Hyperledger Fabric-X is an open source project that builds on top of Hyperledger Fabric and is tailored specifically for digital asset use cases. Fabric-X builds on the core principles of Hyperledger Fabric (sovereign, horizontally scalable smart contract execution and a modular, agile architecture), making it well-suited to meet the governance and compliance needs of regulated digital assets.
This repository contains the hyperledger.fabricx Ansible collection, which can be used to deploy a Hyperledger Fabric-X network locally, on Kubernetes, or across multiple nodes.
- Installation
- Usage
- Prerequisites
- Run a sample Fabric-X network
- Supported commands
- Contributing
- License
To install the latest published version of the hyperledger.fabricx collection from Ansible Galaxy, run:
ansible-galaxy collection install hyperledger.fabricxThen install the collection's dependencies:
ansible-galaxy collection install -r ~/.ansible/collections/ansible_collections/hyperledger/fabricx/requirements.ymlTo install the hyperledger.fabricx collection on your control node, run:
Note
This is the recommended way if you plan to develop and change the scripts, since it allows to test directly the modified scripts avoiding to reinstall the collection at every change.
git clone https://github.com/LF-Decentralized-Trust-labs/fabric-x-ansible-collection.git ~/.ansible/collections/ansible_collections/hyperledger/fabricx
cd ~/.ansible/collections/ansible_collections/hyperledger/fabricx
make install-depsWarning
Do not run make install with this setup — the collection is already live from the cloned directory. Running it would overwrite your checkout with a built artifact. Use make install-deps to install dependencies only. The Makefile will also guard against this and abort if it detects the risk.
If you don't know where the COLLECTIONS_PATHS is located, or you don't plan to develop/change the Ansible scripts within the collection, you can install from source using the commands:
git clone https://github.com/LF-Decentralized-Trust-labs/fabric-x-ansible-collection.git
cd fabric-x-ansible-collection
make installThe collection provides a set of Ansible roles that can be used to deploy a Hyperledger Fabric-X network in a distributed manner. Each role is devoted to a specific component.
Each role comes with tasks and each task performs a specific operation, such as starting, stopping, configuring, or wiping a component. The collection also includes predefined playbooks that compose these roles into common lifecycle operations. If your inventory follows the expected group names, you can use those playbooks directly instead of writing your own orchestration layer.
The collection is organized around three concepts:
| Concept | Description |
|---|---|
| Roles | Low-level component automation. Use these when you need custom orchestration. |
| Playbooks | Reusable lifecycle workflows that call the roles in the expected order. |
| Inventories | The deployment model: which components exist, where they run, which ports they use, and which security/runtime mode is enabled. |
For example, the playbook playbooks/orderer/start.yaml shows how to use the hyperledger.fabricx.orderer role to start a Fabric-X Orderer node:
- name: Start Fabric-X Orderer components
ansible.builtin.include_role:
name: hyperledger.fabricx.orderer
tasks_from: startFor more information, see the roles, playbooks, and example inventories documentation.
To run such Ansible collection, you need to have the following prerequisites installed on your control node:
python>= 3.11;dockerorpodman;go>= 2.16 (only needed if you run binary-based inventories);kubectl(needed to run k8s inventories).
After having cloned this repository, run:
make install-depsThe collection comes with a playbook that can be used to automatically setup all the remote nodes at once. From your control node, run:
make install-remote-node-depsWarning
The playbook installs the needed packages and requires sudo permission. Make sure to use a passwordless sudo user so the playbook can complete.
This repository comes with Ansible inventories and example playbooks that can start sample Fabric-X networks on your local machine, in Kubernetes, or across multiple machines. See the examples README for the available inventory families.
By default, the local/fabric-x.yaml inventory is used:
This diagram shows the default local sample topology: Fabric CA services issue identities, four orderer groups produce ordered blocks, a PostgreSQL-backed committer validates and stores state, and monitoring collects metrics.
To run it on your local machine, follow these steps.
The sample lifecycle is:
flowchart LR
setup[make setup] --> start[make start]
start --> init[make init]
The current sample inventory families are:
| Family | Documentation | Notes |
|---|---|---|
| Local | Local inventories | Single-machine deployment, useful for trying and testing on your local machine |
| Distributed | Distributed inventories | Multi-machine deployment to scale the network and test high-throughput use-cases |
| Kubernetes | Kubernetes inventories | Kubernetes deployments |
Set ANSIBLE_INVENTORY to use another inventory without editing examples/ansible.cfg:
export ANSIBLE_INVENTORY=examples/inventory/k8s/fabric-x.yamlIf you run a local container inventory on macOS, you can run into connectivity issues between host processes and containers. Docker and Podman run Linux containers in a VM, so localhost inside a container is not the same endpoint as localhost on macOS.
