2012-03-08 19:36:47 +01:00
Ansible Modules
===============
2012-03-31 16:38:24 +02:00
Ansible ships with a number of modules (called the 'module library')
that can be executed directly on remote hosts or through :doc: `playbooks` .
Users can also write their own modules. These modules can control system
resources, like services, packages, or files (anything really), or
handle executing system commands.
2012-03-08 19:53:48 +01:00
2012-03-31 16:38:24 +02:00
Let's review how we execute three different modules from the command line::
ansible webservers -m service -a "name=httpd state=running"
ansible webservers -m ping
ansible webservers -m command -a "/sbin/reboot -t now"
Each module supports taking arguments. Nearly all modules take `` key=value ``
arguments, space delimited. Some modules take
no arguments, and the command/shell modules simply take the string
2012-03-15 01:57:35 +01:00
of the command you want to run.
2012-03-09 04:50:00 +01:00
2012-03-31 16:38:24 +02:00
From playbooks, Ansible modules are executed in a very similar way::
- name: reboot the servers
action: command /sbin/reboot -t now
All modules technically return JSON format data, though if you are using the
2012-03-09 20:39:29 +01:00
command line or playbooks, you don't really need to know much about
2012-03-31 16:38:24 +02:00
that. If you're writing your own module, you care, and this means you do
2012-05-02 07:35:02 +02:00
not have to write modules in any particular language -- you get to choose.
2012-03-08 19:36:47 +01:00
2012-03-31 16:38:24 +02:00
Most modules other than command are `idempotent` , meaning they will seek
2012-03-27 01:48:32 +02:00
to avoid changes to the system unless a change needs to be made. When using Ansible
2012-03-31 16:38:24 +02:00
playbooks, these modules can trigger 'change events'. Unless otherwise
noted, any given module does support change hooks.
2012-03-08 19:36:47 +01:00
2012-03-31 16:38:24 +02:00
Let's see what's available in the Ansible module library, out of the box:
2012-03-08 19:36:47 +01:00
2012-04-06 17:41:18 +02:00
.. _apt:
2012-03-09 20:39:29 +01:00
2012-03-27 01:48:32 +02:00
apt
`` `
Manages apt-packages (such as for Debian/Ubuntu).
*pkg* :
2012-05-10 07:41:31 +02:00
* A package name or package specifier with version, like `foo` , or `foo=1.0` to install a specific version of the foo package.
2012-03-27 01:48:32 +02:00
*state* :
2012-05-10 07:41:00 +02:00
* Can be either 'installed', 'removed', or 'latest'. The default is 'installed'. (In 0.4 and later, the aliases 'absent' and 'present' can also be used. They correspond with 'removed' and 'installed')
2012-03-27 01:48:32 +02:00
2012-04-19 22:25:12 +02:00
*update-cache* :
2012-07-26 14:57:09 +02:00
* Whether the apt cache must be updated prior to operation. This is equivalent
to doing "apt-get update". Optional, and can be
2012-04-19 15:57:30 +02:00
'yes', or 'no'. The default is 'no'. This can be done as the part of a
package operation or as a seperate step.
2012-04-19 22:25:12 +02:00
*purge* :
* Will force purge of configuration file for when ensure is set to 'removed'.
Defaults to 'no'.
2012-04-26 04:28:22 +02:00
*default-release* :
* Corresponds to the -t option for apt, and sets pin priorities
2012-07-09 20:34:06 +02:00
*install-recommends* : (devel branch now, part of ansible 0.6 later)
* Corresponds to the --no-install-recommends option for apt. Defaults to 'yes', which means install the recommended packages the same way APT does by default. Set this to 'no' to add the option not to install recommended packages.
2012-03-27 01:48:32 +02:00
Example action from Ansible :doc: `playbooks` ::
2012-04-19 15:57:30 +02:00
apt pkg=foo update-cache=yes
2012-04-26 04:28:22 +02:00
apt pkg=foo state=removed
apt pkg=foo state=installed
apt pkg=foo=1.00 state=installed
apt pkg=nginx state=latest default-release=squeeze-backports update-cache=yes
2012-07-09 20:34:06 +02:00
apt pkg=openjdk-6-jdk state=latest install-recommends=no
2012-04-19 22:25:12 +02:00
2012-07-04 23:47:04 +02:00
.. _assemble:
2012-07-04 23:44:39 +02:00
assemble
`` ` ` ` ` ``
(new in 0.5) Assembles a configuration file from fragments. Often a particular program will take a single configuration file
and does not support a conf.d style structure where it is easy to build up the configuration from multiple sources.
