Write a play that changes the root password hash and encrypts the file it is stored in

In this article, we will examine a play used to change the root password using Ansible. It will also encrypt the file the password is stored in–using ansible-vault on your localhost. Table of Contents Red Hat Ansible Automation: Objectives The encrypted password files will be stored under the password directory and saved off to a backup using […]
Advanced Ansible Playbooks: Tips and Tricks for Efficiency

In this guide, we’ll delve into the intricacies of advanced Ansible playbooks, offering step-by-step instructions, real-world examples, and valuable tips to streamline your automation workflows. Table of Contents Introduction In the dynamic realm of IT automation, Ansible stands out as a powerful and versatile tool. As your automation needs grow, mastering advanced features of Ansible […]
Write a play that checks for the timezone of a system and outputs the results to a file

In this article, we will review how we can automate a task that checks the timezone using Ansible, offering a detailed walkthrough of the steps involved in automating the verification and configuration of time zones across target machines. Table of Contents Introduction Welcome to our latest blog post, where we delve into the world of […]
Write a play automating changes to the SSHD Configuration file

In today’s Ansible series, we will learn about automating changes using Ansible. Specifically, we will automate changes to the sshd config file. Table of Contents Introduction In this exercise, we will examine a playbook that automates a config change (resolves common SSH vulnerabilities) and …specifically makes a change to the sshd (sshd_config) configuration file on […]