Ansible 2.9, or maybe just this time in history, was a great time for simple configuration management that (mostly) just worked.
Category: Ansible
How to add an inline comment using Ansible.
Out of the box, security with Docker (and Docker Swarm) over the network is bad. Okay, that’s not entirely true. Out of the box when you have no containers started, it’s fine. But after you start a container, and if you publish a port, they are exposed to the outside world by default. And it’s not easy to fix. You need to create a custom Docker firewall with iptables.
Ansible is used to do so many things. And if you already use Ansible for your automation tasks then you already have it ready to go. So why not use Ansible to test network connectivity?
Ansible is a great tool to automate all the things. Another task it can help to automate is user management. This guide will be talking specifically about user management on Linux servers like Red Hat Enterprise Linux (RHEL), CentOS, or Ubuntu. Ansible can handle this task!
Ansible can use encrypted files, using a feature called Ansible Vault. This is great for sensitive information that you don’t want to store as a normal text file since you are able to encrypt this data in your souce control.
This is a guide to getting started with Ansible. By the end of this guide, you will be up and running with Ansible.
Included is an Ansible role that will create a user which is used by Ansible to connect to your remote servers. Let’s go! After installing Ansible, you will need to setup Ansible by following these steps.
Using a VPN can help to protect your privacy. You can use a VPN to appear like you are in another country to reach a website that was previously blocked, to stop your ISP from restricting you to certain websites, and when travelling to protect your data while using insecure WiFi. There’s another: ad blocking.