We use it for patching and configuration management.
We are a healthcare institution. We have less than 500 hosts. Ansible is used between the infrastructure and applications, and primarily has Red Hat as the OS.
We use it for patching and configuration management.
We are a healthcare institution. We have less than 500 hosts. Ansible is used between the infrastructure and applications, and primarily has Red Hat as the OS.
It has improved our organization through provisioning and security hardening. When we do get a new VM, we have been able to bring on a provisioned machine in less than a day. This morning alone, I provisioned two machines within an hour. I am talking about hardening, installing antivirus software on it, and creating user accounts because the Playbooks were predesigned. From the time we got the servers to the actual hand-off, it takes less than an hour. We are talking about having the servers actually authenticate Red Hat Satellites and run the yum updates. All of that can be done within an hour.
The YAML syntax is easy to use, but it takes some getting used to. I feel like Microsoft Visual Studio helps with the YAML syntax, lining it up correctly. However, if you're doing it from the command line without actual spacing, that could be a little problematic. The new version of Visual Studio is quite helpful because Git is integrated with it. The YAML markdowns are also in place. My staff doesn't need special coding skills to use it.
We have multiple Playbooks to configure a server. We can break it up or make one main YAML script to push out all the individual dependencies.
When you set up Playbooks, I may have one version of the Playbook, but another member of the team may have a different vision, and we will not know which version is correct. We want to have one central repository for managing the different versions of Playbooks, so we can have better collaboration among team members. This is our use case for using Git version control.
Collaboration across teams is a great goal to accomplish, but that would necessitate more visibility to other teams of what Ansible is capable of with the database teams and other individual applications. Because we have so many applications, I don't know if they are aware of how Ansible could be beneficial to them. That would necessitate a broader conversation within the IT infrastructure application teams.
While it saves time with fewer moves, there could be still room for improvement because we do not actually manage the VMs. Instead, this is managed by the Windows team, who spins up the VM. Then, once the VM is handed off, we do the security hardening. If we received the request from the application owner to spin up the VM to hand it off, then we could take that entire process and get it streamlined. Whereas, it is handled by a different team right now.
It would be great if we could leverage Ansible Tower and Red Hat Satellites more.
API integration would help because right now our security team uses Splunk, and they are independent of my team, which is the Unix team. Therefore, if we could tie in Splunk with products, like Ansible, Cylance, and Rubrik for backup, then we could get all that information in a central console. We have not previously raised this suggestion because our Ansible Engine needs to be upgraded so we can get support for the Ansible product.
We have been using Ansible for at least four years.
We have not had any issues with Ansible. One of the projects that we have allocated for this year is to migrate our control station from RHEL 6 to RHEL 7.
We really don't have anyone maintaining it. It was a plug and play solution. We downloaded Ansible and ran it, because everyone knows how to use Ansible on the team at this point. Right now, I am trying to get to the next phase of using Git to set up more version control.
The scalability is excellent.
Four guys use it on the Unix team.
We were previously using Bash scripting.
We did try BigFix for two years. However, because of costs, Ansible proved to be better cost-wise. The licensing fee was a big issue with using BigFix. Control from the BigFix perspective was a concern, because you were locked into the GUI. With Ansible, we were able to do everything from the command line and touch the entire environment from the command line. Once you use BigFix and an issue, you then have to log out or go into the box from one of the servers, but you were locked into the GUI in BigFix.
It is agentless. All we had to do is set up the control station, then Python was installed on all our Linux hosts. So, it was easy. The deployment took less than an hour.
The SSH keys were already in place. We already had the account, where we tested it out beforehand. Therefore, we knew exactly what we needed to do to deploy it. The keys were the hardest thing to set up and that was already in place (prior to Ansible).
The entire Linux group of four guys was involved in the deployment. We never had to use Red Hat resources to set up Ansible.
Ansible is primarily used for provisioning or hardening our servers. The realization of getting a server from testing to actual production is very short in our environment because the processes have been streamlined. Before Ansible, the processes were a lot more unwieldy. We went from a week to less than a day where you can get your server hardened, provisioned, and handed off to the application owner.
Costs are negligible when using Ansible. The costs are just learning to use the solution's various options. We save time and efficiency versus other solutions.
We have tested out Ansible Tower, but there is a budget issue, so that is in our next phase.
Red Hat's open source approach was a factor when choosing Ansible, since the solution is free as of right now.
We have Red Hat Satellites and looked into Red Hat Insights, which we are still not fully deployed on yet. The integration between Red Hat solutions is seamless.
We looked into BigFix. I also looked at SaltStack and Puppet, but didn't get anywhere with that. I wanted something that had ease from a management perspective. Other solutions besides Ansible needed us to use agents, and I felt that would cause too many problems. Management didn't want a disruption of servers or downtime. I couldn't give them the assurance that installing something with an agent would not cause issues. So, this affected our decision to go with Ansible.
