Skip to main content
TrustRadius
Ansible

Ansible

Overview

What is Ansible?

The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments…

Read more
Recent Reviews
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons

Video Reviews

3 videos

Is it worth it? | Red Hat Ansible Automation Platform Review
04:14
Red Hat Ansible Automation Platform Review | Words from an Automation Architect
03:12
Red Hat Ansible Automation Platform Review | Systems Admin Thoughts
06:37
Return to navigation

Pricing

View all pricing

Basic Tower

5,000

On Premise
per year

Enterprise Tower

10,000

On Premise
per year

Premium Tower

14,000

On Premise
per year

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

WebLogic Continuous Deployment with Red Hat Ansible Automation Platform

YouTube

Trusted Automation Series: F5 BigIP

YouTube

Manage your Cisco devices with Red Hat Ansible Automation Platform

YouTube

Network Automation Basics - First Ansible Playbook

YouTube

Deep Dive - Automated NetOps - Ansible for Network GitOps

YouTube
Return to navigation

Product Details

What is Ansible?

The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments and configuration of systems and devices. It can be used in a CI/CD process to provision the target environment and to then deploy the application on it.

Its Automation Hub provides a one-stop-shop for Ansible content that is backed by support from Red Hat and its partners to deliver additional reassurance for demanding environments.

The Ansible project and Ansible Engine are open source technologies. The Ansible project is built by the community (ansible.com/community) for the benefit of the community. Ansible Engine is developed by Red Hat with the explicit intent of being used as an enterprise IT platform.

Ansible Technical Details

Deployment TypesOn-premise
Operating SystemsLinux
Mobile ApplicationNo

Frequently Asked Questions

The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments and configuration of systems and devices. It can be used in a CI/CD process to provision the target environment and to then deploy the application on it.

Reviewers rate Performance highest, with a score of 8.7.

The most common users of Ansible are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(258)

Attribute Ratings

Reviews

(1-25 of 28)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
To better validate the applications we support, we have built an extensive set of Ansible jobs, some are scheduled and some are on-demand.
  • Easily create the scheduled or on-demand validation jobs
  • Ansible jobs could be run by other users via granting the proper privilege
  • No agent required on the hosting server
  • More flow control functionality in Ansible Job Flow
  • Better IDE
We had a set of validation scripts running on hosts before we adopt Ansible Automation Platform. Accessibility and security was a major concern. Also, the scheduling was cron-based and not flexible. Moving to Ansible help us resolve such issues/concerns.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use the AAP as a building block in many end-to-end infrastructure and platform related build and deployment processes as well as a foundation for maintaining IaC and CasC principles that we adhere in the organization. The major complaint would be related to fair number of bugs the most of the new releases contain. The regression testing process can be improved at this point. Also, sometimes the bug fixes don’t get backported to the previous minor release, which forces us to perform more frequent upgrades. It impacts the platform availability due to increased number of maintenance windows required to support the product. At this point we always run on N-1 minor release to ensure stability (over new features and bugs that a just released version normally contains). It would be great if all the bug fixes are backported to the previous minor releases.
  • Distributed deployment options
  • RBAC
  • Identity providers options
  • UI has always been a problem and a cause of the users complaints. Specifically the option of following the job output.
The product is invaluable in the areas where post infra deployment configuration is required. It is not too suited for infra deployment as it is hard to maintain and remediate the state.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall Policy Automation to allow app teams to directly generate their required access on the Firewall, Load Balancer automation for building VIPs and moving traffic with pipelines, creating new networks in IP space and on network devices, network compliance that enforces audit requirements on several platforms, automated credential rotation on infrastructure, data gathering, TLS certificate installs, monitoring, and automated self-healing, as well as hundreds of automation tasks outside of the infrastructure teams.
  • Automation for every platform due to agentless architecture.
  • Easy adoption due to human readable code and simple-to-use GUI.
  • Great API that can be called from ServiceNow forms, Pipelines, GitHub Webhooks, or anywhere else.
  • A secure vault that is customizable and can plug into systems like Hashicorp or CyberArk to pull updated credentials in real-time when a job runs.
  • Workflows should have more flexible paths than just success or failure.
  • The upgrade process can be challenging with differences in security and environment.
  • There is an opportunity to add CICD functionality into the tool.
  • For development, it would be nice to have the option of editing a repo directly from AAP to allow quick tests/reruns. Then, allow it to push the updates back or create a new branch/PR in GitHub.
  • The RBAC is good but could use improvements. One example would be an option that allows admins to assume the access of another user to validate it works as expected.
Ansible and AAP is well suited for orchestrating over many platforms. Its agentless architecture makes it ideal for infrastructure that cannot support an agent. It has a strong module library for the most common products, services, and platforms. It is by far the best language for anyone new to coding or automation to jump in and quickly get to a productive state. While AAP is capable of automating nearly anything, there are still advantages of using other platforms in its place. For example, Chef has been valuable for server automation because of the availability of existing cookbooks. For systems that can run an agent, having the individual nodes perform their own checks can scale a little better than the centralized model of AAP. But running an agent also means the potential risk of resource over utilization.
June 01, 2023

