- Os / Servers Updates and Patching
- Os / Servers Vulneability Scan & Security Management
- Os / Servers User and Group Management
- Os / Servers Policy Management
- Os / Servers Performance Monitoring and Tuning
- Os / Servers Service Management
- Os / Servers User Authentication and Access
- Os / Servers Monitoring and Alerts
- Os / Servers Disaster Recovery Planning
List of Ansible Modules of Servers Updates and Patching
yumModule (For Red Hat-based Systems):yum: Manages packages using the YUM package manager on Red Hat-based systems like CentOS and RHEL.
aptModule (For Debian-based Systems):apt: Manages packages using the APT package manager on Debian-based systems like Ubuntu.
dnfModule (For Fedora Systems):dnf: Manages packages using the DNF package manager on Fedora systems.
zypperModule (For SUSE Systems):zypper: Manages packages using the Zypper package manager on SUSE Linux systems.
pkgngModule (For FreeBSD Systems):pkgng: Manages packages on FreeBSD systems using thepkgpackage manager.
pipModule (For Python Packages):pip: Manages Python packages using the Python Package Installer.
gemModule (For Ruby Gems):gem: Manages Ruby gems using the RubyGems package manager.
composerModule (For PHP Dependencies):composer: Manages PHP dependencies using Composer.
win_updatesModule (For Windows Systems):win_updates: Manages updates on Windows systems using Windows Update.
dnfModule (For OpenSUSE Systems):dnf: Manages packages using the DNF package manager on OpenSUSE systems.
List of Ansible Modules of Servers Vulneability Scan & Security Management
redhat_securityModule:redhat_security: Interacts with the Red Hat Security Data API to fetch information about security vulnerabilities and advisories.
os_hardeningModule:os_hardening: Enforces system hardening configurations based on predefined or custom security policies.
debsecanModule:debsecan: Scans Debian-based systems for known vulnerabilities in installed packages using the Debsecan tool.
lynisModule:lynis: Executes Lynis security auditing tool to perform system security assessments.
osqueryModule:osquery: Manages the installation and execution of osquery, a tool that allows you to query and monitor system information for security purposes.
ufwModule:ufw: Manages Uncomplicated Firewall (UFW) rules on Linux systems, allowing you to configure and manage firewall settings.
firewalldModule:firewalld: Manages firewalld firewall settings on Linux systems, including adding or removing rules.
sebooleanModule:seboolean: Manages SELinux boolean values, allowing you to enable or disable specific security settings.
sefcontextModule:sefcontext: Manages SELinux file context mappings, which define how files and directories should be labeled for security purposes.
aideModule:aide: Manages the installation and execution of the Advanced Intrusion Detection Environment (AIDE) tool to perform file integrity checks.
List of Ansible Modules of Servers User and Group Management
userModule:user: Manages user accounts, including creating, modifying, and deleting users. It also allows you to set user attributes such as password, home directory, and shell.
groupModule:group: Manages groups, including creating, modifying, and deleting groups. You can also add or remove users from groups using this module.
user_passwordModule:user_password: Manages user passwords, allowing you to set or change user passwords.
authorized_keyModule:authorized_key: Manages SSH public keys for user authentication, enabling you to add or remove authorized keys for user accounts.
ssh_authorized_keyModule:ssh_authorized_key: Similar toauthorized_key, this module specifically manages SSH public keys for user authentication.
user_secretModule:user_secret: Manages user secrets, which are typically used for managing credentials and other sensitive information associated with users.
group_membershipModule:group_membership: Manages group membership, allowing you to add or remove users from groups.
group_varsModule:group_vars: Manages variables associated with groups. While not directly for user and group management, it can be used to manage configurations for different groups of users.
