ansible   9785

« earlier    

How to use Vagrant for Ansible role testing and development
Vagrant is a tool used for building, destroying, recreating and managing virtual machines and development environments with a focus on automation, combined with the Ansible Provisioner it can be used for testing and developing Ansible Playbooks and roles.

In this I article describe why and how I use Vagrant for testing while developing new Ansible roles and how you can make your live a little easier with Vagrant and Ansible.

If you are already familiar with the baisics of Vagrant and want to jump right to the Juicy bits you can skip over to here.
ansible  virtualbox  vagrant  testing  devops 
yesterday by base10
Safely storing Ansible playbook secrets | On Web Security
More and more organizations use dedicated software to safely handle the creation and management of secrets (for example SSL certificate keys, private variables and passwords). Three 'well known' solutions are Square's Keywhiz, Hashicorp's Vault and crypt in combination with etcd or consul. As with all security solutions the roll-out can be quite cumbersome. The correct implementation (think key management, think audit trails, think key recovery) of any one of these solutions is difficult. And difficult means that most people won't use it, at least not right away (remember SELinux ?). There are a number of tools available to encrypt secrets within (Ansible) repositories. One of them for instance is Ansible Vault (look here for a more in-depth review). Although the idea of selectively encrypting data is a good one, text-oriented version control systems like git or Subversion aren't meant to store binary blobs of encrypted data. Moreover you still run the risk of accidentally uploading or sharing unencrypted files. Mitigations like adding filenames of unencrypted secrets to a .gitignore file are error-prone. How to facilitate developers and system operators to store secrets in a safe place, outside the repositories where Ansible playbooks and configuration files are kept ? This article describes a …
ansible  devops  secrets  tutorial 
yesterday by mrbarker
ansible | realguess
Just a blog about every detail encountered.
ansible  devops  update  server  reboot  howto 
yesterday by mrbarker

« earlier    

related tags

/etc/hosts  ]  ansible_fqdn  atom  automation  aws  awx  azure  bastion  blog  cfgmgmtcamp  cheat  chef  cloud  comparison  concatenate  configuration-management  continuousintegration  copy  devops  dns  docker-swarm  docker  dotfiles  drupal  ec2  elasticsearch  elk  email  exists  explanation  file  generate  github  gitlab  golang  guillaumeduveau  hosting  howto  include  infrastructure-as-code  interactive  jinja  keyboard  kibana  letsencrypt  list  logging  logstash  london  macbook  macos  medium  meetups  merge  module  molecule  monitoring  openshift  opensource  operation  packer  playbook  programming  puppet  python  reboot  redhat  reference  salt  secrets  server  serverfault  sheet  slide  ssh  ssl  stackoverflow  sysadmin  systemsmanager  task  tdd  techevents  terraform  test-kitchen  testing  tip  tips  todo  tools  tr-2018-02  tricks  tutorial  update  user  vagrant  vars  vim  virtualbox  virtualization  vmware  vps  vscode  vultr  windows  zabbix   

Copy this bookmark: