Junte-se a nós em uma viagem ao mundo dos livros!
Adicionar este livro à prateleira
Grey
Deixe um novo comentário Default profile 50px
Grey
Assine para ler o livro completo ou leia as primeiras páginas de graça!
All characters reduced
Practical Ansible Automation Handbook - cover
LER

Practical Ansible Automation Handbook

Luca Berton

Editora: Orange Education Pvt Ltd

  • 0
  • 0
  • 0

Sinopse

Unleash the Power of Ansible to Automate Workflows, Streamline Operations, and Revolutionize Infrastructure Management

KEY FEATURES 
- Automate tasks with Ansible code for error-free, high-performance results.
- Master Ansible language essentials, architecture, and ad hoc commands.
- Explore Ansible’s versatile capabilities to gain expertise in Linux and Windows administration
- Achieve efficient configuration management, deployment, and orchestration.
- Unlock advanced Ansible Automation Platform and Morpheus features.

DESCRIPTION
Tired of repetitive and time-consuming IT tasks? Unlock the true potential of automation with "Practical Ansible Automation Handbook." This comprehensive guide, authored by Ansible expert Luca Berton, will help you master the art of automation. 

Starting with the basics, the book introduces Ansible's workflow, architecture, and environment setup. Through step-by-step instructions and real-world examples, you'll gain proficiency in executing core tasks such as provisioning, configuration management, application deployment, automation, and orchestration. The book covers automating administrative tasks in Linux and Windows, advanced topics like Ansible Automation Platform and Morpheus, and leveraging cloud computing with Amazon Web Services and Kubernetes container orchestration.

Practicality and real-world scenarios set this book apart. It addresses common roadblocks, provides best practices, and helps you develop a beginner-friendly playbook that minimizes errors and maximizes performance. With Ansible's commercial viability evident in the market, learning it positions you at the forefront of automation expertise. Whether you're a system administrator, network administrator, developer, or manager, this book empowers you to automate everything with Ansible. Embrace the power of automation, revolutionize your IT operations, and unleash new levels of efficiency and productivity in your organization.

WHAT WILL YOU LEARN 
- Set up and configure Ansible environments to automate various tasks. 
- Execute automation tasks, manage configurations, and deploy applications. 
- Leverage Ansible Automation Platform and Morpheus for performance optimization of complex workflows. 
- Design efficient playbooks to streamline operations and troubleshoot using the best practices.
- Efficiently automate routine tasks to achieve Enterprise-level scalability 

WHO IS THIS BOOK FOR?
This book is targeted towards beginners and developers involved in IT operations and who wish to extract the best from Ansible for task automation. It caters to system administrators, network administrators, developers, and managers in IT operations. No prior Ansible knowledge is needed as it covers basics and advances gradually. Familiarity with Linux and system administration is beneficial. By the end, readers will have a solid foundation and be ready to implement automation solutions.

TABLE OF CONTENTS 
Chapter 1: Getting Started
Chapter 2: Ansible Language Core
Chapter 3: Ansible Language Extended
Chapter 4: Ansible For Linux
Chapter 5: Ansible For Windows
Chapter 6: Ansible Troubleshooting 
Chapter 7: Ansible Enterprise
Chapter 8: Ansible Advanced
Disponível desde: 20/07/2023.

Outros livros que poderiam interessá-lo

  • Blockchain Basics - A Beginner's Guide to Distributed Ledger Technology - cover

    Blockchain Basics - A Beginner's...

