In today’s Ansible for beginners tutorial, we’re going to guide you through everything you need to know in one sitting – from installing Ansible on your machine all the way to setting up and running an example Playbook.

Then we’ll talk a bit about how to best put it to use on your VPS or multiple VPSs.

Getting started with Ansible might seem a bit daunting, but once you master its many options and complexities, you’ll have a whole new level of control when configuring servers.

So – without further ado, let’s jump right into our comprehensive, step-by-step Ansible guide…

Notes On The Ansible Tutorial

This tutorial requires the use of domain names. Whenever you see the SUBDOMAIN, DOMAIN, or TLD variables, replace them with the details of your domain name. In example.ssdnodes.com , the SUBDOMAIN is example, ssdnodes is the DOMAIN and .com is the TLD .

, the is example, is the and is the . This tutorial requires the use of IP address. Whenever you see the IP_ADDRESS variable, replace it with your own.

What Is “Infrastructure As Code”? Infrastructure as code (IaC) is the way of defining computing and network infrastructure through source code, the same way you do for applications. Rather than manually configuring your infrastructure or using a one-off isolated script, IaC gives you the power to write code, using a high-level language, to decide how infrastructure should be configured and deployed.

IaC is different from infrastructure automation, which involves repeating the steps multiple times and spawning them on several servers. The guiding principle behind IaC is to enforce consistency among DevOps team members by representing the desired state of their infrastructure via code. Moreover, the code can be kept in source control, which means it can be audited, tested on, and used to create reproducible builds with continuous delivery. What Is Ansible? Ansible is an open source IT configuration management, deployment, and orchestration tool. It empowers DevOps teams to define their infrastructure as a code in a simple and declarative manner. A lot of people compare Ansible to similar tools like Chef or Puppet. They all help automate and provision infrastructure, but there are a few features that make me prefer Ansible over the others. What Are The Benefits Of Using Ansible? Ansible Is Agentless



Ansible doesn’t need any agents to be installed on remote systems to be managed, which means less maintenance overhead and performance issues. Instead, Ansible uses a push-based approach leveraging existing SSH connections to run tasks on the remote managed host. Chef or Puppet work by installing an agent on the hosts to be managed and the agent pulls changes from the control host using its own channel. Ansible Is Written In Python Ansible is written in Python, which means installing and running Ansible in any Linux distribution is very easy, and only a little more difficult on OS X. Being a popular language, there’s also a good chance that you’re familiar with it, or at least can find enough resources online to start learning. Or, you’ll easily be able to find a developer with Python experience to help you out. Ansible Is Easy To Learn The fact that a new user can get up to speed and run Ansible tasks in a matter of minutes, thanks to clear and easy-to-follow documentation, is one of the most appealing features of Ansible. Troubleshooting in Ansible is also very easy for beginners, and the fact that all tasks are idempotent reduces the risk of making a mistake. Deploy Infrastructure In Record Time



Ansible can dispatch tasks to multiple remote managed hosts in parallel. This means you can execute Ansible tasks on a second managed host without waiting for them to complete on the first to reduce provision time and deploy your infrastructure faster than ever.

What’s the BEST DEAL in cloud hosting? Develop at hyperspeed with a Performance VPS from SSD Nodes. We DOUBLED the amount of blazing-fast NVMe storage on our most popular plan and beefed up the CPU offering on these plans. There’s nothing else like it on the market, at least not at these prices.Score a 16GB Performance VPS with 160GB of NVMe storage for just $99/year for a limited time!Get limited-time deals!⚡ Develop at hyperspeed with a Performance VPS from SSD Nodes. We DOUBLED the amount of blazing-fast NVMe storage on our most popular plan and beefed up the CPU offering on these plans. There’s nothing else like it on the market, at least not at these prices.

Step 1: Install Ansible On Your Control Machine

To take your first steps with Ansible, you first need to install it on your control machine. This is the machine you’ll use to dispatch tasks. For most people, this will be your desktop machine at home or your laptop, but you can also use one VPS as a control host to connect to other VPSs.

