Book Image

Ansible Quick Start Guide

By : Mohamed Alibi
Book Image

Ansible Quick Start Guide

By: Mohamed Alibi

Overview of this book

Configuration Management (CM) tools help administrators reduce their workload. Ansible is one of the best Configuration Management tools, and can act as an orchestrator for managing other CMs. This book is the easiest way to learn how to use Ansible as an orchestrator and a Configuration Management tool. With this book, you will learn how to control and monitor computer and network infrastructures of any size,physical or virtual. You will begin by learning about the Ansible client-server architecture. To get started, you will set up and configure an Ansible server. You will then go through the major features of Ansible: Playbook and Inventory. Then, we will look at Ansible systems and network modules. You will then use Ansible to enable infrastructure automated configuration management, followed by best practices for using Ansible roles and community modules. Finally, you will explore Ansible features such as Ansible Vault, Ansible Containers, and Ansible plugins.
Table of Contents (15 chapters)
Title Page
Copyright and Credits
Packt Upsell
Contributors
Preface
Index

Chapter 6. Ansible Coding for Configuration Management

The main way in which you'll learn Ansible coding is by writing your own Ansible playbooks, either for fun or to solve your own infrastructure challenges. However, at a certain point, things may start to get complicated. Your code might be working, but how do you know if it is really doing the task in the right way? Is it efficient? How scalable will it be? Using meaningful names makes it easier to understand your code. Issues may also arise to do with script organization: it is easy to end up with a folder filled with several scripts, even if they have nothing to do with each other.

In this chapter, we're going to talk about the standards and best practices for writing Ansible playbooks. We are aiming to improve our playbooks by speeding up tasks, improving security, providing accommodation for built-in infrastructure redundancy systems, optimizing their tasks, and reducing code repetition to produce smaller playbooks with the same functionality...