Step By Step Kubernetes Automation With Ansible | Mukesh Ranjan | Skillshare

Step By Step Kubernetes Automation With Ansible

Mukesh Ranjan, Learn Everything Step By Step

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
41 Lessons (6h 3m)
    • 1. Course Introduction

      3:18
    • 2. PART I : Introduction

      3:18
    • 3. PART I : YMAL Basics

      7:38
    • 4. PART I : Ansible Architecture Overview

      6:18
    • 5. PART I : Concepts Virtual Enviornment Setup

      7:05
    • 6. PART I : LAB Virtual Enviornment Setup

      11:52
    • 7. PART I : LAB Ansible Installation

      3:51
    • 8. PART I : Ansible Internals

      8:06
    • 9. PART I : Ansible Core Components

      15:45
    • 10. PART I : LAB Overview

      5:06
    • 11. PART I : LAB Variables

      13:56
    • 12. PART I : LAB Tags

      7:44
    • 13. PART I : LAB Register Keyword

      5:42
    • 14. PART I : LAB When Statement

      6:33
    • 15. PART I : LAB Loops

      6:46
    • 16. PART I : LAB Error Handling

      7:46
    • 17. PART I : LAB Roles

      5:50
    • 18. PART I : Ansible Templates

      10:23
    • 19. PART I : Ansible Handlers

      4:24
    • 20. PART I : Project Automation Of LXD Container Creation For Kubernetes

      16:27
    • 21. PART II : Overview Of Step By Step Kubernetes Automation With Ansible

      6:44
    • 22. PART II : CONCEPT Kubernetes Components

      9:59
    • 23. PART II : LAB MANUAL STEPS HAProxy Installation

      9:19
    • 24. PART II : LAB MANUAL STEP Install Client Tools

      6:25
    • 25. PART II : LAB MANUAL STEP Provisioning CA Certificate and Generate TLS

      9:36
    • 26. PART II : LAB MANUAL STEPS Generating Kubernetes Configration

      12:06
    • 27. PART II : LAB MANUAL STEP Generation Of Data Encryption Config and Key

      2:51
    • 28. PART II : LAB MANUAL STEPS Bootstrap The ETCD Cluster

      11:58
    • 29. PART II : LAB MANUAL STEPS Bootstrap The Kubernetes Control Plane

      10:47
    • 30. PART II : LAB MANUAL STEPS Bootstrap Worker Nodes

      15:44
    • 31. PART III : OVERVIEW Step By Step Automation With Ansible

      6:19
    • 32. PART III : LAB AUTOMATE STEPS HAProxy Loadbalancer

      12:00
    • 33. PART III : LAB AUTOMATE STEPS Install Client Tool

      6:12
    • 34. PART III : LAB AUTOMATE STEPS Provisioning CA Certificate and Generate TLS

      19:42
    • 35. PART III : LAB AUTOMATE STEPS Generating Kubernetes Configration

      6:32
    • 36. PART III : LAB AUTOMATE STEPS Generating the Data Encryption Config and Key

      10:53
    • 37. PART III : 07 LAB STEP7 Automate Certificate And Kubeconfig Distribution Process

      7:49
    • 38. PART III : LAB AUTOMATE STEPS Bootstrap ETCD Cluster Step

      10:06
    • 39. PART III : LAB AUTOMATE STEPS Bootstrap The Kubernetes Control Plane

      18:42
    • 40. PART III : LAB AUTOMATE STEPS Bootstrap Worker Nodes

      10:48
    • 41. PART III : LAB AUTOMATE STEPS Merge All Playbooks Within Single Playbook

      1:04

About This Class

Mastering Ansible With Step By Step Kubernetes Automation is three part course. In the Part I. You will learn about Ansible with Hands On Labs. This course is Practical based course. All lesson designed as per industry standard . So that you can support real time project after completion of all the part of the course.

What will students learn in your course?

Automation Techniques With Ansible

How to execute Real time project on Ansible.

How to Setup Kubernetes on Bare Metal Machine On  LXC / LXD Containers

Are there any course requirements or prerequisites?

Basic Linux Command

Who are your target students?

