home / skills / ancoleman / ai-design-components / managing-configuration
This skill helps you automate server configurations with Ansible, enforce idempotency, manage secrets, test roles, and implement GitOps workflows.
npx playbooks add skill ancoleman/ai-design-components --skill managing-configurationReview the files below or copy the command above to add this skill to your agents.
---
name: managing-configuration
description: Guide users through creating, managing, and testing server configuration automation using Ansible. When automating server configurations, deploying applications with Ansible playbooks, managing dynamic inventories for cloud environments, or testing roles with Molecule, this skill provides idempotency patterns, secrets management with ansible-vault and HashiCorp Vault, and GitOps workflows for configuration as code.
---
# Configuration Management
## Purpose
This skill provides guidance for automating server and application configuration using Ansible and related tools. It covers playbook creation, role structure, inventory management (static and dynamic), secret management, testing patterns, and idempotency best practices to ensure safe, repeatable configuration deployments.
## When to Use This Skill
Invoke this skill when:
- Creating Ansible playbooks to configure servers or deploy applications
- Structuring reusable Ansible roles with proper directory layout
- Managing inventories (static files or dynamic cloud-based)
- Securing secrets with ansible-vault or HashiCorp Vault integration
- Testing roles with Molecule before production deployment
- Ensuring idempotent playbooks that safely run multiple times
- Migrating from Chef or Puppet to Ansible
- Implementing GitOps workflows for configuration as code
- Debugging playbook failures or handler issues
## Quick Start
### Basic Playbook Example
```yaml
---
# site.yml
- name: Configure web servers
hosts: webservers
become: yes
tasks:
- name: Ensure nginx is installed
apt:
name: nginx
state: present
notify: Restart nginx
- name: Start nginx service
service:
name: nginx
state: started
enabled: yes
handlers:
- name: Restart nginx
service:
name: nginx
state: restarted
```
Run with:
```bash
ansible-playbook -i inventory/production site.yml
```
## Core Concepts
### 1. Idempotency
Run playbooks multiple times without unintended side effects. Use state-based modules (`present`, `started`, `latest`) instead of imperative commands.
**Idempotent (good):**
```yaml
- name: Ensure package installed
apt:
name: nginx
state: present
```
**Not idempotent (avoid):**
```yaml
- name: Install package
command: apt-get install -y nginx
```
See `references/idempotency-guide.md` for detailed patterns.
### 2. Inventory Management
**Static Inventory:** INI or YAML files for stable environments.
**Dynamic Inventory:** Scripts or plugins for cloud environments (AWS, Azure, GCP).
Example static inventory (INI):
```ini
[webservers]
web1.example.com ansible_host=10.0.1.10
web2.example.com ansible_host=10.0.1.11
[webservers:vars]
nginx_worker_processes=4
```
See `references/inventory-management.md` for dynamic inventory setup.
### 3. Roles vs Playbooks
**Playbooks:** Orchestrate multiple tasks and roles for specific deployments.
**Roles:** Reusable, self-contained configuration units with standardized directory structure.
Standard role structure:
```
roles/nginx/
├── defaults/ # Default variables
├── tasks/ # Task files
├── handlers/ # Change handlers
├── templates/ # Jinja2 templates
├── files/ # Static files
└── meta/ # Dependencies
```
See `references/role-structure.md` for complete role patterns.
### 4. Secret Management
**ansible-vault:** Built-in encryption for sensitive data.
**HashiCorp Vault:** Enterprise-grade secrets management with dynamic credentials.
Encrypt secrets:
```bash
ansible-vault create group_vars/all/vault.yml
ansible-playbook site.yml --ask-vault-pass
```
See `references/secrets-management.md` for Vault integration.
## Common Workflows
### Workflow 1: Create New Playbook
**Step 1:** Define inventory
```ini
# inventory/production
[webservers]
web1.example.com
web2.example.com
```
**Step 2:** Create playbook structure
```yaml
---
- name: Configure application
hosts: webservers
become: yes
pre_tasks:
- name: Update package cache
apt:
update_cache: yes
roles:
- common
- application
post_tasks:
- name: Verify service
uri:
url: http://localhost:8080/health
status_code: 200
```
**Step 3:** Test with check mode
```bash
ansible-playbook -i inventory/production site.yml --check --diff
```
**Step 4:** Execute playbook
```bash
ansible-playbook -i inventory/production site.yml
```
See `references/playbook-patterns.md` for advanced patterns.