Ansible Review

BHANUCHANDRA KOMMALAPATI | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
we are using Ansible for patching and configuration management
  • OS patching
  • server build
  • Configration management
  • sameple playbooks from Red Hat community
  • Pricing
  • more focus for windows
for confiration and server deployements it is very good to use
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The platform addresses several business problems, such as:

1.) Manual and repetitive tasks: Ansible Automation Platform helps eliminate manual, repetitive tasks by automating them. This reduces human error, increases efficiency, and allows IT teams to focus on more strategic initiatives.

2.) Configuration management: Managing configurations across a large number of systems can be challenging. Ansible Automation Platform enables centralized management of configurations, ensuring consistency and compliance across the infrastructure.

3.) Application deployment and orchestration: Deploying and managing applications across different environments can be time-consuming and error-prone. Ansible Automation Platform simplifies application deployment and provides orchestration capabilities to streamline the process.

4.) Infrastructure provisioning: Provisioning and managing infrastructure resources can be complex, especially in cloud or hybrid environments. Ansible Automation Platform helps automate infrastructure provisioning, enabling organizations to scale resources efficiently and consistently.
  • Configuration management at scale
  • Infrastructure as code
  • Cross-platform and cross-environment compatibility
  • Managing systems off corporate network; i.e. company provided equipment.
  • Think windows MDM... how do we manage systems off of corporate network.
Based on its idempotent nature, Red Hat Ansible Automation Platform is well suited for the following scenarios:

1.) Configuration management: Ansible excels in managing and maintaining consistent configurations across a large number of systems. Whether it's configuring software, network devices, or infrastructure components, Ansible's idempotent operations ensure that desired states are achieved and maintained, even in complex environments.

2.) Continuous deployment and integration (CI/CD): Ansible is well suited for automating application deployment and orchestrating CI/CD pipelines. Its idempotent execution ensures consistent and reproducible deployments, making it easier to roll out updates, manage multiple environments, and integrate with popular CI/CD tools.

3.) Infrastructure provisioning and orchestration: Ansible is an excellent choice for provisioning and managing infrastructure resources. Its idempotent playbooks enable organizations to automate the creation and configuration of servers, virtual machines, containers, and cloud resources, allowing for scalable and consistent infrastructure provisioning.

4.) System administration and operations: Ansible's idempotent nature makes it ideal for system administration tasks and operational automation. Whether it's managing user accounts, updating software packages, or performing routine maintenance tasks, Ansible ensures that operations are executed reliably and consistently across different systems and environments.

