The Rise of Smart Contracts: A Beginner’s Guide to Generating Smart Contracts

Generating smart contracts

Are you interested in generating smart contracts but don’t know where to start? The goal of this article is to provide the beginner with enough information to feel confident about the process. Table of Contents Introduction In this beginner’s guide, we’ll explore the rise of smart contracts, detail 15 things everyone needs to know about […]

Write a play that changes the root password hash and encrypts the file it is stored in

change root password using Ansible

In this article, we will examine a play used to change the root password using Ansible. It will also encrypt the file the password is stored in–using ansible-vault on your localhost. Table of Contents Red Hat Ansible Automation: Objectives The encrypted password files will be stored under the password directory and saved off to a backup using […]

Ansible Tower vs AWX: How to Manage Ansible at Scale

Ansible vs AWX

Learn about the key differences between Ansible Tower vs AWX. This guide covers setup instructions, features, support models, and helps you choose the best platform for large-scale automation. Table of Contents Introduction As infrastructure complexity increases, so does the need for robust automation tools. Ansible is one of the most widely adopted tools for managing […]

Advanced Ansible Playbooks: Tips and Tricks for Efficiency

Advanced Ansible Playbooks

In this guide, we’ll delve into the intricacies of advanced Ansible playbooks, offering step-by-step instructions, real-world examples, and valuable tips to streamline your automation workflows. Table of Contents Introduction In the dynamic realm of IT automation, Ansible stands out as a powerful and versatile tool. As your automation needs grow, mastering advanced features of Ansible […]

Write a play automating changes to the SSHD Configuration file

Automating changes using Ansible

In today’s Ansible series, we will learn about automating changes using Ansible. Specifically, we will automate changes to the sshd config file. Table of Contents Introduction In this exercise, we will examine a playbook that automates a config change (resolves common SSH vulnerabilities) and …specifically makes a change to the sshd (sshd_config) configuration file on […]