- Security Automation with Ansible 2
- Madhu Akula Akash Mahajan
- 224字
- 2021-07-02 21:59:52
Summary
We have codified a fairly decent real-world stack for development using a combination of Ansible's features. By thinking about what goes in a LAMP stack overview, we can start by creating the roles. Once we have that thrashed out, the inpidual tasks are mapped to modules in Ansible. Any task that requires copying of a pre-defined configuration, but with dynamically-generated output, can be done by using variables in our templates and the constructs offered by Jinja2.
We will use the same approach to various security-related setups that could do with a bit of automation for orchestration, operations, and so on. Once we have a handle on how to do this for a virtual machine running our laptop, it can be repurposed for deploying on your favorite cloud-computing instance as well. The output is human readable and in text, so that it can be added to version control, various roles can be reused as well.
Now that we have a fairly decent idea of the terms we will be using throughout this book, let's get set for one final piece of the puzzle. In the next chapter, we will learn and understand how we can use automation and scheduling tools, such as Ansible Tower, Jenkins, and Rundeck, to manage and execute playbooks based on certain event triggers or time durations.
- 基于C語言的程序設計
- Deep Learning Quick Reference
- Visual C# 2008開發技術詳解
- 機器自動化控制器原理與應用
- 四向穿梭式自動化密集倉儲系統的設計與控制
- 統計學習理論與方法:R語言版
- 傳感器與物聯網技術
- Enterprise PowerShell Scripting Bootcamp
- 零起點學西門子S7-200 PLC
- Learn QGIS
- 單片機技術項目化原理與實訓
- Creating ELearning Games with Unity
- 30天學通Java Web項目案例開發
- Java求職寶典
- Mastering Android Game Development with Unity