SlideShare a Scribd company logo
1 of 25
1
Whiteklay technologies Pvt Ltd
www.whiteklay.com - info@whiteklay.com
Need and Importance
of an Ansible
2
Whiteklay Technologies
Mandar D Gogate
Bigdata-DevOps Engineer
Whiteklay Technologies Pvt.
Ltd.
Email :- mandar.g@whiteklay.in
Website : www.whiteklay.com
About The Presenter
3
Whiteklay Technologies
Agenda:-
• Before Ansible..
• After Ansible came in to picture
• How – It Works
• Installation
• Ad-hoc commands
• Inventory
• Playbooks
• Handlers
• Roles
• Modules
• Ansible Galaxy
4
Whiteklay Technologies
What we do..
i) Building VM template
ii) Cluster configuration
iii) Storage Management
iv) Alert Monitoring
v) Customer Support
vi) Software Deployment
vii) Authorization / Authentication
viii) Performance Testing
ix) Software Upgradation
x) OS Upgradation
5
Whiteklay Technologies
How we do it..
Building VM template
i) ISO install & configuration
ii) Network setup
iii) Set up User/Group,Security
iv) Software install & Configure
Server Maintenance
i) Ssh into each server & restart service
ii) Write scripts to log in to each server & update openssl
Building Clustors
i) Cloning no. of VMs from templates
ii) Hostname / Network Configuration
iii) Firewall configuration
6
Whiteklay Technologies
7
Whiteklay Technologies
Frustrated Admin..!
8
Whiteklay Technologies
Ansible coming to rescue..!
9
Whiteklay Technologies
Ansible:-
1) It is simple and easy to learn IT automation
system.
2) It handles configuration-management,
application deployment.
3) It provides cloud provisioning, ad-hoc task-
execution with multimode orchestration.
4) It also provides zero downtime rolling
updates with load balancers.
#Read the document and more at :-
http://ansible.com/
10
Whiteklay Technologies
Features:-
i) Agent less
ii) Uses ssh
iii) Everything is a YAML file
iv) Easily extensible via modules
v) Encryption and Security built in
vi) More feature available in enterprise ( Tower)
vii) Idempotent
11
Whiteklay Technologies
How it works..?
Building Blocks:-
i) Inventory
ii) Ad-hoc commands
ii) Playbook :-
a) Tasks
b) Variables
c) Roles
d) Handlers
e) Templates
f) Modules
12
Whiteklay Technologies
Installation:-
Control Machine Managed Nodes
ssh 
Python >= 2.6/2.7
Different ansible installation commands:-
# pip install ansible
# yum install ansible
# apt-get install ansible
Python >= 2.5
13
Whiteklay Technologies
Ad-hoc commands:-
Control Machine Managed Nodes
ssh 
ssh 
ssh 
Host1
Host2
Host3
Inventory File:-
Host1
Host2
Host3
14
Whiteklay Technologies
Mechanism Overview:-
15
Whiteklay Technologies
Structure of an inventory file:-
[webservers]
Host1 <ip>
[lamp]
Host2 <ip>
Host3 <ip>
16
Whiteklay Technologies
Playbooks - Example
17
Whiteklay Technologies
Playbooks- Tasks
18
Whiteklay Technologies
ansible-playbook run
19
Whiteklay Technologies
Handlers:-
i) They are just written like a regular task
ii) They indicates a change in the system
iii)Any module can be used for the handler action
iv) Only run if triggered by the notify directive
Handler example:-
-name: Restart the tomcat
service : name= tomcat state=restarted
20
Whiteklay Technologies
Roles:-
21
Whiteklay Technologies
Roles:-
It is a way of automatically loading certain vars_files,
tasks and handlers based on a known file structure.
22
Whiteklay Technologies
• Tasks - contains the main list of tasks to be
executed by the role.
• Handlers - contains handlers, which may be used by
the role or even anywhere outside the role.
• defaults - default variables for the role.
• vars - other variables for the role.
• files - contains files which can be deployed via the
role.
• templates - contains templates which can be
deployed via the role.
• meta - defines some meta data for the role.
Meaning & Use of different directories of
Roles:-
23
Whiteklay Technologies
Modules:-
• Ansible ships with a number of modules (more
than 1000.)
• They are reusable, standalone scripts that can
be used by the Ansible API, or by
the ansible or ansible-playbook programs.
• They can be executed directly on remote hosts
or through Playbooks.
• Users can also write their own modules.
• They can control system resources, like
services, packages, or files (anything really), or
handle executing system commands.
• They take parameters and conditions to define
desired state.
24
Whiteklay Technologies
Ansible Galaxy:-
25
Whiteklay Technologies
Thank you..!

More Related Content

What's hot

Openstack glance
Openstack glanceOpenstack glance
Openstack glance
SHAMEEM F
 

What's hot (20)

Open Stack compute-service-nova
Open Stack compute-service-novaOpen Stack compute-service-nova
Open Stack compute-service-nova
 
DockerCoreNet
DockerCoreNetDockerCoreNet
DockerCoreNet
 
How to Install & Configure Your Own Identity Manager GE
How to Install & Configure Your Own Identity Manager GEHow to Install & Configure Your Own Identity Manager GE
How to Install & Configure Your Own Identity Manager GE
 
CI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in KubernetesCI / CD / CS - Continuous Security in Kubernetes
CI / CD / CS - Continuous Security in Kubernetes
 
OpenStack Glance
OpenStack GlanceOpenStack Glance
OpenStack Glance
 
WSO2 Microservices Framework for Java - Product Overview
WSO2 Microservices Framework for Java - Product OverviewWSO2 Microservices Framework for Java - Product Overview
WSO2 Microservices Framework for Java - Product Overview
 