Installing Ansible on Ubuntu 16.04

You can install Ansible using standard package managers like apt/yum or Python’s pip command. To install it using standard package manager in Ubuntu, add its repository information apt-add-repository . Next, update the system and install Ansible using apt-get .

$ sudo apt-get install software-properties-common $ sudo apt-add-repository ppa:ansible/ansible $ sudo apt-get update $ sudo apt-get install ansible

Installing Ansible on CentOS 7

While installing Ansible in CentOS and RHEL, you need to enable the EPEL repository first before proceeding with installation of Ansible. Once you enabled the EPEL repository, install Ansible using yum .

$ cd /tmp $ wget http://dl.fedoraproject.org/pub/epel/7/x86_64/e/epel-release-7-9.noarch.rpm $ sudo rpm -ivh epel-release-7-9.noarch.rpm $ sudo yum update $ sudo yum install ansible

Guide to working with Ansible

You are now up and running with Ansible in your system, which is otherwise known as the control host. The control host is the Ansible host you to dispatch tasks to the remote managed Ansible hosts.

Before you start delegating tasks to a managed host, make sure you have non-root, a sudo-enabled user on that host—it’s always a bad idea to connect to a remote VPS via a root user.

Ansible inventory files

The Ansible inventory file lists which hosts will receive commands from the control host. The inventory can list individual hosts, or group them under categories you distinguish.

The default location for the inventory file is /etc/ansible/hosts , but it’s also possible to change the location of the inventory file by uncommenting the inventory parameter in /etc/ansible/ansible.cfg

A typical inventory file can list the managed host either by IP address or by domain names. It is also possible to list one managed host in more than one group. Here’s an example of listing two hosts under the webservers and dbservers categories.

[webservers] 123.45.67.89 SUBDOMAIN.DOMAIN.TLD

[dbservers]

123.45.67.89 SUBDOMAIN.DOMAIN.TLD

To test if all the hosts are discoverable by the inventory file, use the following ad-hoc command.

$ ansible all --list-hosts hosts (2): 123.45.67.89 SUBDOMAIN.DOMAIN.TLD

You can also list the hosts by group name:

$ ansible dbservers --list-hosts hosts (2): 123.45.67.89 SUBDOMAIN.DOMAIN.TLD

Ad-hoc commands in Ansible are merely those that perform a single command across one or many hosts. They don’t use tasks but allow you to do a lot of things quite easily without building out playbooks (more on those in the second part of this guide).

To find out if all the hosts are up and running, use the following ad-hoc command that uses the ping module of Ansible. The -u switch specifies which user Ansible will connect to via SSH—change it according to the non-root user you created earlier.

$ ansible all -m ping -u USER 123.45.67.89 | SUCCESS => { "changed": false, "ping": "pong" } ... ...

The "changed": false in the above JSON result tells us that the ping Ansible task didn’t change anything on the remote server.

Rather than specifying all the hosts as in the above command, you can also ping a group of hosts. Specify the group name in place of ‘all’ with the following command:

$ ansible webservers -m ping -u USER

Ansible modules

Modules are the discrete units of code that can be used from the terminal or in a playbook task. They simplify Ansible tasks by installing software, copying files, using templates, and so on.

Modules use the available context to determine what actions if any needed to bring the managed host to the desired state and are idempotent, that means if you run the same task again and again, the state of the machine will not change.

To find the list of available modules, use the following command:

$ ansible-doc -l

Let’s try to install Nginx on an Ubuntu/Debian host using an ad-hoc command in Ansible:

$ ansible webservers -b --become-user=root -m shell -a 'apt -y install nginx' -u USER 172.104.160.8 | SUCCESS | rc=0 >> Reading package lists... Building dependency tree...

The following flags were used with the above command:

-b : Instruct ansible to become another user to run the command

: Instruct ansible to become another user to run the command --become-user=root : Run the command as a root user

: Run the command as a user -m : Declares which module is used in the command

: Declares which module is used in the command -a : Declares which arguments are passed to the module

The alternate and preferred way of installing software using an ad-hoc command is to use apt module. If your remote managed host is running RHEL/CentOS, then change the module name from apt to yum .