Ansible is the way...
May 24, 2023

Automate This

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Help customers automate repetitive functions and ensure consistent deployments
  • easy to read and understand code
  • essentially documents the environment
  • doesn't require an agent
  • inventory in AAP
  • blue green deployments from AAP
  • documentation has a lot of room for improvement
AAP is well suited for customers that need to automate their configuration but don't necessarily have a lot of in house expertise and would benefit from the support of Red Hat.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use AAP as our configuration management tool. We create and manage golden images and host the images in multiple cloud platforms for end user consumption. When an end user consumes/deploys one of our golden images, we use event detection to call AAP and finalize the hardening of the device. We also use AAP to manage configuration drift in the form of DSC.
  • Managing configuration drift
  • Playbook Formatting
  • Inventory/Variable Management (hierarchy)
  • Please re-add the running job ids to the browser tabs
  • Tracking multiple jobs running the same wf/job template
Ansible Automation Platform has been solid when applying STIG/CIS guidelines and is great for managing configuration drift.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Operating system server hardening on existing Vms. Azure and AWS cloud resource creation. Ansible playbooks for repeatable fixes. VM image creation and publishing and automation integration with other IT systems. We also use Ansible for data collection and ad-hoc executions across multiple network segments and environments. we use Ansible to deploy terraform jobs across azure and aws
  • Github integration using projects to tie code versions to templates
  • running the same automation code across one to many hosts
  • being able to automate almost anything, running powershell, terraform, python inside of Ansible plays.
  • Job template workflow decisions to do more than failed/success/all
  • RBAC for users, teams and orgs sometimes has differences in access roles.
  • better error handling/retries on connection problems, which typically force fail a play before code can execute
Ansible has been key to our success with server hardening as well as hardened image creations.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use Ansible Automation Platform to deploy Java Springboot services onto RHEL. We recently began to use it to make changes to our Citrix Netscaler. There is a requirement that a change be made to a load balanced virtual server twice a day, once at 7am and once at 7pm. We wrote a playbook and scheduled it to keep a person from having to be available 7 days a week to make a simple change. Since then that group has begun to develop other playbooks to be able to create the entities on the Netscaler instead of creating them manually everytime.
  • Makes change configuration repeatable and consistant
  • Allows scheduled automation
  • Allows separation of duties and roles
  • Better integration with Automation Hub. It almost appears they're two separate products.
  • The ability to see the details of the individual processes within a workflow job
It is very good at working with any Linux system as well as many of the major products on the market. It's hard to work with Microsoft because of the many prerequisites needed on Windows servers. It can also be difficult to work with out of the box with systems that might require extra dependencies that need to be added to an Execution Environment to interact with.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Config mgmt. supporting the other areas of IT with playbooks. We provide the back end inf along with creating the job templates.
  • Scalability
  • Easy to use
  • Powerful
For us we use it to deploy windows, linux server provisioning.
May 24, 2023

Awesome Ansible

Joe Tarnow | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Red Hat Ansible Automation Platform to automate a number of applications and workflows. We use it to automate or DUO account registration and account creation, disaster recovery, server builds for linux and windows, and many other workflows.
  • Repeatability
  • Self documents
  • Reduces work load
  • Forms for non technical users to launch templates
  • Slow on displaying log output
  • Templates are not organized
Configuration management, any repeatable workflows.
May 24, 2023

Ansible review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
Ansible is our infrastructure automation platform. We deploy and automation server builds, hardening, auditing, and anything else we can.
  • Repeatable Automation
  • Re-usable role based automation
  • Audit log
  • Install simplicity
Server build process from deployment to hardening Secure cloud resources Keep security requirements up to date on end points
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using it for deploying virtual machines, deploy software on top, and configure software through APIs. Other we use it with monitoring integration for event driven reconfigurations. AAP is used for helpdesk running provisioning tasks, configuration of servers at client premisses, configuration of network equipment... Also for deploying servers in lab for testing changes.
  • Provisioning of servers on hypervisiors
  • Configuration of software through API
  • Event driven remediation
  • Automation hub stuck when pulling images
  • Documentation on deploying isolated nodes
It is well suited in enviroments where there is a lot interaction with API. Its not well suited for working with multiple users or playbooks where there are lot of variables included. It can see the benefits where there are dislocated environments with low bandwidth. Use of hop nodes are really beneficial in combination of isolated nodes.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We’re using Ansible for deployments and compliance within the Systems group, primarily on the Linux platform.
  • Playbooks are easy to write
  • Huge community means someone has probably written a play you need
  • Idempotent method makes testing low stress
  • Lack of agents is magnificent
  • YAML syntax can be a pain
  • Lack of built-in scheduling in community edition
  • Windows interaction requires some scheming
Ansible is a given in nearly any environment. It can automate almost any infrastructure device you can think of.

