Harold Spencer Jr of Eucalyptus, technology partner of Neo Technology, walks through deploying a Neo4j High Available Cluster
Pre-requisites
In order to use this Ansible playbook on AWS/Eucalyptus, the following is needed:- An AWS or Eucalyptus account, with a user’s access key and secret access key.
- EC2 IAM Policy to allow launching of instances, and authorize ports in security group
- Ubuntu Cloud Image (Precise 12.04)
- EC2 API Client Tools
- git repository tools
- port 22 (SSH)
- all instances part of the security group allowed to community with each other (ports 0 – 65535)
- Create the security group
ec2-create-group --aws-access-key <EC2_ACCESS_KEY> --aws-secret-key <EC2_SECRET_KEY> --url <EC2_URL> -g neo4j-cluster -d "Neo4j HA Cluster"
- Authorize port for SSH in neo4j-cluster security group
ec2-authorize --aws-access-key <EC2_ACCESS_KEY> --aws-secret-key <EC2_SECRET_KEY> --url <EC2_URL> -P tcp -p 22 -s 0.0.0.0/0 neo4j-cluster
- Authorize all port communication between cluster members ec2-authorize –aws-access-key <EC2_ACCESS_KEY> –aws-secret-key <EC2_SECRET_KEY> –url <EC2_URL> -P tcp -o neo4j-cluster -p -1 neo4j-cluster
ec2-describe-groupto view the security group:
ec2-describe-group –aws-access-key <EC2_ACCESS_KEY> –aws-secret-key <EC2_SECRET_KEY> –url <EC2_URL> neo4j-cluster GROUP sg-1cbc5777 986451091583 neo4j-cluster Neo4j HA Cluster PERMISSION 986451091583 neo4j-cluster ALLOWS tcp 0 65535 FROM USER 986451091583 NAME neo4j-cluster ID sg-1cbc5777 ingress PERMISSION 986451091583 neo4j-cluster ALLOWS tcp 22 22 FROM CIDR 0.0.0.0/0 ingressRead the full article.
Keywords: Ansible playbook Eucalyptus high availability