Ansible continues to grow and is the strategic automation engine for Red Hat’s business. Having a solid and constantly improving integration with Ansible is key for CloudForms’ future success.
Ansible Tower Workflows are widely used in by the industry to orchestrate and govern interactions between different playbooks. CloudForms has been able to run Ansible Tower Jobs since its 4.1 release. Starting with CloudForms 4.7, we will expand this support and will be able to utilize Workflows from the Service Catalog.
Continue reading “Using Ansible workflows in CloudForms”
Last week we held a Hackathon in Berlin thanks to Christian Jung and Fabien Dupont. We had 35 attendees contributing to 12 tracks covering tons of topics related to State Machines, Ansible, Dynamic Resource Object and High Availability
If you want to join us next time, please let us know! We will be more than happy!
Continue reading “GitLab output from 2018 CloudForms Hackathon in Berlin”
This part will focus on how to create the Custom Button using an Ansible playbook.
Creating Custom Button
CloudForms 4.6 has introduced more options while creating a button. This topic will be discussed in another post.
Continue reading “Ansible Custom Buttons in CloudForms (Part 2 creating the button)”
This series is highlighting the improvements and new capabilities introduced with CloudForms 4.6 about Ansible Custom Buttons.
The Ansible Playbook used in this example will install a user-specified package on the selected virtual machine.
Continue reading “Ansible Custom Buttons in CloudForms (Part 1 configuring the environment)”
Most systems use Access Control Lists (ACL’s) to manage user’s access to objects. Common examples are ACL’s for file systems, LDAP, Web Servers and many more. Anyone who has had to create ACL rules and maintain them knows how complicated this can be. To make access control easy again, CloudForms uses tags. If the group a user belongs to has the same tag as the accessed object, access is granted, if not, access is denied.
This sounds simple and straightforward, but there are a couple of things to know about tags which make them very powerful, but also a bit tricky.
Continue reading “Using Tags for Access Control”