Docker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on LinuxDocker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on Linux
 
What Prometheus means for monitoring vendors
What Prometheus means for monitoring vendorsWhat Prometheus means for monitoring vendors
What Prometheus means for monitoring vendors
 
World Domination Through Helix Broker
World Domination Through Helix BrokerWorld Domination Through Helix Broker
World Domination Through Helix Broker
 
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
 
oVirt 4.3 highlights
oVirt 4.3 highlightsoVirt 4.3 highlights
oVirt 4.3 highlights
 
Testing Docker Security Linuxlab 2017
Testing Docker Security Linuxlab 2017Testing Docker Security Linuxlab 2017
Testing Docker Security Linuxlab 2017
 
Openstack glance
Openstack glanceOpenstack glance
Openstack glance
 
SF Bay Area OpenStack Meetup Stacki Presentation
SF Bay Area OpenStack Meetup Stacki Presentation SF Bay Area OpenStack Meetup Stacki Presentation
SF Bay Area OpenStack Meetup Stacki Presentation
 
Continuous Integration for Fun and Profit
Continuous Integration for Fun and ProfitContinuous Integration for Fun and Profit
Continuous Integration for Fun and Profit
 
Microsoft Azure 新功能導覽 @ Build 2014
Microsoft Azure 新功能導覽 @ Build 2014Microsoft Azure 新功能導覽 @ Build 2014
Microsoft Azure 新功能導覽 @ Build 2014
 
Managing ceph through_oVirt_using_Cinder
Managing ceph through_oVirt_using_CinderManaging ceph through_oVirt_using_Cinder
Managing ceph through_oVirt_using_Cinder
 
Docker Security
Docker SecurityDocker Security
Docker Security
 
45c
45c45c
45c
 
Monitoring hybrid container environments
Monitoring hybrid container environments Monitoring hybrid container environments
Monitoring hybrid container environments
 

Similar to The Need and Importance of Ansible

Similar to The Need and Importance of Ansible (20)

OSDC 2018 | Highly Available Cloud Foundry on Kubernetes by Cornelius Schumacher
OSDC 2018 | Highly Available Cloud Foundry on Kubernetes by Cornelius SchumacherOSDC 2018 | Highly Available Cloud Foundry on Kubernetes by Cornelius Schumacher
OSDC 2018 | Highly Available Cloud Foundry on Kubernetes by Cornelius Schumacher
 
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxThe Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
 
Azure meetup cloud native concepts - may 28th 2018
Azure meetup   cloud native concepts - may 28th 2018Azure meetup   cloud native concepts - may 28th 2018
Azure meetup cloud native concepts - may 28th 2018
 
Defcon - Veil-Pillage
Defcon - Veil-PillageDefcon - Veil-Pillage
Defcon - Veil-Pillage
 
Nagios Conference 2014 - Mike Weber - Nagios Rapid Deployment Options
Nagios Conference 2014 - Mike Weber - Nagios Rapid Deployment OptionsNagios Conference 2014 - Mike Weber - Nagios Rapid Deployment Options
Nagios Conference 2014 - Mike Weber - Nagios Rapid Deployment Options
 
Watch How The Giants Fall: Learning from Bug Bounty Results
Watch How The Giants Fall: Learning from Bug Bounty ResultsWatch How The Giants Fall: Learning from Bug Bounty Results
Watch How The Giants Fall: Learning from Bug Bounty Results
 
CV_RishabhDixit
CV_RishabhDixitCV_RishabhDixit
CV_RishabhDixit
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of them
 
Open Audit
Open AuditOpen Audit
Open Audit
 
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux ContainersSecuring the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
 
Openstack Third-Party CI and the review of a few Openstack Infrastructure pro...
Openstack Third-Party CI and the review of a few Openstack Infrastructure pro...Openstack Third-Party CI and the review of a few Openstack Infrastructure pro...
Openstack Third-Party CI and the review of a few Openstack Infrastructure pro...
 
Fiware cloud developers week brussels
Fiware cloud developers week brusselsFiware cloud developers week brussels
Fiware cloud developers week brussels
 
ZStack architecture overview
ZStack architecture overviewZStack architecture overview
ZStack architecture overview
 
Effective administration of IBM Integration Bus - Sanjay Nagchowdhury
Effective administration of IBM Integration Bus - Sanjay NagchowdhuryEffective administration of IBM Integration Bus - Sanjay Nagchowdhury
Effective administration of IBM Integration Bus - Sanjay Nagchowdhury
 
A Distributed Malware Analysis System Cuckoo Sandbox
A Distributed Malware Analysis System Cuckoo SandboxA Distributed Malware Analysis System Cuckoo Sandbox
A Distributed Malware Analysis System Cuckoo Sandbox
 
PyCon India 2012: Celery Talk
PyCon India 2012: Celery TalkPyCon India 2012: Celery Talk
PyCon India 2012: Celery Talk
 
Get Rapid Right-sized and Recent with the Liberty Repository
Get Rapid Right-sized and Recent with the Liberty RepositoryGet Rapid Right-sized and Recent with the Liberty Repository
Get Rapid Right-sized and Recent with the Liberty Repository
 
Magento infrastructure by OpsWay
Magento infrastructure by OpsWayMagento infrastructure by OpsWay
Magento infrastructure by OpsWay
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
 
O'Reilly Software Architecture Conference London 2017: Building Resilient Mic...
O'Reilly Software Architecture Conference London 2017: Building Resilient Mic...O'Reilly Software Architecture Conference London 2017: Building Resilient Mic...
O'Reilly Software Architecture Conference London 2017: Building Resilient Mic...
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

The Need and Importance of Ansible