Assmeble will take a directory of files that have already been transferred to the system, and concatenate them
together to produce a destination file. Files are assembled in string sorting order. Puppet calls this idea
"fragments".
*src* :
* An already existing directory full of source files.
*dest* :
* A file to create using the concatenation of all of the source files.
Example action from Ansible :doc: `playbooks` ::
assemble src=/etc/someapp/fragments dest=/etc/someapp/someapp.conf
2012-07-04 23:47:04 +02:00
.. _authorized_key:
2012-07-04 23:44:39 +02:00
authorized_key
`` ` ` ` ` ` ` ` ` ` ` ``
(new in 0.5). Adds or removes an authorized key for a user from a remote host.
*user* :
* Name of the user who access is being granted or remoted to.
*state* :
* Either 'absent' or 'present', this is whether the given key should be in the authorized keys file or not.
*key* :
* The actual key, as a string.
Example action from Ansible :doc: `playbooks` ::
authorized_key user=charlie key="ssh-dss ASDF1234L+8BTwaRYr/rycsBF1D8e5pTxEsXHQs4iq+mZdyWqlW++L6pMiam1A8yweP+rKtgjK2httVS6GigVsuWWfOd7/sdWippefq74nppVUELHPKkaIOjJNN1zUHFoL/YMwAAAEBALnAsQN10TNGsRDe5arBsW8cTOjqLyYBcIqgPYTZW8zENErFxt7ij3fW3Jh/sCpnmy8rkS7FyK8ULX0PEy/2yDx8/5rXgMIICbRH/XaBy9Ud5bRBFVkEDu/r+rXP33wFPHjWjwvHAtfci1NRBAudQI/98DbcGQw5HmE89CjgZRo5ktkC5yu/8agEPocVjdHyZr7PaHfxZGUDGKtGRL2QzRYukCmWo1cZbMBHcI5FzImvTHS9/8B3SATjXMPgbfBuEeBwuBK5EjL+CtHY5bWs9kmYjmeo0KfUMH8hY4MAXDoKhQ7DhBPIrcjS5jPtoGxIREZjba67r6/P2XKXaCZH6Fc= charlie@example.org 2011-01-17"
2012-04-06 17:41:18 +02:00
.. _command:
2012-03-27 01:48:32 +02:00
2012-07-04 23:44:39 +02:00
2012-03-08 19:36:47 +01:00
command
`` ` ` ` ``
2012-03-09 20:39:29 +01:00
The command module takes the command name followed by a list of
2012-03-15 01:57:35 +01:00
arguments, space delimited.
If you want to run a command through the shell (say you are using
'<', '>', '|', etc), you actually want the 'shell' module instead.
The 'command' module is much more secure as it's not affected by the user's environment.
2012-03-08 19:36:47 +01:00
2012-03-15 01:57:35 +01:00
The given command will be executed on all selected nodes. It will not
be processed through the shell, so variables like "$HOME" and
operations like "<", ">", "|", and "&" will not work. As such, all
paths to commands must be fully qualified.
2012-03-09 04:50:00 +01:00
2012-03-09 20:39:29 +01:00
This module does not support change hooks and returns the return code
from the program as well as timing information about how long the
2012-05-02 07:35:02 +02:00
command was running.
2012-03-08 19:36:47 +01:00
2012-03-27 01:48:32 +02:00
Example action from Ansible :doc: `playbooks` ::
2012-03-22 06:01:02 +01:00
command /sbin/shutdown -t now
2012-04-06 17:41:18 +02:00
If you only want to run a command if a certain file does not exist, you can do the
following::
command /usr/bin/make_database.sh arg1 arg2 creates=/path/to/database
The `creates=` option will not be passed to the executable.