$ ansible webservers -b --become-user=root -m apt -a 'name=nginx state=present update_cache=true' -u ansadm 172.104.160.8 | SUCCESS => { "cache_update_time": 1530378409, "cache_updated": true, "changed": true, "stderr": "", "stderr_lines": [], ... ...

In the above Ansible command, the -a switch passes the arguments to the apt module by specifying the name of the package to be installed, the desired state, and whether to update the package repository cache or not.

The line change: true in the result section of the above ad-hoc command signifies that the state of the system has been changed. If you run the above ad-hoc command again, the value of changed field will be false , which means the state of the system remains unchanged, because Ansible is aware that Nginx is already present in the system and will not try to alter the state again.

That’s what we call Ansible idempotent. You can run the same ad-hoc command as many times as you’d like and it won’t change anything unless it needs to.

172.104.160.8 | SUCCESS => { "cache_update_time": 1530378676, "cache_updated": true, "changed": false }

So far, we have understood the ansible modules and its usages through ad-hoc way, but this is not so useful until we use the modules in ansible playbooks to run multiple tasks in the remote managed host.

Tasks in Ansible

When you dispatch a job from a control host to a managed host using one an Ansible module, it is known as a task. Tasks can be implemented using ad-hoc commands, as we’ve done just above, or you can use an Ansible playbook (more on those in a moment).

One example of a task is copying a file from the control host to a managed host, since it requires the use of ‘copy’ module. There are thousands of modules in Ansible, which means a task can use any of the modules to bring a managed host to the desired state. How many modules are there by default in Ansible? Let’s see:

$ ansible-doc -l | wc -l 1852

If you haven’t guessed, there are a lot of things you can do when combining Ansible tasks and modules.

Play in Ansible

An Ansible play is a set of tasks that are run on one or more managed hosts. A play may include one or many different tasks, and the most common way to execute a play is to use a playbook.

Ansible Playbooks

No Ansible tutorial would be complete without a guide to Playbooks. And some concrete Ansible Playbook examples.

Ansible Playbooks are composed of one or more plays and offer more advanced functionality for sending tasks to managed host compared to running many ad-hoc commands.

The tasks in Ansible playbooks are written in Yet Another Markup Language (YAML), which is easier to understand than a JSON or XML file. Each task in the playbook is executed sequentially for each host in the inventory file before moving on to the next task.

Let’s create a simple Ansible playbook example that will install Nginx and a MySQL server on the managed hosts that we had already defined in the inventory file.

To be more precise, we want Nginx installed on hosts in the webservers group and a MySQL server installed on hosts in the dbservers group.

$ vi playbook.yml --- - hosts: webservers gather_facts: yes become_user: root tasks: - name: Install Nginx apt: pkg=nginx state=present notify: - restart nginx - name: Enable Nginx during boot service: name=nginx state=started enabled=yes handlers: - name: restart nginx service: name=nginx state=restarted - hosts: dbservers become_user: root tasks: - name: Install mysql apt: pkg=mysql-server state=present

The hosts tells Ansible on which hosts to run the tasks. The above Ansible playbook includes two host groups from the inventory file. The tasks for webservers group are to install Nginx and enable Nginx during boot, and the dbservers group includes a single task to install MySQL.

The become_user in both the host section tells ansible to use sudo to run the tasks.

The gather_facts option gathers information about managed hosts such as distribution, OS family, and more. In ansible terminology, this information is known as FACTS .

The handlers section restarts Nginx when Ansible gets notified that Nginx has been installed.

A handler is the same as a task, but it will be executed when called by another task. It is like an event-driven system. A handler will run a task only when it is called by an event it listens for.

Now run the above playbook example using ansible-playbook . Append the name of the user from a remote managed host in the command using -u switch.

