Ansible role which installs and configures Graylog log management.
- MongoDB - use master branch for compatibility with Ansible 2.2 see issue 5
- Elasticsearch - use version 0.2 to ensure compatibility with 2.x. Graylog doesn't support Elasticsearch 5.x yet
- NGINX
- Here is an example of a playbook targeting Vagrant box(es):
- hosts: all
remote_user: vagrant
become: True
vars:
es_major_version: "2.x"
es_version: "2.4.3"
es_instance_name: 'graylog'
es_scripts: False
es_templates: False
es_version_lock: False
es_heap_size: 1g
es_config: {
node.name: "graylog",
cluster.name: "graylog",
discovery.zen.ping.unicast.hosts: "localhost:9301",
http.port: 9200,
transport.tcp.port: 9300,
network.host: 0.0.0.0,
node.data: true,
node.master: true,
bootstrap.mlockall: false,
discovery.zen.ping.multicast.enabled: false
}
# Do not set web_endpoint_uri to choose the first ip address available automatically
graylog_web_endpoint_uri: ''
# Option 2:
# graylog_web_endpoint_uri: 'http://{{ ansible_host }}:9000/api/'
# Note: if you set here localhost or 127.0.0.1 the web interface will never reach your webui as client
# runs with javascript on your browser since graylog 2.0
roles:
- role: 'Graylog2.graylog-ansible-role'
tags: graylog
- Create a playbook file with that content, e.g.
your_playbook.yml
- Fetch this role
ansible-galaxy install -n -p ./roles Graylog2.graylog-ansible-role
- Install role's dependencies
ansible-galaxy install -r roles/Graylog2.graylog-ansible-role/requirements.yml -p ./roles
- Apply the playbook to a Vagrant box
ansible-playbook your_playbook.yml -i "127.0.0.1:2222,"
- Login to Graylog by opening
http://127.0.0.1:9000
in your browser. Default username and password isadmin
# Basic server settings
graylog_server_version: '2.2.2-1' # Optional, if not provided the latest version will be installed
graylog_is_master: 'True'
graylog_password_secret: '2jueVqZpwLLjaWxV' # generate with: pwgen -s 96 1
graylog_root_password_sha2: '8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918' # generate with: echo -n yourpassword | shasum -a 256
# Elasticsearch message retention
graylog_elasticsearch_max_docs_per_index: 20000000
graylog_elasticsearch_max_number_of_indices: 20
graylog_elasticsearch_shards: 4
graylog_elasticsearch_replicas: 0
graylog_rest_listen_uri: 'http://0.0.0.0:9000/api/'
graylog_web_listen_uri: 'http://0.0.0.0:9000/'
graylog_web_endpoint_uri: 'http://127.0.0.1:9000/api/'
Take a look into defaults/main.yml
to get an overview of all configuration parameters.
- Set up
roles_path = ./roles
inansible.cfg
([defaults]
block) - Install role
ansible-galaxy install Graylog2.graylog-ansible-role
- Install role's dependencies
ansible-galaxy install -r roles/Graylog2.graylog-ansible-role/requirements.yml
- Set up playbook (see example below):
- hosts: server
become: True
vars:
es_major_version: "2.x"
es_version: "2.4.3"
es_instance_name: 'graylog'
es_scripts: False
es_templates: False
es_version_lock: False
es_heap_size: 1g
es_config: {
node.name: "graylog",
cluster.name: "graylog",
discovery.zen.ping.unicast.hosts: "localhost:9301",
http.port: 9200,
transport.tcp.port: 9300,
network.host: 0.0.0.0,
node.data: true,
node.master: true,
bootstrap.mlockall: false,
discovery.zen.ping.multicast.enabled: false
}
# Do not set web_endpoint_uri to choose the first ip address available automatically
graylog_web_endpoint_uri: ''
# Option 2:
# graylog_web_endpoint_uri: 'http://{{ ansible_host }}:9000/api/'
nginx_sites:
graylog:
- listen 80
- server_name graylog
- location / {
proxy_pass http://localhost:9000/;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass_request_headers on;
proxy_connect_timeout 150;
proxy_send_timeout 100;
proxy_read_timeout 100;
proxy_buffers 4 32k;
client_max_body_size 8m;
client_body_buffer_size 128k; }
roles:
- role: 'Graylog2.graylog-ansible-role'
tags: graylog
- Run the playbook with
ansible-playbook -i inventory_file your_playbook.yml
- Login to Graylog by opening
http://<host IP>
in your browser, default username and password isadmin
You can use var: graylog_install_java: false
and then add java from openjdk-8 instead of installing oracle java 8.
Openjdk doesn't have problems to use a proxy for apt, also doesn't requires the license agreement that oracle requires.