I don't think any product that we looked into could compare to Ansible.
Test the environment because it is easy to use. Once you are proficient with Unix and Linux, it is extremely easy to use it: Setting up the inventory system, YAML files, and SSH keys.
I have no complaints about Ansible. I just wish I had more time to really delve into it.
I think we not using Ansible to its fullest potential, because of:
I haven't been exposed to Ansible Tower much. I have only tested it out three times. Right now, I am a little rusty on it, so it will take some getting used to again. It is more GUI-based, so it is pretty user-friendly.
The biggest lesson learnt: There are multiple ways of doing the same thing.
I would rate this solution as a nine (out of 10) because of the configuration management for all our servers in the environment. It can be used within the networking field for all devices, such as Cisco switches. The solution speaks to Windows hosts as well. It just takes time to use all the functionality and get it visible across the organization.
We use it for the bot. It helps to keep tracking all the automation processes that are ongoing in your ecosystem
It helps with patching and keeping everything compliant.
Automation tracking is the most valuable feature.
The SSM connection access needs improvement because right now, they do everything through SSH.
I have been Red Hat Ansible Automation Platform for a few years.
The solution is very stable.
If there's some cloud add ons, we would increase the usage. Only admins use the solution.
We just create a server, and then we use that server to on-premesis.
Ansible has good performance. Overall, I rate the solution an eight out of ten.
The primary use case is mostly automation. In technical terms, the solution uses a playbook. The playbooks contain code. If you have written all the code in the playbook, you just execute that code. You can automate depending on the environment.
The playbooks and the code the solution uses are quite useful.
It would be good to make the solution more user-friendly for customers who aren't skilled in coding and don't know how to use the playbook's code. If we have many customers and the modules already exist, the user can just plug and play.
I have been using the solution for one year.
We don't have many issues with stability, so I rate the solution's stability a nine out of ten.
I rate the solution's scalability a nine out of ten. We have two customers using the solution.
The technical support is good.
The initial setup is complex, and OpenShift would be much easier. It took a week to deploy the solution. When deploying the solution, you must download the installer and install the solution on the server.
It requires two engineers for maintenance and deployment.
Customers need to pay yearly for the license. The pricing is acceptable. It is not expensive.
If you know the basics of coding for you to write the playbook's code, and if you have a midrange environment with up to 1,000 servers, Red Hat Ansible Automation Platform is a good option to automate daily tasks.
I rate the solution a seven out of ten.
We have a lot of Red Hat servers in our data center environment, so we use this solution to manage the configuration, deploy and push configuration management. In addition, we use the Red Hat Ansible Automation Platform to automate deployment tasks.
We can manage all the configuration consistency between all our servers. It is a configuration management tool, so we can easily manage our consistent configuration course over different Red Hat or Linux servers. We have not used Windows recently and are using only Linux now.
We like the GUI-based interface for the tower. Before, we only had a command-line interface to run all the Ansible tasks. Now, the Ansible tower provides the complete GUI functionality to run, manage, and create the templates and the Ansible jobs. This includes the code and YAML file we can create. The GUI interface is the added advantage of this solution, including some integration with the different plugins.
It should support more integration with different products. For example, it is for network security automation, and with the VMware product, they don't have an integration for NFTX right now. So they should include this integration capability so we can automate more tasks with this solution.
We have been using Red Hat Ansible Automation Platform since 2021, and we are using version 3.2. It is deployed on-premises.
It is a stable solution.
It is a scalable solution and is based on your node license. We are using more than 400 servers right now, and it requires one senior system engineer for maintenance and deployment. We plan to increase the usage using Windows automation.
I rate the technical support an eight out of ten.
Positive
We used a Puppet configuration in the past. We staged with Puppet and then moved to Red Hat Ansible Automation Platform.
The initial setup and deployment were easy, but the first two days of operations were a bit complex. We completed the deployment in-house.
There is a return on investment as a technical person. It has saved time and effort in maintaining the deployment environment. So on the technical side, it's saved lots of time and effort on the configuration.
I believe the cost per node basis is around $125 per node.
I rate this solution a nine out of ten. Regarding advice, for the deployment, I would suggest working on inventory first. They should also consider their use cases and which workflow they want to implement. In the next release, they should have VMware tight interrogation.
We primarily use the solution for automation purposes. We also use it for CI/CD plus DevOps. So these are the three main uses. We can use it for operational automation plus DevOps. We handle applications, pipelines, deployments, et cetera.
With this solution, we're able to cover our client's needs.
The automation is very good. The operational automation and DevOps are the most valuable features for us.
