2014-03-14 19:01:07 +00:00
Google Cloud Platform Guide
===========================
2014-03-05 15:53:38 +00:00
2014-03-14 19:01:07 +00:00
.. gce_intro:
2014-03-05 15:53:38 +00:00
Introduction
2018-07-06 14:09:13 +00:00
--------------------------
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
Ansible + Google have been working together on a set of auto-generated
Ansible modules designed to consistently and comprehensively cover the entirety
of the Google Cloud Platform.
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
Ansible contains modules for managing Google Cloud Platform resources,
including creating instances, controlling network access, working with
persistent disks, managing load balancers, and a lot more.
2014-03-14 19:01:07 +00:00
2018-07-06 14:09:13 +00:00
These new modules can be found under a new consistent name scheme "gcp_*"
(Note: gcp_target_proxy and gcp_url_map are legacy modules, despite the "gcp_*"
name. Please use gcp_compute_target_proxy and gcp_compute_url_map instead).
Additionally, the gcp_compute inventory plugin can discover all GCE instances
and make them automatically available in your Ansible inventory.
You may see a collection of other GCP modules that do not conform to this
naming convention. These are the original modules primarily developed by the
Ansible community. You will find some overlapping functionality such as with
2018-08-22 19:53:30 +00:00
the "gce" module and the new "gcp_compute_instance" module. Either can be
2018-07-06 14:09:13 +00:00
used, but you may experience issues trying to use them together.
While the community GCP modules are not going away, Google is investing effort
into the new "gcp_*" modules. Google is committed to ensuring the Ansible
2018-11-02 21:05:23 +00:00
community has a great experience with GCP and therefore recommends adopting
these new modules if possible.
2018-07-06 14:09:13 +00:00
2018-11-02 21:05:23 +00:00
Requisites
2018-07-06 14:09:13 +00:00
---------------
The Google Cloud Platform (GCP) modules require both the `` requests `` and the
`` google-auth `` libraries to be installed.
2014-03-05 15:53:38 +00:00
.. code-block :: bash
2018-07-06 14:09:13 +00:00
$ pip install requests google-auth
2014-03-05 15:53:38 +00:00
2018-11-02 21:05:23 +00:00
Alternatively for RHEL / CentOS, the `` python-requests `` package is also
available to satisfy `` requests `` libraries.
.. code-block :: bash
$ yum install python-requests
2014-03-05 15:53:38 +00:00
Credentials
-----------
2018-07-06 14:09:13 +00:00
It's easy to create a GCP account with credentials for Ansible. You have multiple options to
get your credentials - here are two of the most common options:
* Service Accounts (Recommended): Use JSON service accounts with specific permissions.
* Machine Accounts: Use the permissions associated with the GCP Instance you're using Ansible on.
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
For the following examples, we'll be using service account credentials.
To work with the GCP modules, you'll first need to get some credentials in the
2016-05-12 15:57:26 +00:00
JSON format:
2014-03-05 15:53:38 +00:00
2016-05-12 15:57:26 +00:00
1. `Create a Service Account <https://developers.google.com/identity/protocols/OAuth2ServiceAccount#creatinganaccount> `_
2. `Download JSON credentials <https://support.google.com/cloud/answer/6158849?hl=en&ref_topic=6262490#serviceaccounts> `_
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
Once you have your credentials, there are two different ways to provide them to Ansible:
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
* by specifying them directly as module parameters
2016-05-12 15:57:26 +00:00
* by setting environment variables
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
Providing Credentials as Module Parameters
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
2014-03-05 15:53:38 +00:00
2014-03-14 19:01:07 +00:00
For the GCE modules you can specify the credentials as arguments:
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
* `` auth_kind `` : type of authentication being used (choices: machineaccount, serviceaccount, application)
2014-03-05 15:53:38 +00:00
* `` service_account_email `` : email associated with the project
2018-07-06 14:09:13 +00:00
* `` service_account_file `` : path to the JSON credentials file
* `` project `` : id of the project
* `` scopes `` : The specific scopes that you want the actions to use.
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
For example, to create a new IP address using the `gcp_compute_address` module,
you can use the following configuration:
2014-03-05 15:53:38 +00:00
.. code-block :: yaml
2014-03-14 19:01:07 +00:00
2018-07-06 14:09:13 +00:00
- name: Create IP address
2014-03-05 15:53:38 +00:00
hosts: localhost
2016-05-12 15:57:26 +00:00
connection: local
2014-03-05 15:53:38 +00:00
gather_facts: no
2014-03-14 19:01:07 +00:00
2014-03-05 15:53:38 +00:00
vars:
2018-07-06 14:09:13 +00:00
service_account_file: /home/my_account.json
project: my-project
auth_kind: serviceaccount
scopes:
- www.googleapis.com/auth/compute
2014-03-14 19:01:07 +00:00
2014-03-05 15:53:38 +00:00
tasks:
2014-03-14 19:01:07 +00:00
2018-07-06 14:09:13 +00:00
- name: Allocate an IP Address
gcp_compute_address:
state: present
name: 'test-address1'
region: 'us-west1'
project: "{{ project }}"
auth_kind: "{{ auth_kind }}"
service_account_file: "{{ service_account_file }}"
scopes: "{{ scopes }}"
Providing Credentials as Environment Variables
2016-05-12 15:57:26 +00:00
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
Set the following environment variables before running Ansible in order to configure your credentials:
.. code-block :: bash
2018-07-06 14:09:13 +00:00
GCP_AUTH_KIND
GCP_SERVICE_ACCOUNT_EMAIL
GCP_SERVICE_ACCOUNT_FILE
GCP_SCOPES
2016-05-12 15:57:26 +00:00
2014-03-14 19:01:07 +00:00
GCE Dynamic Inventory
---------------------
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
The best way to interact with your hosts is to use the gcp_compute inventory plugin, which dynamically queries GCE and tells Ansible what nodes can be managed.