All who wanted to Learn Automation Techniques

Beginners who want to learn Automation with Ansible

All who want to setup Kubernetes on Bare Metal Machine

Transcripts

1. Course Introduction: Hello, guys. Welcome to the complete automation course. In this course, we're going to learn about the step by a step Cuban. It automation with sensible. This course is divided into three parts. The first part we're going to learn about and several. Were we going to look into these topics in the first part, we're going to learn about sensible, where we will discuss about in when trees label configuration file and all these components which is involved within the enseval so that we will become for table toe, do the automation. Once we understand the core components, we will do the labs. So these are the lapse we are going to do. We're going to do the labs on these elements often several playbook whenever we're designing and several label. So we're going to use these components so I will let you know water these component with the help off lab. Once you finish all those things, then we are good to go to the second part of the course in the second part of the court's going to learn about manual deployment or wanted closure on production environment to let's looking toe that what we're going to do? We're going to design this infrastructure on Alexey. Contain a pair. We have one load balancer and three master north and three worker nodes. And there were going toe deploy the Kubernetes cluster as kubernetes cluster deployment had so many steps involved. So we must have toe aware about what are those component? I will let you know what are those component in this course. So let's look into the topics which we're going to discuss in part two of the courts. In part, two of the courts were going toe deploy the Kuban it cluster step by step manner manually where I will explain all these steps such involved in the deployment or Coburn it question . So once you are comfortable with all these deployment with manual steps, then you are in a good position toe proceed for though in the part, order off the courts where we're going to use whatever the knowledge which begin from part one and part two, and we will convert it as a uncivil automation. The script. So let's look into that. What are those things we're going to learn in the part? Three of the course. So in the part three we're going to perform all these activity which we have done. Man will in part two of the course. And here we will design a playable for each of their steps. And once each of steps has been done, people most those playbook and make a big labor. Put with that and we will execute it. And it will for form all the manual deployment activities which is required to deploy the coupon it cluster on production environment. So there is Lord Toe come within the course. So what does the school's doesn't contain? This course doesn't contain about the Cooper net application deployment on Cooper Net. It contains the infrastructure side off Cuba, NATO. After completion of this course, you come to know of our various technologies like vagrant Alexey Container Cooper Nets and several and most important, how to do automation With the help of these tools, this course is for everyone who want to learn about new technologies. I want to know about Cuban it who want to know about automation who want to know about sensible toe. So all these things you will get over here. I hope you will get the Complete View off automation project after completion of this course so far by guys. See you in the course 2. PART I : Introduction: Hello, guys. Welcome to the complete automation course. In this course, we're going to learn about the step by a step Cuban. It automation with sensible. This course is divided into three parts. The first part we're going to learn about and several. Were we going to look into these topics in the first part, we're going to learn about sensible, where we will discuss about in when trees label configuration file and all these components which is involved within the enseval so that we will become for table toe, do the automation. Once we understand the core components, we will do the labs. So these are the lapse we are going to do. We're going to do the labs on these elements often several playbook whenever we're designing and several label. So we're going to use these components so I will let you know water these component with the help off lab. Once you finish all those things, then we are good to go to the second part of the course in the second part of the court's going to learn about manual deployment or wanted closure on production environment to let's looking toe that what we're going to do? We're going to design this infrastructure on Alexey. Contain a pair. We have one load balancer and three master north and three worker nodes. And there were going toe deploy the Kubernetes cluster as kubernetes cluster deployment had so many steps involved. So we must have toe aware about what are those component? I will let you know what are those component in this course. So let's look into the topics which we're going to discuss in part two of the courts. In part, two of the courts were going toe deploy the Kuban it cluster step by step manner manually where I will explain all these steps such involved in the deployment or Coburn it question . So once you are comfortable with all these deployment with manual steps, then you are in a good position toe proceed for though in the part, order off the courts where we're going to use whatever the knowledge which begin from part one and part two, and we will convert it as a uncivil automation. The script. So let's look into that. What are those things we're going to learn in the part? Three of the course. So in the part three we're going to perform all these activity which we have done. Man will in part two of the course. And here we will design a playable for each of their steps. And once each of steps has been done, people most those playbook and make a big labor. Put with that and we will execute it. And it will for form all the manual deployment activities which is required to deploy the coupon it cluster on production environment. So there is Lord Toe come within the course. So what does the school's doesn't contain? This course doesn't contain about the Cooper net application deployment on Cooper Net. It contains the infrastructure side off Cuba, NATO. After completion of this course, you come to know of our various technologies like vagrant Alexey Container Cooper Nets and several and most important, how to do automation With the help of these tools, this course is for everyone who want to learn about new technologies. I want to know about Cuban it who want to know about automation who want to know about sensible toe. So all these things you will get over here. I hope you will get the Complete View off automation project after completion of this course so far by guys. See you in the course 3. PART I : YMAL Basics: Hello, guys. Welcome back. So, in decision, we're going to discuss about the animal basics. It is really important to understand the Yemen structure because and civil uses Yemen for orchestration. So let's get started. Okay. So first we will discuss about what is Yemen? Why we're going to use Yemen on the design goal off Yemen. Then we will understand that data type representation. How the data is being represented within the animal different type of greater rapes, like a scaler value, multi value, multi collection. Does this candidate that I've looking toe that after that we can also look up the structure within Enseval how it is being used within the and civil. So what is Yemen? Yemen s stands for yet another Micah plan with ugly it. But now it is being cool called as gammel and another markup language. So basically, Jahmal is a serial addition language that has increased in popularity over the last few years. Jamil often used as a for mitt for conflagration. Fine, but its object serialization abilities make it viable replacement for language like Jason in and civil as well. It is used as a configuration file. So the question here is why we're using it as a configuration point because it is easy for human to read, which is why it is good choice for configuration. Let's look an example over here, so the finest starts with three day passes these deaths is indicates the start off a new Jamel document. Yemen supports multiple document and complained Possible recognize eat set of deaths is as the beginning of a new one. Next receiver construct that makes up showstopper typically Amel Document Key value pair. Here we're seeing product I D. On the value is one key value pair another key value pairs, porches date and the value of the date. It has another key value pair, buyer and customer 123 which is another valuable. Another important thing you must be seeing over here is that it has some standard structure which is falling the in in patient on the widest pieces, indentation and Vitus pieces. This part off Hamas For mating, you were structure Yamil document with indentation. The indentation level can be one or more spaces, but Carson over here is that don't use taps because tool street them very differently. It is not considered as this place, so it it will give you the error. So let's go further and understand that. Why do we use Gamel? If XML is there, Why another data center logician in place? So let's understand that at the your problem with maximal wars which was not readable by humans, so it is very clattering e and because of that, very difficult to read sometime. Whereas Yemen was created, Toby, human friendly will integrate easily with morning programming language. Most of the programming language. Nobody is being using Yemen for data, realization and instruction set for general tools in the early days when we were using XML for keeping the conflict while lock. While so it is very difficult to read those files. So no, Yemen has simplified those aspect. You can easily read the contract fine on toe lock files using Yemen, because Yemen, the structure is pretty much human readable. In short, we can say that we're using animal because it's a structure is very simple, and it is easy to maintain to understand more about yamma why we use yamma. We must have to understand that design guru PML so let's see, what are the design goals off family. So these are some of the important point which make Gamel strong candidate for throw any kind off configuration management of gyppos. Instance e and all other data See the logician activity. So no, you understand the design goals of family We can move forward and we will look into water. The data types is being supported. Onda, how it is being represented within Yamil document. So let's get OK. So first we have to see that. What is the structure off those data types? So let's understand that here I'm using the same example file which I have sure you at least if you closely looking toe this find, then you can claim that some of the values is being represented as a scaler value. So these values is being represented as a scallop Know how do we represent collections? So here the buyers, for example the representation off the collections and multi line is being represented with the pipe and all those details. You can write it over here. How do we represent the dictionaries within you? Hamilton, you can represent like this. It also supports more killing for mating. So it will start like this. This entire record is a representation off. Different, different later take. You can take it as an example to design your own Yemen. One thing you notice over here, key value is yeah, Mel's basic building blow. The key is always be strengthened. The value is a skeleton off sometime any day today. Oops in Yemen. Recognize numeric tape as well. If you see that product, I d. It is a numeric type, and indeed it can be the symbol, Exodus, semen or Octel you could see year. Then you find that total is a decimal value over there, which values 1400. So these are some of the example we, like, demonstrated you how this scaler values represented. Collection is being represented. Multi collection. This 10 dictionaries Marty lying permitting. So let's move forward. We will look into that how the C amel file can be represented within sensible Lex for further than looking, for example, Off and civilian will find. So let's look in tow. Gamel, in sensible Justin example don't focus about what is region over. You're just focus about the structure as we already discussed that this camel document will start with three day passes and here you see that you just started Three days is it has key value where each entry and it is pretty much simple file what it is doing. It is just installing Tomcats over which I will explain in late. Once we go more detail in tow. The course Gamel has up a structure which is a starting with the three dances. It has key value pair on the These were loser scaler values and below the rules Dictionary the Gruevski Vela Pierre is representing the list. Well, legal. That's it. Gazeau, these RV amel basic toe work with danceable. So I hope I have given you my basic understanding about the Yemen. This will really help. Do you, when you design your own Yemen structure than these basic tips will help you to design your family structure? That's it, guys. So see you in the next section. Thank you. 4. PART I : Ansible Architecture Overview: Hello, guys. Welcome to another session decision we're going to discuss about and civil over. So in this section immediately, I will discuss with you Prue thing one is what was the problem. And after that I will discuss about our picture details. In early days, the problem World System administrator usually perform repetitive tasks such as installing service, contributing go sober and these tasks will be performed on many so close again and again. So this turns automated with this script. But the problem with the script is that it is very cumbersome to write those a script and very unmanageable if they scripts going long. And it is quite problem mystic if the infrastructure is large. So to solve this problem, configuration management was introduced. So basically, configuration management is nothing but a practice off. Handling changes systematic. So that means configuration management in shows that garden design and the builder straight off the system is known on good and trusting and doesn't rely on the heck technology off live loveman. It also allow the flexibility to access the historical regard, off system estate for project management and audit purpose. So, in sore immigration management, who will come various challenges, like figuring out which component to change when requirement chains no more manual reward, since requirement has changed, no more redoing an implementation. It also gives us the flexibility to reverting to a previous wasn't off the computer. If you have placed with the new but flawed poison sometime, it happens that due to large infrastructure, the wrong component has been replaced. So in such a scenario, conflagration management will give us the flexibility, reverted back whatever the earlier state Dr Environment is. Hello, guys. Let's discuss about architecture offensive. So when you install instable, it will deploy orchestration, injun and back orchestration. Injun run through Major Pile. One is invent tree, and another one is believe the Indian prettified contains the details. Simple so which we want to manage. And the playbook tried. Uses these in wintry as a single source of proof who apply. The team is on the interested, So let's look how this invented by look like So this is the countrified where we have seven increase off machines. So this diagram is illustration off the humanity questions. In this question, it has on Lord Balances and three Monster Machine and three workers. So basically on these seven machine. The task has been performed on these seven missions, and those task is coming from people. So let's look into the playbook for No, just understand that playbook is having the rules and rules is nothing but a task smaller task which is being junked out in different different roads. And those rules is doing some activities within these sewers on those activities is placed within the module. So, for example, if you want to deploy any model so those more Julie is being listed over here. So try to get it once again if you closely looking toe that they are accurate, pretty much straight for So if you see that we have already discussed that it has to price . May 1 is in Ventria. Another one's believable on inventory file contains the information about the machines where we want to apply. The changes on those things will be mentioned it in people. So what does play ball? Contains people contains the information about the task which we are going to perform on the machines, which is mentioned within the inventory Here. You must be getting some of the world so that you don't bother about? No, but those words. I'm going to discuss all those things in more detail when we will discuss the core component off for principle that time, I will this in more detail what his role is, what is tasked, what is model, what is playing, what is facts, variable handlers. All those thing I will discuss in more detail enable discuss about the court for timing. You just understand that So these are some of the important defensible your offensive. So one of the beauty of this architecture is that there is no other plants. Software is being installed on known machine. So how does it connect? You must be thinking that how does it connect? So basically, it uses a citizen connection to connect to the Nords. So that means and civil will only need to be installed on a controller machine, which can sit so new laptop as well. One of the thing, which you must know about open several, is that it is an agent lous. So what does it mean by Agent Lee's? So basically agent list means there are no agents or prayer or additional viral port need to be configured when you are installing. And seven no additional setting will be required to or automation off the line machine. Another one of the good thing about incivility is that it is an extensive. That means suppose if any model is not at the level, then you can write your old That is out of scope in this course. But I will provide you the link, but you will use it for model development. So these are the some of the architectural overview which I want to discuss with you. Decision. So in the next session, I will discuss with you the core compliment off Enseval. That is very much important. So that's it. Gaze. What? This session. See you in the next session. Thank you. 5. PART I : Concepts Virtual Enviornment Setup: No, guys, thanks for joining this station in this session. What we're going to do, we're going to learn about naturalization techniques like Pregnant and Alexey Container. So why we're going to learn about this? Because our virtual lab is going to be based on what you logician taking as we have moving for good in the course. So we need 11 1 moment where we do the practical about the concept with three loan in theory ization. So most people alone about these technologies, we look into what it is on way it is. And then afterwards what we will do, we will learn about how to do it. So let's look into some of the theories first. Okay, so here we're going to discuss about technology off virtualization. It's the way we're going to discuss about this, which I will explain you in detail, supposed to understand that what actually these technologies is so let's understand record . So what is wagon So pregnant is open source software product for building and maintaining portable virtual software development. In one what does it means? So basically it is a product from her she car, which provides the flexibility toe or toe made the process off, creating virtual in wana me using virtual boxes or give you a hyper V doctor can dinners being were and aws anyone off this? So in this lab, we're going to use virtual box. Took set up a work floor, and when we run it, it will create a virtual walks environment for our lab, as they already mentioned that why we're going to use rag grand because it provides us flexibility from designed the world floor for creating virtual environment. So let's look into how this bag grand final place. So in this Reagan, for what we're mentioning that we've gone, probably find a virtual machine with the name Carver VM car. Weston's a community automation with uncivil. So here we're mentioning that we're going to use the Basie maser who going through bionic 64 on the size off the rear Miss 20 GB. We're going to keep the host name is this. We're also mentioned that the private network for this machine is on the sadness and it will also provide us the memory allocation. So here we are telling that we're going to use memory off G B and we're going to use no see appeals for this virtual machines. So this is what this pregnant file country turn it, What we have to do, we need to go into the folder command from and great pregnant up. So this virtual machine get Espino, and then we will proceed further with Alexey and aleck stick and dinner design. Okay, guys. Well, now we have understand Regular and no Movinto. Alex. Gillian Alexy Container. We were looking toe some of the theoretical aspects off Aleck stand Alexey Container, And then we will move further. So do the lab. So let's understand what is their legs? D in the Lexi contain that sits so Alex de Containers Isaly next continent. It is an operating system based virtual addition method which offers an environment as close as possible as the one you would get from virtual machines. But read out the overhead that comes with running a separate Carnell and simulating all hardware. So what does it mean? It means that Alexis is the part off mean land Colonel, It doesn't require hardware immolation, which makes it very light and very easy to use in this technology. The Kleenex Carnell provides the functionality that actually allows limitation and private dietitian off resources, which means Cebu memory block input output networks. All name is base isolation functionality that allow complete isolation, often application. So how does it provide the isolation? So to understand that we must have to understand that there is something called CGE Group. Actually, CDG Group is a lean external feature that actually limits the accounts. And I salute the resource, uses off collections off processes as it doesn't require hardware immolation. So it makes very lightweight and very easy to use. No, we have little with understanding about Alexey. So we have to understand that what? Actually this Alex Days. So to understand that if we have a container, so we need a mechanism to interact with those containers. So Alex is one of the things which provide that flexibility. It provides some cli which will help us toe access the container and to do some manipulated the container like container creation and all those things we have to do with the help of lex T. So if you go bury definitions of what actually Alex days, Alex days, the newly Alexey obedience, it offers a complete press and in duty with user experience with the single common lying toe to manage containers. Now we have little bit understanding about this election. A lexicon dinner. We will move it forward and looking toe that why, actually we use it? Why not any other virtual addition? Technique. So let's look into that. So basically what it provides is nesting Oh, virtual machines. So where does it means? It means that you can easily create virtual machines within virtual machines, which was a clear north possible or sometimes it is very difficult theoretical. It was possible, but it is really very tough to design such kind of your infrastructure as those hyper visor techniques required to do hardware immolations. So virtual machine on top of what? Your mission is not supported and will not work. But with the help off this Alexey container designed, we can easily create the virtual machines containers within a virtual machines. In our love, I will show you I will create a virtual box. And within that I have a spinoff route to pre virtual machines within that using Alexey container. So it is really going to be very fun exercise. I'm definitely sure that you will really enjoy that a lab session. Okay. See you in the lab 6. PART I : LAB Virtual Enviornment Setup: Okay, guys will come back. So this is a lab station in this lab station. What we are going to do, we're going to set up a virtual machine using Rag Grint and Alexey Containers. So let's see what we are going to do in this lab in this lab. Basically, we're going to design this so as the picture. If you see that we're going to spin up over chilled box using rag Grint and within that we are going toe create Alexi Container. So okay, coming toe their steps, the steps which we will follow to design this infrastructure. So basically, we will get a vagrant fight. I have already returned the court. It is very much straightforward. I will explain you line by line. What? Actually that fight is doing the record and find is being provided into your resource section. You can use that file as well, so no one. The standard starts to create the environment. In the first step, we will spin up of migrant. What? Your machine using virtual box. So here we will run the wagon top command. And it really has been no for what? Chill walks environment. And within that we will go in tow That and we will run some prerequisite tried running the 30 steps. So after that prerequisite people set of the Alexey container to Alexa Container, we will set up and we re test those things. So let's open the wrecked and fight. So there's this is a vagrant file which we will look into that. So as I already discussed this fight in our the recession, So if you look in tow that then you can understand that yet the fragrant configure toe it is actually representing the Voisin. So that means this is the vagrant wasn't too. And we are going toe a spinoff One virtual machine. Here it is basically as number off which in machine you want to create or the virtual walk So you want to create you can change the number on and it will spin off those number of what your boxes. But for this lab, we're going to create 21 virtual walks and within that we are going to create to Alexey Containers. I also want to iterate you what the court is doing. So basically it is defining some name off the virtual machine and here we are. We're telling that. Okay, we need the base machine, which is going to be a UNIX able to system where Nick 64. And also we are asking for 20 db a location for for hard disk on host Name off the VM, which will be on network 172 dot for dot once it of one. If it is going to be one virtual machine, it will take that because it is in a loop. It will generate that I p after that or what we're telling that. Okay, who owned the name? Should we like this? And the memory should be a g B. We want to use to Scipio. So So this is what this file is telling. So now let's see how we will execute this fight. So now we will run it toe, so we will learn it. Command, we'll need to open a command from and within that we need to go into the folder. Which folder? Where we're keeping that racket and fight. So here we have kept treating toe, Alexey container. So, Alexey, continue. We need to go. When we were looking toe that No. Here. We're seeing that we have one file. So that is called wagon file. No, we need to run this command rag Grint up. So it will has been off that virtual machine in Chile. It will take some time, so we will wait for it so he'll see it started spinning off that virtual mushing with esport Our configuration, as you are seeing here that it is whatever the name which we have provided like Avm one. And it is importing the base books. Basically it is importing from the cloud off migrant where they have kept these images. So from there it is acting getting those images. Details on these images is going to be created. This is the basic meat. Actually, as I have already created this virtual machine and it is existing into my virtual box so that the reason it is telling that for you it will work properly. So know what you have to do. No, we need to come over here. Toe, Get inside the virtual machine. We need to run this command rag grant a sausage. So what it will do? It will get us inside the Baghran virtual box. And after that we will create the A lexicon dinner within that. OK, guys, we're now into the system that units UNIX machine. You can check here. That's weird. Into Bagram permission. So don't. So no, We will check that with the galaxy because of 12 provides Alexey within the system itself. When LeBron it rich Alexey? Yeah. See existing there. So now we will move further on, do some reading. Quiz it. Okay. So prior to moving for that What we will do, we will understand that. What? The prerequisite we have to run. So to do that, you have to understand that what we need to do we need to configure a Alexe t. And then after what we need to launch this. So let's looking toe that how we will do it. You need to come back and here we need to provide. And next in it it will last some questions. In most of the cases, we're going to choose the default answer. So here we're going to choose Pinto. Then it is asking Do you want to configure the newest storage pool? Yes, we do Want name also were going toe default here. We need to provide Dia. Then again, the D for adoption. Then again, the default option. We will call it as whatever he has provided. We're going to choose the default option for this has been Sidon submitted petitions. Napi. We've movie six as well. No, we don't want Yes. Not know. So no intense. Done the configuration for Alex T know we're ready to move for that. And we will create the Alexey continents. No level create Alexey Containers. So to do that, we need to rate before launching the Alexey Containers through. I just wanted to so you one thing that right Alexey list. So it will tell that there is no container. So what we have to do now? We will create some container. Alexey, launch media is I am 64. Run this. It will create the container Would take time. Yeah. Is that retrieving? No. Yeah. See you. So now it has created the Alexey Container. We can verify it. Alexey, list CEO. We have a spin off one container. Alexey Container, Whose I P is this one. And we can go inside that go inside that insect. That How do we can do that? We need to write Alexey. Exactly. And the name of the box. Kasich Bash. So now we're in tow, Alexey Container machine. So you can run any common What? I will show you. Once again, we can spin off the another world virtual machine so athletically, premier. And now again, we will spin off another virtual machine with the same command. So now if you will check Alexa list, then you will point to container is running. Still, it is not being a located. CEO type is not being a located yet. We will wait for it. We've been drama, Lexie. Best see you located. Know what we will do? We will go inside each box and being the other works. So again we you seem common. Alexey Exit Born bash. No, we were great toe being valued. Of course. Five dot See your It is pinging. So now what we're doing, We're bringing it from one country to another container. So what? We didn't hear that we have created to virtual country nous within migrant box. So again we will do. We will exit from here now we will go in tow, valued Bruce boards so older equal, you can write Alexey exact the name of the walks valued cross. And we want to prove ash. No, we're in tow that No, we will try to pink the other box that is called for in rodent. So what you need to write, We need to think I free of that do you want? So it is. Also think that means both boxes are pinging each other. That means both boxes are reachable to each other. No exit from here. Now, this conclude our lab so But I wanted toe reiterate that what? Actually we did in this lab, So I wanted toe tell you that what we did, we have set up a wagon virtual machine. And after that, also configured that Alex De And then afterwards, we have set up Alexey containers off. Wouldn't Roubaix unica MD 64 remains base image to container. And then how do we test it? We went inside the container using Alexi exact container name on the bass common. So it will take us into that that box on reaping from that machine, that Alexey container machine one machine to another machine. So this way we are able to set up to and Alexey containers with the Nova Agron box. Now we will proceed for the stop here for this. And we will see you in the next session. Thanks for joining the session, guys. Syrian the next session. Thank you, Baba. 7. PART I : LAB Ansible Installation: Hello. Guys will come back. So this is a lab station when we are going to do installation offensively so that steps required to do the installation is as follows. So basically it is for the steps process and where we're going toe follow these steps. One thing we have to remember that at the tourist aircraft will go on executing the tortoise trip. We have to are this? It was a trick. What? We're going to sister. So let's get this started. I'll go to traveling. So tell me, supposed to step We have to wrong, uh, update district. Once it is being done, we have to go to the second in the second district who runs the following come in Sudo apt its jaw. He's the apples, frequent and strong. Our victory once and I have already been a victory that that it's a name to it was Now we're moving to a step pretty. So as I already mentioned that a step three, we have to do some prerequisites. So what are those prerequisite? We have to Aboriginals as for here. So what we have to do toe had the repossess trick. First you have three truth We need proof of this. Come on. Here. You have to press intern once you pressed the intern And if we delude those recording and it will addict So we have to wait for that. So once it is being done So it is reading the package list once it will add. Then we will won't know it has been completed. The requisite is being completed. So no, we need to move through the tortoise tip in the coldest trip. We need to run the command as a bonus year brings us juice minus winners of the of beef from the command. No, it is being updated. So hold a step is being completed Now. Then we will move, installed and simple. So these are there some of the prerequisite we need to install while doing then civilian stolid. It is pretty much a straight forward installation. So no. Done. No. We will run the command to install and simple Sudo Apt stall Danceable. So no, we need to tell Yes, so it will take time. So I'm just pausing the week. OK, guys, congratulations. We haven't start and civil. Now we are ready to roll you in the next session. 