    Craig Dames

    • 0
    • 0
    • 0
    Blockchain technology has become one of the most revolutionary innovations of the 21st century, offering a new way to securely store and share data. At its core, a blockchain is a distributed ledger that records transactions across multiple computers in such a way that the registered transactions cannot be altered retroactively. This provides a level of security and transparency that is not possible with traditional, centralized databases. 
    The concept of blockchain was first introduced in 2008 by an individual or group under the pseudonym Satoshi Nakamoto. It was initially designed as the underlying technology behind Bitcoin, the first decentralized cryptocurrency. However, its potential goes far beyond just digital currencies. Blockchain can be applied to a wide range of industries, including healthcare, finance, supply chain management, and more, providing a secure, transparent, and efficient way to handle data. 
    A blockchain consists of a series of "blocks," which contain records of transactions. Each block is linked to the previous one, forming a chain. This chain of blocks is distributed across a network of computers, known as nodes, ensuring that all copies of the ledger are synchronized and identical. When a new transaction occurs, it is verified and added to the blockchain by the network participants. This decentralized nature eliminates the need for a central authority, making blockchain a powerful tool for fostering trust in a wide range of applications.
    Ver livro
  • Navigating Cybersecurity - Defending Against Cyber Threats: Strategies for a Secure Online Environment - cover

    Navigating Cybersecurity -...

    Olivia Larson

    • 0
    • 0
    • 0
    Protecting your online presence in a world where technology rules is more important than ever. Welcome to "Navigating Cybersecurity: Defending Against Cyber Threats—Strategies for a Secure Online Environment." This extensive book is your go-to resource for figuring out how to defend yourself online and navigate the complex world of cyber threats. 
    Have you ever given any thought to the complex web of cyber threats that lie in the background of the digital world? Explore the world of cybersecurity as we reveal the wide range of cyber threats—from phishing and malware to well-known attacks—and analyze their tactics and motivations. Learn from real-world case studies that highlight the seriousness of cyberattacks and their aftermath. 
    Gain knowledge that will empower you to overcome your fear. Arm yourself with tactics that will protect you from ever-changing threats. Examine the three foundational principles of cybersecurity: the Defense-in-Depth strategy, the Principle of Least Privilege, and the CIA Triad. Learn how multi-factor authentication, safe password practices, and frequent software upgrades can change lives. Explore intrusion detection systems, firewalls, and virtual private networks (VPNs) to learn how to protect data while it's in transit and at rest. 
    Are you prepared to steer your digital course? You will gain practical insights from this book that will improve your online experience. Discover the duty of ethical concerns, the skill of avoiding phishing attempts, and the art of safe browsing. Navigate the world of cloud computing, data privacy laws, and Internet of Things security with confidence.
    Ver livro
  • Assembly Language - The Ultimate Guide to Programming and Virtual Machines - cover

    Assembly Language - The Ultimate...

    Jonathan Rigdon

    • 0
    • 0
    • 0
    Assembly language is often considered a bridge between high-level programming languages and machine code. Unlike high-level languages such as Python or C, which use human-readable syntax and abstract away many details of the underlying hardware, assembly language provides a more direct representation of the CPU's operations. 
      
    Each assembly language instruction corresponds to a specific operation that the CPU can perform, such as loading data from memory, performing arithmetic calculations, or branching based on conditions. These instructions are typically represented using mnemonic codes, which are easier for humans to understand compared to the binary machine code instructions that the CPU actually executes. 
      
    One of the key benefits of programming in assembly language is the level of control it provides over hardware resources. Because assembly language instructions map closely to CPU operations, programmers can fine-tune their code to optimize performance or interact directly with hardware peripherals.
    Ver livro
  • The Miracle of the Black Leg - Notes on Race Human Bodies and the Spirit of the Law - cover

    The Miracle of the Black Leg -...

    Patricia J. Williams

    • 0
    • 0
    • 0
    Beginning with a jaw-dropping rumination on a centuries-old painting featuring a white man with a Black man's leg surgically attached (with the expired Black leg-donor in the foreground), contracts law scholar and celebrated journalist Patricia J. Williams uses the lens of the law to take on core questions of identity, ethics, and race. 
     