2012-03-15 01:57:35 +01:00
2012-03-09 20:39:29 +01:00
.. _copy:
2012-03-08 19:36:47 +01:00
copy
`` ``
2012-03-16 03:47:21 +01:00
The copy module moves a file on the local box to remote locations. In addition to the options
listed below, the arguments available to the `file` module can also be passed to the copy
module.
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
*src* :
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
* Local path to a file to copy to the remote server. This can be an
absolute or relative path.
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
*dest* :
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
* Remote absolute path where the file should end up.
2012-03-08 19:36:47 +01:00
This module also returns md5sum information about the resultant file.
2012-03-27 01:48:32 +02:00
Example action from Ansible :doc: `playbooks` ::
2012-03-22 06:01:02 +01:00
copy src=/srv/myfiles/foo.conf dest=/etc/foo.conf owner=foo group=foo mode=0644
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
.. _facter:
2012-03-08 19:36:47 +01:00
facter
`` ` ` ``
Runs the discovery program 'facter' on the remote system, returning
2012-03-09 04:50:00 +01:00
JSON data that can be useful for inventory purposes.
2012-03-08 19:36:47 +01:00
Requires that 'facter' and 'ruby-json' be installed on the remote end.
2012-03-09 20:39:29 +01:00
This module is informative only - it takes no parameters & does not
support change hooks, nor does it make any changes on the system.
Playbooks do not actually use this module, they use the :ref: `setup`
module behind the scenes.
2012-03-08 19:36:47 +01:00
2012-04-13 04:29:49 +02:00
fetch
`` ` ``
This module works like 'copy', but in reverse. It is used for fetching files
from remote machines and storing them locally in a file tree, organized by hostname.
*src* :
* The file on the remote system to fetch. This needs to be a file, not a directory. Recursive fetching may be supported later.
*dest* :
2012-04-19 03:21:49 +02:00
* A directory to save the file into. For example, if the 'dest' directory is '/foo', a src file named '/tmp/bar' on host 'host.example.com', would be saved into '/foo/host.example.com/tmp/bar' (in Ansible 0.0.3 and later).
2012-04-13 04:29:49 +02:00
The fetch module is a useful way to gather log files from remote systems. If you require
fetching multiple files from remote systems, you may wish to execute a tar command and
then fetch the tarball.
2012-04-19 03:21:49 +02:00
Example::
fetch src=/var/log/messages dest=/home/logtree
2012-04-06 17:41:18 +02:00
2012-03-16 03:47:21 +01:00
file
`` ``
2012-04-02 02:03:13 +02:00
Sets attributes of files, symlinks, and directories, or removes files/symlinks/directories.
All parameters available to the file module are also available when running the `copy` or
`template` modules.
2012-03-16 03:47:21 +01:00
*dest* :
2012-05-04 02:47:44 +02:00
* alias for 'path'. Sets an absolute path to a file on the filesystem when used with 'state=file'. When used with 'state=link', sets the destination to create a symbolic link defined by 'src' key.
2012-03-16 03:47:21 +01:00
*state* :
2012-04-05 02:30:41 +02:00
* either 'file', 'link', 'directory', or 'absent'. The default is 'file'. If 'directory', the directory and all immediate subdirectories will be created if they do not exist. If 'file', the file will NOT be created if it does not exist, specify `copy` or `template` for the module name instead if you need to put content at the specified location. If 'link', the symbolic link will be created or changed. If 'absent', directories will be recursively deleted, and files or symlinks will be unlinked.
2012-03-16 03:47:21 +01:00
*mode* :
* the mode the file or directory should be, such as 644, as would be given to `chmod` . English modes like "g+x" are not yet supported.
*owner* :
2012-05-02 07:35:02 +02:00
* name of user that should own the file or directory, as would be given to `chown`
2012-03-16 03:47:21 +01:00
*group* :
* name of group that should own the file or directory, as would be given to `chgrp`
2012-04-02 02:03:13 +02:00
*src* :
2012-04-05 02:30:41 +02:00
* path of the file to link to (applies only to 'link' state)
2012-04-02 02:03:13 +02:00
2012-04-18 02:08:17 +02:00
*seuser* :
2012-05-02 21:03:56 +02:00
* 'user' part of SELinux file context. Will default to what is provided by system policy, if available. Only used on systems with SELinux present. If you specify '_default', it will use the 'user' portion of default context from the policy if available.