8. PART I : Ansible Internals: Hello, guys. Welcome to the another Chechen offensive in decision. We're going to discuss the vote. Sensible internal. So basically what we were looking toe that we were looking toe that how and simple works behind the scene. So when a very for writing any animal files what is happening with that family? Well, we will discuss about that. Let's look in tow one off the jahmal file. So we're in tow. Uncivil site, The documentation side and we're into a module called I Am, which is a part off rate of Louis. If you go below, you will get an example how to use this model. So here what it is telling that they're creating the task and giving a name, and it is assigning some model. There is a model called I Am and where it is performing. Although the strips, whenever you're rating this instruction within the jahmal filed what is happening behind us in that I wanted to explain if you ever bean looking toe the sore scored off and civil, Then you will get dance of that what is actually happening Because at the end of the day, this is just enamel file, where we're providing the instruction that for this task than when you're running the sensible playbook than what is happening. So he this is the source scored off and simple. So if you go inside that, then there is a library. Coari live instable within that. If you go there, then you can find the models, whatever you're writing within the enamel so that jahmal will be pushed through These sore scored and they saw scored read behind the scene. These model will be called So for example, I'm using I am over here. So you will see over here that if you're going into image on then you will find a model called I Am so we will source for that. I am. Then here. You can find that there is Lord, this one. So here it is. So this is the source file which actually providing the capability in that models, whatever model. So we will go into that and we will look into that. What is the source court which is running behind when we're passing those instructions. So if you look into that, this is a fight on more dill and what it is doing managing. I am user groups rules and keys on that sort were telling If you know, going toe in toe that document, then you will find that we are providing those instructions on the same thing you are passing with the uncivil playbook. That is a CLI then that to see, like calling behind the scene this model on this model. It is doing the thing which is providing an interface which will communicate with the aid of Louis. So all those logic water would you pass in a form or for instruction set in the Amel like president? Absent update so that will be passed over here and that logic will be applied within that here also, they have given the example how to use it. If you're going toe, then models. So these are the functions which is running behind the scene. And here you will get like create user is one of the models, then delete dependency first. So these the these are the bite on function. If you are interested in fight on learning, you can look into that how it is being really implemented. That is really very interesting. You come to know that, OK, they how they have managed so many things. Single library. If you're going toe for the then you will find that all the models, whatever the model so which is designed in answerable you will find over here. So this is for cloud, for thief, for it, for cloud. They're having exclusive models over here. If you're looking toe that, for example, there early cloud image on Harto make So with the help of this, you come to know that how many number of renders in a cloud woman So it is a good place to check that so far like I believe, like they have covered almost all the clothes. And it is really very interesting what with with my experience, Whenever I want to loan any new thing what they do, I can come over hell looking toe that what are good things? Every level within the and civil. So I can go in tow the in that model and looking toe that water the component existing within that. So those component I can identify that and then I will play with design some playbook and it is one of the wave I with you can learn quickly, so that is one tape I wanted to give you. So the same way. If you go inside that Oh, not about cloud any other infrastructure, whichever environment. For example, if you're working with the cryptographic, you can use it databases. So you will see that there the database More deal has these number off Mongol Baby Emma sequel. My sequel post classical proxies equals all these models. So if you go and check the implementation So with that you are you can easily right the jahmal file for any kind off in France structures. So that is one of the people I wanted to give you. Then then you can see that NATO's network notifications remote management source control. So all those things Web infrastructure, windows. So all those things which is most of the model you will find over here. Or I can say all models you can find over here. If you are wanted to play with files, then you can get the those implementation details over here. So what are the functionality you can ity with the file? More deals, files more, dude, Then all those things you will get over here. So this is one of the thing I wanted to discuss with you. This is really very important. If you understand this thing, then it is very easy to write any kind off Jamel file on any kind of foot task. Any kind of four rule rule is nothing but a task only, you know, junk. The manner this thing really helps you toe Oh, approach for any kind of for design. If we're supposed that, if you got a project and where you were, there were various components. Cloud components is coming into picture like from made of Louis. You're going toe design some and it a warehouse. So how do you design it with sensible so that it will your infrastructure will get enabled . Supposed to pre warned to design some sales maker environment with the AWS thing. So, holder, you can approach it or you want to design some vpc. But what's your problem, Cloud which is being running into it of Louis. So how do you design it with the uncivil so that you can execute that the uncivil file jahmal file and it will It will create a we beat the environment. So all those things you can easily create with sensible and to know about those details. You can come over here, check the models. You come to know that. Okay. What are the? I ask you can perform with that mortal. So this is really helpful. So what I would suggest that can see this link on going toe each individual more dill. Understand that how they have written the model as well. So that's That's it, Gates. No, this is the thing which I wanted to share with you. Thanks for joining decision. Syrian the next session. Thank you. More 9. PART I : Ansible Core Components: okay. Guys will come back with come back toe of this nation. Defensible indecision. What we're going to discuss, we're going to discuss about sensible core components. But before moving for that, I just wanted to reiterate that Still know what thing we have completed so far in this course so that we can proceed for them. So let's look our John. Okay. So far, what we have learned the jahmal basic. What are the things we required? Greater Jahmal documents where I have given a complete over about young will be see data types. What kind of data? Types of scale of multi value Marty collection. All those things we have discussed in the amel basics. Once we understand that, then we move further in the virtual addition techniques. Understand that? Very clean, then. Alexey Container as well. Our lab is based on these environment only. So where I have explained that how do we Alexey works? Hallway Grant works on with that. We have also done the lab set up where I have explained you how Toe traitor Vagrant files how to run regular in file, how you can assess it. You're pregnant once you go inside the system. Then I also or demonstrated that how to set up an Alexey container. And I hope to contribute. Alex de and how? How we can go inside the containers, My lexicon Dinner So? So all this thing we have discussed so far. Then, after setting off the virtual environment, what we did we have set, installed and civil into the Alexey Container. So now I have given you a complete overview often, Sibal. Now we are in the right position to discuss about the core components. Now we will go inside the and symbol and we will see that we will first discuss that all this cover component is interrelated water they are called I will show you each individual components and when the course proceed, I will go inside each component and give you an overview. Along with that, we will do the lab treat. My intention with this course is that I want to give your detail no less so that you can use that knowledge in your day to day life. You can design the infrastructure and configured those infrastructure with the help off unstable. So such kind of knowledge which I wanted to give you and it is a completely a practical worse where you can learn everything used within the industry. So keeping something in my mind, I have actually designed the course like that so that you can work. Practical scenario. Let's move for the and see the core component offensive, ill and let's understand the core component of principles. What we will understand that how components are related with Egypt in decision. What actually I will discuss with you is that I will let you know that how all these individual component related with teacher that and how it is giving you a bigger picture whenever you're designing automation. This clip. So let's understand that how old this thing come together and what are the contribution I can say that what is the significance off each individual component whenever you're writing a script for our committing an infrastructure? So let's understand this scenario. First, Suppose if I have infrastructure, which were I won't design. That was you want put the same line infrastructure. Who wouldn't where we have three mustard computer, the master computer earn three. Good Lord. These are the individual machine which we will design in this course. So the third part of this course and there is a Lord balance. So we have our Lord violence over here. So these seven machines I wanted to in warming our automation. So how do we can achieve this? So to achieve this, the first thing or save the first component which comes into picture is that invented. So so these inventively will keep the information about these machines. I'm going toe applied. No, we understand the significance off inventively. So let's understand the significance off label. I wanted to perform some activities on load balancer. Some activities on monster machine, some activities on workers. So how do we can do that? So here playbooks comes into picture. So with the help of playbooks, we are going to define what instruction on each individual machines, where I can perform the actions toe the respective machine. I will discuss in more detail about the playbook when I will discuss this competent exclusively. So for now, just understand that we have understand component, very important component one its inventory than another one. It's playbook. So in wintry is used key to keep the information about those machines where we are going to apply the or run the instruction and those instruction is will be designed within the playbooks soon no proceed further and understand So moving forward once we understanding when trees label Now we're moving toe the configuration by default and civil come with some before it configurations. So if we want to override knows conflagration, where do we can override it so and several convertible conflagrations in within a file and which is residing in PTC slash and civil slash and civil dot C of G file And that confrontation file contains their default setting. For example, if we're not a specifying the location off the inventory file, it will by default goto the that particular location. Class C D. C. Class Sensible will goto that look. It's in slash CTC slash sensible slash s answerable dot CFT. Within that fight, there is an intra or all those Defour configuration you will find over there. If you want to write any of the conflagration you need toe, go there and overrated and change the configuration, which you want for your particular application in tow. That fight that I will explain you in more detail than ever discuss with you about the configuration file individually. Okay, Okay. Moving further to don't should be task first. So no moving for that. We need to understand that the significance of task now, when we were designing playbooks within playbook, what exactly do we perform? Some tasks. Tasks comes into picture then. So how does it will look like? I wanted to show you some structure. So basically looking toe that then you will find that within the label, what we're doing, we're performing some tasks. Basically, rules is nothing but junk. The task just forgettable. Trolls know playbook is performing some tasks for that task is nothing but individual item . For example, here were telling that we want as three model in with industry model. I want to perform some activity. So if you see here So in this I'm telling that I want to use as three model there is easy to model also, which will perform some activity within easy toe also with the network. So these activity eighties. I won't toe perform whenever this playbook will run. So playbook contain that task and those task will be executed on the round it like that. I will give you breathe the terrible dusts Justin, This is an overview section. I want to make a relationship how old individual component school component is being related with each other so that when we designed the playbook, it is really very easy for, you know, once we understand the task, let's move it for the and understand models. So what is happening? Whenever we're writing a task, then what we're doing evident that task so defensible? We are doing some activities and those activities will be returning models, for example taking the same example If you look into that within the playbook, I'm telling that Okay, this task create this VPC I want these models would be executed that bpc should have a network should have waas easy to instance and it should have a story instance. So I wanted to configured this. We proceed with the help of principle and civil exposes. I already discussed with you how and several internals work they have exposes some of the functions which is running on what happened. When this playbook will run, it will perform this task and those task will be performed using with the help of models. Now we understand the models than moving for the then within the models when we were writing the playbooks. So there are certain things we wanted you re dynamic. This will go for it. We're going to perform some of the activities which should be dynamic. And we should be provided that dynamics so we can use variables and variable. There are different kinds of variables we can use. It is same like other programming language. How we're using variable and simple also provide those capably how you already know how we're doing with the other programming language is not a programming language. It is just to instructional way. But again, we required a variable where we can achieve some dynamics in civil. So hence a bill provide that mechanism in the form of four variables. You can define variables within the within the playbook itself. Within the host file itself within the inventor of violets. We will look into more detail when we discuss does. Now when we're performing some task and suppose that if you want toe run some other activities like after installing this activity, we have to restart the system or restart the services so those things will be handled by handless, so that is the thing I will discuss in depth about this handler as well. No moving for the and simple exposes some of the facts from some of the variable, which is called fact. So fact. Give the information about the system in more detail when we discussed the fact, so just think that fact is one of the component which give the information about Tal answerable. When you run it, you will get so many information which is go which is related toe the environment through those information we can utilize whenever we are designing any any automation for any of the infrastructure. So no one's we have understand that. So there is other confident called templates for what is the significance of template? Is that suppose if you wanted to apply some block off court within a file, so we need a mechanism by which you can apply those blocks, and that is going to be a some common blocks, for example, just to understand that in some of the files, when wherever we're setting up the Kuban, it's which we're going to perform in the third part of this court there, the certain activities you are performing on on the master nodes and those activity I wanted to apply within the master North Pretence civil. How do we can achieve those two answerable provided Can is in the form off template where you can design those block off changes and then you can push it in tow. The task task will run and it will take. And you will. We will refer that. Okay, this template. Whenever we're writing a block off court, use this template and push shooting toe the fight. I will show you a good example. In later part of this schools, we will set up a load balancer within the Lord, balance their chip proxy Lord balance and we're going to set up. It has some, Lakoff. Good. We will push that when we are designing the Lord balance. And we will push with the help of template, where we can really will rate the block off court. And that block off court will be applied to the Lord balance. No moving further. So there is something called words. So worlds is nothing but a secure mechanism by which you can keep some secrets of keys. So those things, I will discuss that because somewhere we wanted to interact with with the system where we can maintain the secrets so those secrets, like excess keys and all those things. So how do we can achieve? Because we need to beat either an automation is scrip and within the automation escape. Some of the system wanted some authority to access those systems, So how do we can achieve it if you can keep it in a file system dignitary being exposed to the outside world? The answer will provide a way by which you can keep those secret so that when automation is called Children the controller machine use those secrets like those things within the machine. It will read those secret and access the details you, for any access authorization will be needed. So these are the some of the core component which I wanted to discuss with you. So to sum up, we can once looking toe that what we have looked into, that we have looked into invent re playbook than we have discussed about tasks. Then we have discussed civil mortals home. Ordell's comes into picture after models we have or discussed about toe discuss the vote variables. How variables being is being Once we have discussed the variables than we have discussed, the vote completes. We have discussed double templates. Then we have discussed devote words. So all this thing we understand that how these things are related with each other. Now, I'm pretty much sure that whenever we will start looking toe all this individual thing, you are pretty much comfortable with those things. And once you learn this thing, you can easily right all those instructions that jahmal document easily and no. You also know that how all these internals that's it, guys for decision. I wanted to discuss with two in the next session. Thank you, rabbi. 10. PART I : LAB Overview: locates, will come back from this session. All words, what we're going to do We had went to whom The laps and there are so many laps coming after decision. So what we will do? I will give you an overview about what are the topics? We're going to go work in the lab section, so let's get started. So basically, first we will discuss about so as you know, that playbook is made up of various sediments. So those elements I wanted to make you comfortable with those of living. So in that aspect, what we will do, we're going to start with ready boats. And here we will do the practical zone valuables how to use variable simply able and I will also introduce reach other places where you can use the ready. But but we will do the hands on lap on. Bradley evils within playbook. Once we get comfortable with variable, then we will move for the truth attacks. So taxes. One of the important thing in the people as our times off playbook is getting well pleased with required a way by which we won't run on little single pull shallow or so how we can achieve this so exploit that gap of once year comfortable with tax will be moved for the to the register keyword basically register key What we will use it or people. You know what I mean To say that it's something is running and you wanted to get the information about those anything. Then you can use the register valuable in on the flight. You will ask the ready if you can get those information within that ready. But with the yours off registered, he will ever be more in the coming session. After that, we will move it and look into that how we can Google condition and sensible generally in the normal programming, angry mainly user if a statement. But over here we will be using when the street that also I were demonstrating the upcoming lab session After that, once we're comfortable with conditional statement, we will move it through the loops within the loops. We're going to look into that how we can iterate the item within instable. And if we have Mr Items how we can operate within Enseval Once we're comfortable with groups then we've you for that the air handling so every programming language provides some other Hedley method mechanism is not a programming language and several first awful, but it does provide their heavily mechanism within and say, But once we're comfortable with terror and we will move it through the cannula us, we'll be looking through that. How we can be a chaining off, even some if you are doing one task and you want to know before I told the other times that okay, I have completely no, you bow your work for a couple your abating. Some service file on our personal is well of age, and we must have to be a starting us over to achieve such for originality. In civil, we use handless. Once we learn about training off, ask the help of friendless, and we will move it to the templates that templates is pretty with required supposed. If you are having a big line or really stupid in Sorted went working on some more information on that need to be go within some of the important final service files. For example, if you're colored comforting ezchip, proxy lord balance at hand within the load balancer while contributing your balance. We need to a great some of the country vision with the native proxy, a conflagration fighter and that has so many number off lines off jobs. So we need a way and keep those spoiling templates. So template is a very quick great. We're ending your of big courts. Place on it is supported way ginger comprehension. Once we understand template, then report further and looking to rules rules is one of the primary element off. People. Provide us a capability to arrange your coat in a more logical manner. With the help of roads, we can break the playbook into multiple logical units so that we can easily reuse those court whenever required in other playbooks. One thing. Years of remember rules are not labels. Rules are small emotionality, which can be independent feet used, but it must have to be used within playbook. You can't directly execute the roads, and there is no explicit setting for rules to hear the questions come. So why new brake fluid books? We briefly books because breaking off playbook allows you typically break the playbook into reusable confidence that rules we can easily reuse the competent whenever we required. In other playbook, you look into in more detail when we do the lapse. So all these things are coming in the coming lab. So let's get started days. This is what I wanted to share in this lab. So there you can get dreams about what we're going to loan in doing Bad lab station. So let's get started and let's get our hands and our tunes, the nexus in Thank you. 11. PART I : LAB Variables: Hello, guys. Welcome to Lab Station in this lab station. We're going to discuss about read edibles and we will also look into the court how we will use variables within Enseval. So let's look in tow that so variables in any other programming language helps you toe use and assign value to a value. But so let's understand that. So in and civil there are various places where we can use the very like inventing playbook . That is also we have. We can declare the variables within violence. Or as were there is some variables, the special variables with an unstable con facts which keep the information about the environment. We can also define variables within invincible. But in this example, we're going to see that how we use when you will within playbook and Dexter Sciences, which we're going to do, is this. So we're going to perform all these exercises. Want to follow along with me? You can follow along with me. If you want to watch it, you simply watch it. That's when I have given all this exercises with the new resource section so you can work with them any time. I have also given the instruction what to do in each exercise it so that it is really easy for you. You can run it offline as but what the way it is fine with me. Okay, guys. So we're known Terminal. So one thing I just wanted to tell that we're going to use something called months weighty marks. So because with the help of the marks, we can easily break screens. So what do we mean by that? So can use control be and double courts. Then on the same screen, you have two different means and to navigate on the pain what you have to do, you have to press control me and oh, you are no window first being first thing, we want to check that. How many containers we have? I have already created one container so that this is the one container which we're not going to use. Just I have created We're going toe, right? No, All the labs happen within a local host, which is a controller machine. All these lab is related with the controller machine. When we move for the then you will come to know that how to use these machines toe. Let's gets a starting place. Now what we have to do, we have looking toe first we will Creator inventor refiled toe that what we have to do to create forced lab directly? We're going toe work on this lab Matic. It's a lapse. Could be Bring all the exercises within this So first thing this inventively file I will explaining other section other part of the left. But for now I'm just creating it so that it is required. So for now I'm just going toe creator. When different man No, we went to meet door playing, so we will create. And here we will make an entry off this machine so that we will use it for the so here we have master one machine here I'm creating. This is inventory variable. This is one of the ways you can be fined then went variable in Putin When? Three point. So we are creating a variable called masters over here. And we are making an into you over here. Guard Master, One master one is the machine name over here. And then we have to tell that there is a a special valuable within that were were mentioning that and simple host here. We need to provide the I p off the machine, doctor. $10. 115 Your $15. 194 After that, we need to also mention that which user is goingto be the user for this. So we're telling that this is going to be the root. So once that the thing which we wanted toe make an entry, I will have exclusive session on this. So for now, just time keeping it. I will explain you in the later section. So because right now our focus is to understand the element off playbooks. So this is the first element were working upon right now we're ready to execute our exercises. So to learn that water, the steps we have to follow. So let's look into that. So here it is telling that creative playbook, core lab, exercise Yemen. So we will take this. Copy it. You also follow the same way and come here and then right? Nano or V? A whim. Whatever you have, you can use it. No, we have created. As for the instruction, no moving for the what it is telling. Okay? They moved label within that. What we have to do we have to run gold. Or I can say I can use the power off Copy paste. So we will come here and paste it. I will explain the cold over here. So what? We're telling over here that we are going to perform this action on this host rituals. Local host local host means the current controller machine Where am executing it? And within this post, I'm going to create a variable called And what are the task we're going to perform? We're going toe perform these tasks on the name of the task is display variable. It is always a good practice to give the name. If you don't give, it will run. There is no problem. But if you will give, it will give well meaningful information. So now it is very simple. Ah, simple task. We have created a very simple playbook. We have created where we have kept the name local host and which contains the variables. And the name of the variable is death. On the name of this task is display variable is doing nothing but displaying the message. By this way, in instable, we actually bring the message on the screen by using D but exit from here? Yes, we won't perceive it. Okay, so now we wanted to try and clear it. So let's run it first. So toe run it. What you have to do, right? And stable. I fun Plea book minus I minus. I mean, this invented the region. Ventria. I'm going to use inventively dot I You know, if you don't provide, it will take the default one and it will send some warning that I will show you here if you rate like lab exercises dirty. If you run it, you will get some water. Morning. See you. You're getting some warning but they executed. So why you? It is telling that it is telling that the default location have some post fight that is inventory file which doesn't contain any information. So to avoid this warning in the first instance what we have done, we have created an inventor. If I know, I will run with an inventory file if you so that we will use it later. Right now it is just to remove this warning. I'm have created this and later point of time. When we proceed further in the courts. Then we will use this invent refile only and we will tell that know if we will execute it then it will not give any warning. See, it haven't given anyone so it is a simple people. What we did we have created a play to display a message. And here, whatever the name you have given toe that play, it is displaying that. So if you look into that see, you were telling that display variable So no, we understand that Let's move to the other exercise. What is the other lab it is telling That's looking toe that So it is telling that this exercise completed no, the other exercise tracks valuable. So it is telling that so here and simple provided some of the special environment variable kind of for information. So we will look into that toe, run this command we will get some information about, and so we'll set up. So let's sing looking toe that if you run it directly, then it will give us information about the local host. See, it has given some of the information which is truncated information. We will look into more detail if we will make it out put into some other files as it has given so much of long information. So this is not useful. So what we have to do? You have to do some years rooting to do that. What we need to write, we again use this thing. I know you pull it, pass it to so have you some text fight so since meaningful. Okay, we were looking to know what it has given to go toe the season for not next. See, it has given all those required information how this set up is worth this information given it give it has given the information about the controller machines and there are various information it has given also all the information about sensible local machine. So all these things you can look in tow that when When you're performing this exercise, you can also look into these things. So you will get so much of information or perfect. Okay. Now we have performed the third exercise. No moving to the second exercise. No, we're moving toe. The third exercise. What is that? So it is telling that we need toe. Okay, so now we're going to use some of the facts variable which we have getting there. So there is one where table which we're going to use That danceable distribution we were looking toe that what kind of distribution we are using with this. So to do that, we can create a fact the majority were human So clear Yes, we will create another playbook and I know I'm using Nano editor Facts Demo North were human within that we will pays the court. So here's what we are doing. We are again No, you are You know your way. We had using threats. So it is again off variable declaration within playbook and here we need to mention that. So this is bill bullion value for gathering the information about the fact we must have to provide this as a true once he will provide that. Then we will get the information from the facts valuable and here we're mentioning this line. We're comfortable as we have performed this line in our last lap. After that, we're creating another task with the name called Drink Doubt Operating system. So this detail, the sensible distribution will give that till Tono Let's go into that. We wanted to save it And then we will go and right and symbol. Why no sign Inventor t and run it. Why it is going giving the warning Because I forget to mention over, daughter, unite, as we are having finding you pretty is providing in. We have provided in one tree. So it looked in tow the current location. It didn't find any file with that name. So it give it went toe their default location which is uncivil location where the unstable finances are kept and check there There is also no entry that they didn't given the warning . No, we don't. We will not get any morning. See you. So here you will see that we are using open toe distribution. So it told that so it has executed comments on these task and Lee whatever the task which we have told that so just verify it back to demo so re toward Just execute and give me the information about environment variable which we have created over you Just print darting valuable And here we have provided that to print devil and then afterwards we have also printed the overall distribution Run it again in your well Good day So that's it. Grace for this lab. So it is pretty much a straight forward. You will practice it, Onda, once you're comfortable with it. The name definitely. Sure. We're going to raise big playbook in a compensation. This is just the 1st 2 strips towards learning the sensible rating. Invincible playbooks. We'll see you in the next session. Thank you. Thank you very much. 12. PART I : LAB Tags: Hello, guys. Welcome to another lab in this love. We're going to learn a vote tags and simple tax. So what it is, let's look into that. And we will do some exercises on tax as well. So let's jump in tow and understand that what this tag is. So basically, what is targets whenever we are having a large playbook? So it is some time we're coming with the new model. I I don't want to run the court all the court which is already working fine. It is very painful. Task toe run again and again, who avoids a scenario. We need a mechanism to handle such a thing. So and simple provide this thing in the form of tags so weekend and define the tax for each good on whichever we want to run, we can tag it with the tax and then afterwards, well, running the court, we need to mention that which tag we want to run it. So you will would understand that once we will do the demo some points to remember when you were using it. You can keep same name for the tag so that what will happen that it will group The task, for example, if task one. It belongs to a particular group, Group One and tasked to also belongs to a particular group. Certain activities so you can target as a group one, so only those task will be executed. If you keep same name, those task will be executed. A special tax. There is a special attack that will always run a task unless is specifically escaped. So there is also task cord. Always you can tag it as always. So, irrespective of whether we were tagging, are not tagging, you run that It is very useful in a scenario where you are working with databases where you want to run the connection establishment off the connection so it must run whenever happened. So and then afterward, you're performing some task. So in that scenario, you can use always so that it will run always. So let's jump in tow, nominal and looking toe that how we can do this. I have also provided the hands on lab so we will follow this hands on lap. So let's go be it will help. It is the first step. It is telling that create a playbook or tax they moved out Yemen. So we will do that. Let's jump in tow. Dominant. We will clear it. Forced to step, it is telling creator for local tax. The Model T Hammond. Yes, we will create it. Okay, now let's look in tow. That what it is telling So another ex society. It is very simple exercise. So this is the playbook which we have to work. I will explain you all this court just so again I'm here using the power off Copy paste. So to understand this court again, what we're doing here that we have running this According to the controller machine control of machine is the machine where we have installed and stable. And after that we were telling that we're going to use this environment variable which we have seen earlier and again. This we have also seen gather facts. We will be discussed the boat after that. In this to task again, we're going to use the earlier playbook which we have used in variables. But here we air coming with the new line off court That is called tags. I want to run. Want to mark this task Has task one on. We want to mark the another task is tasked to I will show you when you run it. If we're providing that minus minus tax with task one, it will execute one. Did that task? So let's see that. How we are going to execute it to control X? Yes. Now I don't need to be nice to write and stable. I want label here. We have created an inventor. If you remember that we or Bentley no training and we want to run that dags damn more! Don't Yemen And we're here. We need to market the stag. We want to run. We need to market in this minus tags. And here you will mention that task when I want to execute only task one They started running. See you. We have to task. It has executed one Live one. If you going provide this than what will happen, it will execute the whole time, right? No, it executed How many play he it has executed to know It will show us three. So gathering factory it is considering See it? It executed three. So now if we want to mention the tags now I want to run one leader does, too, so we can run it like this. See you. So it has executed this. Executed the 2nd 2nd task where we were told that we want to know about the uncivil distribution on which it is returning open toe? No, we were looking toe the example off. Always. Jack. If we go inside that, then you need to go. We come over here, what we will do. So I wanted to demonstrate that so we can copy one off the task. We come here. Andi, please. That tag, for example. We're going to give a name. For what example? Connection. And instead of attacks, we will mention it always. So what will happen that irrespective off if we're going to provide any tag, I suppose if we're giving that minus, uh, this task one to execute. So it will execute always Dag as well, because we're marking it. It will Don't always along with task one If you run task toe on that case, also always tag will run. So let's see that How to do that? Control X. Yes. So now we will come over here and we will tell that I want to run task one senior. It turned both the task task one your connection variable Task it, Reverend. But we have asked for Just want to run on. But it is also executing always because we're marking it. It respect people. Whichever toe acts you are running, this tax should run. So this is what always tag means. So just just see that bag task to if you're on it. In that scenario, also, it will run. I see. So this is what I wanted to demonstrating in decision. So see you in next left, and you will practice slowly and step by step. We're moving forward to writing a big playbook for timing. Just practice this and see you in the next session. Bye bye. 13. PART I : LAB Register Keyword: Hello, guys. Welcome to another lab station in this lab. We are going to discuss about Register Key. Would we will do the discussion about why we use register keyword. And then afterwards, we will do some Hansen lab on the register. Keyword. So let's jump into the discussion. The main purpose of register keyword is to extract the information from the running. Come on. So what do you mean by that? I suppose if you're running a task and you want to use out, put off that task in tow. Another task so that this turkey, where comes very handy toe get those information. It is really, really handy for the working purpose. So let's look into that. So here I have already explained you what we're doing with the register key would we are extracting the information from the running common. So we will do the same thing on this lab. So let's see what actually inside the lab. So basically it is telling that we have to create a playbook on. Then we will need toe right this thing in the playbook within the playbook. When we write it, then I will show you what Actually, it is doing so let's do it now. So jumping toe the Tommy None. Go meal. Clear it. I will explain you all this. So here we will. Creator play book called Register. He