toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

274
active users

#ansible

6 posts6 participants0 posts today
Kevin P. Fleming<p>I've just published version 25.7.1 of 'kpfleming.systemd_networkd', my collection of Ansible roles for managing systemd-networkd configuration. New in this release are a half-dozen 'advanced' features in the 'network' role, along with a new 'bridge' role. Most of these changes originated from my recent project to switch to DHCPv6-PD on my home network, and also eliminate the standalone DHCPv4 servers I was using.</p><p>If you're an Ansible user and use systemd-networkd on your managed machines, take a look! Here's an example of a moderately-complex configuration:</p><p><a href="https://github.com/kpfleming/ansible-systemd-networkd#examples" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/kpfleming/ansible-s</span><span class="invisible">ystemd-networkd#examples</span></a></p><p>I've got more complex ones if you're really interested 🙂 </p><p><a href="https://mastodon.km6g.us/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a> <a href="https://mastodon.km6g.us/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a> <a href="https://mastodon.km6g.us/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.km6g.us/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a>-networkd</p>
Ian<p><a href="https://cloudisland.nz/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a> Users: what would you consider 'best practice' ..</p><p>* having a dedicated ansible user with a common password, ssh keys and sudo access across systems, or<br>* just using your own user and giving yourself a common password across systems?</p>
Blaise Pabón<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@paulasadoorian" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>paulasadoorian</span></a></span> <br>Honestly, I am falling back in love with <a href="https://fosstodon.org/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a> and with the opinionated structure of Robert Dr Bock"s ansible-collection-roles/roles <a href="https://share.google/Fg2XolFtA7rS2G5j3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">share.google/Fg2XolFtA7rS2G5j3</span><span class="invisible"></span></a><br>I'm putting my <a href="https://fosstodon.org/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> into code.</p>
JP Mens<p>Fame!</p><p><a href="https://mastodon.social/tags/ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ansible</span></a></p>
Debacle<p>Upgraded 13 servers to <a href="https://framapiaf.org/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a>&nbsp;13 <a href="https://framapiaf.org/tags/trixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trixie</span></a> yesterday 🙂</p><p>Minor problems:</p><p>- On two servers, <a href="https://framapiaf.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> kernel changed network interface names. Fortunately, local servers, so I could login and fix it.</p><p>- Four <a href="https://framapiaf.org/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> instances did not start, because long deprecated "ssl on" is now an error. Again, easy to fix.</p><p><a href="https://framapiaf.org/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a></p>
bodsch<p>Ich habe meine <a href="https://chaos.social/tags/scm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scm</span></a> <a href="https://chaos.social/tags/ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ansible</span></a> collection mit <a href="https://chaos.social/tags/opengist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opengist</span></a> bereichert.</p><p><a href="https://github.com/bodsch/ansible-collection-scm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/bodsch/ansible-coll</span><span class="invisible">ection-scm</span></a></p>
gyptazy<p>And a short blog pot about it :)</p><p><a href="https://mastodon.gyptazy.com/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a> <a href="https://mastodon.gyptazy.com/tags/ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ansible</span></a> <a href="https://mastodon.gyptazy.com/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://mastodon.gyptazy.com/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://mastodon.gyptazy.com/tags/storage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>storage</span></a> <a href="https://mastodon.gyptazy.com/tags/nfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nfs</span></a> <a href="https://mastodon.gyptazy.com/tags/iscsi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iscsi</span></a> <a href="https://mastodon.gyptazy.com/tags/pbs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pbs</span></a> <a href="https://mastodon.gyptazy.com/tags/cifs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cifs</span></a> <a href="https://mastodon.gyptazy.com/tags/smb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smb</span></a> <a href="https://mastodon.gyptazy.com/tags/cephfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cephfs</span></a> <a href="https://mastodon.gyptazy.com/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> </p><p><a href="https://gyptazy.com/introducing-storage-management-for-proxmox-nodes-clusters-with-the-new-ansible-module-proxmox_storage/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gyptazy.com/introducing-storag</span><span class="invisible">e-management-for-proxmox-nodes-clusters-with-the-new-ansible-module-proxmox_storage/</span></a></p>
gyptazy<p>It just got merged… You can now easily manage storage in <a href="https://mastodon.gyptazy.com/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> with <a href="https://mastodon.gyptazy.com/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a>.</p><p>Simply add CephFS, NFS, iSCSI or Proxmox Backup Server to your cluster with a simple Ansible task :)</p><p><a href="https://mastodon.gyptazy.com/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a> <a href="https://mastodon.gyptazy.com/tags/proxmoxve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmoxve</span></a> <a href="https://mastodon.gyptazy.com/tags/ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ansible</span></a> <a href="https://mastodon.gyptazy.com/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.gyptazy.com/tags/contributing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>contributing</span></a> <a href="https://mastodon.gyptazy.com/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a> <a href="https://mastodon.gyptazy.com/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://mastodon.gyptazy.com/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> </p><p><a href="https://github.com/ansible-collections/community.proxmox/commit/c5d6adafe1f74befb0dc4d61c5a7cf92491272bf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/ansible-collections</span><span class="invisible">/community.proxmox/commit/c5d6adafe1f74befb0dc4d61c5a7cf92491272bf</span></a></p>
jhx<p>Just reworked my <a href="https://fosstodon.org/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://fosstodon.org/tags/ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ansible</span></a> desktop playbook and adapted it for <a href="https://fosstodon.org/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> 13 Trixie. :debian: <br>Pretty smooth sailing overall 😎 </p><p><a href="https://github.com/jhx0/debian-desktop-playbook" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jhx0/debian-desktop</span><span class="invisible">-playbook</span></a></p>