2012-04-18 02:08:17 +02:00
*serole* :
2012-05-02 21:03:56 +02:00
* 'role' part of SELinux file context. Will default to what is provided by system policy, if available. Only used on systems with SELinux present. If you specify '_default', it will use the 'role' portion of default context from the policy if available.
2012-04-18 02:08:17 +02:00
*setype* :
2012-05-02 21:03:56 +02:00
* 'type' part of SELinux file context. Will default to what is provided by system policy, if available. Only used on systems with SELinux present. If you specify '_default', it will use the 'type' portion of default context from the policy if available.
2012-04-18 02:08:17 +02:00
*selevel* :
2012-05-02 21:03:56 +02:00
* 'level' part of SELinux file context. This is the MLS and MCS attribute of the file context, also sometimes known as the 'range'. It defaults to 's0'. Only used only used on hosts with SELinux present. If you specify '_default', it will use the 'level' portion of default context from the policy if available.
2012-04-18 02:08:17 +02:00
2012-04-22 08:51:03 +02:00
*context* :
2012-05-02 07:35:02 +02:00
* accepts only 'default' as value. This will restore a file's selinux context to the default context in the policy. Does nothing if no default is available. Only used on hosts with SELinux present.
2012-03-22 06:01:02 +01:00
2012-04-02 02:03:13 +02:00
Example action from Ansible :doc: `playbooks` ::
file path=/etc/foo.conf owner=foo group=foo mode=0644
file path=/some/path owner=foo group=foo state=directory
2012-04-05 02:30:41 +02:00
file path=/path/to/delete state=absent
2012-04-02 02:03:13 +02:00
file src=/file/to/link/to dest=/path/to/symlink owner=foo group=foo state=link
2012-04-18 02:08:17 +02:00
file path=/some/path state=directory setype=httpd_sys_content_t
2012-04-22 08:51:03 +02:00
file path=/some/path state=directory context=default
2012-04-13 04:30:43 +02:00
2012-04-06 17:41:18 +02:00
.. _git:
2012-03-08 19:36:47 +01:00
git
`` `
2012-03-09 04:50:00 +01:00
Deploys software (or files) from git checkouts.
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
*repo* :
2012-03-08 19:36:47 +01:00
2012-05-10 06:42:26 +02:00
* git, ssh, or http protocol address of the git repo to checkout.
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
*dest* :
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
* Where to check it out, an absolute directory path.
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
*version* :
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
* What version to check out -- either the git SHA, the literal string
2012-07-25 23:18:31 +02:00
`` HEAD `` , branch name, or a tag name.
2012-05-10 06:42:26 +02:00
2012-07-26 14:53:05 +02:00
*remote* :
* Name of the remote branch, defaults to 'origin'.
2012-03-27 01:48:32 +02:00
Example action from Ansible :doc: `playbooks` ::
2012-03-22 06:01:02 +01:00
git repo=git://foosball.example.org/path/to/repo.git dest=/srv/checkout version=release-0.22
2012-04-06 17:41:18 +02:00
.. _group:
2012-03-08 19:36:47 +01:00
2012-03-31 18:08:28 +02:00
group
`` ` ``
Adds or removes groups.
*name* :
* name of the group
*gid* :
* optional gid to set for the group
*state* :
* either 'absent', or 'present'. 'present' is the default.
2012-05-10 07:26:40 +02:00
*system* :
2012-05-10 07:27:34 +02:00
* (new in 0.4) Indicates the group (when being created), should be a system group. This does not allow changing groups from and to system groups. Value is 'yes' or 'no', default is 'no'.
2012-05-10 07:26:40 +02:00
2012-03-31 18:08:28 +02:00
To control members of the group, see the users resource.
Example action from Ansible :doc: `playbooks` ::
group name=somegroup state=present
2012-04-06 17:41:18 +02:00
.. _ohai:
2012-03-08 19:36:47 +01:00
ohai
`` ``
2012-03-09 20:39:29 +01:00
Similar to the :ref: `facter` module, this returns JSON inventory data.
