Ansible Playbook Example-1

What’s with the Name “Ansible”?

 Ansible was used to control a large number of remote ships at once, over vast distances. Think of it as a metaphor for controlling remote servers.

Introduction:-

Ansible playbooks are a way to send commands to remote computers in a scripted way. Instead of using Ansible commands individually to remotely configure computers from the command line, you can configure entire complex environments by passing a script to one or more systems.

Ansible playbooks are written in the YAML data serialization format. If you don’t know what a data serialization format is, think of it as a way to translate a programmatic data structure (lists, arrays, dictionaries, etc) into a format that can be easily stored to disk. The file can then be used to recreate the structure at a later point. JSON is another popular data serialization format, but YAML is much easier to read.

Continue Reading

Advertisements

Ansible Agentless Automation

WiKi:-

Ansible is a free-software platform for configuring and managing computers which combines multi-node software deployment, ad hoctask execution, and configuration management.[1] It manages nodes (Linux nodes must have Python 2.4 or later installed on them, Windows nodes require PowerShell 3.0 or later) over SSH or over PowerShell.[2] Modules work over JSON and standard output and can be written in any programming language. The system uses YAML to express reusable descriptions of systems.[3]

Configuration management systems are designed to make controlling large numbers of servers easy for administrators and operations teams. They allow you to control many different systems in an automated way from one central location.

Continue Reading

setup free DDns for your home pc using no-ip and router setting for no-ip

———————-Theory——————

Dynamic DNS (DDNS or DynDNS) is a method of automatically updating a name server in the Domain Name System (DNS), often in real time, with the active DDNS configuration of its configured hostnames, addresses or other information.

Your IP address is just like your phone number, but it is your computers personal phone number on the internet. It is used by your Internet Service Providers to connect your computer to the Internet. Your computer doesn’t have the same number every day, it has a dynamic IP address, meaning it changes. It could change once a month, once a week, or even a few times a day, but it does change. Dynamic IP addresses are very common since they are cost effective for ISPs.

Continue Reading

Setup local Environment using vagrant

Introduction:-

Vagrant is an open source tool for building a complete virtual development environment. Very often, a test environment is required for testing the latest release and new tools. Also, it reduces the time spent in re-building your OS. By default, vagrant uses virtualbox for managing the Virtualization. Vagrant acts as the central configuration for managing/deploying multiple reproducible virtual environments with the same configuration.

Continue Reading

ftp perl script using Net::FTP

—————-Theory:———————–

File Transfer Protocol

File Transport Protocol, or FTP, is an open protocol standard that is widely used to transport and receive large files. FTP can be used to send and receive large files. FTP can also be used to send configuration files and software updates for network switches and routers. It uses ports for communications and also uses encryption to protect the information being received and sent. In this lesson, we will go over these topics so that you can be familiar with FTP and what it has to offer.

How it Works!

The picture above shows the generic operation of how a client accesses an FTP server. The FTP server listens to Port 21 for connection requests and it sends data from its Port 20.
ftp1

Continue Reading

mac vendor lookup using bash script

Simple bash script that while give you the vendor of your device.

———————Theory——————–

A media access control address (MAC address), also called physical address, is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi. Logically, MAC addresses are used in the media access control protocol sublayer of the OSI reference model.

A universally administered address is uniquely assigned to a device by its manufacturer. The first three octets (in transmission order) identify the organization that issued the identifier and are known as the Organizationally Unique Identifier (OUI).

Continue Reading