### Workflow 2: Create and Test Role
**Step 1:** Initialize role structure
```bash
ansible-galaxy init roles/myapp
```
**Step 2:** Define tasks
```yaml
# roles/myapp/tasks/main.yml
---
- name: Install application dependencies
apt:
name: "{{ item }}"
state: present
loop: "{{ myapp_dependencies }}"
- name: Deploy application
template:
src: app.conf.j2
dest: /etc/myapp/app.conf
notify: Restart myapp
```
**Step 3:** Add handler
```yaml
# roles/myapp/handlers/main.yml
---
- name: Restart myapp
service:
name: myapp
state: restarted
```
**Step 4:** Initialize Molecule testing
```bash
cd roles/myapp
molecule init scenario default --driver-name docker
```
**Step 5:** Run tests
```bash
molecule test
```
See `references/testing-guide.md` for comprehensive testing patterns.
### Workflow 3: Set Up Dynamic Inventory (AWS)
**Step 1:** Install AWS collection
```bash
ansible-galaxy collection install amazon.aws
```
**Step 2:** Configure dynamic inventory
```yaml
# inventory/aws_ec2.yml
plugin: aws_ec2
regions:
- us-east-1
filters:
tag:Environment: production
instance-state-name: running
keyed_groups:
- key: tags.Role
prefix: role
hostnames:
- tag:Name
compose:
ansible_host: private_ip_address
```
**Step 3:** Verify inventory
```bash
ansible-inventory -i inventory/aws_ec2.yml --list
```
**Step 4:** Run playbook
```bash
ansible-playbook -i inventory/aws_ec2.yml site.yml
```
See `references/inventory-management.md` for multi-cloud patterns.
### Workflow 4: Secure Secrets with ansible-vault
**Step 1:** Create encrypted vault file
```bash
ansible-vault create group_vars/all/vault.yml
```
**Step 2:** Add secrets
```yaml
# group_vars/all/vault.yml (encrypted)
vault_db_password: "SuperSecretPassword"
vault_api_key: "sk-1234567890"
```
**Step 3:** Reference in variables
```yaml
# group_vars/all/vars.yml (unencrypted)
db_password: "{{ vault_db_password }}"
api_key: "{{ vault_api_key }}"
```
**Step 4:** Use in playbook
```yaml
- name: Configure database
template:
src: db.conf.j2
dest: /etc/app/db.conf
vars:
database_password: "{{ db_password }}"
```
**Step 5:** Run with vault password
```bash
ansible-playbook site.yml --vault-password-file ~/.vault_pass
```
See `references/secrets-management.md` for HashiCorp Vault integration.
## Tool Selection
### When to Use Ansible
- Configuring servers/VMs after provisioning
- Deploying applications to existing infrastructure
- Managing OS-level settings (users, packages, services)
- Orchestrating multi-step workflows across hosts
- Cloud-native environments (agentless SSH/WinRM)
- Teams new to configuration management (easiest learning curve)
### When to Use Alternatives
**Infrastructure-as-Code (Terraform):** Creating cloud infrastructure resources.
**Kubernetes:** Container orchestration and configuration.
**Chef/Puppet:** Existing deployments with high migration costs.
### Ansible vs IaC Integration
Best practice: Terraform provisions, Ansible configures.
**Workflow:**
1. Terraform creates AWS EC2 instances, security groups, load balancers
2. Terraform outputs instance IPs to Ansible inventory
3. Ansible configures OS, installs packages, deploys applications
4. Ansible sets up monitoring, backups, operational tasks
See `references/decision-framework.md` for detailed decision trees.
## Testing and Quality
### Pre-Deployment Validation
**Step 1:** Lint playbooks
```bash
ansible-lint playbooks/
```
**Step 2:** Check mode (dry run)
```bash
ansible-playbook site.yml --check --diff
```
**Step 3:** Test roles with Molecule
```bash
cd roles/myapp
molecule test
```
**Step 4:** Verify idempotence
```bash
molecule idempotence
```
### Configuration Files
**.ansible-lint:**
```yaml
---
exclude_paths:
- molecule/
- venv/
skip_list:
- name[casing]
warn_list:
- experimental
```
**molecule.yml:**
```yaml
---
driver:
name: docker
platforms:
- name: instance
image: ubuntu:22.04
pre_build_image: true
provisioner:
name: ansible
verifier:
name: ansible
```
See `references/testing-guide.md` for complete testing strategies.