Ohai data is a bit more verbose and nested than facter.
2012-03-08 19:36:47 +01:00
Requires that 'ohai' be installed on the remote end.
This module is information only - it takes no parameters & does not
support change hooks, nor does it make any changes on the system.
2012-03-09 20:39:29 +01:00
Playbooks should not call the ohai module, playbooks call the
:ref: `setup` module behind the scenes instead.
2012-03-08 19:36:47 +01:00
2012-04-06 17:41:18 +02:00
.. _ping:
2012-03-08 19:36:47 +01:00
ping
`` ``
2012-03-09 20:39:29 +01:00
A trivial test module, this module always returns the integer `` 1 `` on
2012-03-08 19:36:47 +01:00
successful contact.
2012-03-09 20:39:29 +01:00
This module does not support change hooks and is informative only - it
takes no parameters & does not support change hooks, nor does it make
any changes on the system.
2012-03-08 19:36:47 +01:00
2012-04-06 17:41:18 +02:00
.. _service:
2012-03-08 19:36:47 +01:00
2012-05-10 07:20:31 +02:00
raw
`` `
Executes a low-down and dirty SSH command, not going through the module subsystem.
This module is new in Ansible 0.4.
This is useful and should only be done in two cases. The first case is installing
python-simplejson on older (python 2.4 and before) hosts that need it as a dependency
to run modules, since nearly all core modules require it. Another is speaking to any
devices such as routers that do not have any Python installed. In any other case,
using the 'shell' or 'command' module is much more appropriate.
Arguments given to 'raw' are run directly through the configured remote shell and
only output is returned. There is no error detection or change handler support
for this module.
2012-05-14 02:04:53 +02:00
Example from `/usr/bin/ansible` to bootstrap a legacy python 2.4 host::
2012-05-10 07:20:31 +02:00
ansible newhost.example.com raw -a "yum install python-simplejson"
2012-03-08 19:36:47 +01:00
service
`` ` ` ` ``
Controls services on remote machines.
2012-03-09 20:39:29 +01:00
*state* :
2012-03-08 19:36:47 +01:00
2012-05-19 23:30:06 +02:00
* Values are `` started `` , `` stopped `` , `` reloaded `` , or `` restarted `` .
2012-03-09 20:39:29 +01:00
Started/stopped are idempotent actions that will not run commands
2012-05-19 23:30:06 +02:00
unless necessary. `` restarted `` will always bounce the service, `` reloaded ``
will always issue a reload.
2012-03-08 19:36:47 +01:00
2012-05-10 06:42:26 +02:00
*enabled* :
* (new in 0.4) Whether the service should start on boot. Either 'yes' or 'no'.
Uses chkconfig or updates-rc.d as appropriate.
2012-05-10 07:41:00 +02:00
*list* :
* (new in 0.4) When used with the value 'status', returns the status of the service along with other results. This is primarily useful for /usr/bin/ansible, and not meaningful for playbooks.
2012-03-09 20:39:29 +01:00
*name* :
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
* The name of the service.
2012-03-08 19:36:47 +01:00
2012-03-27 01:48:32 +02:00
Example action from Ansible :doc: `playbooks` ::
2012-03-22 06:01:02 +01:00
service name=httpd state=started
service name=httpd state=stopped
service name=httpd state=restarted
2012-05-19 23:30:06 +02:00
service name=httpd state=reloaded
2012-03-22 06:01:02 +01:00
2012-03-09 20:39:29 +01:00
.. _setup:
2012-03-08 19:36:47 +01:00
setup
`` ` ``
Writes a JSON file containing key/value data, for use in templating.
2012-03-09 20:39:29 +01:00
Call this once before using the :ref: `template` module. Playbooks
will execute this module automatically as the first step in each play
using the variables section, so it is unnecessary to make explicit
calls to setup within a playbook.
2012-05-02 07:35:02 +02:00
Ansible provides many 'facts' about the system, automatically.