$ ansible-playbook playbook.yml -u USER PLAY [webservers] ************************************************************************************************************* TASK [Gathering Facts] ******************************************************************************************************** ok: [123.45.67.89] TASK [Install Nginx] ********************************************************************************************************** changed: [123.45.67.89] TASK [Enable Nginx during boot] ************************************************************************** ok: [123.45.67.89] RUNNING HANDLER [restart nginx] *********************************************************************************************** changed: [123.45.67.89] PLAY [dbservers] ******************************************************************** TASK [Gathering Facts] ******************************************************************************************************** ok: [123.45.67.89] TASK [Install mysql] ********************************************************************************************************** changed: [123.45.67.89] PLAY RECAP ******************************************************************************************************************** 123.45.67.89 : ok=6 changed=3 unreachable=0 failed=0

The last line contains information about the current run of the above playbook. The four points of data are:

ok : The number of tasks that were either executed correctly or didn’t result in a change.

: The number of tasks that were either executed correctly or didn’t result in a change. changed : The number of things that were modified by Ansible.

: The number of things that were modified by Ansible. unreachable : The number of hosts that were unreachable for some reason.

: The number of hosts that were unreachable for some reason. failed : The number of tasks failed to execute correctly.

Roles

In Ansible, a role provides a mechanism to break a complicated playbook into multiple reusable components. Each component offers a small function that can be used independently within the playbook. So rather than creating one complex playbook, you can create many roles and simply drop them into your playbooks.

You can’t execute roles directly, the way you do a playbook, and you can’t specify which host you want to execute a role, the way you would an ad-hoc command. Instead, they’re built into the playbooks you use to define a host.

The Ansible Galaxy repository has thousands of pre-built roles for you to choose from, although you’re free to create your role framework. Let’s dig into how you might want to do just that.

Variables

In Ansible, variables are similar to variables in any programming language—they let you input values and numbers dynamically into your playbook. Variables simplify operations by allowing you define and declare them throughout all the various roles and tasks you want to perform.

There are few places where you can define variables in an Ansible playbook.

In the playbook

In the inventory file

In a separate variable file

Using group_vars

To define variables in a playbook, use vars key just above the task where you want to use the variable. Once declared, you can use it inside the {{ }} tag. Let’s declare a variable by the name pkgname and assign it the value of the package name that we want to install, which is nginx . Once done, we can use the variable in a task.

--- - hosts: webservers gather_facts: yes become_user: root vars: pkgname: nginx tasks: - name: Install "{{ pkgname }}" apt: pkg="{{ pkgname }}" state=present ... ...

It is also possible to declare a variable in the inventory file using the syntax [host_group_name:vars] . Let’s define the variable pkgname in the inventory file.

[webservers:vars] pkgname=nginx

Now the variable pkgname can be used anywhere in the webservers hosts section in the playbook.

You can also define variables in a separate variable file and import it into the playbook. Create a variable file using vi another text editor and define the variable pkgname here.

$ vi ansible_vars.yml --- pkgname: nginx

To use the variable pkgname , import the above file using the vars_files keyword in the playbook.

$ vi playbook.yml --- - hosts: webservers gather_facts: yes become_user: root vars_files: - ./ansible_vars.yml ... ...

Another preferred way of managing variables is to create a group_vars directory inside your Ansible working directory. Ansible will load any YAML files in this directory with the name of any Ansible group.

Create the directory group_vars in your Ansible working directory, and then create the variable files matching with the group name from the inventory file. In our example, this would be webservers and dbservers . This allows you to separate variables according to host groups, which can make everything easier to manage.

$ cd <your_ansible_working_directory> $ mkdir group_vars $ cd group_vars $ vi webservers --- pkgname: nginx $ vi dbservers --- pkgname: mysql-server

You don’t need to declare the variable in your playbook, as Ansible will automatically pull the variables from each group_vars files and will substitute them during runtime.

Now suppose you want to have variables that will apply to all the host groups mentioned in the inventory file. To accomplish it, name a file by the name all inside group_vars directory. The group_vars/all files are used to set variables for every host that Ansible connects to.

Conditionals

In Ansible, conditionals are analogous to an if statement in any programming language. You use a conditional when you want to execute a task based on certain conditions.

In our last playbook example, we installed Nginx, so let’s extend that by creating a task that installs Nginx when Apache is not present on the host. We can add another task to the playbook we’ve already built.

... ... tasks: - name: Check if Apache is already installed shell: dpkg -s apache2 | grep Status register: apache2_is_installed failed_when: no - name: Install "{{ pkgname }}" apt: pkg="{{ pkgname }}" state=present when: apache2_is_installed.rc == 1 notify: - restart nginx ... ...