Proxmox fully automated! From ClickOps to Code: Automated. Audited. Revisioned. Repeatable.

Starting from the base by automating:
- Cluster initialization
- Cluster join
- Storage Integration
- Proxmox Backup Server Integration
- SDN Networks (different ones for pros/dev)
- Guest Resources utilizing the cluster infrastructure

#Proxmox #PVE #Pbs #ProxmoxBackupServer #opensource #Automation #Ansible #python #devops #terraform #cicd #pipeline #cluster #nfs #iscsi

peertube.gyptazy.com/w/4cp7ddL

Continued thread

I mentioned recently that the configurability of {{ ansible_managed }} is being removed for #ansible 2.23. The reasoning appears to be “can be set in an inventory or other vars source”.

Anybody have any clever ideas on how to accomplish template filename modification time without prior invocation of a module or two, preferably also without having to create a custom lookup/filter plugin? (The template filename is in {{ template_path }}, {{ template_uid }} )

I’m out of ideas.

2/2

When we originally invented #ansible’s “ansible_managed” variable, we made it configurable. Before the default was broken a few years ago, it was roughly:

ansible_managed = Ansible managed: {file} modified on %Y-%m-%d %H:%M:%S by {uid} on {host}

One of the cool bits (I say this as its inventor) was that such an entry in an ansible.cfg caused the templated value to have the filename of the template source {file}, it’s owner {uid}, and it’s modification time in the strftime() patterns.

1/2

Continued thread

Actually on the topic of feature flags, I'm curious if they exist/what people are doing at the infra / #IaC / #GitOps level.

At one point I was thinking "can I hookup like launchdarkly into #Puppet's Hiera" to handle phased rollouts of things.

More recently, want the same thing for my #FluxCD stuff. Higher level than like Flagger I think, as in gradual rollout of Deployments over many clusters, than gradual rollout of Pod within a deployment.

Kinda like #Ansible's strategies and it's "max_fail_percentage" where it'll halt.

Ever wondered which SSH keys are lurking on your servers?

Just published a comprehensive Ansible playbook in my gists that audits your entire infrastructure for SSH keys and finds dangerous unprotected private keys!

- Detects unprotected private keys
- Lists all Pubkeys for root and users
- Comprehensive reporting (TXT + CSV)

codeberg.org/Larvitz/gists/src

Codeberg.orggists/2025/20250804-SSHKeyAuditPlaybook.md at maingists - Just some gists in Markdown, I wanted to share

#Linux #hivemind

TL;DR: How would you deploy a maintainable Linux build to 14 PCs?

I have a lab network of 14 PCs at $dayjob. I want them all to have the same Linux build/image, with the same apps - (probably) Plasma, VirtualBox, LibreOffice, Packet Tracer (so JRE as well) as the basics, plus various other tools.

If the users mess up the machine somehow, they need to be easily re-imaged. It would be nice if /home could optionally be preserved, but not essential.

I am currently the most Linux-savvy person in the team that will be looking after these PCs. I'm not there all the time, so this needs to be maintainable by techies who don't daily drive Arch.

I know #Ansible could be a good option, meaning I have some flexibility with which distro. (I am open to different distros for this.) #Nix or #NixOS could also work, but the learning curve for that could be pretty steep (for me - steeper for the rest of the team), plus its non-standard approach to Linux might be confusing for some.

I guess some solution using a PXE boot and then an auto-deployed script or definition file?

Hey #GetFediHired,
After some layoffs in my current company, I am looking for some #softwaredevelopment job, #remote only. I can work in the #EU or would be able to travel some weeks during the year.

I am fluent in #PHP, #Symfony, #Golang, #gRPC, #REST and #GraphQL #API, #Docker, #Ansible, Event Streaming and modern software development in general with experience of over 15 years in various roles - from senior engineer to CTO. I value good software architecture, tests, documentation in combination with valuable communication and discussions.

Find my CV here: codedge.de/cv

If that sounds like something, drop me a message or reply. Cheers!

code and society | codedgeCV
More from tH