2012-04-26 04:40:11 +02:00
Some of the variables that are supplied are listed below. These in particular
are from a VMWare Fusion 4 VM running CentOS 6.2::
"ansible_architecture": "x86_64",
"ansible_distribution": "CentOS",
"ansible_distribution_release": "Final",
"ansible_distribution_version": "6.2",
"ansible_eth0": {
"ipv4": {
"address": "REDACTED",
"netmask": "255.255.255.0"
},
"ipv6": [
{
"address": "REDACTED",
"prefix": "64",
"scope": "link"
}
],
"macaddress": "REDACTED"
},
"ansible_form_factor": "Other",
"ansible_fqdn": "localhost.localdomain",
"ansible_hostname": "localhost",
"ansible_interfaces": [
"lo",
"eth0"
],
"ansible_kernel": "2.6.32-220.2.1.el6.x86_64",
"ansible_lo": {
"ipv4": {
"address": "127.0.0.1",
"netmask": "255.0.0.0"
},
"ipv6": [
{
"address": "::1",
"prefix": "128",
"scope": "host"
}
],
"ansible_machine": "x86_64",
"ansible_memfree_mb": 89,
"ansible_memtotal_mb": 993,
"ansible_processor": [
"Intel(R) Core(TM) i7-2677M CPU @ 1.80GHz"
],
"ansible_processor_cores": "NA",
"ansible_processor_count": 1,
"ansible_product_name": "VMware Virtual Platform",
"ansible_product_serial": "REDACTED",
"ansible_product_uuid": "REDACTED",
"ansible_product_version": "None",
"ansible_python_version": "2.6.6",
"ansible_product_version": "None",
"ansible_python_version": "2.6.6",
"ansible_ssh_host_key_dsa_public": REDACTED",
"ansible_ssh_host_key_rsa_public": "REDACTED",
"ansible_swapfree_mb": 1822,
"ansible_swaptotal_mb": 2015,
"ansible_system": "Linux",
"ansible_system_vendor": "VMware, Inc.",
"ansible_virtualization_role": "None",
"ansible_virtualization_type": "None",
More ansible facts will be added with successive releases.
2012-03-09 20:39:29 +01:00
If facter or ohai are installed, variables from these programs will
also be snapshotted into the JSON file for usage in templating. These
variables are prefixed with `` facter_ `` and `` ohai_ `` so it's easy to
2012-04-26 04:40:11 +02:00
tell their source.
2012-05-02 07:35:02 +02:00
All variables are bubbled up to the caller. Using the ansible facts and choosing
2012-04-19 05:02:28 +02:00
to not install facter and ohai means you can avoid ruby-dependencies
on your remote systems.
2012-03-08 19:36:47 +01:00
2012-05-02 07:35:02 +02:00
*variablename* :
2012-03-08 19:36:47 +01:00
2012-05-02 06:55:54 +02:00
* Arbitrary variable names, which must be a mix of alphanumeric characters and underscores, can also be defined. Setting a variable creates a `` key=value `` pair in the JSON file for use in templating.
2012-03-08 19:36:47 +01:00
2012-03-27 01:48:32 +02:00
Example action from Ansible :doc: `playbooks` ::
2012-03-22 06:01:02 +01:00
vars:
ntpserver: 'ntp.example.com'
xyz: 1234
2012-04-13 00:20:52 +02:00
Example action from `/usr/bin/ansible` ::
2012-03-22 06:01:02 +01:00
2012-04-13 00:20:52 +02:00
ansible all -m setup -a "ntpserver=ntp.example.com xyz=1234"
2012-03-22 06:01:02 +01:00
2012-03-08 19:36:47 +01:00
2012-03-15 01:57:35 +01:00
.. _shell:
shell
`` ` ``
The shell module takes the command name followed by a list of
arguments, space delimited. It is almost exactly like the command module
2012-05-02 15:53:29 +02:00
but runs the command through the user's configured shell on the remote node.
2012-03-15 01:57:35 +01:00
The given command will be executed on all selected nodes.
If you want to execute a command securely and predicably, it may
be better to use the 'command' module instead. Best practices
when writing playbooks will follow the trend of using 'command'
unless 'shell' is explicitly required. When running ad-hoc commands,
use your best judgement.
This module does not support change hooks and returns the return code
from the program as well as timing information about how long the
2012-05-02 07:35:02 +02:00
command was running.
