Skip to main content

Essentials Ansible Modules

Ansible is a reliable configuration management tool. It is shipped with a lot of modules including those provided by the communities. Some modules are essential and come in very handy in everyday tasks.

Ansible is pushed-based and works by generating a Python script that will be run on the target server. It means the target server is required to have Python which is also commonly shipped in any Linux distros.


package

The module is used to manage packages in the target host. It is like running apt, yum, or aptitude. The following snippet is an example of its usage to install the Nginx package using the package manager.

tasks:
  - name: Install Nginx
    package:
      name: nginx
      state: present
      update_cache: True

file

It is used to manage files, symlinks, links, or folders on the target host. These are the two examples.

tasks:
  - name: Create a directory
    file:
      path: "/home/luki/mydir"
      state: directory
      mode: 0750
  - name: Copy a file
    file:
      src: "/home/luki/my.conf"
      dest: "/etc/my.conf"
      state: link

copy

It is used to move files from Ansible (local) host to the target host. For example, we want to copy two files in a local directory to another directory in the remote host.

tasks:
  - name: Copy files
    copy:
      src: "files/{{ item }}"
      dest: "/home/luki/files"
      mode: 0644
    loop:
      - "file1.txt"
      - "file2.txt"

template

It works very similarly to copy but it will generate the content of the file based on the specified template. The template is based on Jinja. It can be advantageous when we want to create configuration files whose contents depend on local or remote variables.

tasks:
  - name: Copy homepage
    template:
      src: templates/index.html.j2
      dest: "{{ web_root }}/index.html"

The following snippet is an example of the index.html.j2 file. It passes two variables that are natively maintained by Ansible. The output file will have those variables replaced with the actual values.

<body>
  <h1>Server is configured by Ansible</h1>
  <ul>
    <li>Host IP: {{ ansible_host }}</li>
    <li>Host User: {{ ansible_user }}</li>
  </ul>
</body>

service

Having services or daemon programs that always run on a server is common. This module will be an abstraction for maintaining the services whatever service manager we use, systemd or systemctl.

tasks:
  - name: Restart nginx
    service:
      name: nginx
      state: restarted

get_url

Rather than using curl tool available on Linux, it is recommended to use this module. The module can monitor the existence of the downloaded file and decide whether a download should be run based on some properties.

tasks:
  - name: Download My File
    get_url:
      url: https://website.com/files/my-file
      dest: ~/file.txt
      force: True

shell

If there are actions that Ansible is not covered yet or we need to execute certain functions on the remote host, the shell module comes in handy. The module allows us to execute Linux shell commands. The following example shows a call to the curl CLI tool through a shell. The args section is an alternative way to pass shell module's supported arguments while we use a string as shell's value.

tasks:
  - name: Install NVM
    shell: >
      curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.3/install.sh | bash
    args:
      creates: "{{ ansible_env.HOME }}/.nvm/nvm.sh"

apt

This module is very similar to the package module. The difference is that it uses APT explicitly while the package module prefers to use aptitude. The supported arguments are also very similar.

tasks:
  - name: Install Docker required packages
    apt:
      force_apt_get: True
      force: True # allow_unauthenticated && allow_downgrade
      name:
        - ca-certificates
        - curl
        - gnupg
        - lsb-release
      state: latest
      update_cache: True

apt_repository

If we need to add items to the APT source list, we can utilize this module. It is safer than using a shell script to append items to the list because as we know Ansible call is idempotent so we don't need to validate if there is any duplication.

tasks:
  - name: Add Docker's repository
    apt_repository:
      filename: docker 
      repo: "deb [arch={{ [ansible_architecture] | map('extract', deb_architectures) | first }} signed-by=/etc/apt/keyrings/docker.gpg] https://download.docker.com/linux/ubuntu {{ ansible_distribution_release }} stable"
      state: present

debug

It can be used to display any messages from previous tasks or other system processes. The following example shows an example of using it for displaying some host variables.

tasks:
  - name: Debug environment variables
    debug:
      msg: "{{ ansible_env }}"
  - name: Debug host information
    debug:
      msg: "{{ item }}"
    with_items:
      - "{{ ansible_distribution }}"
      - "{{ ansible_distribution_version }}"
      - "{{ ansible_distribution_release }}" # same as command: lsb_release -cs
      - "{{ ansible_architecture }}"

Comments

Popular posts from this blog

Deliver SaaS According Twelve-Factor App

If you haven't heard of  the twelve-factor app , it gives us a recommendation or a methodology for developing SaaS or web apps structured into twelve items. The recommendation has some connections with microservice architecture and cloud-native environments which become more popular today. We can learn the details on its website . In this post, we will do a quick review of the twelve points. One Codebase Multiple Deployment We should maintain only one codebase for our application even though the application may be deployed into multiple environments like development, staging, and production. Having multiple codebases will lead to any kinds of complicated issues. Explicitly State Dependencies All the dependencies for running our application should be stated in the project itself. Many programming languages have a kind of file that maintains a list of the dependencies like package.json in Node.js. We should also be aware of the dependencies related to the pla...