would demo not for Yemen. And within that you come here coffee, pastry. Feel falling along with me. You do the same thing and come over here. Copy it. And based after that, you just need to save it. Control lights. Prior to executing this, I wanted to explain you that What? Actually it is doings. The first line were telling that you should run in the same machine where and civil is being installed on that is a controller machine. And here we are performing a task with the name registered keyboard demo. And here we are telling that find the text files in this directory and then afterwards were telling that you should register this variable It wouldn't this find underscored output variable? And after that, we are calling this variable and printing it so it is very simple exercise. Let's look into that. So if you go there in the temp file, I will show you what we have kept. Hell. So here you will find that we are keeping to text file and one excel file. So when it will run, then it will search for this to file and it will give in tow the output. So next run it. So to run it. I already told the use and civil I found playbook minus. I remember why we had using reigning Cy. It is for invent re we which is referring in this location. And then after one name off the playbook. What is the name that is? Took you what demo dot Yemen. Now we will run it and let's see the output. What doubt? But it's coming for this. Still executing it? No, I went to the task. We have done some mistakes so less rectify it going into the file again and look into what we mystic we have done. So the mystic over here is so guys, this error looks very interesting. See you the errors. Because off this a space we have given this piece, we should remove it. Never, ever give that space. Now we can really save it and try to run it again on a plate again. It is executing bingo seal now because office space we we we got there. So here what it is doing, he has given out. But so here it found two files text file one and text file toe. So that's what we told that with all this. If you go inside that, then you will find that what we have done here we have used this register key would. So while executing when they're performing what they were, the information it it falls at the time off running. It is pushing in tow, this variable and that variable we are use for debugging. And we were telling that bring those variables. That's it. Gays. See you in the next lab. Well, by 14. PART I : LAB When Statement: pillowcases. Welcome to another lab in this lab. We are going to discuss about when a statement off unstable. So let's jumps in tow that so before discussing about when a statement, let's discuss about what? Actually, the thing which make sensible so powerful as we know that and civil is not a programming language, but it has the capability where you can design your instruction document like a programming language. So what are those things which actually makes answerable a great tool or say powerful tool ? So when a statement is one of those elements, which makes sensible so powerful, so what? Actually, when a statement does Rennes treatment is equivalent like he felt the statement, which is a Cubillan toe, other programming language. It would come very handy when we want to check the condition while execution off the playbook. I suppose if we were creating a playbook war agenda, Rick environment, where instruction will be executed on the basis off operating system, for example, if we were using it even toe distribution, then the then other set off instruction will be executed. And if you're using a santos distribution than the others, instructions will be executed. This is one off the example which we will try in our upcoming lab has been. So now you get a glimpse about that. Why, Actually we are going to use when a statement. So let's jump in tow that and looking toe in more detail. So this is what I have already discussed with you. So let's understand that types of conditions so basically the single condition you can manage it like this. The Syntex for handling the single condition is like this. We will use the wen keyword and assigned the state mental will heal. Suppose if you have mounted multiple condition than you can handle like this. So here you can use the operator and then our operator. If you want to check about the multiple conditions, you could know how to use brilliant filter thing. It would be used like this. So let's jumps in tow, hands on lab, and look that what we have to do. So here we are, goingto perform to exercises in the first exercises. We need to create a playbook that is called witness statement demo, and after that we will look into this exercise which I have already discussed with you what happened in this exercise. In this exercise, we're checking the word kind of for distribution and civil distribution were using. And on the basis off that we're generating off file, it is a pretty much simple, straightforward example. So let's looking toe that I will explain line by line in our lab. Dominant so again, the same way we will go to the terminal. Do our hands 30. Okay, so what? It told that we have to create a fine cord or when ST men demo dot german. And now we will call people that thing to save our time. So here what it is doing again, where we're using local host, you must be knowing that. Okay, we're performing this thing on our local machine. We're and civil is being installed. So this is a variable declaration off within the playbook and the task we have defined to task over here on this, tutors will be executed on the basis off some condition. So here we're providing a name so that we can is leading to fight that this task is getting executed or which task is executing. So after that, we have project here. It is given that? What is the path? So part of the thesis file will be created on the basis off this condition. If it is in a world distribution, then it will create. They will tow distribution. After that, it will check that another condition eating. If you're using us and toast machine, they need this condition will be contributed. Anyway, in this lab, this condition will not satisfying. We are going to get one. Did this This output as we are using the open to system. So let's sit down this control, Lex. Yes. Know how to donate? I told you and Sibyl ripen playbook. Well, you know, say entry. And then when the statement No, if you run it. Oh, there is a type word Thanks for And sequel. So you would run it to the executing? No. So you take the cute did know. So no, we need toe looking toe that with what we know, Finally, it has created to really find that we've been look into temp folder list of the world. So here it has created a 12 distribution on the basis off the condition which I have already mentioned, that if we go in tow that file. So this is what? So that the reason it has created that fight, we even come out. So that's it. Days. This is what I wanted to demonstrate in this session in this lab station to see you next session. Bye bye. 15. PART I : LAB Loops: locates. Welcome to lab in this lab station. What we're going to discuss about, we're going to discuss about loops. We were looking toe that how to use loops within Enseval. So let's get started. So far in this journey, we have already looking toe that how to use variables. Then we also learned that how to use tax and wait to use tax. We have seen that how have edged variable is helping us fetching out the details while running. Then we have not seen that how to use when a statement? No, it's time toe loan about loops. So basically we can achieve the loop personality within Enseval. With the help off, he would call with items for Norman Loop. And if we want to achieve nested loop functionality, then we have to use another key word called with underscore Nestor. So we will do the lab onboard the keywords, so we have to check now. It is the same thing which I have explained. Now it's timeto jump, terminal looking toe, that what are the labs have? So we're going to put on two laps one with with tight um ski wooden on the duties with Mr So let's look into that to here. We're going to perform to exercises in the first Czech Society. We're going to create a playbook. And after that we need toe run this. After that, we need toe looking toe witness to key word. And here we will perform toe exercises again. Were going toe creator with my straight playbook removed. And within that we have to perform this exercise. So let's jumps into the terminal. And there I will explain you line by line of the first exercises. Could yet file called with Tyto man. No, thank you. They're more. Thank you. No devil, No. Here we will go back and copy Pasted to save our time people copy it and come here and face to so again the same thing. Local host. No, you know about when we had using looking most it is because we have running. Going to run this playbook within the controlling machine were then simple is being in stores. And why do you boots We launched aboard the variables. We're not using it. We have kept it so that you must be aware that how to use valuables within the playbook and there is another task which were which we have created over here Corneloup demo. And within that we're creating a file and within the temp folder. And here we are, right, aerating that it has three items and this will be created when it gets executed. So let's run this and we will look into that Alexe. Yes. Oh, we've done it. And stable. Playable. I like this site Entry retitled groups Well, we will drop me. Wait for it. Executing gathering facts. Yeah, See, It has commuted three files, so verify it. Let's I just checked out Quarter those five years with them. See you. It has cleared trade conflict one conflicto raj A to country three door jato. But this is a ginger template files which I will explain in later part of this course now moving toe another lab. So another lab work The thing it is explaining. So we need to know we have done the right items. Let's look in tow with nested. So we have to create a I'm not the flight. So the, uh come here we need to create I know the demo Mandel with less stirred blue demo talk Yemen. No, we will grab the court to save our time. I will expend this code in the terminal. You called you. Okay, so here again, the media portion. You have to understand it. This line from here, we're creating a task. Core nested. Loop on. We're printing the message. So what it is doing? It has two lists. It it has. And we wanted to wait. Did it ministered, man? That means Section one will print part one. Part two, Part three and six and two. Little supreme. Part one. Part two. Part three. So how do we achieve that? Invincible. With the help of witness to key word. So let's run it. And we come to know about this. Yes, we want to see it. And let's going toe that. Do you run it and stable? All right, I believe no running to the burning. No, get the facts. So see you. If we look in tow this then you will find that we told that to print it like this. So Section one part one section Section one, part two. Section one, part three and same will be repeated with section two. Part 16 sent to party six and partly So this is what my daughter that. Okay, guys. So this is the thing. I wanted to demonstrate you in this lab. I hope you understand that. How to use look, so see you in the next session by 16. PART I : LAB Error Handling: Hello guys. Welcome to another lab in this lab. We are going to discuss about better handling. We were looking toe that. How do we handle edit in Enseval? So let's look into that. So in answerable we actually handle ended in two ways. The first week is ignored errors, this method, what will happen? That or when evidence happened then we will ignore it. We will look into the examples. How do we do that? So it is a default behavior off and civil. Whenever a program is getting executed, what will happen that it will stop in at that moment? Suppose if you have women three task and on the first task it executed. And in the second task, the other cames Then it really stopped there. It would not execute the Third World. So to ignore such behavior we will use a method to handle that within instable is called ignore area. We were looking toe the lab How to do that? Another method we will look into that Is the block interesting? It is equivalent to try and catch block so we will put the thing which we wanted toe provide the error handling capability in a block off court so that we will achieve through block and rescue. It is same like dry cat on final block in the programming language. But here in the instable, we're going to use the block rescue and always so let's jumps in tow, the Hansen level it looking toe that what are the labs given there? So we're going to perform to lab first for ignored another for block rescue. So what are they? Exercise is given, so it has given to exercise that we will create this exercise first and then we will jump into the another exercise. So let's jumps into the terminal. So first thing it is telling that we need to create five chord ignored and underscore demo and let's jumped into an copy place. You can also do the same thing if we're following me, there is in the source section. It is given that you go there and copy you go with this and goto the terminal and paste it . So here again, the local loss. You must be aware now that why we had using locals. But again, I will reiterate it because we have running this into a looking this machine controller machine were and several is in store. And that is good local host. After that, we're creating a task in this task. Were performing the first weather here. We have given the name and we're performing the ignore data. So what is happening over here? We're trying to freaking out a neural which is not existing. And we're telling that you should execute. And there is another task which actually executing after their normal behavior. What will happen that if this edit will come then it will stop executing it there. Only the second task will not be executed. But here were telling that you should execute even though Erin awkward. So let's run it. And then you will see the behavior. See of it? Yes. And come here. Open it. And Sibal label minus I in reentry and no, run it. It is gathering Fracked. Yes. See you. It feels but still it executed the second task in a normal behavior. I want to demonstrate that if it is a normal behavior, then what will happen? Let's look into that. So if you come here and we will try to market hash, save it. Control X Yes, But we're commenting like this and no try to run it again. So it got error handed to stop there. If you look into that here, it has executed the second task. But here it hasn't way because we come entered out to remove that comment. Yes. No, done it again. But if it so this is what I wanted to demonstrate to. Let's jump in tow. Another lab. We were looking toe that work. Actually, it it So another method to handle the area. So go there. So first toward it is telling that in that exercise we need to create block rescue error handling demo. Naughty amel file. Okay, so what we have to do? Come here. Nano and then block rescue all was demo with more, not Yemen. Now here we jump that and copy Paste it so that we will save some time. We will come here. Hope he pasted. So Okay, again. So here what we're doing. We're creating a task and we have here We are defining the block and the rescue block and the always block. So that means what will happen. It should run and it will through another. And what will happen that it will execute normally. And this rescue block will court there on this message will never, ever print this one because the other will happen. Okay, And after that, what will happen that this always block even though error is there But this always block always gets executed. How do we do in the normal programming language, whatever which is execute it, which is residing into the final block that always get executed. For example, if we're making a connection and when that happened, then you want to close that connection. So region really putting too this block so we can use the same kind of full functionality with the unstable, with the help off this block rescue and always so let's try to run it. Come here. So how do we done it? And civil label site and and win today and run it. It is running. See, this failure happened, but it's still it got executed from the final block. So this is what I wanted to demonstrate you. And in this lab. Thank you guys. Thanks for your time. By 17. PART I : LAB Roles: Hello, guys. Welcome to lab in this lab. We are going to discuss a vote Roads. So let's jumps into the discussion and then we will do the hands on lab. So in this lab, we are going to discuss a vote rules. So far in this journey, we have come across various elements off, sensible on what is happening that went to you. Designing the playbook than the size of the playbook is getting increased. As for the task, So it is sometimes very difficult to manage when the size of playbook is getting increased . So we need a way by which we can handle those task and or say, organize our task. No more meaningful manner. So how do we can do this in Enseval? We can do this with the help of rules. So let's look in tow that what his roles is. So what is ruled sees basically, rules is nothing but a way to organize the things within. Answer it, help us to organize our thing in a more meaningful manner where we can easily track what we are doing from answerable prospective. It is nothing better a structure of folders. So we will look into that hole do we can create rules within Sensible. So let's jump into the hands on lab. So what? We're going toe design. Let's see. So we're going to perform four exercises on the first exercises. We will create any animal filed Rolled a Modotti Amell and after that we will use the score in tow. That Yemen one that is being done. We need to create such folder structure. And then we need to provide work on this Yemen and within that we need to create to task so that I can demonstrate you how to use rules. So let's jumps into the terminal. So here we need to write Nano and the demo for Rose rules. Demo, not Yemen. So the first test of what it is telling we moved to grab this court copy, paste it, go there and two months we will still save it. No, let's look into what it is telling. Just telling that we need to create this structure. One thing you notice that the name of this folder and the name of the rules which is given over here is the same. So I will demonstrate you. They're only so let's grab this so that we can create this folder restructured into the terminal, become over here and do NVIDIA and please. And after that, we need to put minus B because it will create the same folder structure if it is not existing. Well, we don't know, mystic, we don't want to create on the route. It should be in the current directory so into. And then afterwards we need to create a normal file within that that is called Mindo TML. So to do that, we know that Come here, Landel. Tell that I want to create mean Don't Yemen In this location, we come over here and grab the court for the second, so we will grab this court a bit. So the terminal based it. So here what we're doing, we're creating only the task Over here were telling that this task to task for execute when I run this Jahmal. So save it. Rolex. Yes. No, we will run this exercise. So how we will run it again. And civil label and rules. Demo holds demo door to Yemen. We're on it, executing it. I see it. It has executed task task one and task toe So now to understand that we have do like this three. So I wanted to explain you this the rules. So here, this is structure. We must have to remember, Whenever we're writing our roles, we should have the name of the food that should be similar as what we have into the rules demo dot Yemen. So if you look at the rules de more Yemen So the thing comin over years, the name off this list item should be seem as the name of this folder, and it should have this starts folder. And that should contain a fine name, court mean nor Tim. Whenever you're writing rules, make sure that whatever you are providing the name within this list, that name of the borders would be the same. So that's it, Guys, this thing I wanted to show you in this demonstration, I hope you understand the rules. It's pretty much a straight forward. See you in the next session. Thank you. Bye bye. 18. PART I : Ansible Templates: Hello, guys. Welcome to the lab. In this love we're going to discuss about and civil templates in the last love we have seen the rules. So now we were looking toe What? Actually and several templates are so let's understand it. So before going into the actual definition, I wanted to give you a scenario so that you can better understand that what is template is and why we are using the template to understand that lets jumped into a diagram and then we will discuss it. So in this diagram, we have seen that we have a cluster where we have three master north and three worker nodes . Consider that we are going to deploy a configuration file on worker North, all the worker north. So that means our single configuration file will be used to four different different worker nodes. So to do that, either I can keep a separate copy and I can define three copies off that configuration file for each of the worker north. So this is really a dread Gary task that means very painful task. We need toe define the configuration file for each of the northern. So we have two options for that first option. Either we can create the configuration file for each of the worker nodes are we need to define our template. So here templates comes into picture in answerable. You can use template for designing such kind off activities where we have reputation off court or reputation off block off court. So how to do that? I will show you in this lab. So if you go by definition than template is a file within answerable which give the information about configuration. But the dynamic values are given as a variable. So what it means let understand by example. So here supposed that we have our template like this where we are having a configuration in the form of Jason and visitation will contain the configuration name for different, different worker north. So here what we need to express if I that I need to create this conflagration for each of the silver. So here we have used a loop and within that we air iterate ing the Nords. So these are the North's. We relate. I will demonstrate this example to you. So here we are replacing this item variable with the name off this value So that's what we are going to use the template. So let's jumps into the demonstration. So we are going to use the same template file on. We can deploy this template file and we can generate this configuration file with the help of template for each of these worker nodes. So let's get started and let's go into the nominal and gets our hands dirty. Let's jump. So now what we will do we will create a direct record Possible template Example. First we need to define no valuable for that so we can create our dictionary. Do that We need to create a direct record of Judea group. That's which I have told you so and we will create that. And within that we will create a file record all so that we will keep their dictionary. So to do that, this is the first test of we're going to do so. No Nano group that underscore vets all on this will container dictionary. We can give it turkey. It s worker one and we will keep the same name here. Mocha one would be fine And here we can give the worker toe no exit from here once it is being done. Know what we have to do? We Creator. Why do you corridor templates there more They moved or nor TML. And within that, we will create a host. We're going to run this on local host, so we don't need I in a file. So here, Post, we're going to the run on this and we can have for rules. We're going to create this rule and the rules Name is we can take it. Templates. Demo. No exit from here. No. Next time you need to create the rules to do that. I m Katie. A year rules. And here we need to define the name templates de more, which we have defined there, which is called Pass Not Task three. For this folder we need to create and to rule that you need to specify I couldn't be if it will not exist, it will create that once it has been done, know we will. First, we will create that man nor or here I mean yeah, yeah. So I will grab the court. I have already written so that we can save time there. Quick, grab the court first and then I will explain. You have grabbed the cordon. No, I will paste it. So here we're defining a task. And we're telling that supposed that we are generating this thing for Cuba lit. We can use it in the upcoming we will use it in tow. Part three, actually. So we will use this template as well there. So just consider that this is the configuration file for one of the component off on it for the time being Now. So here we are going to create a template which I have showed you. If you remember, I had showed you this template we're going toe creating a template location off that task. So no and what we're doing here, we are using this template, and we're generating the file configuration file for each of the respective over which were right aerating within this loop. So now what we need to do, we need to save it. Yes, and then afterward, we will create the template for them to do that. We need to rate them kedia rules, templates, the move, your templates. And here we need to mention it was mentioned, Kate, Templates nor jato. So one more thing I wanted to point it out that this is a ginger template as sensible, supported singer template engine. If you want to know about ginger template, you can get this information on danger. Dark poke, orderto artist site. So you will get all those details. Words injure. Tempted. So for a time we just considered that ginger template is the engine behind er and several templates. So now first we need toe create this full of the structure and ones of procreation we need toe continued the fight to do that? No. And within that here, we need to specify care templates. No, Gato know. I will grab the court and placed it over here. No, I grabbed the court. No way we'll baste it. So this is the court. The same could which I had showed, you know. Here you can see that we're iterating those worker note. So let's jump into that and we will run it now. First we will save it. Yes, we want to save it. No, we will run it. Run it! Clear. No. Right And symbol. Playbook, Detective. And here we need to write template. No running. No, it is running minorities checking the facts. Number two started executing the different task deployed villages in which we have defined . So no, see, your it is generating those configurations for each of the individuals over. No, we will look into the temp folder. No. If we were looking toe folder, then we will find that this is get generated. Now, if you look into this file so it would look like cat Don't caters for one door, Jason. So see it. It has generated for gay artists. Work a one. If we were looking toe, then it is foot. Welcome to and same foot. Well, Kathy, So we're concluding it with that template can be used for configuration with the dynamic variable. So wherever we want toe reputational configuration file generation, we will use templates. So this is what I want her to demonstrate in this lab. See? In the next left till then. Bye bye. 19. PART I : Ansible Handlers: Hello guys will come to the lab in this love. We're going to look into the answerable. Handless will understand that why we use handlers. So let's understand the scenario. So So it won the standard better. We were looking toe the previous example what we did earlier. So we will going toe the diagram in the last for template exercise what we have done, we have used the template and where we have generated the template for each of the solo No e configuration fight for each of the silver's once configuration file has been generated and we have installed this configuration file at some particular location. Then we have a requirement. After each country tradition of that, we need to do you start the services. So in certain seen idea what will happen that we need to run or restart the services again after each of late? So that means there is a changing off operations. So how do we handle the chaining off operation in and civil? So handless is the solution. So suppose it free our country. Considering this example, if we are having three servers and it's over, we're going to deploy the certificate and We're doing some changes within the system. The fight on once we're changing something within the system the file We need to restart their demon. So how do it get notifying? So we used the handlers for that read we do the changes in the system defied. And then we will restart the services. So this is what handlers will help us in unstable. So let's look into the lap. It is very sort of lecture here. I will show you block off the court. We will leverage the same example What we have done earlier in the template section we will ever is that example only and I will walk you through that the port block which I have already inserted. So we will go with that court block and we will look into that. How old do designer handlers within Enseval? So let's jumps into the nominal first. So here in the last love what we did taken Sure you So if you we have created this one where we have created the template demo rules and within that we have created the task, I will show you that task. So basically the dance which we have created waas No rules. So and here we have created templates They moved and the activity which we were performing in this task Waas this one. So here we are deploying here We're creating the configuration file footage of the North which is being defined What? Here within the look. So no. Here you will find the extra block off court, which is telling that once this is being done, that means we you have generated the fine using this template. Then you can notify this so this which we have defined and then handler section, which I will show you. So that means here were performing some chaining off operations. So now in that scenario, we can use handlers after performing off this activity. I'm telling that you should go. And do you start that? And the next services He had just a devil purpose. I have given taking the engine ex service it no going toe the handler file. So, handler, we have a separate handler folder effective, handless handlers. And if it didn't the main file, we have defined this. What? We're telling that if you look in tow this you find it the name of this thing with the same in the task file where we're telling, notifying this name and that name the same should have to keep the name same after that, were telling that this service I want to restart. So this is all we could hear the handlers file. 20. PART I : Project Automation Of LXD Container Creation For Kubernetes: Hello, guys. Welcome back in this lab. We are going to do a project in this lab. We will see the power off and civil. We will automate the entire Alexian Alexey Container creation with the help of Enseval here we will use the Alex D model offensive herbal toe automate the entire process. So let's look into the architecture diagram. What we are going toe implement in this project. So let jumps into the architecture diagram. We're going to design something like this where we have seven Alexey containers on each will be representing a Nord within the Cuban it cluster. That note either belongs to master north or working old which we will look into next part of the course. But from here onwards, we are getting ready with the bare metal machines These Alexey container we will use in next part of the course where we will design or manually installed the Cuban it cluster. In the second part of the course, we will design on deploy the Kuban, it cluster manually and in the third part, we're going to use and civil to automate the entire process. So before getting our hands dirty, I wanted to show that from where you can get the reference about this model, if you visit the and symbol side and search for Alexei Underscore Container, then you will find this. So this is the model within the unstable which will help us to automate the entire process . It is always of good practice to refer the documentation off Enseval. Whenever you start any kind of automation, you must first visit site off and civil. Look for the documentation. What is the recommendation and look of the perimeters which is being provided over here? We will use it and look at the examples also. So what are the example? It is really a good starting point. We start writing the instruction set in Yamil, so let's jumps into the terminal and do our hands dirty. So let's start writing the playbook where they already mentioned you how to write it. So first we have to tell that now I know the name of the playbook. We will give that exceed information dot Now here what we have to do where we want to create it. First we want that host is going to be our this machine. That means it is going to be the local host. Then afterwards, we need to a specify you over here that that is going to be a a local machine, which is what default value here. Then afterwards, we were tell their tasks. So what kind of task we're going to create that we need to provide the name. So the name of the task which we're going to create over here it's it would creating Alexe d Dana, that container model, which which model we're going to use That said, it's called Alexe team or we're going to use. So we're going to use a lick stick container 16 on no tab use. I have used tap. Sorry for that name. What is the name? Name? We will come and define later for time being to sleep with houses. So here we need to mention that the state state, because we want that continue so they start. So it should be a started. One more thing. I wanted to tell you that here Alexey Container is pulling from as TTP a site. So we must have to specify that sort file. That is a property called sort file. We can use it. I have already created that as a self certificate fact is residing in certificate location hopefully next that have a way to use. Now we have to define the configuration. So the configuration which we are going to use it is gone. Fig and so limb to CPU. We need to mention like this CPU I'm going to use to CP over here. Then I will tell that my born memory So this is the same checks actually, we have to use if you're looking toe that you would find that just telling them the of the country duration field mentioned that memory is going to be four DV and we need to tell that swap we need to make it for two necessary. Really? Were you to this thing? We need to mention it. Kleenex. I hate typing, really. But I wanted to the most trade that we can write it from scratch so that it would be also good. You can copy paste this thing from the resource section, or you can right along with me anything. It's get comfortable. I want that you should become for table understanding all these things after that Royal. So this configuration which I'm going toe to a copy paste because this is some conflagration which we have to remember that and you should also keep it as is. So I'm going to copy paste from one off the location. I'm going to copy praise from this location. Okay? No, we need to mention that security start blasting. True. Then after boards, we have to mention level eight. Security to cool. No, we have to mention the source from where we can get the image type of the source is going to be the type this image we want to meet and more this we're going toe pull that. So we need to mention that we are going toe, pull it, and then afterwards we need to tell that's over with. So from where we need to pull that image, that is I know need toe take it to us. That is, I also need to take it deal, paste it, then of rewards. We need to mention that protocol. So the protocol, it's Lex de and what he made, we want We need to mention that we are going to use by your Nick. That's CMD 64. So again, we're going to use the certain file. So we need to provide the certificate which we have created that will give us the access to this image. Once we do that, we're really more for the no. We need to mention the profile flights. It is good vibes. We need to tell that they're going to be the default flaws. Tell that with some of the setting which we need to remember. Peut by the way, you can copy it this thing from the source section. So that would be really easy. So we need to provide the time out. So that so what is not responding a little with a toll? No. Here. We need to mention that home in the number off. So we are going to create. So let's look in tow. That the diagram. We need toe movinto diagram. So we are going to create this thing that so know what we have to do. We need to mention this thing. Okay, First, we will create load balancer. We need to We need to mention that No, really. Go back and create those we need to provide those list. We're going to give the name Ticketus load balancer Kia Tous, Master one, We're going to create one mosque for much. Three masters machine. And so here. We need to mention the 2nd 1 monster, too. And then we need to mention master on three. Work on what we have to create has put out predictor diving. Welcome to it is good. So this these are the Alexey Container we're going to create and we need to mention over here. We have already left it blank. So we need to go there and here. We need to use big limit that it's called Item Over here. Now we're ready to go. So what we will do? We will run it. And this will has been off. Seven Alexey container. So let's look into that Rolex. Yes, Lex. Yes, We want to save it. But prior to execution, I want to break this green and we will look into that. We'll go there. Clear. Look, that any Alexey container with their So there is no Alexi container existing. So we're really talking clear. I want to watch it. So Alexa list they can keep over here so that we can see the execution process. No, come over here and right to and civil laps. And here we will run it. Leave. That's fine. Tree Alexey Automation daughter Yemen, Run it! So see you. It just started creating caters load balancing. So first load balancer has been created Now. So Master one is getting created. So Master one is also created. No, no Always started creating master too. So master to also created Now it will pick Master three. See you it just doctored muster three No, no! It created Master three years We'll know it will pick pick of the worker nodes. So you distracted creating local one. They created worker one as well. Now it will be quicker to no it Big toe walker toe. So it has created We could do as well. Now it will create worker three CEO So this is the last North it is creating as we already has been No. Six machine. Now this is the 7th 1 and the last one These machine we will use in the next part of the course where we will deploy the Kuban It cluster. That is done. Now that's it, guys, this is what I wanted to show you. So do you in the next session, or seeing the next part of the course. But by 21. PART II : Overview Of Step By Step Kubernetes Automation With Ansible: Hello guys. Welcome to the party tour who were needs automation with 10 7 in this part of the course, I'm going to discuss civil the following thing. First, we will understand about the cool nets. In that aspect we were looking toe how this Kuban, it gets evil. Once we understand that, then we will understand that goo net ecosystem. All this who wanna tipo sister works And once we understand ecosystem then we will movinto Copernic component We will look into that water the components in world Whenever we are deploying the Cuban it And once we have better in the standing off the Kuban it component Then we will look into how we can deployed manually the Kubernetes cluster This part of the course is mainly related toe the deployment of the Cuban note manually This part is very much important. Whenever we are applying the automation on Kuban, it's if we understand the manual aspect off deployment, then we can easily go for automation. That is our third part of the course. So what does the course doesn't contain which also I want to inform you that this goes doesn't contain information about the application deployment on Cooper Nets, but this part is not being covered for application deployment. For that aspect, I will come up with another court so application aspect off when it is out of the scope for this course. So let's get started with the Cuban. It's overview. So here we were, looking toe that how the scooper nets evolved, and then we will look into other concepts off Cooper Nets. So let's jumps into the discussion off of you in early days. Organization Drunk Application on Critical. So so what was happening? There was no way to define the source boundaries for applications in a physical server. And because of that resource allocation issue has arised. So what it means. For example, if multiple applications runs almost magical solo, there can be instance where one application would take up most of the resources, and as a result, the other application would underperform. So this is really a big problem, so to cope with such problem, so there was a solution for this would be to run each application on a different critical so over, and because of that, the challenge is on. Organization was facing that it is very much costly poor application posts over is not an ideal solution, so to cope with that, then there is virtualized. Deployments comes into picture, so let's understand it What it was. Actually, what should deployment comes as a solution for traditional deployment. Problem with help off. Watch a logician Take me. We can run multiple virtual machines on a physical silver sea views. Watch. Your tradition allows application Toby isolated between Williams and provide a level of security as the information off, one applicant cannot be freely assessed by another application. There was also another issue when we were using traditional system. The resources was underutilized because we were using one is 21 ratio. That means one application was using once over, so that means the resources was under utilise, so to cope up with that were in a virtual environment. Watch. Your tradition allows better, futile addition off resources in a physical so over and allows better scalability because an application can be added or updated easily reduced hardware cost and much more. But what was the problem off virtual environment As you see in the picture, Each BM runs on his own operating system, which is an overhead because of that reason the containers comes into picture containers are similar toe Williams, but they have relaxed isolation properties to share the operating system. Among the applications within a country radiation technology, a container has its own file system. Cebu memory processes, spaces for applications. So what is the benefit we achieved out off it? So we achieved with this decoupled architecture, we are easily distribute the application with different different environment, from production to a staging staging to development. So with this powerful capability, container provides us many benefits, like the image creation for continuities as faster than what your machines you can quickly has been off the container compared toa virtual machines with the power of containers, you can easily give the continuous development, integration and deployment process in place. That, it means provides for reliable and frequent container image built on deployment with quick and easy rollback. Supposed that if we make any mistakes, then we can easily roll back with this container capabilities into visitor development and operations. Separation off concert possible because or container technology. So what it means means that create applications container immediate at the building release time rather than deployment time, so That means we are decoupling applications from the intra strict. One of the greatest benefit out off it is that we have the environmental consistency. It grows the development, testing and production in tournament. So that means can run the same on a laptop as it does loud. Who here? We understand that. Why we use containers? No. In the next session, we will discuss about why we use wooden. It's and we will also look into the kubernetes ecosystem. Where Miss Dropping Here. Now see you in the next session. Bye bye. 22. PART II : CONCEPT Kubernetes Components: Hello, guys. Welcome to the another session in decision. We're going to discuss about what is carbonate and bicarbonate. But before knowing what is Cooper Net, we must have to understand. First y Cooper Nets, as we have already discussed in the overview section, how the deployment off the application evolved from a traditional way toe. Virtual machines from virtual machines to now contain originations, as we all know, that containers are a good way toe bundle and run your applications. So when it come to the production environment, we need a mechanism to manage those containers that runs the application and also ensures that there is no downtime. Downtime means you for continued, goes down another containers needs to get the started, and all this thing happened automatically. No need of human intervention. So here, Cuban, it comes into the picture. So couldn't provide these functionalities where container management's happen automatically . Who wouldn't? It provides us with the framework to run distributed system resiliently Cuban A take years off. Our re Skilling requirements fail over deployment patterns and all those activities which is required to run the application is Spoonley within the production environment. So let's look in tow this diagram. So this diagram represent that we have number of containers with these existing in one of the component called Pardes. What bodies? For the time being, Just considered it. It is one of the component which is keeping those containers on that is all being handled by this government. So this Cooper Net providers, the capability to man is those come container and it will provide the runtime for the country Now and with the help of Cooper Net, we can easily orchestrate the container infrastructure. Coburn It also has the capability to sell feeling supposed that if any of the container is going down, it can automatically come back within the system. I will demonstrate you once we will deploy our cluster. Then I will showcase this. We will delete some containers and we will look into that. How that container is coming back. Now we understand that. Why reuse goober net? Let's move on. Looking toe the ecosystem off Cuban it We will look into the complete detail how this ecosystem looked like So let's look into that. So this is the ecosystem or Cuban it So what is happening when a user deploy an application it. Deploying a container and container reside within port on this part contains multiple containers and in Kuban it We basically deal with this port. We don't have direct access to the containers. Continue it being doctor or are kitty on this part belongs to a node and no belongs to cluster. So here you are saying that this class church has multiple nodes on these containers is access via service. So to understand that how all this note management will happen, we need to understand that components are covenant. So let's look into the component of Cuban it So this is components off Cuban it We will discuss one by one here to part off the coordinate components. One is the master north on another one is the worker notes, so users can access those Master North's using a p I cli. Anyway, there is a Seelye tool called Cube City L, which user use to access the master node and Master Nord is the main machine which controlled the nodes were Voelker's are running here. Master Nord is a main entry point for all administrative tasks. It handles the orchestration off the worker notes. If you look into this diagram, you will find that there were various competent which is used within Cooper knit like F B A , Civil E TCD controllers and Sid Uhler. Now we will discuss one by one. What is the rule of these components? Q b p ace over component on the master, nor is actually used to expose the Cuban. It's a P A that is used to handle the communication between master. No to work. I know it is basically a control plane off Cuban it. Now let's discuss about it, said Who wouldn't. It has a stateless architecture that means awoken or don't know about their estate. So how does this magic happen whenever word goes down, although it come back again? So all this magic happened with the etc. It is basically a key values tour, which is used as Kuban, its backing store for all plaster data. So, it said, is the part off master controller? No, let's understand that What is controllers control? It is one of the component within the Cuban it must earn. So basically, controller is a control loop that watches the shared estate off the cluster through the A P . A silver and makes changes attempting to move the current district toward the desire to state. So what it means means that it is an engine behind all the logic which is responsible for noticing and responding when North school down. It is also responsible for maintaining the correct numbers off work for every replication controller. By the way, there are a variety off controllers which I will discuss in this discussion. Also, controllers are also responsible to populate the end points objects No, understand that how many types of controllers we have. Whatever the activities which I have been mentioned Controllers which has distributed into various types off controllers on the controllers types are there is something called node controller which is responsible for noticing and responding when north go down. Then we talk about replication controller. This replication controller is responsible for maintaining the correct number of parts for every application controller For every replication controller object within the system there is something called en pointe controller which populate the endpoints that joint services and parts. So this is short description I wanted to give you about the controllers Then we will look into the sea dealers should ill It is also one of the master node component that actually watches newly created parts and that have no nor design. It's a let's in order for them to run on. So what does it means? It means that whenever the Newport comes into existence than it said, your job is to assign it to a particular note. There are certain criterias, which actually Soudelor keeps for assessment. Who assigned the board in tow? The North on the criteria takes into account for so doing. These decision includes individual and collective resource requirements, hardware, software policy constant and workload as well. No, let's look into the worker notes. What are the components included within the worker notes? We will look into that. So what is welcome, Notes post. We will understand that what cannot is actually a local machine in Kuban. It's this machine perform requested task and each note is controlled by the master note. Its task is to run the container inside parts, and this is where the container infrastructure, like Docker or our kitty, runs and takes kills off, downloading immediate and the starting containers. So here we understand that we're condoles now. Look into the components residing within the Poconos. The first component which we were looking to is that cube lit cubit is nothing but an agent that runs on each note within the cluster and the responsibility off the Cuban. It is that it makes sure that containers runs within the party. You must be wondering how old this thing happening, how Cuban it comes to know about all this. So basically, what is happening? That Cuba takes a set off for the specific that are provided through various mechanisms and that ensures that container describing those porta specifications are running healthy and green. So each worker Nordoff, who wouldn't it, must have Cuba. Cuba Late is one of the important component off Cuba network. A note now moving toe. The another component called Q proxies Que Proxy is a component which actually maintains the network rules on Lords, and these network rules allow networks to communicate with our part. So that means it is a component which take cares off communication with bored inside off the class chin, so the outside of the class chip. So that means all the aspect of the Covenant class shirt for communication within the worker, Nord is taken care by Q Proxy. OK, now I understand all this thing Now you will must be asking that. How does container runs on board? So all this happening with our next component to discuss that is container run time. The container room time is the software that is actually responsible for running the containers. So there are so many elements in Creek overnight cluster. But this is very important thing. I wanted to discuss that so that you will be aware whenever you are deploying a coupon in question manually or automatically, you should aware about these important component. So that the reason I wanted to discuss all these things. So once you know about this thing, then we know that how to configure these things. So I believe I have given a brief overview about these components. So let's move to the next session. In the next session, we will discuss about the steps for manual deployment off Cooper Nets cluster. Thanks for joining Decision. See you in the next session. Thank you. Bye bye. 23. PART II : LAB MANUAL STEPS HAProxy Installation: locates. Welcome to another lab in this love. What we're going to do, we're going to install. That's a proxy on a lorry Islands a cardinal. So let's look into the steps required to install Etch a proxy. So here we need to go into the step to and we will look into that. What are the steps we have to follow? So we need to follow these steps to do the installation. We need to log in tow the silver. That is not which we have created earlier, which I wanted to show you so I can show you. So here, we need to go in this machine and do the installation. Then afterwards, we need to install the chip edge, a proxy on the solo. And we need to install also nettle package to get their status. Tick off the network. First of all, what we need to do We need to break this screen drawing double courts. No, we need to go inside the load. Balancer. This is an Alexa machine. So the command which we need toe Is this to Alexi? Exactly. Subtler than that. Get this load balancer on here. We need to write. We want Could do Bash once you run it. No year in tow. The Lord balance of system. Now, the second step we have to do, Mr Runda, Etch a proxy stole that your proxy. So to do that, that's a proxy. We need to run this. Come on, Strong chip proxy. So it isn't strolling now to it. Install the H A proxy. Another thing which we need to install is the Nettles package to do so that Royan dog Net Foods It is installing this tool. Help us two. Very fine with it all Network Etch a proxy is working or not, So we can identify with this about the stool to do so on the command which we need to write this, like not to start for Nana. I work for the next Mr Jobs. So now the next step is we need toe goingto configuration file off. It's a proxy with Resides in It is a folder. There has a chip, Cropsey. And here we have toe grab this conflagration find and we need to change. You do the changes over here. What kind of changes we have to do? I want to leave all these settings and we need to come down and go to the last. No, to insert with the nature proxy, we need to define fronton and back. And so you must have to give a name. No. Provide the details for where we want to find. So here I p address off, Lord balances comes. We need to write Bind in the I. P. Endres off load balancer is 10 dot $115. $50 44 in the port where we're going toe bind his 6443 So what it means is that all the request comes in tow the load balancer, and these request will be distributed toe The master knows so to understand it, better looking toe their diagram. So what will happen that all the request from local note will first come Toe Lord balances on then for that it will be distributed to the master node. So now go back toe terminal for further conflagration. So, no, you would come over here after that, we need to define two things. 1st 1 is the mood on the mold is going to be the TCP Protocol and then we need to A specifying that which back and we are going to use and to do so, we need to mention that Just go to be full back in whatever we have given below. Yeah, the name should be the same. No, here we need to a specific rates some of the configuration to do so what we have to do we need to write right about the balancing act, how the balance will happen in what fresh action. So it should be like round Robin. So we need to date Robin and heroes who We need to specify what protocol we are going to use. So to do that, we need to mention DCP We need transpacific adoption that is going to be TCP log. Then another option that is going to participate. Check Now we need to express if I the soul, get its master silver to do so. We need toe tell that the name of the masters over monster upon on the I p what that is we need to bind with 6443 put Go to me six for full three. We need to specify here chick. Then afterwards we need to tell that it waas true that is going to be gender. 11 fine. Kuwait Mind with book 6443 Check Soon it's all three. And whenever you are introducing a new server, Master North, we need to express if I it to bind with the load balancer 10 dot $115 door two for one. Buying with the port. 644 three Check. So, no, we done with the configuration off chip Proxy? No, we will exit from here. So no enable the Soviets to do that. We need to write system cto a neighbor at your proxy once it has been done, then we need to started system CTO, start at your proxy. We need to check. The status is stumps it. You notice that your proxy So it is up and running now we need to run the net. Just trapped toe to check that where it is listening to start. See you. It is being buying. No. So that your proxies listening on this port. So now we have configured that a proxy? No, We will move for the and do the other conflict. Genetic, wouldn't it? Cluster deployment, man, But that's it. What decision guys to in the next session by 24. PART II : LAB MANUAL STEP Install Client Tools: Hello, guys. Will control of the lab station in this lab station. What we're going to do, we're going to install client tools for our Cuban their deployment. So let's look into the journey. So far, so far, we have greeted the Alexey Container in our last part of the course. And then afterwards we have deployed the edge a proxy load balancing and configured it. Now, in this session, what we're going to do, we're going to perform, install train tools here. We will look into dudes. Want to see if SSL and gives a deal. So the difference is still will help us to set of the PKK and removed at what we have to do . We have to follow the steps first. We need to download these tools from this location and then we can provide the execute permission. Then our approach. We need to movinto specific location. Let jumps into the steps you can follow along with me. So we really grab this. You are jumping to the terminal here. We need to come over here and taste it. Oh, we need to run it. Dollars? No, it started off, so we have no loaded with the tool. No. See the next test of what Britain existed, we're going to perform. So here it is telling that we need to provide the acute permission. We should come over here, have it off towards just telling that we need to move it. Romeo done being done. Now we need to ready. Find that rich. So now we do on their existing there. We have told that no more. For those looking to go another tool, we have already body find it. We need to really find a war zone. So that's right. Based on go language. No install Cube Cityville client tools to do that. Go there. So no stall Cube City. They already mentioned about the cubes it year. We use it to interact with the opiates over off overnight. So let jumps into the starvation starlet Moved to download it first and then drunk Garnett one by one Gravitt downloading now it is being done. We will move it for the look forward. They execute permission. Coldest trip! We need toe Movinto. Once it is being done, then we need to ready by it. So we need to run this common. You killed? Yes. So we have installed wasn't one point to it. So no, we have completed this a step. So no looking toe that so far what we have competed. We have completed the creation off Alexey Container. Andi. Then afterwards, we have also completely the proxy Lord balance. And now we have been is the install plane tools we're looking toe the step forward in the next session where we can generate the certificate all those certificates for different components of the Kuban. It is he already aware that we are going to develop all automation Is script heard part of the course because for that it is really important to understand process offsetting the manual deployment How the woman in question deployment happened in the production in it is really important. With the help of this, we come to know that water the elements involved when we are deploying proven that question setting off wounded clusters little vast. It contains so many steps. When I have daughter down all those steps which is involved in Randall installation and we had going through one by one so that we will not miss any escape. We will miss any steps than overnight cluster will know. That's it. Gays in this session. I wanted to share this thing see in the next session, but by 25. PART II : LAB MANUAL STEP Provisioning CA Certificate and Generate TLS: locates. Welcome to another lab In this love. We are going to provisional certificate authority and we will also generate delis certificate for all the components. Let's jumps into the discussion. So far, we have completed the 1st 3 steps. Now we're into the trips where we are going to gender certificate for 30 and along with that, we will generate that the lesser difficult for all Coburn, its components. So let's look into the component word the confident for which we're going to generate the certificate. We're going to generate certificate for master node component and for worker not company in the master nor component. We will generate the certificate for a piece of certain component. Then we will also generate controller 30 event We will also generate for civilian that has been done we will generate for public. Then we will also generate for you proxy So let's later their steps. So to install the certificate we have followed their steps chips we're going to follow is we need to run this legendary certificate authority You can follow along with me can copy paste copy It comes through the dominant drug So it does indicate the certificate already now pulled up on a dentist. Let's Mr Porter steps along. This has been done. No, we wouldn't verify it. So see you. It turns in Victor. This one Senior Open Keown's senior. This is a private. No, let's looking toe. What is the leather strip? We have Couldn't have to generate the certificate now. So now we're going toe gendered certificate. For all those compliments for the AGM in client certificate, Cuba claims certificate. We will also generate Controller Manager Clients will also generate que proxy said Euler Kubernetes Ph So many certificate We have Rajendra. Let's looking admit certificate No generated. We need to cope with this. Come to the terminal. It started generating. Look So that senior it has inflicted at windows Keep. Now let's look into what is the other steps School that we need to sort of kick for. You live. Call it the terminal Turgeon. Victory for you Bill it as but for all workers so we can verify that que bullet certificate has been generated For all the worker note. Yes, it is being generated for old for worker one or two local three, no next going to do another steps that will do that. We have gone Cuba. No gender, the certificate for bank manager gender that we need to grab this court. So we need to. But from all this thing, this will heal to Drummy. So all the same certificate we have generated for controller Manager. Let's clarify it. Yes, it turns into truthful controlling man. Is that as well? No. Move through the other steps for another job we need to generate for Q proxy client certificate. So again. Okay, so they're told me. No, Too cute. It Ted's in Victor. Fluke. You proxy as well to all these component required certificate to talk to each other. So no moving to the district. This is Chip. We need to generate certificate force a doula. To do so, we need to grab the court already framed. But this So he turns in Detroit key for certificate for secular as well go a little this trip. No, Let's look into the community piece of a certificate. So before that, we need toe right? The Lord balance or whatever Di p off your lord balance that you should give it over here. So first grab it. There should be no a space grab this. Go Mobile here based it afterwards. We need to work with this and poor game. Well, then, drum. So it has generated the certificate. Let's verify it. Yes, it has generated No. Oh, well done under the strip. Let's look into that. The next. Just we have to do just to generate the certificate for service account to do that. Grab it. Go Mobile Here, do you on it? Verify it. Yes, we have Gen Dietrich Force Always account passable? No. For though, looking to the rest trip No, we need to distribute it. So we need to distribute to the client. So as we were working on the Alexey container So we are going to use a command core Electile bush. So we need to run this command so that it will go and Sittard the root off each instance off caters worker and seem for the monsters to rule that we need to run this. Come on, you need to go to the terminal. Clear and run it. No, it has different distributed there to verify it. We need to run Lexi Key. This or one Ellis. So we have distributed all these certificates. Go there respective awards. No, Very fine. The for two? Yes. See, it went toe to toe. We execute the command on Alexey Container from our host machine. We have to use the Alexey exact command. So you should remember it. So no, the ones done. No. We have done the distribution for plain No. We will do it for the server for the master note. So grab the court. Come here. Go to the terminal and based it. So it done So again? We need to verify it to do that. Alexey exactly caters Monster one. And this. He and the service A coat certificates. You know, we have done the distribution for plain as well as master. So we could Norden the Master Note boat. So we have verified that as well for monster nor school, you know, very for monster, not three. Perfect. So long. We are ready for the next district. In the next section we will generate the few contract file for each of the components Fork , you break you proxy singular controller manager. And that means so that's it, Gates. So I'm stopping over here. See in the next session by 26. PART II : LAB MANUAL STEPS Generating Kubernetes Configration: Hello, guys. Welcome to another lab station in this lab. We are going to look into how to generate Kuban and configuration file for authentication. But first of all, we have to understand that why we use coupon it configuration file basically que conflict file is used to organize the information about the clusters and all the details about the cluster. So whenever if you're using cubes, who till command tool, it fetches the information from Cuba contract about the cluster. So let jumps in tow that we will look into their steps. What are there steps we're going to follow? So let's look into that. So now we have already gone through a step one where we have created the Alexey Container has put the given architectures. So we have already seen that. So we are working on this architectural where we have a load balancer and where we have three masters and three worker nodes after creation off that we have further moved in tow and we have deployed a at a proxy Lord balance that we have seen those steps as well. And then we have also installed client tools for that. We have used certificate generation tool called CF SSL. And then we have also in Star Cube, CTL tool. After that, we have also province in all those certificates which is required by the company off you. Burnett, we have generated certificates for all the components. We have seen that how toe generated we have generated certificate for AGM inclined. Quickly. Control manager que proxy dealer Cooper, 90 p a silver service account. And we have also distributed to the well controlled and the master north. Now we have to generate the cube conflict file. What are the configuration file we're going to generate for which component we're going to generate? Configuration file for Q public Que proxy she dealer control manager and admin. So to generate that thing What we have to go. We have to follow these a step total. We have 27 steps process for each component. We are going to perform that exercise. So let's look in tow that What are those? So we have to assign the Lord balance that address over here They were putting into your variable over here, then for Cuba late. How we're going to do I can explain you for Cuba. I have already explained that why we use cube alert, that Cuban it is the primary Nord agent that runs on East north. So actually quibble. It is mainly responsible for maintaining all the set of parts parties actually executing the containers. So in this lab, I'm going to explain you how we can generate the configuration file for Cuba lit. So to do that. So we need to perform these activity. So, basically, what we are going to do, we are I treating each worker nodes and here we are setting off the plaster. And we are also providing that the certificate authority Private key. We are invading those certificates. And along with that, we are also providing the Lord balancer address over here, which is running on port 6443 on which the name of the certificate, the coupon trick while is going toe Reader Gate. This hyphen woke up one if treated, running for worker one and then we are setting up those great in sales. So these configuration file is going to be a single source off information whenever you are going toe first, the detail about the cluster so from the Cube city l so cubes it. You're looking toe this contract file and get you the information about those worker as I have already explained why we use all this thing as you must be aware that the components off the worker north which I have already explained. So I want to reiterate again. What are the components off worker nodes? If you remember this diagram. So here what we are doing, we are going to generate the configuration file for Cuba. Que proxy on the container. So we were looking toe that. So, as I have explained you, the steps to generate the publican pic file no moving toe. The another component, the Q proxy. The same aspect Que proxy is also going to be generated like this. If you look into the pattern, these court is going to be almost same for every components. So it is repetitive court, So there is not much difference. If you wanted to look into offline, you can look in tow that so basically all the course is going to be the same border conflict and file while generating the admin contract file. So these are the parameters were passing to generate that bagman configuration. Then we will generate the cube conflict filed for controller Manager Once this is being done, then we will move it for the after controller Manager, We need to generates configuration file for Cube Sevilla and we will follow the same steps . If you look in tow that you will find the same kind of perimeter which were while we are generating in the earlier component that is going to be steam over here then next we need to generate it for admin, Admin country for admin user And then once it is being done, then we need to distribute it. Kudo Worker note With this, we will use Alexey file Push common to distribute it into the poker note. Here we are using the worker, not rewrite, aerating it with the loop and we're passing this common and it is going toe the each instance off, Colonel, and it is pushing that it is just copping the conflict file toe the root and same for the Master north. So these are that this escape dealer and controller manager had me not cute. Conflict files has been distributed across all the master notes. So no, let's perform their steps. So first what we have to do. We need to take this and go toe the tahmeena. What we have to do We need to come here and here. We need to run that. Come on. So to do that, it is tipped. And here we're doing a mystic. You should also make sure that your load balance that I peed with the same. So I am having this. I p sweet is same. We need to put it into a variable. After that, we have toe jump over there. And as I discussed earlier, we need to grab the court. I have given this court. You will use this cord and you will all jump up on the same step. Now who? Come here and paste it so verify it. See? Here it has generated that dark cube conflict file. Now move for the generate the Cube conflict file for Q proxy to do that. As I already explained that we will grab this scored and jump into the terminal based here so it will generate that cubicle proxy conflict files to verify it. So he'll we have generated you conflict file CEO, this one. So we have gender to this for Q Proxy. No, let's look into the other step. No, we have to generate it for controller manager. So to do that, we should come over here. Graham, the corn which I have already explained you and go to the terminal. Yeah, fistic. So let's verify it. So see, year it has generated Kucha que controller manager not cube conflict Fine, no, let's look into what is the strip After generating controller manager, we need to look in tow cubes a dealer. So here we're going to perform the same steps which I have already explained you now Goto the terminal based the thing. It is so much off repetitive task so that the reason I'm explaining you so that you will be aware about all those manual list of what are the things required to do all this configuration so that in the third part of the course, we will do all this thing with the help off the tool so we can automate all these steps. No moving for the no, we were looking toe that so we have all religion. Richard, this cubes dealer, not cube conflict file. Now we will go there and generated for admin user toe so that we have to copy this one. Come here and based it. So it has generated so very fight toe before Goto, verify the cubes. A dealer one? Yes, it is also being generated. And here also admin dark you conflict pile has already been generated. Now looking toe the restaurant. Now we have generated the U conflict file for all the components. Now we need to distribute it. So to distribute it, we are going to run this command as I already explained you what we're doing. We're right. You're eating with the four. Look with all the worker north and we are using over here as we are working with the Alexey Container Alexey Container provide a command called Alexey File Push. With the help of that, we will copied it. So the route So we will grab it. Copy it and we will go to the terminal and push it there. No, it has deployed to verify it. What we have to do. I have already mentioned that we need to write Alexey Eggs IQ. And then we have to mention that to verify one Skaters vocal. We'll go one on which command we have to run. We have to run Ellis So CEO, we have for that you proxies or conflict and the work A wonder Que pontificators! Hyphen worker one not cube conflict Nobody read the same process for Master North So we will go there and grab it for master to distribute. Come over here based Drunk the court So now we need to verify it. Really? Find that How do we build very playing? Alexey exact? It is most one. Let's so see you. We have distributed the cube controller Manager Fine on the skin dealer fight. So we have done that. We have told that true is to build the admin Cube country. It is there. We also told that to distribute to Cuba. Controller manager Not you Can Cuba scheduler dot Cube conflict findings Also there. So we have distributed it? No. And which is existing here? So that's it to be here? We have finished our lab. Could you the cube conflict point? So see you in the next session by 27. PART II : LAB MANUAL STEP Generation Of Data Encryption Config and Key: Hello, guys. Welcome to another lab in this lab. We are going to generate the detained Egyptian configuring key. So why we use data encryption? As I already