It's easy to set up.
The solution can scale.
It's very stable.
Now, there is a GitHub solution that came on the market. GitHub's integration with Ansible is adding value for the customer as GitHub has the capability to push/pull architecture plus it can bring in collaboration and versioning. As long as they continue to develop this integration, it will continue to be useful. What is next is to look into the infrastructure.
The improvement is already there in GitHub's capability. GitHub is already there, however, they can bring something like that into the solution as well too. They can bring AOPs capability. They should think of this product as an end-to-end solution and begin to develop it that way.
The solution costs a lot. It's not cheap.
I've been using the solution for the last four years.
The solution is extremely stable. that's why so many organizations end up using it. There are no bugs or glitches. It doesn't crash or freeze. It's reliable.
The solution can scale well. It works for small or large enterprises. There is no limitation.
Technical support has been good. We are very satisfied with the level of service we get. They are continuously improving their services as well. As long as they continue to improve we will remain happy.
Positive
The solution is very straightforward. It's easy to set up. It's not difficult at all.
How many engineers you need to handle the implementation depends on the project and use case. It depends, for example, on how many automations will be created, et cetera. The time it takes to deploy also varies. Different use cases have different deployment times.
Our company provides the implementation for our clients. We are able to handle the setup ourselves.
We've seen an ROI. It is reducing the resources needed by the customers.
It's an expensive product. It's costly.
We're charged between $8 to $13 a month per license. There are some limitations as well, however, specifically in AOPs.
We're partners.
Which version we use depends on the customer If they have a license the latest is fine. We can also work with an older version. Whatever's possible we can do. We have the list of the scripts available, which can help us do the automation for the customer.
It's on the cloud we utilize Azure and AWS. It can also be used on-premises.
It's an effective tool. We weren't sure about it at first, however, it helps reduce resources and has been helpful to customers.
I'd rate it an eight out of ten.
We use the solution for Linux patching automation. Currently, we are using the solution for patching normal configuration-related work. However, we also plan to use it for the provisioning of the servers.
The most valuable features of the solution are automation and patching.
The solution is slightly expensive, and its pricing could be improved.
I rate the solution ten out of ten for stability.
Red Hat Ansible Automation Platform is a scalable solution. Around 300 to 400 users are using the solution in our organization.
The solution’s technical support is very good.
The solution’s initial setup is very easy.
The solution can be deployed within a day if you have all the resources. To deploy the solution, you need to check if you have a proper infrastructure and everything in place.
Users with the right environment, like Linux, should go for Red Hat Ansible Automation Platform. With the Red Hat Ansible Automation Platform, we don't have to do manual things, increasing our efficiency. The solution helps us complete our complex work very easily, increasing efficiency.
Overall, I rate Red Hat Ansible Automation Platform ten out of ten.
We use it mostly for remote execution.
The most valuable feature of Ansible is repeatability because when you're working at the DoD, you want things to be cookie-cutter and replicable.
Red Hat Ansible Automation Platform helps us achieve our mission because it's easy to write.
The Red Hat solutions fit together pretty well and work in conjunction with one another.
Networking needs to be improved.
I've been using Ansible for at least a year.
As long as it can communicate with the target, there's usually no problem with the stability.
We used Puppet and switched to Ansible because it's an agentless solution.
On a scale from one to ten, I would rate this solution at nine.
We use the Red Hat Ansible Automation Platform for infrastructure provisioning as well as application deployment on Kubernetes and virtual machines.
We don't use Tower very often. We are currently primarily using the Ansible Playbook.
There are new modules available, which help to simplify the workflow. That is what we like about it.
When compared to Terraform, the execution speed of Ansible is very slow due to the way it executes things.
Improvements should be made in terms of execution speed, which is, I believe, the most lacking feature. Aside from that, re-triggering a failed task is another useful feature.
I have been working with the Red Hat Ansible Automation Platform for approximately one year.
I don't remember the exact version we're working with, but it's N-1.
Red Hat Ansible Automation Platform is a stable solution.
I've had no issues with the scalability of the Red Hat Ansible Automation Platform.
Our organization has four to five administrators who use this solution.
We have contacted technical support. I would rate them a four out of five.
Positive
We are also using Terraform.
The initial setup is quite straightforward.
This solution does not require specific maintenance.
The deployment was done in-house.
The cost is determined by the number of endpoints.
A license is required, if you are using Tower, we don't use it very often.
It is slower than other solutions.
Terraform is better for infrastructure provisioning. However, once the infrastructure is provisioned, we don't see any alternatives to Ansible.
I have a partnership with Red Hat.
It's clear and simple, and there's plenty of help available.
I would rate the Red Hat Ansible Automation Platform an eight out of ten.
