ansible基本使用

1. ansible的安装shell

  1. ansible的特性和优势
 
1.1 特性
  • no agent:不须要在被管控主机上安装客户端,ansible的客户端就是sshd服务
  • on server:无需服务端,使用时直接在命令行执行命令
  • modules in any languages:基于模块工做,模块可以使用任意语言开发
  • yaml, not code:使用yaml格式定制playbook
  • ssh by default:基于ssh协议工做
  • strong mulit-tier soloution:可实现多级指挥
 
1.2 优势
  • 轻量级,无需安装agent
  • 批量任务执行能够写成脚本,并且不用分发到远程就能够执行
  • 支持sudo

 

2. 安装vim

[root@localhost ~]# yum install -y epel-release
[root@localhost ~]# yum install -y ansible

 

3. ansible的配置文件ssh

ansible的安装目录是/etc/ansible优化

[root@localhost ansible]# ll
总用量 28
-rw-r--r--. 1 root root 19236 2月  10 21:25 ansible.cfg             //配置文件
-rw-r--r--. 1 root root  1031 2月  10 21:19 hosts                   //inventory,ansible须要链接的主机列表,能够填ip或者域名
drwxr-xr-x. 2 root root  4096 1月  30 04:15 roles

 

4. ansible的链接优化this

  • 4.1 开启ssh长链接
ansible使用ssh协议和被管控主机通讯,开启长链接后会有一个established的链接
openssh5.6之后的版本支持了multiplexing,若是管控机命令行执行ssh -V获得的版本号大于5.6就能够设置长链接
[root@localhost ansible]# vim ansible.cfg
[ssh_connection]
echo "ssh_args = -C -o ControlMaster=auto -o ControlPersist=5d" >> /etc/ansible/ansible.cfg

ControlPersist=5d 这个参数是设置保持长链接的时间spa

 

4.2 取消ssh第一次登录的交互命令行

[root@localhost ~]# cd .ssh/
[root@localhost .ssh]# cat config
UserKnownHostsFile /dev/null
ConnectTimeout 15
StrictHostKeyChecking no

若是是命令行登录,取消第一次交互:ssh -o StrictHostKeyChecking=no 192.168.123.107code

 

4.3 去除ansible第一次执行命令而没有known_hosts文件报错限制server

第一次执行ansible命令,可是管控机历来没有登陆过被管控机,会报以下错误blog

[root@localhost ~]# ansible all -i test.txt -m ping -k
SSH password:
192.168.123.107 | FAILED! => {
    "msg": "Using a SSH password instead of a key is not possible because Host Key checking is enabled and sshpass does not support this.  Please add this host's fingerprint to your known_hosts file to manage this host."
}

 

解决方法:

[root@localhost ~]# vim /etc/ansible/ansible.cfg
.......
# uncomment this to disable SSH key host checking
host_key_checking = False  

 

 

ansible的模块

大部分模块之前都学过,再也不重复作笔记,只补充之前没学过的
 
ansible执行命令的格式:ansible ip/group -m module -a arg
 
1. ping模块
[root@localhost ansible]# ansible all -m ping
192.168.123.107 | SUCCESS => {
    "changed": false,
    "ping": "pong"
}

 

2. 使用指定的IP列表文件

[root@localhost ~]# cat test.txt
192.168.123.107

[root@localhost ~]# ansible all -i test.txt -m ping      //若是自定义的文件没有分组,调用文件时必须写上all              
192.168.123.107 | SUCCESS => {
    "changed": false,
    "ping": "pong"
}

 

3. ansible使用密码登录被管控主机

ansible执行命令前,管控机须要配置密钥登录被管控机,使用密码则省去了这一步
有两种方式实现密码登录,第一种是ansible -k 选项
[root@localhost ~]# ansible -h |grep ask-pass
    -k, --ask-pass      ask for connection password

[root@localhost ~]# ansible all -i test.txt -m ping -k
SSH password:
192.168.123.107 | SUCCESS => {
    "changed": false,
    "ping": "pong"
}

 

第二种是在inventory里,ip 后面直接把密码写上

[root@localhost ~]# cat test.txt
192.168.123.107 ansible_ssh_pass=123456                         //直接在ip后面写上密码

[root@localhost ~]# ansible all -i test.txt -m ping
192.168.123.107 | SUCCESS => {
    "changed": false,
    "ping": "pong"
}

 

4. 收集被管控机的信息(相似saltstack的grains)

[root@localhost ~]# ansible all -i test.txt -m setup             //调用setup模块

[root@localhost ~]# ansible all -i test.txt -m setup -a 'filter=ansible_default_ipv4'             //使用filter关键字对setup的信息过滤提取
192.168.123.107 | SUCCESS => {
    "ansible_facts": {
        "ansible_default_ipv4": {
            "address": "192.168.123.107",
            "alias": "ens33",
            "broadcast": "192.168.123.255",
            "gateway": "192.168.123.1",
            "interface": "ens33",
            "macaddress": "00:0c:29:66:54:78",
            "mtu": 1500,
            "netmask": "255.255.255.0",
            "network": "192.168.123.0",
            "type": "ether"
        }
    },
    "changed": false
}

 

5. 从inventory中取ip地址

[root@localhost ~]# ansible all -i test.txt -m shell -a 'echo {{ inventory_hostname}}'       //inventory_hostname是一个内置变量,返回当前的inventory
192.168.123.107 | SUCCESS | rc=0 >>
192.168.123.107
相关文章
相关标签/搜索