explained you, encryption is used for security and in Cuba, Nate, it supports data, addressed security. So to achieve that, we have to generate the encryption configuration. So how to do that? Let's jump, Scinto that and we will look into that. So now, so far, we have completely until now a step five. We have already generated the lexicon dinner. Then we have deployed a a load balance around it. And then we have also install the client tools for generating the certificates and Cube city. And after that, we have also generated the certificate authority and also generated the realist certificates. Then we also saw that how to generate the cube conflict Fine for all the different components. Now here we will look into that how to gender data encryption, conflict Fight to do that, what we have to do, which would come over here. We were looking toe their steps. So basically it contains two steps we will need to generate the encryption key. And once we will generate with this, we're going to create a variable. And within that we need to run this command and it will give us the base 64 g. And after that was the key is being convicted. Then we need to push it. So what we what it is doing? It is a pending within this configuration file. So So now, once we generate the 64 key, we need toe upend this court and to offend it. What we have to do, we need to run this command to do that, what we have to do the forces. We need to run this command and jumping for the moment. And he'll we need to come over here. Most we need to generate encryption key on the second of steps with what we have to do. We need to come over here, grab it from your basic. So that's it. What we don't We have upended these gold within this Yemen. So that's what we have done. So this is pretty much a straight forward, a step I didn't know. Also, whatever we have performed early, that's it. Guys, this is what I wanted to show you. Decision by 28. PART II : LAB MANUAL STEPS Bootstrap The ETCD Cluster: Hello, guys. Welcome to another lab in this lab. We are going toe work upon bootstrapping offered sit plaster. So why we had using a trick question which I have already been discussed with you. So basically hurts of liveliest owes the configuration data off. Proven it cluster it represent the state off the cluster. What? It means it Basically, it gives the information about the world. Nord exists within the cluster. What part should be running and which notes they're running on on the whole lot off information. So as all the cluster data is stored in our certain, you should always have a backup plan for it are typically is distributed architectures and it consists off key values Tour, which is used for configuration manning and that is also used for service discovery and coordinating with distributed for an exit can be deployed onto the Master north. So let's look into that. What are the steps required to do their deployment jump over here now? So far, we have been in this journey. We have already completed a step one where we have created the lexicon dinner. Then our reports we have deployed the at a proxy load balancer. Then we have installed client tools which content CF SSL for from certificate gen direction Andi Then we have also in store Cube City, Ill. After that, we have for prove isn't the certificate authority and then we have generated the certificate for all the components. These components, we have generated the certificates. After that, we have also seen that how to generate the cube conflict point. And then we have distributed across the cluster for Road Worker north for the master nor husband. Then we have seen that how toe configure the encryption? Because Coogan it supports retired dressed encryption. Now we are coming and looking toe that how will distract the actor cluster This is going to be unmasked throat So let's jump into that. So basically what we have to do we have to perform these fight with steps where we need too long in each Nord and upon this command we have the first grab it we could certainly for different product which we are going to deploy within the master so that the information about the cluster and then afterwards we can extract that once we extract it. Then what we have we have to configure the master north and to do the configuration. What we have to do, we're going to create to directly within this location. And then we have to copy the certificate Authority, Private key, wouldn't it? Private toe these location. Then afterwards, we will map the I p off all the master note. We will perform on each of the master note and then afterward we need to generate this system. The file we're looking toe that this is the system unit file on. We have to perform. These actors are here whenever you are deploying it. One thing you must have toe. Remember you have to come here and do the changes as party or whatever your master notes are. There. You have tow specify those things here. So it is going to be in this port and see you. If you're looking toe that I have a specified the master nor that list I can show you. See you, my master one is 112 go to eight and two for one. If you're looking toe that, then you will find that 11 tau to do it and then for one. So this thing you have to change it. Only these configuration you have touched on that once it is being done, then we need to come here because we have done the changes within the system. The file We need toe real order demon and then we need to enable it. And then we need to start it. And once this is being done, we need to verify this. Let's do this. So first thing, what we have to do, We have toe logging toe each of the north that will go to the terminal. And here what we will do. We will bring this green in threes. And through that cool to be quote no, we can sink this. We can synchronize all depend. So to do that you have to like this. 09 Dress control, Be shift alone and here we need to write and then we need to write Set w seemed good night from friends. Inter No, you will type so it will be synchronized if you want to donate than what we have to do. Control be Sift colon again Toggle to know what we have to do If you're looking toe that then it is telling that We need to log in tow each of the master note. So what we will do? We will log into the master node where no different different paint. So to do that, we have to write Alexey ZIC exit Master one and Bash or Pittis Novia in the first skin were in tow. Master, one can control you next pain here. We need to change the master too Inter Then we talking in tow. Third Master, to do that, it is to do over here three in tow. No, this is being done. We can go toe one and again We need to press control. Be go alone Toggle No, you will write clear So it will happily cable toe. So now we're into Master one Master to Master three. This will save our time. So no next test Airport we have to do we go there and grab the court first. What we have to do? We can no Lord. So to do that you have it arrested in tow. So now we have downloaded it. No next step. We have to perform Extract those downloads. Copy it, Camille and again Christian Enter. So it will extracting those over perspectives over when that is being done. Come again? No, we have toe grab. This will make their directory. Camille must We will clear it. Christie. Game now it has done Created those directly and cooperative to that location. No, Go again after this system. What we have to do We have to configure have extracted it. We have moved it. No, we have to set internal I p So we need to set internal happy. So what we have to do? We need to go there. And we should make sure that removed the synchronization first. Soto that control me Shift Run this again. The year the yellow bar You were thing that sect of losing tonight spent If we will press enter then there is no synchronization because I'm struggling. So now we need to write first We need to grab the So what we have to do. We need to grab the I p and grab the B What we have People use confidence Not until Okay, I can quickly grab it. You can exit it for attending and here we can done that elected list. So the light before master too. First we will set for my own master to control. Go learned here. We need to set internal I p and here it and then we need to set it in tow. No cool to be or no, we have to tell you in tow. Score the 3rd 1 the third on this. This one? No, we have to copy the toe. 112 on here. We need to come to the first plane. So here. So we can go again. To the back. Clear. And here we need to tell that under school. Right Court this video. Now we're good to go. So again we will do the synchronization now to do that work we have to do controlled me You'll be alone. You you didn't need to certain synchronization. No, we will go toe Go there. We have completed this. Now we need toe run This So here again we're setting a variable Is the unique name. What should name? So to do that we're grabbing the host name. If we will run it, I get a different name. Okay, so next step What we have to do? We have to grab the this command and we've been planet. If we're going remarks is helping us over here that we are able to doing nothing from tradition. More so it is a little faster. So long we will come here. So it is done faintly has been done. The next distributive chilling is to come here and run this command. Tom. In them based, intra. That's it. No, what we have to do, we need to Very fine. Very afraid. No, All the steps has been done. No, we need to very afraid so. Two. Very fine. What we have to do to come here and grab this command. And we need to turn. Go to the terminal. Run it. Well, so no, it is being a started seal. So this is what I wanted to demonstrate you in this lamp. Thank you, guys. See, in the next issue by 29. PART II : LAB MANUAL STEPS Bootstrap The Kubernetes Control Plane: hello. Grades will complain of the lab station in this lab station. We're going to put a strap. The Cuban it control plane. So what actually do we can deploy the components off master nodes? So let's look into that. What? We are going toe, as we have seen, have already gone through all these steps. In the last step, we have completed the bootstrapping off the cluster. Now we have to go to strap the Copernican cruel plan. So what thing which will come into that? I have already explained you. No, we are going to configure the a p a. It's over. It's a controller. And to do it on the master, let's look in tow that So what? Are there steps involving toe that so we have toe follow the steps. This is going to be little law because it has these numbers off the steps. We have to follow on that need to be executed on each master node. So again, we're going to use D months and where we can have to break the session. So let's iterate the steps were the steps which we're going to follow. First we were longing into each master note. Then we need to create the configuration Barrick. And once it is being done, then we need toe run this common to download it on. That is being done. We need to extract those beina restraints to all those winery and provide Execute more mention and then we have to also move it, toe the respective location, use the local bill. After that, we need toe configure the B a. So And to do that, we need to provide the internal life be and then we have to do the changes in system D file off MPs over them. We will do with the controller manager as I have already explained you. Now we have done Dave ps over in the last step we have done for it said no, we are going to do with the controller manager. Then we will do it for sued Hewlett So same missteps. We will follow that we will move it to the respective location and we will do some changes within the system defined And then afterwards we can do the same thing for Cooper next Lula . Once it is being done, we need to restart the services as we have done the manipulation within the system we fight and after that we need to verify it. And once all this being done, we need to create the less general and we need to buying their cruel. So this is what we are going to do in this a step. So let's get started. Let's so let's jumps into the terminal now we will go to the terminal will come here. We're going to use control. Be double court now again, Control, be double cork. No, you need to log in. So to do that what? The command we have to follow first control. We sift along and said the synchronization on. So now whatever you write, it will replicate each of the pain once it is being done. No, let's log in to log in what we have to do Exactly it ISS Master mash. I will provide that. No, we can remove the synchronization over here because we need to go into the individual pain and then I specify the number. Do that control with sift. Toggle it again. Now come here one. Then we need to control me double toe of the one strict during go to be cool And again we have to single mine Bean, we still don't know. Press Enter. So now we're into master one mustard mustard Let's go there and looking toe this trip. What is the step? Come here. We have already done than first want Now we need to create the on prick directly. I hope it go back to terminal. Run it once it is being done you have to come here and need toe Grab the wineries to do that. Grab it. We need to run it. No, we can execute it. We just talked it downloading the vine of it. It will take time So I'm pausing the video Once it has been done, I will get back and we really started from here. So now all the downloads has been done. It is no loaded you bps over controller Manager, Could you live and cubes Deal? No, look. Let's looking toe the next disturb Now the next step is installed A coup Bernard wineries do that. You will have this. Come on, carpet. We need to run it to do that to the terminal. Tomio, taste it. Gender More. More for that quickly. It will go with the respective location. Once it is being done, we need to go again. No, do the activity for if we're so so. To do that, you need to run this. So now then we need to go over. Do you live it? Your unders Border known. Looking to the next step for next step we have toe widely internal I p No. We need to grab the internal life each master not to take it and to go to the dominant here . So far, we have been taught 115 No, Here we need to stop the synchronization toe through again. Control be but don't chocolate. So for the first master node, I need to confirm it is 112 And for the 2nd 1 for the third World Do that double again now , looking to the next sister. After that, we need toe Do the changes within the system. The file will grab it and based. So whenever you based you remember that you have to do the changes within hell it's It's over. So you need to change. Provide your master node and provide the I p off your master for it. So So while during the copy paste. If we're doing a trail right now along with me, so do those changes. And then proceed further. This is what I wanted to point you. Grab it? No, to the terminal and based it. So that is done. Looking to the next step. What is the next district that is for controlling Manager. We need to grab this, take the country off oil and move through their respective location. Done on a little trip again. We need to do the changes into this is totally fine. So grab it. There is no changes in this file. You can grab it on directly. Put it so once done. But it now this has been done. Another this trip. Same thing. We will do it for you. Look, I need to go with the respective location. Next. Moved, Instituted. Got human. Fine. That is some changes we have to do. We need to offend it. Camille, having done quantity is being done. Then we need to do the changes into the system. The fight you don't. So there is no changes for the respective over. It is going to with the same, so you can radically copy it and paste it once it is being done now, looking to the next step. So far we have done it for the peace over Controller, manager and said, you know, we have toe start the controller services. So we have done all this thing. You know we can grab it and executed. Grab a Hold this. Andi, Come here, Andranik. It is being done. Do that next. Just tip. We need to do the verification. Once it is being done, we have to verify it. And we will verify With with this command, we will come over here, go to the terminal and based it. So it is ready. No, it is healthy and ready. So that is good. No, next to step. We have to come on. Will you? And enable the are back rollback access control. And to do that, we have to create the cluster role. And to do that copy it. Come over here and based it. You can do it from any of the note which is being done. No, again. Go back. And now we need to bind it. Do it. Should come over here and again faced it so that so. That's it. Guys, this is what I wanted to show you in decision to in the next session by 30. PART II : LAB MANUAL STEPS Bootstrap Worker Nodes: Hello, guys. Welcome to another lab. In this love, we are goingto go to strap Cooper networker nor configurations. So we are going to configure it all the required components off Cooper Network a note. So we were looking toe water. Those component which I have already explained you were looking toe those companies. So the competent which we're going to configure it as Cuba que proxy and container the container Strong time. So let's look into the steps of water the steps we're going to follow. So so far in this journey, we have gone through all these steps where we have configured Alexey Container. And then we have deployed the load balance around to it. Then we have also installed playing toe the lentils we have. You see if SSL and then we have installed cubes et al plane toe. Then we have provident certificate authority and then we have generated certificate for each components. After that, we have ah creado you con trick point. Then we have ah also done the configuration for detained corruption retired, dressed. Then we have or deployed the exit question on the Master north where we have to strip the entire process and then are perverts. We have also done the configuration for Master North. Whatever the components which I have already explained you to these component master nor component A p a a certain controllers to do that. We have already been configured with the master node. No, you're doing the same thing for these component off work. In order here, the process we're going to follow. So these are there steps we're going to follow The steps are we have to first install the dependency. Then we have to install the wineries. Whatever the binder is used for you pretty well. Que bleidt que proxy continuity. So all those buying it is we have to install and then afterwards, once it has been downloaded, we need toe create those directories. Once direct regulation has been done, then we need to configure that we need to move to the respective directorates after that. Once it is being done, then we have to configure the networking. Why it is required because the part will communicate with each other. This a step will create that thing. Once it is being done, we need to define the cider for that. Outsiders were going to be like this. Always maintained the same kind of configuration. If you see that it is belonging toe end or $200. 00 This is wanting door $200 one's It'll Ben not wounded or two towards zero. It is very much important. You have tow contained the same or that where you need to provide that Welcome note. 1st 1 is zero second one is 1/3 oneness toe. And if you have more than that, then you can follow the same order after that, Once it is being done, what do you need to do? You need to breathe the network configuration. To do so, you have toe manipulator configuration that 10 bridge conference and bring this thing once it is being done, then you have to configure the look back network configuration file. So look back configuration file exist in this location. So we need toe do the manipulation on that Manipulation has been done. Then we can consider the country never in time. So to do that again, some configuration needs to be applied to do so. We need to create the falling directory structure. Once it is being done. Then we have to configure like this so that there directly should contain this door to Mel file on which contained these configurations so that the worker nor will communicate with each other so it will provide the runtime for worker north. Once it is being done, we will move further and do the system reconfiguration changes. To do that, we need to configure with these configurations. Once we can figure system re container on time, we will move further and do it for Cuba. Led to do so, we have to follow these airstrip where we need to do the manipulation within this configuration file where we will create this configuration and apply it. And then we need to do the changes or create a system defile for Cuba. Once is being done, then we will move further and we will do the configuration for when it trucks is what are all these thing which I have already explained ng the initial video. You can refer it if you have any doubt. What are the rules and the responsibility off each components of woken? Or you can go there and you can listen it. So once it is done, then we have to follow these steps to configure it, we need toe the Q conflict file. So this location that is being done we need to create these configuration on this while you proxy happen. Conflict, dirty animal file. Once we done the changes within the these configuration file. Then again, we need to do changes or create the thing in the system. If I love you, Proxy, once it is all being done, we will move for the into the next step. We come here and you start the service. It's as we have done the changes within the system, the fight. So once it is being done, we're good to go for the So let's jump into the configuration toe. Do you think we need to grab it? Copy and go to the terminal here? Nominal. This is a team accession where I have treatment and that is being synchronized. Now we will logging in tow. Each of the workmen note because we need to perform this exercise in all the woken or produce. Oh, you great Alexi. Exact and name of the weapon one might guess. Yet, as worker one, it is synchronized mint. We are not going to use it as a single night and we need to write Bash Now I can remove the synchronization toe. Do that control Be swift and toggle. Once it has been done, we can come here one then control B o whenever get toe the serpent. And here we need toe Ancient worker too. Then control Be again. Oh come here three. Then we can go there control me And now again we can synchronize it and told me. Safety toggle No, He logged into Gators worker one worker too and work a treat. Now we will follow their steps to follow their steps. We will copy it. Go to the terminal Basic. It is downloading the information. Whatever we have provided, it looked like it will take time. So imposing the video Once it completes, I will get back. No, it is being installed now we will move for the and we will download the wineries. It will come here. We could have the court goto the dominant PS two and in no move for the once. All the download has been completed. We will move to the next step. The next step We're going toe Greet the installation directories grab it on and jump to the terminal tronic. Look that all these bind it is has been downloaded. So now the next step is come here. We should install these wineries would have it pieced it on it. What is executing it? We have to wait for it. So done. Now this is important. So we need to go to the individual worker Nord and defined this variable and make sure that you should followed the same way. Where? After 200 the forced worker north should have zero. The 2nd 1 should have one and the 3rd 1 should have to. And if we're configuring more than that, then followed the sequence. So grab the 1st 1 Better grab till here. Jump to the terminal. Clear! Know we need to peace to you Andi Toe captured individually. Please, Teoh, this is fine. I need to remove the synchronization. To remove this inclination, we need to press control. B Colon Duggal. Once done. Move it. Come here. Here, We need toe one, then another one. No, it has been done. Now again, Concolor being dog intel, You can look that or it's like, uh, perfect. So now we will move for the on. Do the steps. We need to grab this one and run it. This is done. No one that is being done. We need toe. Do the configuration for Luke. Back Network. Gravitt, go there, please. The district is applied now look back! Network has done no continually configuration. Come here. Create the directory photo. Yeah, No more than done. We need to configure it. We need to create this one this nor to mull file. Do today. Best in tow. Well done. No more. Further come. Yah! Closet! This is ring done. No, we need toe created the system refile toe. So that compete, we'll put the dominant and pasted these air Pretty much important steps we have to follow. And once we designed the automation script than all this will happen automatically. When this is being done, we have configured the continually Now for Cuba, for Cuban it we need toe, follow the steps, get it done for that is window on conflict file we need to create. I hope it does. Being dumb. No, that's a study file. No, we have to clear the system we fight. That is going to be in this location. Grab it. Details about the component. I have explaining one off the video. You can go in tow. That video you will come to know that. What is the significance off all these components that has been done? No being done. No crab. The Kuban it proxy to do that. Have it going here. You get it? We'll run it once this has been done. Next. Tester, we need toe career This configuration file at this location. Que proxy conflict over Yemen. Grab it. Yes, but this configuration has also been done no further. It has all amount off configuration. Now we need toe do the manipulation or creation off the study. File off. Gil Proxy. You could have it. Yeah, I raised it. So we have done still here. Well, this is being done. We need toe. What do you start the service? Well, that Mia nicked. So it is being done? No. We will verify it To do the verification. We have toe follow this the steps, So let's verify it. Toe. Do the verification. We need to exit from here. So we will exit from here on what we will do. We can do the configuration through interest from the host machine. We need to copy admin dark. You conflict file into the host machine. And from here we can easily use cubes. It'll command to interact with worker note. So let's do it first and then we will verify it. So to do that, we have toe followed o other step. So to do that we have toe come here and follow this step Number 10 Come here. We need to create a directory. This directory dot Cube directory into the coast machine to disable the synchronisation over here. So now we can create that map Kenia noticed critically. It is already exist. So toe delete that Remove it. No, we will create it. Don't kill. So the rectory has been created now and then awarded the next step. We should follow this a step We need to run this command to do so. It will pull the not conflict file from one off the Master Lord. So to do that we need to run this command. It is done. No, we can check. So we got the conflict file. Now it is done. No next. What we have to do to come here? We can open this conflict file and map this over. So photo that come here, grab it. No! No! So here, to the suffering. The silver. We need to provide the load. Balancer. So what is the load balancer off? Ours is You need to provide the load balancer address over here to do so. It is gendered 115.5044 That is for my kids. See? Yes. Then it is done. And next What we have to do? We have to do the verification. No, let's do the verification. We will run the common on the commander's. This one cube retail wasn't minus minus short. Run it Perfect. So we have in start. Wasn't 1.1 to the next round? Another cover coast clear IPT Wow! Run it cubes retail class Children for So that is another common. You run it now. See you. The pleasure is running. You know this sport and this is our lord balance around us. Perfect. Now more, further, No more further, And see the command water test cubes. It'll get notes to do that should come here running perfect. So now we have configured the Cuban net flusher where we have master notes on the worker north three monster, no tree worker nodes. And that is handled by a load balancer. So we have set up this infrastructure with manual steps. Now, in the third part, off the course, we will do the configuration with the help of automation tool and stable. So that's what I wanted to show in this part too. And in this session, so see in the next session and see in the next part till then. Bye bye. Take care. 31. PART III : OVERVIEW Step By Step Automation With Ansible: hello. Guys will come toe the another part off this course in this part. We're going to look into the automation step for setting of the Kuban it infrastructure with 10 civil on bare metal machines. So let's understand that what we're going to do in the schools in this part of the courts were going toe design. All the auto mission is script for all the manual steps, which we have done in part, if you remember the part, we have gone through all these steps manually. So in this section we're going to design the and civil playbook toe, deploy the Kuban it infrastructure on bare metal machine. So let's look into it in detail that what we are going to do. So in the 1st 2 step, we are going to create the Alexey Containers where we deploy the coup Burnett, and you will be really glad that you have already completed the step one. If you remember that, if you have coming through all their steps from the part one off the school, you have done a project in the part one off this course where we have created the Alexey Container on this given architecture So this architecture which we have created in the first part of the court as a project. So we're going to leverage that playbook and we will generate the A step one. So if you're falling with me, then it's really good. If you haven't followed me, then you can go back toe that Listen off the part one project part looking toe that video. You will get all those details how to create the Alexey Container. So in this part of the scores were going toe Start with a step too. So let's look into that from a steptoe. What we will do in their steptoe if you remember that we have done the Manuel configuration off at a proxy load Balancer. So what we did we have gone through the steps where we have done some changes within the configuration file off ezchip proxy. So all these steps we are going to do with and several I will walk you through how we will do that so that you will understand that how all these configuration changes within the file, we will do with the help of answerable. Once we will configure the Lord balance and then we will move it toe installing the client will if you remember that we have done the installation those client toe cfs Cecil and keep city. And so we will do this activity with help off. Answer with 13 will through these activity. Step three ones. We perform the Step three activity. We will move it to the airstrip for where to remember that we have general kind authority certificate And then we have generated all those or certificate which is required for the components. So we have gone through all these steps of Lear manually in this part of the court. What we're going to do, we're going to generate all these certificates along with the certificate authority with help offense Ebola Skip, I will walk you through all those steps. How to do that? How to design the playbook. So in a step by step manner so that you will become for table when you are doing the rial project. Once we generated the certificate, we will move for the and we will perform the Step five What we did in the last part of the course, we have generated the kubernetes configuration that this cube conflict file and where we have generated all these coupon figuration for Q proxy, singular control manager and red meat and where we have perform all these activities manually and where we have generated the cube configuration for all these components. And then we have distributed those conflagration here in this part of the courts were going toe design the and several playbook and where we will perform their Step five activities once we will perform the step five. Then we will move further and looking toe their Step six in their Step six. What we did, we have generated the data encryption and conflict key. So it was a smaller step, but that the stuff we are also going to perform with the unstable a script. I will show you how to do that and I step by step manner so that you become comfortable after that. Once it is being done, then we will move further on do the configuration for certain cluster. You remember that we have done the exit cluster configuration manually and where we have gone through all those over one way one that was a really dread Gary task and where we have very much boring task where we have gone to eat so and followed all these steps and configure the orchard question. So here what we're going to do, we're going to perform all these activity but with the help of sensible. So here we were designed the label where all these activity will happen with the help off automation. So once we will do the set up off, it's a closure. We will move for the andare looking toe the steps to configure proven it is control plane to hear what we have done If you remember that we have gone through all the master north and where we have perform all these activities. So these activities very much boarding as we need toe Goto eats over where we have taken the help off the marks where we have created three pains and we perform those synchronization activity and we have performed these activity. But even though TV and tea marks helpless in that what again we need to write all those manual thing aan den copying and pasting in this part of the court were going toe for all these activity with help off and several playbook that I will show you how to design it Now , once we have done this thing, we will move for the on looking toe. A Step nine in the Step nine. What we have done, we have configured the Cooper Network a note where we have performed all these activities on woken note and it was one of the longest ones where we have perform all these activities on the individual worker notes. That was also quite boodle to make it interesting. With what we will do, we will auto make this a step as well on DWI will make it more interesting once it is being done. We have performed the Step nine and they stepped on in the single a step in the manual configuration. So this is what I wanted to show you in this over musician so that you will be aware that what we're going to do in this part of the course that's it, guys, in the next session by 32. PART III : LAB AUTOMATE STEPS HAProxy Loadbalancer: Hello, guys. Welcome to another lab session in this love, what we're going to do, we're going toe or toe may toe at a proxy load balance and installation and configuration of steps. So if you remember that we have done all these steps, Man will in the part two off this course. So now we know that what are the things required to do? The configuration to set of the Etch A proxy. So let's jumps into the terminal and do that here. I have already set of the Alexey Containers to set up the road balance. And I wanted to demonstrate you that here, if you type Alexey list, then we have this container details. So we have a load balancer. Where whose name is gators load balancer? Three masters and three worker note on which has these I p address and I have also set up a folder courts step by step. Cooper nets automation with sensible. So And this is what we are going to do. I wanted to show you we don't have anything set up yet, so we will create it from the scratch. We will also take some off the copy paste operation because I have the script which I have written, which is very long a script to save the time I'm going toe used that copy paste operation. I have only provided those things into your resource section. If you want to follow along with me, you can follow along with me and do the same copy paste with me and I will explain each of steps worked out their steps. I'm doing there why we're doing this script. I will explain those steps so that you know the significance off that line which is existing within the court. So let's jumps in tow. That was what we will do. We will create the most trial. Whose door training. So to do that, what we will do, we will take a nano hosts. Thought are you know No. I'm going to grab some cold and placed it over here, which I have already configured for this unspecific lap. You will also do the same changes as but your Alexis set up and provide the details about your lord balance and master nodes and the worker notes. So the cordis, this one to hear what we're doing. We're defining the valuables on here where we're creating the host valuables. If you remember that I have already taught you how to create the host. Ready? Well, so to do that, what we have done, we have created the load. Balancer here were telling that the fight own interpreter is by country as and civilised by toning waistcoat which I have already explained you. And after that, here we are creating a load. Balancer variable! Where were they specifying our lord balance? The retail Diaby address of that, then the master note. And we're I have also kept a valuable called all north which contains the detail about masters and awoken rich together because in some of the activities, we're going to perform on every note, whether it's master node or work or not. So we need to group it into a variable. How this is done, save it now. In the next step, we will create a mammal file for this is trip. To do that, we will write Nano Steptoe what we're going to create Go figure at contribute Lord balance the old bad go German. This playbook contained rules, so I will mention it. We will mention it in the C Amel on later we will create that role. So to do that again, I'm going to grab the court and placed it here. Then I will walk you through the court. Is the court so basically what we're doing? That we are going toe perform this activity on Lord balance? That which we have defined in the host daughter in a fun. And we're telling that that's operation is going to be the