List of Ansible Modules of Servers Policy Management
os_hardeningModule:os_hardening: Enforces system hardening configurations based on predefined or custom security policies. It helps ensure that servers adhere to specific security standards.
selinuxModule:selinux: Manages SELinux settings, allowing you to enable, disable, or change the SELinux mode on a system. SELinux policies can enforce security policies related to access controls.
sebooleanModule:seboolean: Manages SELinux boolean values, allowing you to enable or disable specific security settings defined in the SELinux policy.
sefcontextModule:sefcontext: Manages SELinux file context mappings, which define how files and directories should be labeled for security purposes.
sysctlModule:sysctl: Manages kernel parameters (sysctl settings) on Linux systems. This can help enforce specific system-wide configurations.
aideModule:aide: Manages the installation and execution of the Advanced Intrusion Detection Environment (AIDE) tool to perform file integrity checks. AIDE helps maintain the integrity of system files and directories.
firewalldModule:firewalld: Manages firewalld firewall settings on Linux systems, including adding or removing rules. Firewalld can help enforce network-level security policies.
ufwModule:ufw: Manages Uncomplicated Firewall (UFW) rules on Linux systems, allowing you to configure and manage firewall settings.
hostnameModule:hostname: Manages the system hostname, which is an important aspect of policy management for identifying and securing systems.
ntpModule:ntp: Manages NTP (Network Time Protocol) settings, helping ensure accurate time synchronization across systems.
List of Ansible Modules of Servers Performance Monitoring and Tuning
sysctlModule:sysctl: Manages kernel parameters (sysctl settings) on Linux systems. Adjusting these parameters can impact system performance and behavior.
tunedModule:tuned: Manages system tuning profiles using thetuneddaemon. Tuning profiles optimize various aspects of system performance based on predefined configurations.
shellandcommandModules:shellandcommand: These modules allow you to run custom performance monitoring scripts or command-line tools to gather system metrics.
setupModule:setup: Collects facts about the system, including hardware, network, and software details, which can help you understand system performance characteristics.
netstatModule:netstat: Provides information about network connections and statistics, which can be useful for identifying network-related performance issues.
topandhtopModules:topandhtop: These modules allow you to run thetoporhtopcommand to monitor real-time CPU, memory, and process information.
iostatModule:iostat: Runs theiostatcommand to gather input/output statistics for disks and storage devices.
vmstatModule:vmstat: Executes thevmstatcommand to collect information about system virtual memory and process statistics.
freeModule:free: Runs thefreecommand to provide information about system memory usage and availability.
sarModule:sar: Runs thesarcommand to collect and report system activity and performance statistics over time.
psModule:ps: Executes thepscommand to gather process-related information, such as process status and resource utilization.
nmonModule:nmon: Manages the installation and execution of thenmontool, which provides extensive system performance data.
List of Ansible Modules of Servers Service Management
systemdModule:systemd: Manages services using the systemd init system. This module can start, stop, restart, enable, or disable services.
serviceModule:service: Manages services using traditional init systems like SysV init. This module is versatile and can work with different init systems based on the distribution.
upstartModule:upstart: Manages services using the Upstart init system, which is used in some Linux distributions.
win_serviceModule:win_service: Manages Windows services. This module allows you to start, stop, restart, or change the state of services on Windows machines.
launchctlModule:launchctl: Manages services on macOS systems using the launchd init system.
cronModule:cron: Manages scheduled tasks using the cron daemon. While not strictly a service, cron jobs are essential for automated tasks.
initctlModule:initctl: Manages services on systems using the initctl command, which is part of the Upstart init system.
zfsModule:zfs: Manages ZFS datasets and properties, including starting and stopping ZFS services if needed.