     
     
    With her trademark elegant prose and critical legal studies wisdom, Williams brings to bear a keen analytic eye and a lawyer's training to chapters exploring the ways we have legislated the ownership of everything from body parts to gene sequences—and the particular ways in which our laws in these areas isolate nonnormative looks, minority cultures, and out-of-the-box thinkers. 
     
     
     
    At the heart of "Wrongful Birth" is a lawsuit in which a white couple who use a sperm bank sue when their child "comes out Black." And "Hot Cheeto Girl" examines the way that algorithms give rise to new predictive categories of human assortment, layered with market-inflected cages of assigned destiny. 
     
     
     
    The Miracle of the Black Leg offers a brilliant meditation on the tricky place where law, science, ethics, and cultural slippage collide.
    Ver livro
  • Multiple Sclerosis (MS) - Basics to Mastery - Evidence-based neurology handbook for diagnosis treatment and everyday living - cover

    Multiple Sclerosis (MS) - Basics...

    Dean Stratton

    • 0
    • 0
    • 0
    This audiobook is narrated by an AI Voice.   
    Written for curious beginners, students, clinicians-in-training, and informed patients, this guide explains the science and day-to-day realities of multiple sclerosis in clear, compassionate language. You’ll learn how an immune-mediated attack on myelin disrupts brain and spinal cord signaling; how typical presentations such as optic neuritis, sensory change, imbalance, and weakness are evaluated; and how diagnosis uses clinical history plus MRI evidence of dissemination in time and space, sometimes supported by cerebrospinal-fluid oligoclonal bands and the McDonald criteria. Understand current disease-modifying therapies (injectable, oral, and monoclonal), what they can and cannot do, and how acute relapses are treated (usually high-dose corticosteroids; plasma exchange when steroid-refractory). Equally, this book emphasizes rehabilitation, fatigue and mood management, heat sensitivity, cognition, exercise, nutrition, pregnancy planning, and shared decision-making. A vivid opening vignette follows “Aisha,” a young designer with sudden blurred vision, through referral, imaging, treatment choices, and building a relapse action plan—turning complex neurology into practical steps. 
    ✓ Plain-English primers with clinician-level sidebars, flowcharts, and a jargon-free glossary. 
    ✓ Case vignettes and “ask your neurologist” checklists mapped to every stage of care. 
    ✓ MRI & lab walkthroughs: lesion patterns, dissemination rules, red flags, and pitfalls. 
    ✓ Treatment landscape decoded: DMT classes, safety monitoring, vaccination timing. 
    ✓ Daily-living playbook: fatigue pacing, mobility, cognition, work, travel, and heat. 
    ✓ Practical tools: symptom tracker, flare diary, medication matrix, goal-setting sheets.
    Ver livro
  • What a Bee Knows - Exploring the Thoughts Memories and Personalities of Bees - cover

    What a Bee Knows - Exploring the...

    Stephen Buchmann

    • 0
    • 0
    • 0
    For many of us, the buzzing of a bee elicits panic. But the next time you hear that low droning sound, look closer: the bee has navigated to this particular spot for a reason using a fascinating set of tools. She may be using her sensitive olfactory organs, which provide a 3D scent map of her surroundings. She may be following visual landmarks or instructions relayed by a hive-mate. She may even be tracking electrostatic traces left on flowers by other bees. What a Bee Knows: Exploring the Thoughts, Memories, and Personalities of Bees invites us to follow bees' mysterious paths and experience their alien world. 
     
     
     
    Although their brains are incredibly small—just one million neurons compared to humans' one hundred billion—bees have remarkable abilities to navigate, learn, communicate, and remember. In What a Bee Knows, entomologist Stephen Buchmann explores a bee's way of seeing the world and introduces the scientists who make the journey possible. We travel into the field and to the laboratories of noted bee biologists who have spent their careers digging into the questions most of us never thought to ask (for example: Do bees dream? And if so, why?). With each discovery, Buchmann's insatiable curiosity and sense of wonder is infectious.
    Ver livro