Set LOCAL_ANSIBLE_HOST so generated configuration points at an address containers can resolve:
# add this to .bashrc or any other file sourced by your shell
export LOCAL_ANSIBLE_HOST="host.docker.internal"If binaries also need to resolve the same name from the macOS host, add it to /etc/hosts:
echo "127.0.0.1 host.docker.internal" | sudo tee -a /etc/hostsThe first step consists in generating the artifacts needed by the nodes to run:
make setupOnce the artifacts have been correctly generated and distributed, you can start the nodes with the command:
make startAfter the components are up, run:
make initThis command runs post-start initialization, such as creating the namespaces indicated in the inventory using fxconfig.
You can access Grafana dashboards (user=admin, password=adminPWD) to see how the Fabric-X network is handling the transactions processing.
Note
These Grafana credentials are sample defaults. Change them before using an adapted inventory in a shared environment.
To shut the network down, run:
make teardownThe command proceeds by stopping all the running instances and also cleaning any artifact that has been generated on disk by such instances.
All the high-level commands are defined within the Makefile. To get the list of all the possible commands, run:
make helpThe most frequently used commands are:
| Command | Usage |
|---|---|
install |
Build and install the hyperledger.fabricx collection locally. |
install-deps |
Wrapper for install-venv + install-python-deps + install-ansible-deps. |
install-venv |
Install a venv environment. |
install-python-deps |
Install Python dependencies on the control node. |
install-ansible-deps |
Install the Ansible collections required by this repository. |
install-remote-node-deps |
Install the needed dependencies on the remote hosts. |
lint |
Run ansible-lint checks. |
check-license-header |
Verify license headers on all files. |
check-trailing-spaces |
Check for trailing spaces in .j2 files. |
login-cr |
Log a container engine within a container registry. |
setup |
Wrapper for binaries + artifacts + configs. |
artifacts |
Wrapper for generate-crypto + genesis-block. |
generate-crypto |
Generate the crypto material on the controller node. |
genesis-block |
Build the genesis block for the network. |
binaries |
Build/install binaries on controller or remote nodes for the targeted hosts. |
clean |
Clean all the artifacts and binaries built on the controller node. |
clean-cache |
Clean the Ansible cache. |
configs |
Create/Ship the configs to the remote nodes. |
start |
Start the targeted hosts. |
stop |
Stop the targeted hosts without deleting the data. |
teardown |
Teardown the targeted hosts (stop and delete data). |
update |
Update the targeted hosts (stop + binaries + start). |
restart |
Restart the targeted hosts (stop + start). |
hard-restart |
Hard restart the targeted hosts (teardown + start). |
wipe |
Wipe out the config artifacts and the binaries from the remote hosts. |
hard-wipe |
Wipe the deploy folder from the remote hosts. |
targets |
Generate Makefile targets for all inventory hosts. |
run-command |
Run a generic command on the targeted hosts. |
ping |
Check that the component ports are open. |
get-metrics |
Get the metrics from the targeted components. |
fetch-crypto |
Fetch the crypto material from the targeted hosts. |
fetch-logs |
Fetch the logs from the targeted hosts. |
limit-rate |
Set the TPS rate on the load generators. |
By default all the Makefile commands target all the hosts which are defined within the reference inventory. However, the playbooks have been tailored in such a way that the actions can be restricted to a sub-group (or even a single host) through the target_hosts Ansible variable, which is reflected as the TARGET_HOSTS variable in the Makefile.
The Makefile comes with a set of predefined host groups that can be used to easily restrict commands:
| Group | Target |
|---|---|
fabric_cas |
The Fabric CA servers |
fabric_x |
The Fabric-X network nodes (orderers+committer). |
fabric_x_orderers |
All the Fabric-X orderers. |
fabric_x_committer |
The Fabric-X committer components. |
load_generators |
All the load_generators. |
monitoring |
All the monitoring instances. |
For example, running:
make fabric_x_orderers startrestricts the command to the host group fabric_x_orderers defined within the inventory.
All these groups are reflected in the sample inventories. If you plan to use the playbooks provided with the collection, keep the group names identical so the high-level lifecycle commands keep working.
Contributions to this project are welcomed and encouraged.
If you'd like to help improve this project, please follow these steps:
-
Fork the repository;
-
Create a new branch for your feature or bugfix:
git checkout -b your-feature-nameRole READMEs and role defaults are automatically generated from meta/argument_specs.yaml. When you add a new role task entry point or introduce variables for an existing entry point, update that role's argument_specs.yaml and then run:
make generate-roles-docsThis project is licensed under the Apache License 2.0.
You are free to use, modify, and distribute this software in accordance with the terms of the license.
For more details, please refer to the LICENSE file included in this repository.