2012-03-15 01:57:35 +01:00
2012-03-22 06:01:02 +01:00
Example action from a playbook::
shell somescript.sh >> somelog.txt
2012-03-15 01:57:35 +01:00
2012-03-09 20:39:29 +01:00
.. _template:
2012-03-08 19:36:47 +01:00
template
`` ` ` ` ` ``
2012-03-09 20:39:29 +01:00
Templates a file out to a remote server. Call the :ref: `setup` module
2012-03-16 03:47:21 +01:00
prior to usage if you are not running from a playbook. In addition to the options
2012-05-02 07:35:02 +02:00
listed below, the arguments available to the `file` and `copy` modules can also be passed
to the template module.
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
*src* :
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
* Path of a Jinja2 formatted template on the local server. This can
be a relative or absolute path.
2012-03-08 19:36:47 +01:00
2012-03-09 20:39:29 +01:00
*dest* :
2012-03-08 19:36:47 +01:00
2012-05-02 07:35:02 +02:00
* Location to render the template on the remote server
2012-03-08 19:36:47 +01:00
This module also returns md5sum information about the resultant file.
2012-03-22 06:01:02 +01:00
Example action from a playbook::
template src=/srv/mytemplates/foo.j2 dest=/etc/foo.conf owner=foo group=foo mode=0644
.. _user:
user
`` ``
Creates user accounts, manipulates existing user accounts, and removes user accounts.
*name* :
* Name of the user to create, remove, or edit
*comment* :
* Optionally sets the description of the user
2012-05-03 19:47:27 +02:00
*uid* :
* optional uid to set for the user
2012-03-27 05:06:14 +02:00
*group* :
2012-03-22 06:01:02 +01:00
2012-05-02 07:35:02 +02:00
* Optionally sets the user's primary group, takes a group name
2012-03-22 06:01:02 +01:00
2012-03-31 18:08:28 +02:00
*groups* :
2012-05-02 07:35:02 +02:00
* Put the user in the specified groups, takes comma delimited group names
2012-03-31 18:08:28 +02:00
*append* :
2012-05-02 07:35:02 +02:00
* If true, will only add additional groups to the user listed in 'groups', rather than making the user only be in those specified groups
2012-03-31 18:08:28 +02:00
2012-03-22 06:01:02 +01:00
*shell* :
2012-05-02 07:35:02 +02:00
* Optionally sets the user's shell
2012-03-22 06:01:02 +01:00
*createhome* :
* Whether to create the user's home directory. Takes 'yes', or 'no'. The default is 'yes'.
2012-07-04 23:44:39 +02:00
*home=* :
* Specifies where the user's home directory should be, if not in /home/$username.
2012-03-22 06:01:02 +01:00
*password* :
2012-03-31 18:08:28 +02:00
* Sets the user's password to this crypted value. Pass in a result from crypt. See the users example in the github examples directory for what this looks like in a playbook.
2012-03-22 06:01:02 +01:00
*state* :
2012-03-31 18:08:28 +02:00
* Defaults to 'present'. When 'absent', the user account will be removed if present. Optionally additional removal behaviors can be set with the 'force' or 'remove' parameter values (see below).
2012-05-10 07:26:40 +02:00
*system* :
2012-05-10 07:27:34 +02:00
* (new in 0.4) Indicates the user (when being created), should be a system account. This does not allow changing users from and to system accounts. Value is 'yes' or 'no', default is 'no'.
2012-05-10 07:26:40 +02:00
2012-03-31 18:08:28 +02:00
*force* :
2012-05-02 07:35:02 +02:00
* When used with a state of 'absent', the behavior denoted in the 'userdel' manpage for `` --force `` is also used when removing the user. Value is 'yes' or 'no', default is 'no'.
2012-03-31 18:08:28 +02:00
*remove* :
2012-05-02 07:35:02 +02:00
* When used with a state of 'absent', the behavior denoted in the 'userdel' manpage for `` --remove `` is also used when removing the user. Value is 'yes' or 'no', default is 'no'.