Example:
- name: Add java-jdk-8 ppa for Ubuntu trusty
hosts: graylog2_servers
become: True
tasks:
- name: installing repo for Java 8 in Ubuntu 14.04
apt_repository: repo='ppa:openjdk-r/ppa'
when: ansible_distribution_release == 'trusty'
- name: Install java from openjdk
hosts: graylog2_servers
become: True
vars:
graylog_install_java: false
# Ensure to add this option if not added elastic.elasticsearch will install openjdk-7 that will break graylog2
es_java_install: False
# Var to be be used with elastic.elasticsearch role to force java version:
es_java: openjdk-8-jre-headless
roles:
- role: geerlingguy.java
when: ansible_distribution_release == 'trusty'
java_packages:
- openjdk-8-jdk
- role: 'Graylog2.graylog-ansible-role'
tags: graylog
Is good to be explicit, these are all the roles that you need to run for graylog2.
Note: in this example vars are in a more appropiate place at group_vars/group/vars
- name: Apply roles for graylog2 servers
hosts: graylog2_servers
become: True
vars:
graylog_install_elasticsearch: False
graylog_install_mongodb: False
graylog_install_nginx: False
graylog_install_java: False
roles:
- role: lesmyrmidons.mongodb
tags:
- mongodb
- graylog2_servers
- role: geerlingguy.java
when: ansible_distribution_release == 'trusty'
java_packages:
- openjdk-8-jdk
tags:
- elasticsearch
- graylog
- graylog2_servers
- role: elastic.elasticsearch
tags:
- elasticsearch
- graylog2_servers
- role: jdauphant.nginx
tags:
- nginx
- graylog2_servers
- role: Graylog2.graylog-ansible-role
tags:
- graylog
- graylog2_servers
Dependencies can be enabled/disabled with the host_vars
graylog_install_*
.
Take look into meta/main.yml for more information. Keep in mind that you
have to install all dependencies even when they are disabled to prevent errors.
One can test the role on the supported distributions (see meta/main.yml
for the complete list),
by using the Docker images provided.
Example for Debian Stretch:
$ cd graylog-ansible-role
$ docker build \
--tag graylog-ansible-role-stretch \
--file tests/support/stretch.Dockerfile \
tests/support
$ docker run \
--rm \
--detach \
--interactive \
--tty \
--volume $PWD:/role \
--name stretch \
graylog-ansible-role-stretch
$ DOCKER_CONTAINER_ID=$(docker ps --filter name=stretch -q)
$ docker logs $DOCKER_CONTAINER_ID
$ docker exec \
--interactive \
--tty \
$DOCKER_CONTAINER_ID \
/bin/bash -xec "bash -x run-tests.sh"
$ docker ps -a
$ docker stop $DOCKER_CONTAINER_ID
Example for CentOS 7 and Ubuntu Xenial:
Due to how systemd
works with Docker, the following approach is suggested:
$ cd graylog-ansible-role
$ docker build \
--tag graylog-ansible-role-centos7 \
--file tests/support/centos7.Dockerfile \
tests/support
$ docker run \
--rm \
--detach \
--privileged \
--interactive \
--tty \
--volume /sys/fs/cgroup:/sys/fs/cgroup:ro \
--volume $PWD:/role:ro \
--name centos \
graylog-ansible-role-centos7 \
/usr/sbin/init
$ DOCKER_CONTAINER_ID=$(docker ps --filter name=centos -q)
$ docker logs $DOCKER_CONTAINER_ID
$ docker exec \
--interactive \
--tty \
$DOCKER_CONTAINER_ID \
/bin/bash -xec "bash -x run-tests.sh"
$ docker ps -a
$ docker stop $DOCKER_CONTAINER_ID
Ubuntu Xenial:
$ cd graylog-ansible-role
$ docker build \
--tag graylog-ansible-role-xenial \
--file tests/support/xenial.Dockerfile \
tests/support
$ docker run \
--rm \
--detach \
--privileged \
--interactive \
--tty \
--volume /sys/fs/cgroup:/sys/fs/cgroup:ro \
--volume $PWD:/role:ro \
--name xenial \
graylog-ansible-role-xenial \
/lib/systemd/systemd
$ DOCKER_CONTAINER_ID=$(docker ps --filter name=xenial -q)
$ docker logs $DOCKER_CONTAINER_ID
$ docker exec \
--interactive \
--tty \
$DOCKER_CONTAINER_ID \
/bin/bash -xec "bash -x run-tests.sh"
$ docker ps -a
$ docker stop $DOCKER_CONTAINER_ID
$ docker rm -v $DOCKER_CONTAINER_ID
Author: Marius Sturm (marius@graylog.com) and contributors
License: Apache 2.0