The first task in the above playbook checks if Apache is installed using dpkg -s command and stores the output of the task to apache2_is_installed variable. The return value of the task will be a non-zero value if Apache is not installed on the host.

Usually, Ansible would stop executing other tasks because of this non-zero value, but the failed_when: no gives Ansible permission to continue with the next set of tasks when it encounters a non-zero value.

The second task will install Nginx only when the return value of rc is equal to one, which is declared via when: apache2_is_installed.rc == 1 .

Loops

All programming languages provide a way to iterate over data to perform some repetitive task. Ansible also provides a way to do the same using a concept called looping, which is supplied by Ansible lookup plugins. With loops, a single task in one playbook can be used to create multiple users, install many packages, and more.

While there are many ways to use loops in Ansible, we’ll cover just one of them to get you started. The easiest way to use loops in ansible is to use with_items keyword, which is used to iterate over an item list to perform some repetitive tasks. The following playbook includes a task which installs packages in a loop using the keyword with_items .

--- - hosts: webservers gather_facts: yes become_user: root tasks: - name: Installing packages using loops apt: pkg={{ item }} state=present update_cache=yes with_items: - sysstat - htop - git

Run the above playbook from your command line, and you’ll see that you’ve installed all three packages on the remote host with a single task!

Tags

Tags allow you to run only specific tasks from your playbook via the command line. Just add the tags keyword for each task and run only the task(s) that you want by using --tags switch at the end of the ansible command. In the following playbook, we have added tags at the end of each task, thereby allowing us to run tasks separately from a single playbook.

--- - hosts: webservers gather_facts: yes become_user: root tasks: - name: Check if Apache is already installed shell: dpkg -s apache2 | grep Status register: apache2_is_installed failed_when: no - name: Install "{{ pkgname }}" apt: pkg="{{ pkgname }}" state=present when: apache2_is_installed.rc == 1 notify: - restart nginx - name: ensure nginx is running and enable it at boot service: name=nginx state=started enabled=yes tags: - mytag1 handlers: - name: restart nginx service: name=nginx state=restarted - hosts: dbservers become_user: root tasks: - name: Install mysql apt: pkg="{{ pkgname }}" state=present tags: - mytag2

Now run any of the tasks by specifying tag name at the end of ansible command.

$ ansible-playbook playbook.yml -u ansadm --tags 'mytag2'

How to use Ansible templates

Typically, after installing a web server like Nginx, you need to configure a virtual hosts file to properly serve a given website on your VPS. Instead of using SSH to log into your VPS to configure it after running Ansible, or using Ansible’s copy module to copy many unique configuration files individually, you can take advantage of Ansible’s templates features.

A template file contains all of the configuration parameters you need, such as the Nginx virtual host settings, and uses variables, which are replaced by the appropriate values when the playbook is executed. Template files usually end with the .j2 extension that denotes the Jinja2 templating engine.

To begin working with templates, create a directory for template files in your Ansible working directory.

$ mkdir templates

Create two template files. The first template file will be the default index.html file for each site, and the second template file will contain configuration settings for the Nginx virtual host.

$ cd templates $ vi index.html.j2 <html> You are visiting {{ domain_name }} ! </html>

Similarly, create a template file for the Nginx virtual host:

$ vi nginx-vh.j2 server { listen 80; server_name {{ domain_name }}; client_max_body_size 20m; index index.php index.html index.htm; root /var/www/html/{{ domain_name }}; location / { try_files $uri $uri/ /index.html?q=$uri&$args; } location ~* \.(js|css|png|jpg|jpeg|gif|ico|woff|ttf|svg|otf)$ { expires 30d; add_header Pragma public; add_header Cache-Control "public"; access_log off; } }

Notice that the variables domain_name in the above two template files are enclosed within {{ }} , which means they will be substituted during runtime by the value of this variable. To define the variable domain_name , navigate to the group_vars directory and edit the file webservers and add the following lines in it.