## Troubleshooting
### Common Issues
**Connection failures:**
- Verify SSH access: `ansible all -i inventory -m ping`
- Check SSH keys: `ssh -vvv user@host`
- Test with password: `ansible-playbook site.yml --ask-pass`
**Handler not firing:**
- Handlers only run on change (check task `changed` status)
- Handlers run at end of playbook (use `meta: flush_handlers` to force earlier)
- Handler names must match exactly
**Variable not defined:**
- Check variable precedence (command-line > playbook > inventory > defaults)
- Use debug module: `- debug: var=myvar`
- Verify variable files are loaded: `ansible-playbook site.yml -v`
**Idempotency violations:**
- Run playbook twice, compare output
- Check for `changed` on every run
- Use state-based modules instead of `command`/`shell`
See `references/troubleshooting.md` for comprehensive debugging guide.
## Integration with Other Skills
**infrastructure-as-code:**
- Terraform provisions infrastructure
- Ansible configures post-provisioning
- Terraform outputs feed Ansible inventory
**kubernetes-operations:**
- Ansible deploys K8s clusters (kubespray)
- Kubernetes handles container orchestration
- Ansible manages node-level configuration
**building-ci-pipelines:**
- CI/CD runs ansible-lint for quality checks
- Molecule tests execute in pipeline
- Deployment stage runs playbooks
**secret-management:**
- ansible-vault for simple use cases
- HashiCorp Vault for enterprise secrets
- Dynamic credentials via Vault lookups
**security-hardening:**
- Ansible applies CIS benchmarks
- Security roles enforce compliance
- Molecule verifies hardening effectiveness
**testing-strategies:**
- Molecule for role testing
- Testinfra for verification
- Integration test suites
## Reference Documentation
- `references/playbook-patterns.md` - Playbook structure, handlers, tags, variables
- `references/role-structure.md` - Role directory layout, best practices, collections
- `references/inventory-management.md` - Static, dynamic, and hybrid inventory patterns
- `references/secrets-management.md` - ansible-vault and HashiCorp Vault integration
- `references/testing-guide.md` - Molecule, ansible-lint, check mode, verification
- `references/idempotency-guide.md` - Ensuring safe, repeatable executions
- `references/decision-framework.md` - Tool selection and workflow design
- `references/chef-puppet-migration.md` - Migrating from legacy tools to Ansible
- `references/troubleshooting.md` - Common issues and debugging techniques
## Example Code
- `examples/playbooks/` - Complete playbook examples
- `examples/roles/` - Production-ready role templates
- `examples/inventory/` - Static and dynamic inventory configurations
- `examples/molecule/` - Molecule test scenarios
## Utility Scripts
- `scripts/validate-playbook.py` - Validate playbook syntax and structure
- `scripts/generate-inventory.py` - Generate inventory from cloud providers
- `scripts/ansible-vault-helper.sh` - Vault management utilities
- `scripts/molecule-runner.sh` - Automated Molecule test execution
This skill guides you through creating, managing, and testing server configuration automation with Ansible and related tools. It focuses on idempotent playbook patterns, role structure, inventory strategies (static and dynamic), secrets management with ansible-vault and HashiCorp Vault, and testing workflows using Molecule. The guidance supports GitOps practices and integrations with Terraform and CI pipelines.
The skill inspects common configuration-management needs and presents step-by-step workflows: building playbooks and roles, configuring static or cloud dynamic inventories, encrypting and retrieving secrets, and validating changes with linting and Molecule tests. It recommends idempotent modules, role conventions, inventory plugins for AWS/Azure/GCP, and secure vault integrations, plus troubleshooting patterns for connection, handler, and variable issues. Outputs include concrete examples, commands, and file layouts you can copy into projects.
How do I verify idempotence?
Run your Molecule idempotence scenario or execute the playbook twice in check/real mode and confirm no unexpected changes on the second run.
When should I use ansible-vault vs HashiCorp Vault?
Use ansible-vault for straightforward repository-level encryption. Use HashiCorp Vault for dynamic credentials, centralized policies, and multi-application secret rotation.
How do I debug a handler not firing?
Confirm the task reports changed, verify handler names match exactly, and use meta: flush_handlers to force execution earlier if needed.