pseudo operation. That means it should have admitted privilege and what we're doing, we're going to create a rule. Corden stolen data school Etch a proxy. So it is pretty much very straightforward. Jahmal fight. So let's jumping to the next step. So once it is being done, save it and exit no, next to step we have to create rules to do that. What we will do, we will create a folder. So m que dia and the folder is going to be the rules. And what is the name of that Roxy Stone into school at a proxy? And after that, we're going to create dust as this is a standard, A structure which I have already explained in the part one off the course where I have brought you about the Enseval we're creating folder forced. So we need to mention iPhone be entered. This will create this part if it'll not existing now we will go in tow That and we will create a file called Main Door to Yemen as it is an extender. The structure, I mean, don't Yemen, Once it is being done now again here I will grab the court to save the time. And I will let you know about the court. What the court is doing now is the court. So it is also very much simple, Yaman. Fine, what it is doing here? We're performing Trita. So the name of the task is installed. The latest words in off Etch a proxy. And then we're configuring the configuration which we did manually in the part two of the video. Here we are, accessing those blocks off this Etch a proxy Dorsey of G. And there we are, adding this block this block off the court will go and inserted into the vial. I will let you know how it get that I will show you also First off, all I wanted to show you it is not existing there. Prior to running this court, I will show you it is not existing. There was to understand that what it is doing after insertion because we have done these changes. We need toe really start the services. So I was told the strip is we hear we're restarting those services where were telling that Lord or a moan And then we are enabling it. And the name of the service which were enabling is the Etch A proxy and forced to step ins . We are installing it. So it is pretty much straightforward. Whatever we have done earlier in the manual, a step where we have installed the tip proxy where we have configured the it's a proxy conflict. And here after that we have restarted that That's a proxy services. So we're performing the same activity in the form of three task. That's it. Save it. Collect. Yes, Clear it. So now, prior to running the script, what I wanted to show you, I will show you that the configuration file there is no entry. So to look into that how to do that? We need to first let's down the Alexa list and grab the load balance R i p. And to do that, we need toe boots as the such connection. Who at the i p we will log in tow that now we're into the Lord balance and toe check the configuration file so that there is no configuration exist yet to do that, what we will do, we will look into that cat. It doesn't say the D. C at a proxy and then a proxy country gration. If you look into that, then you will find that there is no entry off. Those details will open in one of the editors so that you will I feel so now we're into Nana edited. So here you see that there is no entry after execution off rescript which we have created with the help of principle that will put the court that block off court over here. So let's jump into that and run the court exit. Yeah, but prior to that, we need to define some of the group variable that is that the global where people so that we will use it within the script as you have noticed that while explaining you, if you're going toe that the file It contains the variables which we need to define so well , that So here we are using a variable kit. Just load, balance underscore I beat. So this is a group variable which we need to define it. So let me defined that. And then we will execute it to define that we need toe could He ate groupware folded to do that of u N m que dia bats. Now we need to define filed with the name all within that group. That's that. And here we will define those ready with me. Grab it. Based it to you. I have given the file. You can use that fight and do the changes as put your Alexey container configuration. So you must be having different I p for your lord balances. So you need to come over here and do those changes. And so we're going to use. We have created a study like this where we have defined the master's work load balance. R I p Master Saipi worker North saipi exit from here? Yes, we want to save it. So now done. No next step. We will run it. Let's run it. How do I told you you should write and civil type of. Wait. That's not course. We have the detail over here. And then the step. Those are the warnings. United checking the facts. No, it isn't strolling. The latest wasn't offorty proxy given some morning to know it has country good that No, it is done. So let's verify that how it has done so clear now we will jump again. So the Lord balances Do that assess it gated. So that's a search. A route that grab this, Mr Thiel. Now we need to go there. We need to goto Nano that your proxy a proxy country. So you could come here. Then you will find that that code has been upended over here, which we have specified. So if you remember, if you go from here now, we have verified that this court has been exit over here so we can exit from here. Is it from the Lord violence? We can go there. We can look into the detail. Oh, no. Will go to the roles installed. Proxy task. I mean, no Tiemann. So here we have mentioned that Go and sit there. And here we have a specified the Lord balance that I p so that the reason it is existing So now we have conflicted. Second step in the second step, what we have done, we have configured their chip proxy. So here we have done the Etch a proxy Lord balance a configuration. So this is what I wanted to show you in this left to you in the next now? Well, why? 33. PART III : LAB AUTOMATE STEPS Install Client Tool: locates. Welcome to another lab in this lab. We are going to automate the installation off plane tools. So I will walk you through that what we are going to do in this lab as you remember that we have configured or installed client tools when we're doing the manual deployment where we have told to client oneness certificate generation, see if necessary and another oneness for the Cube City. So what we're going to do, we're going to force install the Cube City in and then we will and started to see if it's a self. So in this lab, we're going toe just install Ube City, Ill. And in the next left we're going to do the installation for CFS itself and the creation auto certificates and the certificate authority in the next system. So I have loved this install cfs Cecil on this generation off the list certificate in the next system. So in this left, we're going to install only the Cube city it So let's jumps into the lab. So, so far, how our directory structure will look like it's looking toe that so if we look like a tree , you can install three tools will give you the directory. A structure in the Phoenix time, step by step. So so far, if you look in tow that we have created this file Steptoe load balance about Yemen. And then in the rules we have created install proxy in the last section and where we have defined the cast Now our next step would be We will create another step. No toe talked Yemen. So I will grab the code again and there will explain you Good. ABT it. So here what? We're telling that we're going toe perform this task on local host. That means local host me where and civilised installed. So now what? We're telling that we are going toe run this tasks name is whose name is install underscore plank in the school tools. So we will create this rule now. So we have mentioned it. No controlling? Yes. No, This is being done now we need to create that rule. And to do that we will grab it again. Crab You should make sure that the name of this and the name of the rules older will be the same. Grab it cool next. No, we need to create there directly. And to do that, it should go in tow rules. In the name of this, I think it should be seen. Once it is being done, we need to provide the past and make sure that you provide minus B. It will create within the part if the park is not exist. No, this is being done. And within that part, I'm going to create a file quarter. Nando, that this court mean not Yemen. This will contender Nasty, too. So again, I will grab the court and I will explain you. You do can grab the court from the resource section. I have provided that court and so that you can follow along with me. But if you want to tape it, you can take a hit taping that the reason I'm grabbing. So I have grabbed it based it. So here what we are doing, we are creating a tasked with the name download and install Cube City. So basically it will be downloaded from here. This is the variable which we have defined in tow. The Gruber's I can show, you know so And after that here I'm telling that value did underscore sorts equal to know, as I haven't configured. Those are SSL certificate for this particular migrant machine. So I'm telling that No, I don't want Toto. Use that certificate. You can go ahead and download it toe. Then it is going to be once it is being downloaded. Then I'm telling that it should install at this location and where I have providing this privilege. So once this is being done, we will. Come on. This is pretty much a small task. Yes, we want to save it. So now we will drown it. Pull that what we have to do No running. So you know how to run a Super Dave book. And here we need to export to fight a country which we have created for this project on. And we need to specify the playbook. We're going toe step three. So this time we're going toe run the step three, which we have created Now we will run it running. No. Yeah. So one thing this is and simple is that important. And whenever if it is not installing or anything which you have already done so it will give you the green as I have already executed this a script while creating this left so that the reason it is showing me green for But for your case it will give you yellow and market as a changed so we can verify it. You can also ready for it which you CTL So it will tell that which we have downloaded and pull that you go there and city. So now we have installed the Ube city and two. So this is what I wanted to show you in this lab. Next lap we will do the installation off CF SSL and we will also generate the certificate authority along with the certificates. Four different different components. Okay, Thanks for joining decision. But why? 34. PART III : LAB AUTOMATE STEPS Provisioning CA Certificate and Generate TLS: Hello guys. Welcome to another lab. In this love we are going to install and configure the certificates with the help of CFS is a little so let's jump into the discussion first we were looking toe that what we are going toe As in the last lab, we have done the installation of Cube City in this lab. We are going to install the CFS Cecil with the help of offensive. So the manual steps we have gone through all these steps manually where we have in store the CF SSL manually. Now in this what we are going to do, we are going to create the and stable playbook to do this thing Once the CFS SL tool has been installed, then we will go into the provisioning off the certificate authority and where we're going toe perform all these steps which I want her to demonstrate that So here we are going toe create all these a script where we're going to use this template and we will generate the certificate And once it is being generated, then it will create all these certificate for the component as kubernetes component required certificates, toe talk with each other So these certificates we need to generated and here we are, generating it with the CIA for Cecil. Basically, you can generate the certificate with another methodological PK, which is explained in the Kuban outside. But here in this lab, we have you see a persistent certificate. So here first, we will generate admin clients or two quicker than you. Blake, Controller, Manager, you proxy circular client. Kubernetes a be a certificate. So physical. Keep it. And then in the other lab, this part distribution I have taken it into other lab where we can create our playbook to distribute it in North's. So let's jumped into the lab and looking toe their steps. What are the steps to do this? Jump into the lab? Let's look into the structure where the structure we have No what we have designed. So that so so far we have designed yes. So we have completed a step to where we have configured the load balancing. And then we have installed it plain toe cube, city it and where we have created two rules one for plain tools and one for install it a proxy. And then here you can get that I in a file. And we have ah, global variable grew variable which contains all those variable which is used within this playbook. No, we are going to perform a step for where we are provisioning those certificate. So to do that, let's jump into that. But now we need to write no ancient Greek So crickets don't No, I will grab the court and I will explain it. I have grabbed the court So this is again going to be executed on local host on the Times which we're going to perform is described within this so need to create this tier list. Sir, Generations who grabbed the name as this name must be the same whichever the folder which we're going to create within the past. So grab it. Control X Yes. No. We will create the folder restructure toe Do that m k d a. R. And the name is goingto be within rules. The name is delis, sore generation and within that us whiteness be If the party is not exist, it will create it for you. Inter. No, we re create the task. No, no here mean not Yemen. And to know here again I will grab some cold and I will explain you. So I have grabbed the court. This court is going toe will it along? I will explain you all the blocks whatever the blocks used within this task. And I will walk you through each of their steps What it is going on in this part of the course. So if you look into that, then you will find that it is contained So much number off course. But don't whatever this I will explain you one way One so basically what it is telling that if you remember that we have done manual installation where we have in store two pools cfs Isett to your facility isn't so here we are telling that goto this you are so I'm not using any certificate for border or downloading because I haven't configured for this over once it is being downloaded. Then what will this model will go? It will install it it at this location. Same for the cfs the soldiers into once it is being done. What we're telling you we are going toe do the configuration for certificate authority. So in the same lab, I will show you to set up this year. Conflict Georgeson While doing the manual, The steps, we have performed some activity. Let's look into that. I will show you. So what we have done. We have used this template for generation off certificate authority, key private key and certificate authority PM pile. So to do that year, we are using off file which we have already created. I will show you. I will show you how to create it again. Some copy paste operation. We will do as it has so much, of course. And then after what we're telling that crab this file and put it into at this location, we are telling that now grab this file again. The reputation off the court if you look into the both or copy mortal using where were grabbing the this Jason and then we're telling that keep this file into this location and then afterwards I have created a variable daiquiri underscored the area where really are actually creating or directory. So that this file, whatever the certificate we will generate, that will existed at this location so that the reason I'm creating this once it is being done, then here we are running the common. If you remember in the Manuela Steps we have done the same. If you remember that, what we have done, we have generated it with this. Come on, we're looking toe that cfs insurgent. But we have done manually with this court block. And here answerable will do it for us. Now we have generated it. And again, once it is being generated, it is going to be restored at this location which I have provided here. Same with admin. North Sea Esa. It will be generated. This Jason will be kept from the files. Have Captain toe the rules for that which we are going to create. Now I will show you. And then afterwards again, we are going to generate those certificate and that will be residing in tow. The picky idea. Once it is being done, then we will move for the Here we are using the certificate authority and generating the Edmund client certificate. If you remember, we have generated these steps to hear what we have done. No, we're starting generating down certificates with the help of the certificate authority. So that the reason we are executing here what we will be done earlier we have around this? Come on. With this court block, no sensible will run it for us to hear. We are passing this command, if you will, closely looking toe that you will find that we are executing the same comer. And we're telling that you should grass CSR on that signing request from this location. Once it has been done for admin than the same thing you are doing for Q proxy. And after that you are doing for cubes. You dealer the same thing. It is reputation off the court, nothing more than that. And where we are telling that you took gender The certificate for CUC's Your dealer once cubes a dealer well done, then kubernetes certificate. So here we are using we need to generated for different were colonels. So here we have used cube lit iPhone templates, nor, ditto which I will show you. I have created a template which contains If you look into the court, then you will find that the complication off this court is the thing. Waas. It was a little tough regenerate certificate for kubernetes MPs over as we have very much dynamic values. If you're looking toe that we are generating the certificate certificate for the claim. So here, if you look in tow that then you will find that it will be generated for all the worker north and in the manual step we have run this world block and which generated for us. But in sensible how we did who they hope we did, we have created a template that is ginger template. And then we have I directed it all this name with this variable which we have defined in group that. So if you're looking toe that, then you will find that after completion off this exercise, it will generate the certificate and put it into the PKK. Underscored the area location which I have a finding group under the score vats toe. Once it is being done, then we need to create. So it's account client certificate. As you remembered, there are so many components exist within the Cuban IT infrastructure, So we need to generate the certificate for each of the component so that they know their context. They're aware about each other with the help of certificates. Only once that has been done. Now we have seen that we're going to use Jason file and the template file. It has been done. Now, next to step is what we have seen here. We have seen that there is some Jason file. We have used some template files we have used. We are going to configure it within the rules folder. So let's jumps in tow that, and configure the templates and the files within the rules for the for this particular task . So exit from here? Yes. We want to save it once it has been done. No, Next to step, we have to create or directly m Claudia pulls right within the lesser generation. And here we need to different files which contains the Jason file. So we need to define this part first once it is being done. No, we need to grab some. Jason are We will create those. Jason was street here. So to do that do that we will create nano rewards. Do you lister clients? And here we're going toe to a year a year from conflict Dorji saw. No, they need to grant the cordon. No, Christian. This is the template which we use in the last part of the course. I have actually given the description about where you can find the good blawg and from where you can look into that block which contains very detailed information about all these steps. After completion of this course you will look into those blocked. So yes, we want to save it. No one of the point Nano, You start on just one. This is for signing the question however the court is to So it's no again Could you Do you see yourself so difficult or 13 Christian to court? So they were no one with the fight to go que But I don t then the cook no basic Save it Yes No, not the one we have created for Q controller manager Now we have to create it for que proxy to do that Fuel proxy, right, Mencius? Huh? Miss remembers after that I need to get to have the court and based it over here. See you. No, you did for Sadulayev. But have the court No. Yes, No. We have denoted with cubes and you don't know We need to generate it for a year. So no one noticed for that new formula Governments say it's hot. Grab the court crystal Yes. No need to do it for So Hisako don't do that. So this cold, the court? I haven't missed it. No ST this. So so far, we have generated the Jason file now looking toe the structure How it looked like so. Three The rules. Inter. So so far we have generated these Jason with window find six. You know, Templar generations, we will create the template. So how to do that? We need to most clear it, and then we will create the template for so to do that what we will do we come here. Um, que dia and we come here. We need to tell templates. The spot need to be cuter. Now we need to create the templates, the templates which we have used a Q blitz certificate generation. Now, to do that, we need toe right. Go back. We come here and mention No, no robes. The name of the file. We should keep que pull it my point, Imperador. Tito, make sure that you should keep this file them, as we have used within the Does it mean dough? Tiemann? No, it is being done. So we need to grab the cordon. Put it over here. I grabbed the court and now I put it over here. Yes, they were this. No. It is being saved now, looking toe the structure How it looked like Lourdes. So now we have created the templates as well earned with this point as well. So all those Contra gration which required to run this label we have done Now what we will do, we will run this playbook and look into the certificates whatever the certificates it will create after running the playbook. But frankly, that I wanted to show you back. What trick content. So so far, what we have done. If we look in tow that so so far we have created the group that was D'Artagnan. I rules. And then we have created the step to configure load balancer. Then we have created Step three. Install client told and then a step four. We are doing it right now where we're generating the certificates. So let's try under step forward doing it. So to run it. What? We have to write and symbol open playbook minus. I bought in mentally and then when we were you, we have commuted over here that most Dorte knee. And then we need to specify the playbook which we have created for the step forward. To do that No, we need to execute it. So this is all happening within the locals that the reason it is telling about the local host now it is Don't load it the tool. So it is being done. Now if you look into the full of the structure, then you will find that yet it has created a folder called Vagrant, which we have a specified where I will tell you so Here, if you're goingto no group where on If you remember that we have used a variable Korpi Kia underscore d a. R into the task and that contains this location. That means from wherever I am running the playbook, you should create Holder called factoring Now what it did, it did the same. So it has created a fuller called Bagram that the reason we're getting it now let's look into those certificates which it has created, so to look into that vagrant, so it created these number of certificates. If you remember that we have created all these things in the manual steps as well. So Now we are generating it with the help off and stable. So this is what I wanted to demonstrate you in this lab to see you in the next left by 35. PART III : LAB AUTOMATE STEPS Generating Kubernetes Configration: Hello, guys. Welcome to another lab in this love. We are going to automate Cube conflict generation. So what we will do? Let's look into that. When we were performing Manuela steps, we have gone through various steps to configure Cube conflict, so let's look into that. So basically, we're going to generate the Q conflict file for Q Proxies Cube, Soudelor control manager and admin. And to do that, we have to follow these steps where we need to perform these activities, which we have done earlier in the manual steps. But here, what we will do, we will design a playbook or we will create a playbook which will generate the cube configuration for us. So let's jumps into the Domina and perform this activity. So, so far, what we have done, let's look into that To do that, we will look into that what we have done so so far we have been rated these files. So we have configured Lord balances. We have installed client tools and we have also generated those certificates where we have generated these number of certificates. And now what we have to go and out of that we have created total number off 11 directories and it contains 48 files. So now our project is getting bigger. So let's look in tow the Step five and generate the cube conflict toe dough that clear are now bird generation process. To do that, what we need to do first, we need to create no Step five Generate Cube trick door Yemen. I need to grab the court. I have grabbed the court. Let's look into that. So what we're going to do here? We are actually creating this rule, and we're performing some task and where we're performing were performing on local host. So let's create this generate cube conflict Dusk in the rules. So to do that, we should grab the name as our for the name should be the same. So we should keep it control axis. And now we need toe create that folder structure toe so that I'm clear area within rules. We should create the same name. And here we need to tell that we want to get here to us earned here we need toe. Specify the I found being so that it will kill you. No in tow generated the folder restrictive for us no go meal turn here. We need to a specify main dot Yemen it should be No, we're using Nano editor now. Within that again, I will grab some court and I will explain you here. Okay, grab it. Just based. No, we were looking toe that work. Actually, it is doing so basically if it is again a repetition of the court. So basically what we're telling you we have created a variable called Contact de area and we're creating a cube conflict directory so that we can keep this corn cube conflict file. And now all these are reputation off the court which is being suggested by Cuban. It it's by Google. If you goingto that detail you will find in tow the site that will comes very handy when you over. You're designing your Copernic cluster in the production environment. This is one of the suggestion which I wanted to give you whenever you are not able to understand anything. So where you can look in tow that so it is really good news. Source off information. Okay, now moving into that. So what Actually we are doing over here We are generating the cube conflict for Edmund. So where we are running a cube city a tool. We're using a cube futile tool and we are providing some of the perimeter. And then we are passing. Those certificates were goingto be associated with this component. So if you look into that, then after the execution off all this, it will generate the Cube Country file, which contains the detail and the reference about all these certificates within the Cuban. A different restaurant. We will use this coupon frequent. After that, what we're doing, we're creating the Cube conflict fight for Cuba late earlier we have created for admin. Now here we are creating for Cuban it again the Cube city a tool. We're using it. And here we are, defining all those perimeter which is required for cube configuration file. And here we are, idea, rating it for all the worker north. So that whatever the vocal Nord, which we are having within the environment, I will show you if you put type Alexey list, then you will find the name off those container which you have created. You should specify the worker not over here because you Bill, it is going to sit within the worker north. So once it has been done, we have to generate the cube conflict file for you Proxy the same same repetition off the court where we're mapping the private key lost your name and the context we are specifying over here. So once it has been done, we are doing it for Cube Controller Cube, Controller, manager. And once it is being done for cube controller manager, it should be then for QC dealer. Once all this thing will be done, then it will generate off order with all those cube conflict information. So now let's jump in. Tow the execution off this playbook. Save it. Yes. Now executed to do the execution, what we have to do and stable my foot player book, sighing posts. And here's a step by We need to experts for your stuff. I've now run it. It started executing it It Can you treat a directory called Cube conflict? I will show you So it has created. Now if you Cleo Ellis So you will find that it has created a que conflict folder? No. If you're looking toe that, then you will find that these number of Cuba conflict has been generated. So this is what I wanted to show you in this lab in the next session. Bubbly 36. PART III : LAB AUTOMATE STEPS Generating the Data Encryption Config and Key: Hello, guys. Welcome to another lab in this lab. We are going to automate the data encryption configuration for Cuban it as Kuban. It uses data dressed for security. So to enable that we need ah, encryption configuration. So let's look into that. What we will do as we already have gone through, will Step five, where we have generated the Con Cube conflict for all the components. Now we are going to generate the data encryption. We have already gone through the manual steps in our part two off this course. Now we are going toe. Follow these two steps to automate it. So what we need to do, we need toe use and civil on where we can generate the key, which is over a 64 and that key we will used in this template in the configuration present . So let's look into that. How we will do that. Let's jumps into the terminal. So, so far, what we have done, just let's look into that. So three step by strips, This is not giving good view. So we should use you. Yes. So so far we have gone through the step two step three step for and the step by Step one. We have already done into the project when we are learning and stable in the part one. So we have done there so you can leverage that project video and learn about how to generate their Lexie container. So now what we have to do we have to create a mammal file. No, no. Step six generate Jato corruption. So here I will again grab some court. And then I will explain that. What? What we're doing within the court. So I have grabbed it. No, I will be a street over here. So basically what we are doing again, this is going to be on local host local host here representing that where we have in store lower and civil on. Then afterwards. What? We're going to tell that we are going toe run this task. So what are this task we are going to do in this task? We will implement that. So let's jumps in tow that just copy this name as I already mentioned that this is the same name. You have to create the folder within the rules. Then in civil will come to know that no, save it Yes, I want to save it Now What we have to do? We have to come here again. As is well, we need to create a directory of structure, good rules. And within that we need toe give the name and then we need to create tasks. And here put fine to be It will create it Now it has created the part. Now what we have to do, we have to come here. I know roads Well, we can live with this one. Men know road. And here we need to tell that main door Yemen. No, I will again grab some court. Then I will explain that what that task is doing now I am grabbed it. The court No, paste it. So here what we are going to do as I told you, were going to generator Way 64 key. So random number we will generate with this line. And then here we are using the register. Very well. Do you remember why we have used registered variable? Exactly. So register variable is being used toe grab the output on a run time. And once we grab this variable, we have grabbed output within this runtime variable and then we will push it into the variable. This is a very, very important technique. You should remember it if we want to know about what are the things going on while execution? This comes very handy and you should remember this technique. All these exercises I have done because off you only so that you will loan the rial time implementation off each details how we are going to use it whenever we're writing the thing for the production. What are the difficulties we will face how to cope with this week? Difficulty as it is very difficult to grab their detail about the information running within the automation so and so will provide this register variable. Okay. Anyway, after grabbing it what we are doing, we are passing. We're setting affect variable as I already mentioned. Fact it contains them for environment information offensive, ill. So we are adding one new, more variable with the name called Buddha Strap. So we have generated this value and we will pass it into this token. Once this is being done, then what we are doing? We are grabbing the source template called encryption hyphen con trick. If you remember that we have used this way in the last manual. The steps. We have used this thing. Now here we will, saving it as a template. And this part the encryption key part Here we are passing those value which we have generated in the last step in the fact variable and we will pass it. Let's look into that how we are going to use it. So now, Movinto, that then here we have grabbed that template on were telling that go and put it into the wagon and folded. Now we are going to create this token in to see his reform it because later point of time, we're going to use it within this file. So we're performing that activity as well over here. So no, we understand this, Yaman. Let's movinto another step. Now, the next test of what we have to do, we need to generate the templates, as we have just written the Yamil. But the template which were using it, we haven't return it, so we need to write those. So to do that, what we have to do, we come here first. We need creator directory called templates. Do that. What we have to do em carry a year templates minus p into now we need to generate those templates to do that. We should write Nano and then he should come here and within here within templates. What? The temperature we're going to create, I will tell you. We need to grab the name. It is going to be. The encryption gun freaked out. Yemen would have it and Goto, will you? So this is the name we're going to create to do that. Now we need to pace too. So let me grab the court. You can also from the resource section. So I have grabbed the court. Now come Yah Baster! So this is the thing. So here, with the fact variable which we have created Bootstrap underscore token which we are using here to save it. And now we need to create token, not CSP. So to do that, we need to create again a file called Toker Nazi as well. So we have to come here and tell that dopkin Lord see? Yes, we were inside that No, we need toe. Grab some cordon, write it over here and grab it. Okay, so this is what we are going toe. So this line is going to be inserted into one off the file, which I will explain you in later part of the court. Right now we're just generating it. And now we need to save it. Yes. Now we're good to go. No, we're ready to run it through. Let's execute it. Take you to eat what we need to do. And civil iPhone playbook in one tree most or tree I any. And here we need to rate a Step six. So now run it. Let's look into that. How it is executing Victor started execution. So no, it is creating that year. Less will destruct token. This is done. It is completed. So let's look into that. In the vagrant folder we have toward that you have to creates so looking toe that unless in the vagrant folder, if we go there three pregnant. So here, if you look into that, it has generated encryption contract. Dirty animal. This file it has injected, and we have also told that you have to create another file. I'm not getting It might be some mystic we have done. Let's look into that so first awful clear it. So let's go in tow. The file this friend Yeah. We have given the static value over here which we need to replace it with the variable which we have for created that is that Waas Piquet under the school The area this variable we have ah created into the groove wears so now here also were. We have to s specify that Well, here we need to tell that que the school via this is a very good practice. You should put the global variable and red. You can keep the but this is very important in school. The area No, this was being done. No, we will save it and we will. Granny talking and civil and civil label on minus a course from here. Step six and run it later. We get over. Never regard Sorry for that. So the other was We have front use double courts to do that what we need to do We must have to specify with their double courts. So he'll we can use double court And you three of it and we will try to run it again First clear it and I don't need to study Run it again. So it is executing. No. Now it have generated the Buddha streptokinase to confirm he has been generated. Now let's look into that as earlier we were not getting the token file. No regular? No. We have encryption. That was coming. And we have token. Nazi is free. So this is how we have generated encryption key. So that's it. Gays. Ah, this is what I wanted to show you in this lab. See? In the next session till then. Bye bye. 37. PART III : 07 LAB STEP7 Automate Certificate And Kubeconfig Distribution Process: Hello Guys will