List of Ansible Modules of Servers User Authentication and Access
userModule:user: Manages user accounts, including creating, modifying, and deleting users. It also allows you to set user attributes such as password, home directory, and shell.
authorized_keyModule:authorized_key: Manages SSH public keys for user authentication, enabling you to add or remove authorized keys for user accounts.
ssh_authorized_keyModule:ssh_authorized_key: Similar toauthorized_key, this module specifically manages SSH public keys for user authentication.
group_membershipModule:group_membership: Manages group membership, allowing you to add or remove users from groups.
user_secretModule:user_secret: Manages user secrets, which are typically used for managing credentials and other sensitive information associated with users.
pam_limitsModule:pam_limits: Manages PAM (Pluggable Authentication Module) resource limits for users, helping control resource consumption.
pam_denyModule:pam_deny: Manages PAM access controls, enabling you to deny or allow specific users access to the system.
pam_permitModule:pam_permit: Manages PAM access controls to permit specific users’ access to the system.
pam_tally2Module:pam_tally2: Manages PAM user login counts and lockout policies.
groupModule:group: Manages groups, including creating, modifying, and deleting groups. You can also add or remove users from groups using this module.
user_passwordModule:user_password: Manages user passwords, allowing you to set or change user passwords.
pam_unixModule:pam_unix: Manages PAM configuration for UNIX authentication, allowing you to control user authentication settings.
List of Ansible Modules of Servers Monitoring and Alerts
nagiosModule:nagios: Manages Nagios monitoring configurations, including hosts, services, and contacts. This module helps set up Nagios-based monitoring.
zabbix_hostModule:zabbix_host: Manages Zabbix host configurations, allowing you to configure host monitoring parameters in a Zabbix server.
zabbix_actionModule:zabbix_action: Manages Zabbix actions, which define what should happen when a specific trigger condition is met.
zabbix_screenModule:zabbix_screen: Manages Zabbix screens, allowing you to create and manage visual representations of monitored data.
telegrafModule:telegraf: Manages the installation and configuration of the Telegraf agent, which collects and sends system and application metrics to various monitoring systems.
syslogModule:syslog: Configures syslog settings on remote servers, helping you centralize system logs for monitoring and analysis.
monitModule:monit: Manages Monit monitoring configurations, including service monitoring and alerting.
heartbeatModule:heartbeat: Manages Heartbeat configurations for high availability and failover setups.
snmpModule:snmp: Manages SNMP (Simple Network Management Protocol) settings for monitoring network devices and systems.
prometheus_alertModule:prometheus_alert: Manages Prometheus alerting rules, allowing you to configure alerts based on specific conditions.
nagios_contactModule:nagios_contact: Manages Nagios contact configurations for alert notifications.
zabbix_templateModule:zabbix_template: Manages Zabbix templates, which define sets of items, triggers, and graphs for monitoring.
List of Ansible Modules of Servers Disaster Recovery Planning
backupModule:backup: Manages system backups and snapshots. This module can be used to create and manage backups of files, directories, and system configurations.
rsyncModule:rsync: Performs file synchronization between local and remote systems, which is useful for backup and data replication.
archiveModule:archive: Creates compressed archives of files and directories, suitable for backup purposes.
shellandcommandModules:shellandcommand: These modules allow you to run custom scripts or command-line tools for backup and recovery purposes.
copyModule:copy: Copies files from the local machine to remote servers, which can be part of backup strategies.
fetchModule:fetch: Retrieves files from remote servers to the local machine, which can be useful for recovering backups.
templateModule:template: Creates configuration files based on templates, helping you automate the setup of backup and recovery configurations.
uriModule:uri: Interacts with REST APIs or web services, which can be used for integrating with disaster recovery tools or services.
shellandcommandModules:shellandcommand: These modules allow you to run custom scripts or command-line tools for recovery tasks.
delegate_toParameter:- The
delegate_toparameter allows you to run tasks on a different host, which can be useful for offloading backup and recovery processes to a designated server.
- The
I’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech blog at DevOps School, travel stories at Holiday Landmark, stock market tips at Stocks Mantra, health and fitness guidance at My Medic Plus, product reviews at TrueReviewNow , and SEO strategies at Wizbrand.
Do you want to learn Quantum Computing?
Please find my social handles as below;
Rajesh Kumar Personal Website
Rajesh Kumar at YOUTUBE
Rajesh Kumar at INSTAGRAM
Rajesh Kumar at X
Rajesh Kumar at FACEBOOK
Rajesh Kumar at LINKEDIN
Rajesh Kumar at WIZBRAND