By Jeff Geerling
Covers Ansible 2.0!
Ansible is an easy, yet strong, server and configuration administration instrument (with a couple of different methods up its sleeve). This booklet is helping these conversant in the command line and uncomplicated shell scripting commence utilizing Ansible to provision and deal with at any place from one to hundreds of thousands of servers.
The publication starts with basics, like fitting Ansible, developing a easy stock dossier, and simple strategies, then courses you thru Ansible's many makes use of, together with ad-hoc instructions, easy and complicated playbooks, program deployments, multiple-provider server provisioning, or even Docker orchestration! every thing is defined with pertinent real-world examples, frequently utilizing Vagrant-managed digital machines.
Read or Download Ansible for DevOps: Server and configuration management for humans PDF
Similar linux books
The 1st bankruptcy of Linux strategies deals a great exposition of Linux, its historical past, its communtiy, and the way it suits into the realm of computing. bankruptcy is a great define of modern most well-liked Linux distributions.
Unfortunately, for these new to Linux and the Linux group, the ebook doesn't clarify how one can get aid out of your neighborhood consumer crew or the phenomenon of the installfest. as with all revealed ebook, a few of the specifics have been out of date while it went to press.
I have a web page approximately this booklet on my wiki: wsms. wikiplanet. com, which i'll replace from time-to-time.
This ebook is set programming within the Bourne shell and its derivatives the Korn shell, theBourneagain shell, and the POSIX shell are one of the most evident family. This publication doesnot disguise the various different UNIX and UNIX-likeshells, similar to Plan 9’s rc, or the Berkeley csh. It does disguise a couple of universal UNIX instructions, in addition to a number of a little much less commoncommands, and in short appears to be like into a few universal utilities, comparable to sed and awk, which havehistorically been used seriously in shell scripting.
In an effort to excel on your paintings as a Linux administrator, or even land a role as one, you would like this booklet. the volume of information and services required of Linux directors has grown drastically during the last 10 years. this present day you wish an grand number of talents, numerous of them very new. This publication presents builders, company architects, and location reliability engineers with a valid creation to bleeding-edge Linux-based instruments and applied sciences for either improvement and creation environments.
- Nginx Essentials
- LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-400 and Exam 102-400
- Linux Pocket Guide (2nd Edition)
- Pro PowerShell for Amazon Web Services DevOps for the AWS Cloud
Extra resources for Ansible for DevOps: Server and configuration management for humans
That way you have a full server environment to work with when learning Ansible—and when you’re finished testing, delete the server and you’ll only be billed a few pennies! com in the above example with the name or IP address of your server. Chapter 1 - Getting Started with Ansible 7 Running your first Ad-Hoc Ansible command Now that you’ve installed Ansible and created an inventory file, it’s time to run a command to see if everything works! Enter the following in the terminal (we’ll do something safe so it doesn’t make any changes on the server): $ ansible example -m ping -u [username] …where [username] is the user you use to log into the server.
For speedier testing and development of Ansible playbooks, and for testing in general, it’s a very good idea to work locally. Local development and testing of infrastructure is both safer and faster than doing it on remote/live machines—especially in production environments! In the past decade, test-driven development (TDD), in one form or another, has become the norm for much of the software industry. Infrastructure development hasn’t been as organized until recently, and best practices dictate that infrastructure (which is becoming more and more important to the software that runs on it) should be thoroughly tested as well.
Create an empty text file in the same folder as your Vagrantfile, and put in the following contents: 1 2 3 4 5 6 7 8 --- hosts: all sudo: yes tasks: - name: Ensure NTP (for time synchronization) is installed. yum: name=ntp state=present - name: Ensure NTP is running. service: name=ntpd state=started enabled=yes I’ll get into what this playbook is doing in a minute. For now, let’s run the playbook on our VM. yml file, and enter vagrant provision. You should see status messages for each of the ‘tasks’ you defined, and then a recap showing what Ansible did on your VM—something like the following: PLAY RECAP ********************************************************** default : ok=3 changed=1 unreachable=0 failed=0 Ansible just took the simple playbook you defined, parsed the YAML syntax, and ran a bunch of commands via SSH to configure the server as you specified.