Want to know ansible configuration management example? we have a huge selection of ansible configuration management example information on alibabacloud.com
1. Prepare for the CentOS environmentYum Yum Upgrade2. Control server and managed server requirementsMaster:python 2.6+Slave:python 2.4+, preferably also 2.6+ (CentOS 6.7 comes with)3, configure SSH automatic loginConfigure Master to login to each slave ssh without password (use Ssh-keygen on master to generate key pair and add id_rsa.pub to Authorized_keys of each slave)4. Install ansible with YumYum Install ansible5. Configure HostBy default in/etc/
Example of ansible compiling httpd playbook, ansibleplaybook
The following is the content of the playbook. The process is as follows:
1. First, a total of 3 .tar.gz files are downloaded in the local directory of apr, apr-util, and httpd.
2. decompress the three files.
3. Install the pcre and pcre-devel dependency packages.
4. Compile and install apr.
5. Compile and install apr-util.
6. Compile and install h
-util--with-apr=/usr/local/Apr Make Make Install-name:complie httpd Shell:|CD/root/httpd-2.4. - ./configure--prefix=/usr/local/apache--sysconfdir=/etc/Apache--enable-mpms-shared= All--with-z--with-Pcre--with-apr=/usr/local/Apr--with-apr-util=/usr/local/apr-util--with-mpm=Event Make Make InstallAfter compiling, there are a series of actions, such as setting the PATH environment variable, setting the man path, modifying the configuratio
Library
Iii. configuration items
A configuration item is an object for configuration management. A configuration item can be a module, a sub-system, or even the entire system. The configuration items of each project have differen
of the configuration library
iii. Configuration Items
Configuration items are configuration-managed objects, which can be a module, a subsystem, or even an entire system. The granularity of each item's configuration item is different. The granularity of the
Management 5.1 Linux Process Introduction
In LINUX, each executed program (code) is called a process. Each process is assigned an ID number.
Each process corresponds to a parent process, and the parent process can replicate multiple child processes. For example WWW server.
Each process can exist in two ways. Front and back office, the so-called foreground process is the user's current scre
establishment of configuration items, baselines, status indication of changes, and process control to ensure that products (or sub-products) are operated in accordance with the prescribed procedures; for example, the "configuration item" enters the "baseline" process, including configuration item labeling, Product ver
('http://www.cnblogs.com/wupeiqi/articles/6192986.html')>>> ret.text# renders the entire page, which is equivalent to a stringThe second way: with the implementation of SSH, with the central control machine to collect assets, the middle part is the central control machineMany operations tools are packaged in Python-based Paramiko modules, such as Fabric,ansible,saltstack, and the latest ansible is implemen
the contents of the following:
Gets the form, there is a slight difference (ignores root node root):
var S1 = configuration["Key1"]; return Jsinh
var s2 = configuration["Key2:subkey2"];//Back to Hello World
Note, however, that the common key cannot be repeated, and that the following files will be error-prone when they are read.
Sensitive information
Basic example of PHP: Use PHP + Mysql to compile a simple news management system and mysql news management system
Goal: Use php and mysql operation functions to publish, browse, modify, and delete news information.
Steps:
I. create databases and tables
1. Create a database and a table: newsdb
2. Create a table: news
Field: News id, title, keyword, author, release
, usually with "Ethernet", "Bridge"UUID: Unique identification code for the network card deviceIPADDR: IP address of this interfaceNETMASK: Subnet mask, EX 255.255.255.0Subnet mask in PREFIX:CIDR format, EX 24-bit mask (this one with netmask, this)Gateway: GatewaysDns1:dns the primary DNS server to which the server is pointingDNS2: Alternate DNS server addressDNS3: Third Alternate DNS server addressIpv6init: Initialize IPv6 protocol AddressUserctl: Whether to allow normal users to manage this in
process. In order to control changes without seriously hindering reasonable changes, the Software Configuration Management introduces the "baseline (base line). The IEEE defines a baseline as follows: "A protocol or product that has been officially approved by review can serve as the basis for further development, in addition, the change can only be controlled through formal changes."
Therefore, according
present the software through quantified data and reports based on version control and process management.The status of the development progress.(35) configuration reviewAuditing)Configuration audit is an element of Software Configuration Management. It checks software products based on requirements, standards, or cont
Log Management Server side (servers side)asp.net boilerplate uses the castle Windsor ' s logging facility logging tool, and can use a different log class library, such as: Log4net, Nlog, Serilog ... Wait a minute. For all log class libraries, Castle provides a common interface to implement, we can easily handle a variety of special log libraries, and when the business needs, it is easy to replace the log components.
Translator's note: What is Castle:
----" The formal production environment, all the environmental software version should be unified, whether I endless;2, Development Team Team Office Internal Test Environment (the environment is maintained by the development team, or the code is automatically updated regularly), the code has a problem to return to a developer3, there is a special test engineer, the program has problems directly returned to the developerThe 4,IDC test has a test and operations participation, called Idctest, carri
file1//Show Results? 9, change the owner, belong to the group? =chown: Set who a file belongs to, owner? Syntax: Chwon user name. Group name File? [Email protected] ~]# chown alice.hr file1//change to master, genus Group? [[email protected] ~]# chown Alice File1//change to Owner? [[email protected] ~]# chown. HR file1//change only Group? =CHGRP: Sets the group to which a file belongs? Syntax: CHGRP group name file-R is recursive meaning? [Email protected] ~]# CHGRP it file1//change file group?
times of COMMIT$ Git commit-M "fixed severe production problem"Hotfix branch finishedAt the end, the bugfix will be merged to the master and the develop together to ensure that the bug has been fixed during the next release. This is the same as when release branch is finished.First, update master and tag release.$ Git checkout master$ Git merge -- no-FF hotfix-1.2.1$ Git tag-A 1.2.1Merge with develop$ Git checkout develop$ Git merge -- no-FF hotfix-1.2.1There is an exception, that is, when a re
Due to the problem of overwriting the new version of documents and mixed version during the cooperation process, these problems can be solved by using SVN version control, I just didn't play the real role of this platform. When you often worry about many versions, you will feel that SVN is powerful and a good tool for cooperation.
It manages the development of a team and enables the development of hundreds of developers. It groups users and assigns different permissions to users in different g
There are two types of configuration audit: PCA (physics configuration audit) and FCA (function configuration audit ).
PCA is the physical audit, mainly to check whether the version is correct and consistent.
(1) Whether the configuration items are complete. (2) whether the version is complete.
FCA is a function aud
Introduction to Puppet: 1. installation and configuration, and puppet Configuration Management
Puppet is a configuration management tool. This article describes how to install and set Puppet.What is Puppet?
Puppet is a configuration
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.