elb
, Security Group
, Terraform
, WordPress
AWS INFRASTRUCTURE CREATION WITH ANSIBLE PART-41 Comment
Posted by rbgeek onJanuary 30, 2016
By this point, you should have gone through the Part-1,
Part-2
and Part-3
of this series. In this tutorial, we’ll create the RDS instance inside the VPC that we have created in Part-1and
Security Group created in Part-2using Ansible.
If you have completed the previous parts of this series, then you have already clone the git repo that contains all the roles, if not thenclone the git repo:
git clone https://github.com/arbabnazar/ansible-aws-roles.git cd ansible-aws-roles Modified the aws.yml playbook to add the desired roles:---
- hosts: localhost
connection: local
gather_facts: no
roles:
- vpc
- ec2sg
- ec2key
- ec2instance
- elb
- rds
view raw
aws-4.yml
hosted with by GitHub NOTE: May be, you have already noticed that we have also added the vpc, ec2sg, ec2key, ec2instance and elb roles in the playbook, it will not re-create all this except the EC2 instance(this role is not idempotent), if you have created them in the previous parts, because Ansible is idempotent. Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Amazon EC2 ,
Ansible , Ubuntu
amazon ec2
, amazon vpc
, ansible
, ansible vpc
, aws ec2
, aws vpc
, aws with ansible
, ec2 instance
, ec2 key pair
, elb
, rds
, Security Group
AWS INFRASTRUCTURE CREATION WITH ANSIBLE PART-32 Comments
Posted by rbgeek onJanuary 24, 2016
By this point, you should have already read the Part-1and Part-2
of this series. In this tutorial, we’ll create the EC2 instances inside the VPC that we have created in Part-1,
Security Group & EC2 Key Pair created in Part-2and
also add them inside the ELB, all with Ansible. If you have completed the previous parts of this series, then you have already clone the git repo that contains all the roles, if not thenclone the git repo:
git clone https://github.com/arbabnazar/ansible-aws-roles.git cd ansible-aws-roles Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Amazon EC2 ,
Ansible , Linux
amazon ec2
, amazon vpc
, ansible
, ansible vpc
, aws ec2
, aws vpc
, aws with ansible
, ec2 instance
, ec2 key pair
, elb
, Security Group
AWS INFRASTRUCTURE CREATION WITH ANSIBLE PART-23 Comments
Posted by rbgeek onJanuary 9, 2016
In the second part of this series of tutorials, we’ll create the Security Group and EC2 Key Pair using Ansible. If you didn’t create the VPC already, then please check the Part-1of this series.
If you have completed the Part-1,
then you have already clone the git repo that contains all the roles, if not then clone the git repo: git clone https://github.com/arbabnazar/ansible-aws-roles.git cd ansible-aws-roles Read more of this postSHARE THIS:
* More
*
*
* Tumblr
*
*
LIKE THIS:
Like Loading...
Amazon EC2 ,
Ansible , Linux
amazon vpc
, ansible
, ansible vpc
, aws vpc
, aws with ansible
, ec2 key pair
, Security Group
← Older posts
RSS feed
MY GITHUB ACCOUNT
TENDO.LINUX{AT}GMAIL(DOT)COMTAGS
12.04 amazon cloud
amazon ec2
amazon s3
amazon vpc
ansible
ansible basics
ansible vpc
apache
apache2
AWS
aws ec2
aws vpc
aws vpn
aws with ansible
backup
centos
centos 6
centos server
client
clonezilla
clonezilla on linux
dhcp
EC2
ec2 instance
Gnome
gnome classic
Install
ipsec
LAMP
LEMP
linux
linux ipsec
linux server
linux vpn
mikrotik
mikrotik router
MySQL
mysql command line
nginx
openswan
openvpn
playbooks
private key
putty
quagga
router
routing
Security Group
server
simple test
site to site vpn
ssh
ssh login
ssh server
ssh tunnel
Static IP Address
Subversion
subversion server
svn
technology
tunneling the trafficubuntu
ubuntu. remote managementubuntu
12.04 ubuntu desktopubuntu server
ubuntu server 12.04
vnc session
VPC
vpn
vpn behind cloud
windows
Windows 7
WordPress
ARCHIVES
* September 2018
* October 2016
* July 2016
* May 2016
* April 2016
* March 2016
* January 2016
* September 2015
* August 2015
* March 2015
* February 2015
* January 2015
* September 2014
* August 2014
* July 2014
* June 2014
* May 2014
* April 2014
* February 2014
* January 2014
* November 2013
* August 2013
* July 2013
* June 2013
* May 2013
* April 2013
* March 2013
* February 2013
* January 2013
* December 2012
* November 2012
* October 2012
* September 2012
* August 2012
* July 2012
* June 2012
* May 2012
* April 2012
* March 2012
Advertisements
Report this ad
↑ Top Create a free website or blog at WordPress.com.Post to
Cancel
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. To find out more, including how to control cookies, see here: CookiePolicy
* Follow
*
* Lazy Geek -:)
* Customize
* Follow
* Sign up
* Log in
* Report this content * Manage subscriptions* Collapse this bar
%d bloggers like this: Send to Email Address Your Name Your Email AddressCancel
Post was not sent - check your email addresses! Email check failed, please try again Sorry, your blog cannot share posts by email.Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0