- Introduction
- Installation with LXD containers
- Install on physical/virtual servers.
- Step 1: Before you start, make sure you have the following:
- Step 2: Access deployment server (ansible-controller) via SSH
- Step 3: Install ansible on the deployment server
- Step 4: Grab deployment tools from github
- Step 5: Create hosts file (from the hosts template)
- Step 6: Set fqdn, email, timezone and
ansible_connection=ssh - Step 7: Ensure connection to the managed hosts works
- Step 8: Run the playbook
- Adding a new instance
- Using a Custom TLS Certificate
- Conclusion
- Other important links
This is a quick DHIS2 install guide using ansible. At the end, you will have one or more dhis2 instances running, configured with postgreSQL database and nginx or apache2 proxy. Out of the box, you'll benefit from comprehensive application and server resource monitoring with Glowroot APM (Application Performance Monitoring) and a Munin instance.
At the moment, the tools support two deployment architectures:
- Installation with LXD containers (single server)
- Installation on physical/virtual servers (multiple servers)
You can also do a hybrid of both. Read more on Architectures
Ensure you have:
- Linux server, minimum 4GB RAM, 2 CPU cores
- Ubuntu 22.04 or
- Ubuntu 24.04
- SSH Access to the server
- A non-root user with sudo privileges.
- SSH to your server, Secure/harden SSH, allow SSH port on the firewall and
finally enable the firewall. Be careful not to lock yourself out. Remember to
allow your preferred ssh port before enabling the firewall.
sudo ufw limit 22 # Assuming you did not change default ssh port (22) sudo ufw enable
- Access the server and clone the deployment tools in your preferred directory by invoking below command
git clone https://github.com/dhis2/dhis2-server-tools.git
- Create the
hostsfile using the already existing template,hosts.template.
Use the command below if you are in the directory you cloned the tools in.cp dhis2-server-tools/deploy/inventory/{hosts.template,hosts}
- Edit
dhis2-server-tools/deploy/inventory/hostsfile and setfqdn, andemailif you have any (you can leave them empty if you do not have). - Set your preferred
timezone, you can leave other settings to their set defaults.Below is an example screenshotvim dhis2-server-tools/deploy/inventory/hosts
# variables applying to all hosts,
[all:vars]
# if you do not set fqdn, you dhis2 will be set up with self-signed certificate
fqdn=your-domain.example.com
# required for LetsEncrypt certificate notification.
email=your-email@example.com
# timedatectl list-timezones to list timezones
# Example: timezone=Africa/Nairobi
timezone=your-timezone
# Options: lxd, ssh defaults to lxd.
ansible_connection=lxdNOTE: When the installation is on a single host with LXD, ensure your lxd_network is unique and not overlapping with any of your host network.
- Run
deploy.shscript from withindhis2-server-tools/deploy/directory.cd dhis2-server-tools/deploy/ sudo ./deploy.sh - After the script finishes running (without errors), access your DHIS2, Glowroot and Munin monitoring instances:
Note:
<hostname>= yourfqdnif defined, otherwise your server's IP address.https://<hostname>/dhis https://<hostname>/dhis-glowroot https://<hostname>/munin
- A deployment server - This server is going to be your ansible-controller.
DHIS2 setup on the backend application server will be done from here. We will be using deployment server and ansible-controller interchangeably in this guide.-
It should run either Ubuntu 22.04 or 24.04
-
It should have working and tested SSH access to the managed hosts (backend application servers). SSH key-based authentication is advisable
Deployment will be working with SSH connection.Loadinggraph LR A[Deployment Server<br/>Ansible Controller] -->|ssh| B[Database Server<br/>PostgreSQL] A -->|ssh| C[DHIS2<br/>Application Server] A -->|ssh| D[Proxy<br/>Nginx/Apache2] A -->|ssh| E[Monitoring Server<br/>Munin] F["./inventory/<br/>- hosts<br/>- group_vars<br/>- host_vars"] -.-> A subgraph Managed Hosts B C D E end
-
- Backend Servers (managed hosts) - These are the servers that will be running
your DHIS2 components, i.e database(PostgreSQL, DHIS2, Monitoring, Proxy)
- They all should be running Ubuntu 22.04 or 24.04
- Be accessible (via ssh) from the deployment server.
-
SSH to the ansible-controller, Secure/Harden ssh, allow SSH port on the firewall, and finally enable the firewall. Be careful not to lock yourself out. Remember to allow your preferred SSH port before enabling the firewall.
sudo ufw limit 22 # Assuming you did not change default SSH port (22) sudo ufw enable
sudo apt -y update
sudo apt install -y software-properties-common
sudo apt-add-repository --yes --update ppa:ansible/ansible
sudo apt install -y ansible
- Access the server and clone the deployment tools in your preferred directory by invoking below command
git clone https://github.com/dhis2/dhis2-server-tools
- Create the hosts file using the already existing template, hosts.template.