$ cd group_vars $ vi webservers --- domain_name: SUBDOMAIN.DOMAIN.TLD

Finally, edit the ansible playbook to create a root folder for sites, copy the index.html file to the site’s root folder, and copy the virtual host file to the Nginx virtual host directory /etc/nginx/sites-enabled one by one.

$ vi playbook.yml --- - hosts: webservers gather_facts: yes become_user: root tasks: - name: Check if Apache is already installed shell: dpkg -s apache2 | grep Status register: apache2_is_installed failed_when: no - name: Install "{{ pkgname }}" apt: pkg="{{ pkgname }}" state=present when: apache2_is_installed.rc == 1 notify: - restart nginx - name: ensure nginx is running and enable it at boot service: name=nginx state=started enabled=yes - name: create virtual host root directory file: name=/var/www/html/{{ domain_name }} state=directory - name: Copying index file to webroot template: src: templates/index.html.j2 dest: /var/www/html/{{ domain_name }}/index.html - name: Enables nginx virtual host template: src: templates/nginx-vh.j2 dest: /etc/nginx/sites-enabled/{{ domain_name }} - name: restart nginx service: name=nginx state=restarted tags: - mytag1 handlers: - name: restart nginx service: name=nginx state=restarted - hosts: dbservers become_user: root tasks: - name: Install mysql apt: pkg="{{ pkgname }}" state=present tags: - mytag2

The template task in the above Ansible playbook takes two mandatory parameters src and dest . There are also a few optional parameters that can be specified in a template task but is not required at this stage.

The src parameter specifies the name of the template file from templates directory that Ansible will copy to the remote server. In our case, the two templates files that we have created are index.html.j2 and nginx-vh.j2

parameter specifies the name of the template file from templates directory that Ansible will copy to the remote server. In our case, the two templates files that we have created are and The dest parameter is the path in the remote server where the file should be placed.

Finally, run the playbook from your ansible working directory:

$ ansible-playbook playbook.yml -u USER

Blocks

Blocks, which were introduced in version 2.0, allow you to logically group tasks and better handle errors, which is useful when you want to execute multiple tasks under a single condition.

To end the block, use the when keyword once you’re done defining all the tasks you want to be executed. If the evaluation of the when condition returns true , then all the tasks within the blocks will be executed one by one. All tasks within the blocks will inherit the common data or directives that you set just after the ‘when’ keyword.

--- - hosts: webservers tasks: - name: Install Nginx block: - apt: pkg=nginx state=present - service: name=nginx state=started enabled=yes when: ansible_distribution == 'Ubuntu' become: true become_user: root

The block section in the above playbook includes two related tasks to install nginx and start/enable it. The when evaluation specifies that these tasks should only be run when the remote managed host is using Ubuntu as its operating system. Both the tasks will inherit the privilege escalation directives after the ‘when’ keyword.

You can also use blocks to handle failures, similar to exceptions in most programming languages. The aim is to gracefully handle failures within the block rather than withdrawing the entire deployment.

Here is an example of how to use blocks to handle failures:

tasks: - block: - name: Enable Nginx during boot service: name=nginx state=started enabled=yes rescue: - name: This section runs only when there is an error in the block. debug: msg="There was an error in starting/enabling nginx." always: - name: This section will run always. debug: msg="This always executes."`

Conclusion:

Okay…so if you followed along with this Ansible tutorial step by step, you’ve gotten a simplified but practical lesson in most how to take your first steps with Ansible:

How to install Ansible

Running ad-hoc commands

Understanding how modules work

Creating Ansible playbooks

Running your first playbook

And a few other key fundamentals to get you started.



This is by no means our final or definitive tutorial on Ansible—be sure to subscribe to the Serverwise newsletter to get more Ansible posts as they go live.

Get more Ansible tutorial resources now:

In the meantime, you can check out these Ansible guides if you want to level up your knowledge immediately:

Check out our secure Ansible playbook tutorial to the complete playbook we put together for securing new VPSs:

Learn to us Ansible as a configuration management tool for setting up a bare CentOS, Debian, and Ubuntu server with more secure SSH settings. Plus a few tools to make your life a little easier:

Thanks everyone…until next time!