Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

on inventories/demo/staging/group_vars/openmrs-app-servers/vars.yml

Code Block
# 
openmrs_nginx_enabled_sites: []
openmrs_nginx_sites: []
certs_from_letsencrypt: false
openmrs_certs_from_letsencrypt: false
#

openmrs_tomcat_version: 9
tomcat_group: "tomcat"

if you have a domain replace these

Code Block
openmrs_nginx_enabled_sites: []
openmrs_nginx_sites: []
certs_from_letsencrypt: false
openmrs_certs_from_letsencrypt: false

withupdate this

Code Block
openmrs_site_name: "your domain"

on inventories/demo/staging/group_vars/mysql/vars.yml

...

Code Block
$ ansible-playbook -i inventories/demo/staging deploy-openmrs.yml --vault-password-file=[local path to the file holding the vault password] --skip-tag nginx,certbot,collectd

Keycloak (for opensrp server web v2.2.* and above)

...

on inventories/demo/staging/group_vars/opensrp-app-servers/vars.yml

...

Code Block
opensrp_install_swap: false

 # update with the opensrp version tag/branch you need to deploy
opensrp_version: "v2.1"

if you have a domain replace these update this variable

Code Block
opensrp_certs_from_letsencrypt: false
opensrp_nginx_sites: []
opensrp_nginx_enabled_sites: []

with

Code Block
opensrp_site_name: ""

Code Block
# for opensrp_version version v2.2 you have to add the below
opensrp_maven_package_profiles:
  - postgres
  - jedis
  - oauth2
Code Block
# keycloak configs
opensrp_keycloak_realm: "realm"
opensrp_keycloak_auth_server_url: "http://keycloak.local/auth/"
opensrp_keycloak_client: "resource-id"
opensrp_keycloak_client_secret: "234324"

...

The defaults are:

- postgres
- jedis
- basic_auth # this can be replaced with oauth2 to use keycloak or spring authentication server with openmrs

The other available profiles are openmrs-sync, dhis2-sync, rabbitmq, rapidpro, lettuce, dhis2-sync-vaccine-tracker and more

To use Openmrs openmrs one has to use v2.1* tags.

...

Code Block
$ ansible-playbook -i inventories/demo/staging deploy-opensrp.yml --vault-password-file=[local path to the file holding the vault password]  --skip-tag nginx,certbot,collectd

DHIS 2

Run the following command to start the DHIS playbook in your local staging environment:

Code Block
$ ansible-playbook -i inventories/demo/staging deploy-dhis.yml --vault-password-file=[local path to the file holding the vault password] --skip-tag nginx,certbot

NOTE

When running the playbooks with a user other than root since ssh using root account is not recommended you need to add this extra option 

--extra-vars='ansible_become_pass=youruserpassword'

...