Rangkaian Sensor Infrared dengan Photo Dioda

Keunggulan photodioda dibandingkan LDR adalah photodioda lebih tidak rentan terhadap noise karena hanya menerima sinar infrared, sedangkan LDR menerima seluruh cahaya yang ada termasuk infrared. Rangkaian yang akan kita gunakan adalah seperti gambar di bawah ini. Pada saat intensitas Infrared yang diterima Photodiode besar maka tahanan Photodiode menjadi kecil, sedangkan jika intensitas Infrared yang diterima Photodiode kecil maka tahanan yang dimiliki photodiode besar. Jika  tahanan photodiode kecil  maka tegangan  V- akan kecil . Misal tahanan photodiode mengecil menjadi 10kOhm. Maka dengan teorema pembagi tegangan: V- = Rrx/(Rrx + R2) x Vcc V- = 10 / (10+10) x Vcc V- = (1/2) x 5 Volt V- = 2.5 Volt Sedangkan jika  tahanan photodiode besar  maka tegangan  V- akan besar  (mendekati nilai Vcc). Misal tahanan photodiode menjadi 150kOhm. Maka dengan teorema pembagi tegangan: V- = Rrx/(Rrx + R2) x Vcc V- = 150 / (1...

Configuring Swap Memory on Ubuntu Using Ansible

If we maintain a Linux machine with a low memory capacity while we are required to run an application with high memory consumption, enabling swap memory is an option. Ansible can be utilized as a helper tool to automate the creation of swap memory. A swap file can be allocated in the available storage of the machine. The swap file then can be assigned as a swap memory. Firstly, we should prepare the inventory file. The following snippet is an example, you must provide your own configuration. [server] 192.168.1.2 [server:vars] ansible_user=root ansible_ssh_private_key_file=~/.ssh/id_rsa Secondly, we need to prepare the task file that contains not only the tasks but also some variables and connection information. For instance, we set /swapfile  as the name of our swap file. We also set the swap memory size to 2GB and the swappiness level to 60. - hosts: server become: true vars: swap_vars: size: 2G swappiness: 60 For simplicity, we only check the...

Free Cloud Services from UpCloud

Although I typically deploy my development environment or experimental services on UpCloud , I do not always stay updated on its announcements. Recently, I discovered that UpCloud has introduced a new plan called the Essentials plan, which enables certain cloud services to be deployed at no cost. The complimentary services are generally associated with network components or serve as the foundation for other cloud services. This feature is particularly useful when retaining foundational services, such as a load balancer, is necessary, while tearing down all services and reconfiguring the DNS and other application settings each time we temporarily clean up infrastructure to reduce costs is undesirable.  When reviewing the service specifications of the cloud services in the Essentials plan, they appear to be very similar to those in the Development plan. The difference in service levels is unclear, but it could be related to hardware or resource allocation. For instance, the loa...

Deploying a Web Server on UpCloud using Terraform Modules

In my earlier post , I shared an example of deploying UpCloud infrastructure using Terraform from scratch. In this post, I want to share how to deploy the infrastructure using available Terraform modules to speed up the set-up process, especially for common use cases like preparing a web server. For instance, our need is to deploy a website with some conditions as follows. The website can be accessed through HTTPS. If the request is HTTP, it will be redirected to HTTPS. There are 2 domains, web1.yourdomain.com and web2.yourdomain.com . But, users should be redirected to "web2" if they are visiting "web1". There are 4 main modules that we need to set up the environment. Private network. It allows the load balancer to connect with the server and pass the traffic. Server. It is used to host the website. Load balancer. It includes backend and frontend configuration. Dynamic certificate. It is requ...

Manage Kubernetes Cluster using Rancher

Recently, I sought a simpler method to deploy and maintain Kubernetes clusters across various cloud providers. The goal was to use it for development purposes with the ability to manage the infrastructure and costs effortlessly. After exploring several options, I decided to experiment with Rancher. Rancher offers a comprehensive software stack for teams implementing container technology. It tackles both the operational and security hurdles associated with managing numerous Kubernetes clusters. Additionally, it equips DevOps teams with integrated tools essential for managing containerized workloads. Rancher also offers an open-source version, allowing free deployment within one's infrastructure. The Rancher platform can be deployed either as a Docker container or within a Kubernetes cluster utilizing the K3s engine. We can read the documentation on how to install Rancher on K3s using Helm . Rancher itself enables the creation and provisioning of Kubernetes clusters and ...