Use the command below if you are in the directory you cloned the tools in.
cp dhis2-server-tools/deploy/inventory/{hosts.template,hosts}
- Edit the inventory hosts file and configure the following variables:
fqdn— your domain name. Leave empty if you don't have one (DHIS2 will use a self-signed certificate)email— for LetsEncrypt certificate notificationstimezone— usetimedatectl list-timezonesto list available optionsansible_connection=ssh— required for physical/virtual server deployments
vim dhis2-server-tools/deploy/inventory/hosts# variables applying to all hosts, [all:vars] # if you do not set fqdn, you dhis2 will be set up with self-signed certificate fqdn=your-domain.example.com # required for LetsEncrypt certificate notification. email=your-email@example.com # timedatectl list-timezones to list timezones # Example: timezone=Africa/Nairobi timezone=your-timezone # Options: lxd, ssh defaults to lxd. ansible_connection=ssh
-
You will need to setup SSH connection from your deployment server to your backend application servers.
-
Both password or key-based authentication would work. Key-based authentication is encouraged if you want your deployment to run fully automated (no prompts for SSH passwords). Use ansible ping module to test your connection to all the backend hosts except localhost (127.0.0.1)
cd dhis2-server-tools/deploy/ ansible 'all:!127.0.0.1' -m pingIf your SSH connection is successful, you will see SUCCESS messages like below:
dhis | SUCCESS => { "ansible_facts": { "discovered_interpreter_python": "/usr/bin/python3" }, "changed": false, "ping": "pong" } monitor | SUCCESS => { "ansible_facts": { "discovered_interpreter_python": "/usr/bin/python3" }, "changed": false, "ping": "pong" }
- Since installing packages on the remote server needs sudo, you will be using
-Kor--ask-become-passcd dhis2-server-tools/deploy/ ansible-playbook dhis2.yml -u=username --ask-become-pass --ask-pass
| Description |
|---|
-k or --ask-pass — prompts for SSH password -K or --ask-become-pass— enables sudo password prompt, you can set ansible_sudo_pass=STRONG_PASSWORD to avoid prompts -u— username for SSH connection |
NOTE:
-
When your SSH connection is based on keys, there's no need for the
-kflag -
If you don't specify an SSH username, it will automatically use currently logged in username.
-
After the playbook finishes running (without errors), access your DHIS2, Glowroot and Munin monitoring instances:
Note:
<hostname>= yourfqdnif defined, otherwise your server's IP address.https://<hostname>/dhis https://<hostname>/dhis-glowroot https://<hostname>/munin
-
Edit the inventory hosts file by running the command below and add an entry line under
[instances]category, ensure the instance name and the value ofansible_host(instance private IP) are unique.vim dhis2-server-tools/deploy/inventory/hosts -
Example
[web] proxy ansible_host=172.19.2.2 # database servers/containers [databases] postgres ansible_host=172.19.1.20 # dhis2 servers/containers [instances] hmis ansible_host=172.19.2.11 database_host=postgres dhis2_version=2.39 proxy_rewrite=True training ansible_host=172.19.2.12 database_host=postgres dhis2_version=2.39 # <-- add new instance here # monitoring server/container [monitoring] monitor ansible_host=172.19.2.30
-
re-run the installation as explained on Step 5 — The Install or Step 7: Run the playbook depending on your deployment architecture.
- You will need to have two files, named
customssl.crtandcustomssl.key.
customssl.crtshould contain the main certificate concatenated with intermediate and root certificates. - Copy these two files into
dhis2-server-tools/deploy/roles/proxy/files/directory, preserving their names. - Edit hosts file and set
TLS_TYPE=customsslvim dhis2-server-tools/deploy/inventory/hosts# Options: nginx, apache2 defaults to nginx proxy=nginx # Options: letsencrypt, customssl, default(letsencrypt) SSL_TYPE=customssl
- re-run the installation as explained on Step 5 — The Install or Step 7: Run the playbook depending on your deployment architecture.
At this point you should have DHIS2 up and running.
Note:
<hostname>= yourfqdnif defined, otherwise your server's IP address.
- DHIS2 —
https://<hostname>/dhis - Glowroot —
https://<hostname>/dhis-glowroot(glowroot.org for application performance monitoring) - Munin —
https://<hostname>/munin(munin-monitoring.org for server resource monitoring)- If you changed
munin_base_path:https://<hostname>/<your_munin_base_path>
- If you changed
Default credentials: Username:
admin/ Password:districtImportant: Change these default passwords immediately after your first login.