come back in this lab. We are going to distribute all those certificate which we have generator in the past. The steps. So let's look into that. So far, we have created certificates in step four and we haven't distributed. So if you go into the details, then you will find that we have a home, all the steps, but the step number I we haven't performed. So I have kept it a separate rule or separate task for this distribution task and the same with you conflict. Where? In the strip Five. We have generated the Cube configuration file, but we haven't distributed yet. That's step number. Gee. So in this lab, we are going to distribute the same which we have created in a step for and the Step five and as well as in this Step six, we have created the in encryption conflict noti animal that is also not being distributed as we have generated these files within the local host. That is where the Enseval hasn't start. Now we will implement a task which takes cares off distribution process. Who let's look into the details now. So far, we have completed these number off the steps we have completely Steptoe. Where we have configured the load balancing the Step three we have installed applying toe and step forward. We have generated all those certificate step. We have also generated que country. And in the step six, we have gender to data encryption. Now let's implement their Step seven for distribution process. Let's write clear now Nano here Very to strip servant, distribute old certificate. Not Yemen. Now we will grab the court and then I will. Yeah, so here what we are doing We are sending the certificate toe all the Nords which I have Martina most D'Artagnan I file I can show, you know. So first let's save it. So just remember this all under school notes it is a variable within the host of heart. I am a file, so let's look into that variable. And you should also copied this because we're going to create a folder carpet exit from here. Yes, we want to save it. No looking toe dyin in foil. So here, if you look into that, then you will find that we have a variable called all nodes which were mentioning where we're going to perform all this distribution. So we're telling that we're going to copy all those nodes which we have created. So that is our master Lords. These top records are three record our master node and below three records that the worker north again. You can look the court, how we look like. So here I am mentioning that we're going toe from this task on these Nords. Let's jump Shinto the task, and we will design that role here. Clear here. We will mention that we need to create directory structure. Okay? Yeah. And we need to express it freely over here. Rules we want to create within roads. And then within that, we need to create a tasks folder playing with feet. And then we need to clear the main naughty animal trying to here, man. Oh, that's you find that mean dot No, we need toe. Grab the court and I will explain those Now. I have grabbed the court. I will based it over here. So in this task were performing to task. Basically what we're doing, we're copping all those certificate from this location toe all these locations where we are looping it. Trudeau all the Nords, which we have mentioned. If you look into that, we have a specified these valuables. So that means skaters, Masters, I wanted to show you If you go inside that we will go again into the whose daughter in a fight where we have give the master north as a very well over there. We have kept those variables. So I will tell you Yes, we want to save it and here we can look into that. So here we have mentioned this gators underscored worker and get us underscored monsters. Now we again go back then you will find that we are refering that things like this So where groups is a internal keyword can be used to refer the variable and where we're refering this area variable. After that this operation we are going for all those certificate which we have generated within the wagon for that which I ever specified in the groove variable which I wanted to show you. If we come out and you could be looking toe that then here we will find that here were telling that Vicky I underscore DEA were mentioning that whatever the thing which were having with the migrant folder that you will copy it. That means we're copping all this thing. And in the second task were telling that you should copy the Contrave a year, which is a Q Khan trick directory. So now looking toe that again clear. And here we will go back again here, really specifying that you should copy the cube conflict directly which is coming within this variable. So this is what we're doing. No exit from here and let's run it. So to do that, what we have to do, we need to write and say, Well, they work. I mean, nothing there. We need to specify this trip. Seven. Oh severe. We have done one mistake. The streak is we forgot to his pursuit frying that daughter unique Mile extensive. If you don't mention that daughter in a for help, then what will happen that it will source for the local directory? If it is not existing, then it will look into the before location off course. So here we data mystic that before goto specify that daughter in a fight No, we will execute it to executing note checking all those nodes and no stock it hoping it it is copping the regulate folder. Now it is doing the coupon for So now it has done the task. Now let's verify it. You hear that? Now we will look log in tow, silver. So to do that, what we need to do we need to write Alexey list. And here we need to log in tow one off the silver, very fight with people. This is such if we go inside that now, we're into the sober will do list from regular. So here it has corporate all those folders which we were having their and it also contains cube country. So clear it if you will do Ellis Look, then we will find that it has also corporate the cube country along with the wagon for So this is what we told to do that. So let's exit from you. So that's it, Grace. This is what I wanted to demonstrate to in this video. So see, in the next lab, but what 38. PART III : LAB AUTOMATE STEPS Bootstrap ETCD Cluster Step: Hello guys. Welcome to another lab in this love we are going to do or to meet. You know, Bootstrap answered questions step. So let's look into their step, which we have performed in the manual steps. Now let's look into again. So what we did in this a step earlier we basically followed these five steps. So now what we will do, we will do the same thing, but with the help of Enseval. So let's try to read that what we did earlier. So we have logging to each of the North Master Node, where we have used T marks and synchronize the pain on where we lock in and followed the steps from 2 to 5. So what we have done, we have downloaded the exit question softer and then afterwards we have extracted it and move it into the dislocation. And then afterwards what we have done, we have performed these activities and where we have defined the internal I, p and all and where we have also specify the host name. And after that we have used a template which is being recommended within Cooper Net infrastructure set up so that we will run these things. So this is again a command which we were specifying that what are the private key we are going to use for this communication? So we are specifying in the configuration So now what we will do here we will plan for automation. So basically here we need to design a task where it contains a template. So that means this portion will go into template as it contains different different information about the silver. And if you look in tow that the new will find year. Here we are performing these activity on each of the master note. So that means a common information will exist. Everything different. Different master notes. So this gift so blue that this is going to be our template. So let's jump into the terminal and let's look into the how we're going to design this or say how we are going to implement it. So go to the terminal. We are on terminal now, looking toe that so far what we have done if we find that lsl so here we have completed the number off a steps earlier. So if you have been falling with me then you have also conflicted this one. Now we are into a state eight. We're going to configure the answer question with help offensive All here in the diagram, you will find that we have won the steps extra by 87. And here in the terminal quite is eight because we have separated a process of distribution in tour. Another step. I'm just wanted to give you a clue that whenever you are planning for automation, it is not very easy. Is it to follow the same, most of which I am falling. You can also plan yours and you can split the thing whichever and however you want to arrange your court so there is no hard and fast rule to follow. Whatever I am following, you can design your also. So let's implement the A step number eight now. So to do that, what we have to do as Israel we need to write. I don't know if you're using an already, can you be for him? And then we need to specify the final game. So this is I'm going to specify in UAE Yemen, and then here again I will grab the court as usual, and then I will explain the thing here were telling that you should go toe each of the masters and perform these activities which we are going to create now. So to do that, I need to grab the name so that we can create the folder off this name. And afterwards we will exit from here and we will tell Yes. Now we will first make the directory. To do that, people write em que dia yard. And here we need to create within rules. And we need to specify the name offered cluster. And here we need to specify within task. We need to create a directory over here. So to do that, what we have to room you need to respect If I am Katya Yard and we forgot to mention minus B So we will mention over here and enter now it has created No. We will create the jahmal file within that to do that, what we have to do, we need to write me No t Amell. And now we will go there. And here we will mention Nano and open it. Now I will grab the court and I will explain one by one. Now I have grabbed the court. No pastry, no. Let's discuss what actually east asked were doing over here. So here were telling that Go and download the answer question from this location and with you will put it into the temp directory and source here, really specifying that we are going toe grab this u R l from remote. And then after what we're telling that validate no certificate as I haven't contracted assistance are difficult for this over. So I am not a specifying it. After that we're telling that you should extract it and push it into this location. Once it is being done, what we are going to do, we are telling over here that create this directory structure. And again there is another directory structure we should create. After that, we're copping those driver give else in this location. Once it is being done, then we are going toe. Copy the art, Sir Dart Service file, which we will create now in the next step. And here we are specifying that used That's always file take That's always file it put in tow this location No, we are manipulating the system. Defile off that Soviet. So we here we told that you should restart it. So these are the activity which were performing within this role. So now save it. Yes. And now what we need to do We need to create the template. To do that, we need to create Druids within bootstrap. And here we need to create a templates folder. And within that we are going to create Herzer North service and he'll we will put the template cold. So before that, we forgot to a specify minus p. First, we need to create their directory. And here, once it has been created, we need toe right now. I know my front door service we want to create. This is a template. We will enter it. No, I will grab the court and then we will discuss now I have copied pasted So I have pasted over here. So again, this is the same court which we have used in the manual steps. If you're looking toe that, then you will find over here. You come here and you will look into that. What we did We have copy and pasted in the bass earlier. So here we are doing the same thing. But with the help off and civil. If you look into that, these are the dynamic information which is going within this service file s so that what we have to do we required to create the template file as it contains the dynamic information and which is leading from one north to another, nor master. Nor so. Now let's jump into that. So here we did the same thing. If you're looking to that variable part what we're doing, we are using the roof bears. So which we have created. If you remember that, I will show you again. Lex. Yes? We want to save it if you look into that than what you will find you no cat, Rupert. And here. Then we will find that we are using these variables so that it will converted into eyepiece . Now, once it is being done, we need toe Go back again. Clear it. We will go back again. And here we will Look again. You will find you that we are specifying like this. So this is what now we have created a template. We will run them and we will look into that. How it is going toe thes filing toe each master note. And then afterwards it will restart the services from, you know, running to do that. Right? And symbol. Playbook, plainness. I posts daughter and step eight. We have a from the state fate to do that. No, run it. Run it Going to started executing. So now it is downloading. It is downloading in all the North Master Node. Knowing that detects could you to go forget it. The same thing which we performed over here. No, it is copping their shirts off this file. So the respective location and now it is It is starting the system refined as we have created this system. The fighting. So now this activity has been done here? No, no, to verify it. What we will do, we will log into the one of the silver and check it. And here we will go there. Alexa list. Now we will let specify. No, we were looking toe that system. The file where we have posed a service to do that you need with frank to see this. This is Scrubs source. So here you will see that it has replaced those variables with this I p as we have mentioned it so, senior, how we have using group bears in this template and then it is being replaced too those valuable with the I P, which we have configured in the variable. So this is what I wanted to demonstrate your indecision. So see in the next lab by 39. PART III : LAB AUTOMATE STEPS Bootstrap The Kubernetes Control Plane: hello. Grades will come to another lab in this love. What we're going to do, we're going toward toe made the Buddhist trip control playing the step which we have performed earlier Man Willie, where we have replied all those component of master node with Windows Master node machine So let's look into that. What we have done the manual systems. So here what we have done so far we have deployed all these master component within the Master North manual in part. Now, in this whole part of the court, we're going to deploy all these component with the help offensively and we will orto made those steps. Let's look into that The stuff indeed. Deal. Trying to discussing the water, the things we're going to perform the duties trapping off the Kuban it control plane. So we have to understand that what we have done But so we have a form All these a startle step A and have converted all the manual The steps in tow automated the script off uncivil where we have created the Alexey Container on this architecture. If you remember that we have created the Lexi Quinton around this architecture. Then afterwards, after the creation off this we have deployed and civil in tow that in the first part of the course, and then after that we have also done their deployment with the help of manual step and as well as automaker descript in the part third of the course. Then we have also done the automation for install plane tools. We have also gone toe. The automation is script designing for progres mingles certificate authority and generating the TLS certificate. Then we have also seen that how to generate cube conflict filed manual Lester Pezuela's The Automated Step. Then we have also seen that how to generate the data encryption con trick point. After that, we have also grouper strapped Arthur Cluster on the master note. Now we're coming to this a step that where we can or to make the Cuban it control plane large jumps into the terminal. But prior to that, let's look into their steps that so what we did So basically what we're going to do, we are going toe toe mate. All these steps where we have performed in the manual a step to configure the strapping off when it controlled plane and these activity we're going to perform all although Master Store where we can create the country directly. Then we will download and install the Cuban it controlled winery. After that we will install those buying it. And once it is being done, then configure the corner TPS over. And then we have to create the system. The unit fight for Bs always says once it is being done, then we need to do the same configuration. For who? Burnett control manager. And remember this Dagenham. So it's Bs over. We're going to contribute it. Then after we control manager and then afterwards he do that as we have already done. That's a clustered in the previous lab. So after that, we have toe configure the cube. Should you live now, let jumps into the terminal. So now let's look into that. What are the things we have competed so far? What? We have completed these number of steps. We have already done the Steptoe because this automation is started from the Steptoe as opposed to step. Is the creation off Alexey Container It we did already. So now in this instead, what we're going to do, we're going to design a step number line. So to do that, we can write no strip nine. I really want to design. Would this trap cool photo? No. Again, I will grab the court and then I will explain you grab the court. No, I will taste it. So here, on the same aspect which we were performing in. Although the steps here we're creating a playbook. And where we are creating a Buddha strap when it controlled plane roles. So now here we are also telling that will do all these tasks which is defined within this rule on this masters north. If you remember that we have already created a variable within host stored in a file where we have club or group toe all those master no single variable which is called gators under schoolmasters. I will demonstrate you now So it exit from here. Yes, I want to save it. So if you go into that when you will come to Lord, that closed door mainly So here Gators under schoolmasters. So we are going to perform or which we will define now within the rules for those tasks we will perform on these notes, notes exit from here and then we will create the rules now. So the next step would be Could he ate the bones for them to do that. Let them get dia. Those. And here we need toe. Dig the name off this as the name off. This will be the same. And here we have used this one. Get the name Wolf. This one and whatever we have mentioned within this fight is going toe with the same. Now, within that, I need to create a passport and put minus B that it will create the part if it will not exist. This was done, dear. Now create main door Tama within task folder So that we will come over here and right now I know. Go there. Great mentor Tamil. And within that we will define the task. So I will grab some court and then I will explain You eat block off the court. I have grabbed it. You can also grab from the resource section and based it on. Then we will look into that what all these blocks are doing. So as you know that we're going to perform all these activity which I have told you on which we have performing the manual steps. So what we did earlier we have performed all these activity. If you go into that, then you can find that later. We're 80 off activity. We have to perform well, Conflicting. The boot strapped control plane. So now here we're performing all those activity in automated manner. So what me are doing were forced? Have you tingle conflict directory thing within this part? And after that, what we're going We're putting the private file within that, and we are taking it from the Bagram folder. So that means first, we're going into the wagon folder off each of the master north. And there we have kept, if you remember that we have created a wagon folder in the local host. Attack means wherever and civil has in store. And after that, in one of their steps we have distributed, those are difficult into the vagrant border. So what we're doing here were telling that should go within the wagon folder and take these files and copy in tow this location where live, proven it Goto. Then you will find this. No. After that, what we're doing, we're coping the coupon trick file on putting into the who were in a folder off this location. Once it is being done, we need toe grab the MPs over from this location, and then we will also do the same for overnight control manager. First, we're downloading all those required thing and stalling it into this location. After that, we're moving further and downloading the cubes. You do it here also were specifying the U. N. And we're telling that downloaded. We need to install it at this location. And here we are specifying validates our certificate. If you remember that if we haven't configured that Cecil for this over, then we can you specify that else you will get the SSL certificate and you are not able to download that and your task will feel once it is being done, we can download the Cube Treaty in on each of the Master Nord and push it into the puke city and user local bin Cube city. Once all this thing will be done than what we're doing here now, this is very important. We have used some configuration in the manual steps. If you remember that for configuring the system defiled So what we did, I will show you what we did. We have configured with these settings because this is one of the recommended thing, which you have to perform while doing the configuration off. Who wanted question So Q p p A. It is being recommended that we need to express if I like this on where we have provide all those details, the certificate details and whatever the perimeter, which is required, we need to specify that. And here we also need to provide the I p off each of the Earth shirts over which is a master north. You need to specify it. So when we're doing the automation, what we need to do, we need to convert it as a temple as we have run all these things as a cord or within the bash in the Man Winless tips. But with the automation, we need to convert it into a template, as there is a repetition off for fame called. So no move to the terminal. So here we will career the system, the file with the help of Dark Templar. That's what we're telling you. The sources Cuba be a so we don't services, which we're going to create in the next step. Whenever we do any changes within the system defiled, we must have to restart their demon. So that's what we are doing over here. Once it is being done, we're configuring the controller manager on here have also used system re file template which we have defined, and where we have to use that system defiled or controller manager. And after that, we're telling that you should restart as we have done the changes within the service White moving further. We will repeat the same thing for civility. For here, what we're doing. We had using the future doula So this well and we are operating the or creating the system , the oil. And once it has been created for this, we have updating this and telling that restart the more. And we have also created the rule back, not Yemen in the template. So we will use it for cluster banging. Let's jumps into the another district exit program will do that. Yes. Now the next district. What we need to do we need to create a template for the forced to do that. We need to write him kiddie area you we need to create don't let thank you DEA templates. And here, right this beef. And after that, we need to create the file within that three files. We're going to create one for the Q B. P s over. Another one with the Hoover net controller, manager and another one for civility. Do that. First, we will create Cuba opiates over not service. Well, you will be a so so this fight service now to grab the quarter and push it over here. So now I have grabbed the court. No, paste it. So here, if you're looking for that as I already mentioned that we have used the same kind off template in the manual steps. But we have executed it on bash by copying and pasting. But here what we're telling that we're telling toe then civil. You can use this template and replace all those very well with the Master Nord information looking good. Now that's where we can see of it and saying we will create for controller, manager and the Ruder create another foreign war controller manager. And to do that, he should come here create for controller manager Cool manager, North service. Now you need to grab the court and then I will explain So I grabbed it. So this is very small file. There is no dynamic thing, but we're going to use in all of the master north, so we're converting it as a template. So if you look in tow that it contained those details. So if we look closely into that, then you will find that it also contained the service file information and like, so physical. So these are the configuration for controller Manager, Let's come on from here and now we will create for cubes dealer as we are going to use the conflagration toe So that what we need to go right? No, you you can could he took you. Please do Look Cube, do you north service? No, I need to grab the port of you know I have grabbed the cool face to so it is also a strict forward. So these are the contradiction we're going to keep. If you look into that, we are using a few high fancy do lord or Tiemann document. This is also a template which we need to create now. So let's create that but that we need to exit from here Yes or next toward going to do I need to write another template. Auriemma. This template is also given in your court in the resource section so you can use it that's going toe that after that we will grab the court and we will paste it to you. So this file in nothing but a configuration for cubes do let as you remember that the rule of the cubes would you let it to seduce the board as I have already discussed with you Or the cubes a doula cubes utility actually do the same Dooling job within the Kuban it in France structure If we want to know more about guilty dealer in the fourth and second video of this part I have explained about this in more detail. You can look into that now we will move forward from here and run the court. Yes. No, we're forgetting toe. I could hear the template for roll back. So to do that what we need toe again. We need to write, hold back about Yemen will grab the court So no, I have grabbed the court. This is basically the configuration we need to specify as per the Kuban it recommendation within the configuration off roll back plus a rollback definition. If you remember that we have performed the same activity in the manual, a step where we have copy pasted those cooled. So now we have converted it as a template and we were going to use this in the unstable playbook for the role definition. So it's it from here? Yes. No, we will run the playable. So to do that clear now, let's run it. To do that, you need to write and civil right from playbook. When this site horse dog, are you on the step nine, which we have could you didn't know on Drawn it to the executing. So no, it is creating the border. It is copping based in the prayer Ricky than the coupon. Think so. The act Location. No, it is downloading the few MPs over in control of manager No tree downloading and told the cubes Or do it? No, Next to it is downloading Cube, sweetie. No. In your window. Q b s over template for system defile. Restarting the demon. No No. Four Controller Manager Cubes who do it know it's holding the cube. CTO no restarting services. We started the war at the gender. So this well to be extracting 31 for cooler manager. So that is done. No, Now, to verify that what we have to do, you will go inside one off the container. We were looking toe the location. Where live, said Hewlett, where we have put the files. All those files Cube, conflict file and private key. So we will look into that going for you and now looking through a list. So here we were going toe the master note. That s s it. Roads. Then draw one fight for you folks. No, we come here, Keogh. We didn't dark. We will look into all the files which we have been straight over. Hell. See here in the steps we have mentioned that grab those files and push it over here. But it did the same. So this is what I wanted to demonstrate you in decision. So see you in the next above like 40. PART III : LAB AUTOMATE STEPS Bootstrap Worker Nodes: Hello, guys. Welcome to another lab. In this love, we are goingto go to strip Cooper Net woken or the step as you remember that we have done this a step in the manual set up off Vernet in part two. So let's look in tow. That what we did. So here this is the thing which we have completed so far. So far, we have completed till who won its control plane. We have already bootstrapped with the manual and auto mission as well. So in this lab, we are going to do the book. A strapping off the Cooper networker notes who, Whatever the process which we have done manually, we can do it here with the help of principle. So what we're going to do, Let's look in tow that So we're going to boot the strip All these a step with the help offensive all I will walk you through the court what we're doing and then we will execute it. So this is work this lab will contain. So to do that, let's jumps into the terminal and gets our hands dirty. So here we will look into that will know what we have done so far. So so far we have completed all these steps where we have created a group Variables. Then we have created the in a file. Then we have created rules and all these steps which we have been following from here, starting from the Steptoe as a step born in the continue activation in step. And I have done this as a Roger in the part one. You can refer that So far we have converted all these steps in tow a boat. So now we're going to do the automation for this A step So no, let's go there again. So here we will start to do that. We will make it first clear. And then we can create toe nano step tell and we can give a name would strap or were node. And then so they forget to mention family should be Yemen. No, I will grab the cordon. Then they will extreme. So I have grabbed the court and pasted over here. So we are going to create a rule with the name Corbeau to stop O Connell. And then we will define those tasks and the templates, whatever required for this particular steps. So Let's grab the name as we need to create the folder with this name exit from here. So now we need to define the directory within the rules Occasions. So Mpudi, a year old and hear the name or rules within that we're going to create a task folder. Mention minus B. If it's not existed, will create. And then afterwards we will create the folder. You will clear the fine. No, we will give a name. No mean no Tiemann. So let's jump into that. So here I will grab the court, and then we will discuss each block off the court. So I have grabbed the court and I pasted over here. So no alerts to discuss. So in this block, what we're going to do at the same way, we're creating a folder structure at this location as Kuban. It required this folder should exist in this location. And here we're performing this within a loop. So now moving for the again here were commuting three folders at this location, and we are doing it within a low poor. So it is pretty much a straight forward corps after that. What we're doing, we're copying and pasting the cube alerts. If you remember the component off worker notes, I will create a great that diagram so that you can understand that water there component required to configure when we're working with Kuba networker notes. So let's jump into the diagram. If you remember this diagram where we have already discussed that to configure what cannot be required these number of components. So this is what we're doing to hear we're creating for that at that location. We're we're live on within that we're creating folder for each of these confidence so jumps into the terminal. So that's what we're doing here. And then afterwards we're copping the cube lit at this location Onda Cuba, Little Ray Buckey And what? There was the private key we have created in the step forth where we have generated private G for you Burn it and we're coping at this location. So moving for the what we're doing, we're also coping the cube contract file looking toe that we have created this in a step five and we're coping there declamation. So again, moving for the we're doing the same thing. So here we're copying the proxy coupon trick and after that we had installing that continually over here. And then we, uh, pushing it into the user being folded should be user local bin should mention it. Use that local when Now this is being done. So what we need to do, we need toe, define a doctor, darts off this file. And once it is being created, then we need to restart the services as we have done, the changes into the system refile. And when we will, we do any changes into study for it. We must have two real or 31. And after that, we're installing, downloading and installing the Q proxies. So this is what we're performing over here here before goto mention that validates certificate as we are not using the start difficult assistant certificate. So you must specify this else you will get there. So once it has been downloaded and installed, that cube city eliminate work or not, and it will move for the rand extractor network plug ins and once it is being done So we need to cleared the sea and I at this location to do that, what we need to do, we need toe, don't know, dark network interface for this. And he had We're doing the same. So after that, once it is being done, we need to copy the Cuban tank you proxy filed from your template folder. Toe this location and we're dealing with the notebook. As we have done, the changes within the system refine Soviet starting the demon. So once it is being done, we will exit from here. Yes. Now the next test, if we will create the templates as we're going to use three templates if you remember. If you goingto this diagram, remember that. So we have required three templates. One for the cube lit, one for the proxy. And if you're going toe that the Newell get to those conflagration here. So we need toe. Grab those details. So these are the templates for each of the confidence off worker North. We need to grab this and put it into a templates so that our each worker nodes can use it. Let's clear the temperate now, so you know, we need to create a folder. Lindros open looks. It will be within that we need to create templates. No, no, no. From here, we need to define what country noting it will grab the court and then we will discuss so here. Basically, we're setting off the runtime, the container and where we are specifying all these configurations so these conflagration are required to do or containers on time. So let's move for the exit from you. Yes, we want to say with no, we need to create another template. Let's create it for others overs. So here were created for Q proxy. Didn't that I will grab the court. Then we will discuss No, I have grabbed it. So paste it again. This is the configuration for Q proxy, so these configuration are required whenever we are configuring the Kuban networker Nord. So let's move for the Creator service file for Q blitz. Do that need toe let into it. So again I will grab the court. So I have grabbed the court and I have pasted over you. So this is the configuration for the Cuban, it which is going into the each of the worker note. So we hand here. We need to specify the Lord balance. So once it has been done, we will exit from here and now we have done all the conflagration so no, we will run it so clear and great to run if no so to do that, right and civil playbook for your mind within that he wanted on the Steptoe Now run it started executing it is performing those tasks which we have defined Just open the pedophile in mineral que con trick you Proxicom que contract during the continuity or continue ever on time In the next lab we will merge all the court which we have defined so far so that all the court will execute toe in the one go And he instructing the demon No northern installing the Q proxy. No doing that. No lo ordinance tradition for Cuban it no loading the Cuban it no same for Gipsy deal. So it has done this thing. So it is completed. No, it has finished all the task which we have defined for Cuban it woken notes. So this is what I wanted to demonstrate that the intent of this exercise is that I wanted to show that How do you map your Manuel process to an automated process so you can try it once once you will try it Then you were able to understand that. What are the required? A steps to do the automation. So this is what I wanted toe the most written toe this station. Bye bye. 41. PART III : LAB AUTOMATE STEPS Merge All Playbooks Within Single Playbook: Hello, Guides. Welcome toe last lab in this lab. What we're going to do, we're going to march all the playbooks which we have created so far in tow. Single playbook. So let's jump into the abdominal and gets our hands noting that Come here first we will check that what we have created so far. So we have created so far the number of playbooks and I want that it should contain a single people. To do that, we will get here the last playbook and which is good? No, no. Would net automation civil dot Yemen created. I have written the court for this, so let me grab it. Then we will discuss. So here we are, merging all the playbook. So we're importing the playbook into this single file on all playbook will run. So this is the way you can arrange your all those. Whichever you have designed in this journey on. Then you can execute this single file and it will deploy all those thing which you have mentioned in tow. Each of those people. This is what I wanted to demonstrate