2012-03-22 06:01:02 +01:00
2012-03-27 01:48:32 +02:00
Example action from Ansible :doc: `playbooks` ::
2012-03-22 06:01:02 +01:00
user name=mdehaan comment=awesome passwd=awWxVV.JvmdHw createhome=yes
2012-03-31 18:08:28 +02:00
user name=mdehaan groups=wheel,skynet
user name=mdehaan state=absent force=yes
2012-03-22 06:01:02 +01:00
2012-04-06 17:41:18 +02:00
.. _virt:
virt
`` ``
Manages virtual machines supported by libvirt. Requires that libvirt be installed
on the managed machine.
*guest* :
* The name of the guest VM being managed
*state*
* Desired state of the VM. Either `running` , `shutdown` , `destroyed` , or `undefined` . Note that there may be some lag for state requests like 'shutdown', and these states only refer to the virtual machine states. After starting a guest, the guest OS may not be immediately accessible.
*command* :
* In addition to state management, various non-idempotent commands are available for API and script usage (but don't make much sense in a playbook). These mostly return information, though some also affect state. See examples below.
Example action from Ansible :doc: `playbooks` ::
virt guest=alpha state=running
virt guest=alpha state=shutdown
virt guest=alpha state=destroyed
virt guest=alpha state=undefined
Example guest management commands from /usr/bin/ansible::
ansible host -m virt -a "guest=foo command=status"
ansible host -m virt -a "guest=foo command=pause"
ansible host -m virt -a "guest=foo command=unpause"
ansible host -m virt -a "guest=foo command=get_xml"
ansible host -m virt -a "guest=foo command=autostart"
Example host (hypervisor) management commands from /usr/bin/ansible::
2012-04-13 04:31:43 +02:00
ansible host -m virt -a "command=freemem"
ansible host -m virt -a "command=list_vms"
ansible host -m virt -a "command=info"
ansible host -m virt -a "command=nodeinfo"
ansible host -m virt -a "command=virttype"
2012-04-06 17:41:18 +02:00
2012-03-10 01:04:40 +01:00
.. _yum:
yum
`` `
Will install, upgrade, remove, and list packages with the yum package manager.
*pkg* :
* A package name or package specifier with version, like name-1.0
*state* :
2012-05-10 07:41:00 +02:00
* Can be either 'installed', 'latest', or 'removed'. The default is 'installed'. (In 0.4 and later, the aliases 'absent' and 'present' can also be used. They correspond with 'removed' and 'installed')
2012-03-10 01:04:40 +01:00
*list* :
* When 'list' is supplied instead of 'state', the yum module can list
various configuration attributes. Values include 'installed', 'updates',
2012-05-10 06:46:12 +02:00
'available', 'repos', or any package specifier. (This is more intended for
use with /usr/bin/ansible or the API, not playbooks.)
2012-03-08 19:36:47 +01:00
2012-03-27 01:48:32 +02:00
Example action from Ansible :doc: `playbooks` ::
2012-03-22 06:01:02 +01:00
2012-04-20 20:26:45 +02:00
yum pkg=httpd state=latest
yum pkg=httpd state=removed
yum pkg=httpd state=installed
2012-03-22 06:01:02 +01:00
2012-03-09 04:50:00 +01:00
Writing your own modules
`` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ` ``
2012-03-08 19:36:47 +01:00
2012-03-31 16:21:28 +02:00
See :doc: `moduledev` .
2012-03-31 15:29:31 +02:00
.. seealso ::
:doc: `examples`
2012-04-13 00:20:52 +02:00
Examples of using modules in /usr/bin/ansible
2012-03-31 15:29:31 +02:00
:doc: `playbooks`
2012-04-13 00:20:52 +02:00
Examples of using modules with /usr/bin/ansible-playbook
2012-03-31 16:21:28 +02:00
:doc: `moduledev`
How to write your own modules
2012-03-31 15:29:31 +02:00
:doc: `api`
Examples of using modules with the Python API
2012-04-13 00:20:52 +02:00
`Mailing List <http://groups.google.com/group/ansible-project> `_
2012-03-31 15:55:37 +02:00
Questions? Help? Ideas? Stop by the list on Google Groups
`irc.freenode.net <http://irc.freenode.net> `_
#ansible IRC chat channel