2014-03-14 19:01:07 +00:00
2018-07-06 14:09:13 +00:00
To use the gcp_compute inventory plugin, create a file that ends in .gcp.yml file in your root directory. The gcp_compute inventory script takes in the same authentication
information as any module.
2014-03-14 19:01:07 +00:00
2018-07-06 14:09:13 +00:00
Here's an example of a valid inventory file:
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
.. code-block :: yaml
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
plugin: gcp_compute
projects:
- google.com:graphite-playground
filters:
auth_kind: serviceaccount
service_account_file: /home/alexstephen/my_account.json
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
Executing `` ansible-inventory --list -i <filename>.gcp.yml `` will create a list of GCP instances that are ready to be configured using Ansible.
2014-03-05 15:53:38 +00:00
Create an instance
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
2018-07-06 14:09:13 +00:00
The full range of GCP modules provide the ability to create a wide variety of
GCP resources with the full support of the entire GCP API.
2014-03-05 15:53:38 +00:00
2018-07-06 14:09:13 +00:00
The following playbook creates a GCE Instance. This instance relies on a GCP
network and a Disk. By creating the Disk and Network separately, we can give as
much detail as necessary about how we want the disk and network formatted. By
registering a Disk/Network to a variable, we can simply insert the variable
into the instance task. The gcp_compute_instance module will figure out the
rest.
2014-03-05 15:53:38 +00:00
.. code-block :: yaml
2018-07-06 14:09:13 +00:00
- name: Create an instance
2014-03-05 15:53:38 +00:00
hosts: localhost
gather_facts: no
2014-03-14 19:01:07 +00:00
connection: local
2014-03-05 15:53:38 +00:00
vars:
2018-07-06 14:09:13 +00:00
project: my-project
auth_kind: serviceaccount
service_account_file: /home/my_account.json
zone: "us-central1-a"
region: "us-central1"
2014-03-14 19:01:07 +00:00
2014-03-05 15:53:38 +00:00
tasks:
2018-07-06 14:09:13 +00:00
- name: create a disk
gcp_compute_disk:
name: 'disk-instance'
size_gb: 50
source_image: 'projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts'
zone: "{{ zone }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
service_account_file: "{{ gcp_cred_file }}"
scopes:
- https://www.googleapis.com/auth/compute
state: present
register: disk
- name: create a network
gcp_compute_network:
name: 'network-instance'
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
service_account_file: "{{ gcp_cred_file }}"
scopes:
- https://www.googleapis.com/auth/compute
state: present
register: network
- name: create a address
gcp_compute_address:
name: 'address-instance'
region: "{{ region }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
service_account_file: "{{ gcp_cred_file }}"
scopes:
- https://www.googleapis.com/auth/compute
state: present
register: address
- name: create a instance
gcp_compute_instance:
state: present
name: test-vm
machine_type: n1-standard-1
disks:
- auto_delete: true
boot: true
source: "{{ disk }}"
network_interfaces:
- network: "{{ network }}"
access_configs:
- name: 'External NAT'
nat_ip: "{{ address }}"
type: 'ONE_TO_ONE_NAT'
zone: "{{ zone }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
service_account_file: "{{ gcp_cred_file }}"
scopes:
- https://www.googleapis.com/auth/compute
register: instance
2014-03-14 19:01:07 +00:00
- name: Wait for SSH to come up
2018-07-06 14:09:13 +00:00
wait_for: host={{ instance.address }} port=22 delay=10 timeout=60
2014-03-14 19:01:07 +00:00
2014-09-29 03:18:39 +00:00
- name: Add host to groupname
2018-07-06 14:09:13 +00:00
add_host: hostname={{ instance.address }} groupname=new_instances
2014-03-14 19:01:07 +00:00
- name: Manage new instances
hosts: new_instances
connection: ssh
2014-09-29 03:18:39 +00:00
sudo: True
2014-03-14 19:01:07 +00:00
roles:
- base_configuration
- production_server
2014-09-29 03:18:39 +00:00
2014-03-14 19:01:07 +00:00
Note that use of the "add_host" module above creates a temporary, in-memory group. This means that a play in the same playbook can then manage machines
in the 'new_instances' group, if so desired. Any sort of arbitrary configuration is possible at this point.
2018-07-30 21:12:36 +00:00
For more information about Google Cloud, please visit the `Google Cloud website <https://cloud.google.com> `_ .