It might not be worth the work for Windows only or environments with less than 50 hosts.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Initially we started leveraging Ansible for those annoying daily/weekly tasks. Ansible brought a level of comfort and repeatability to those tasks. Then we started leveraging Ansible for Greenfield Switch deployments, then we moved to assisting w/ repeatable firewall rule changes then onto F5 LB/ADC changes; simplifying those tasks too. Then we started to share our success with our management team and they use to form an Ansible Center of Excellence (CoE) then our role shifted to PR within our Enterprise. We started showing other business units how to leverage Ansible, we worked with the Storage Group for repeatable tasks. When we started this effort the storage industry had not adopted Ansible like the Network world had; that has since changed. We also worked w/ the VMware team to help provision new server instances via a more repeatable process. The Linux server team is currently reviewing while the Windows team is still focused on their Microsoft tool base. We are starting to collect data on time saved weekly/monthly thus allowing us to focus on new business requirements. Plenty of more Ansible projects to tackle including IT Security and many others.
  • Cisco Network provisioning
  • F5 ADC provisioning and config changes
  • NetApp Storage config changes
  • VMware provisioning
  • Ansible is the tool to utilize across all your Enterprise IT Silos
  • As with any new tool the ramp up learning time could still be improved for non-programmers
  • PR (AKA Pull Requests) feel cumbersome any way to streamline?
  • More Press Coverage for new features and functions
That is a big task for all the functionality now in Ansible Collections - Ethernet Networking, Fibre Channel Networking, Wireless networking, LB/ADC configuration & changes. Storage config and changes, VMware provisioning and changes, Windows Desktop provision when paired w/ a tool like Zuul, Workflow integration w/ ServiceNow (SNOW), Testing framework such as Molecule really all you to ensure what you have in your playbooks is solid...prior to deployment not when released to your consumers; Critical. Consistent runbooks instead of managing tons of scripts allows for cross-team training and functionality in a true disaster scenario. Additionally, conversion tools from other IT automation offerings Puppet and Chef, integration into Cloud environments. The list grows daily so jump in the water is just right!
Chris Saenz | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Ansible is being used by our university IT engineering group that is responsible for managing and maintaining 700+ servers of different sizes and roles in hosting applications. We have a diverse datacenter environment with a variety of workloads and Ansible helps us to manage, primarily, our Linux servers, doing maintenance and orchestration tasks such as provisioning servers with particular configurations and run operational tasks on large subsets of servers.
  • Simple implementation by using readable yaml playbooks.
  • Natively has many modules that integrate with various software and technologies.
  • There are still some modules that should be native but are not (MSSQL, Vault, etc).
  • Creating extensive logic in the playbooks is not as straightforward as other scripting languages.
Ansible works well when managing a large number of devices and servers. It helps to standardize builds and automate provisioning of servers and software so that builds are done quickly and repeatably. It works well for SSH-based hosts and standard unix-like systems. It also works well for system administrators who may not have a strong background in scripting and automation. It is a simple and readable language and a playbook is easy to pass along a team and collaborate on.
December 27, 2019

Ansible makes my job easy

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use it to deploy VM's, OS Hardening, Patching, etc. Ansible AWX is implemented for GUI which can be used by end-users.
  • This is agent less.
  • Deployments become easy.
  • UI is Lacking.
  • AWX is Docker which can complicate when upgrading.
Users can get up to speed and productive quickly with the tool. Ansible Galaxy portal serves as the central repository for finding, reusing, and sharing Ansible content. Agentless and troubleshooting are easier.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Ansible is being used by a certain department for testing purposes. We tried it for a while and had an evaluation on it. It is a very nice tool for managing the servers we have on cloud. It is easy to use and powerful to manage all the servers we have. We are very happy with the result.
  • It is very easy to implement.
  • It controls the servers with configuration and executes it well
  • It is not that pricy.
  • With its easiness to learn, you still have to do most of the things in Bash. Would be nice to have UI.
  • Enterprise support is not that good.
  • Windows can be a pain.
If your company is using cloud services like either Amazon Web Service or Google Cloud Platform, you will have time to implements lots of servers and managing them can be a pain. Ansible can be the help that enables you to manage all the config files you have for your servers and executes them in seconds.
Dylan Cauwels | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Ansible is a tool used by our head DevOps engineer and others who elect to do so. It is mainly used for automating server setup/tear down and ensuring concurrency exists across all our application platforms. It's an incredible tool for setting up any environment without having to install the program on the server you wish to target.
  • Automating any machine-level processes that you need to do to set up an environment.
  • Great for sending out consistent changes to a group of servers.
  • Ansible Tower is a paid service, which can be annoying at times. But that is understandable, as it requires an additional level of support from the Ansible team to develop.
  • There is a decently large learning curve for someone not familiar with setting up Unix environments. However, there is a very large support community with tons of documentation, so it's not a dealbreaker.
Great for automating groups of servers and ensuring updates are pushed to all of them (simultaneously if needed). It's hard to manage large groups of servers, and this tool makes it almost too simple. If there is only one server that is unique from the others, Ansible will not be as useful, but can still help track your changes.
John Grosjean | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Ansible every day in our CI/CD pipeline. With everything in AWS, and constantly setting up new instances, other agent-based products were out of the question. And since Ansible has added so much AWS management to it's latest versions, we can manage infrastructure just as easily as we deploy our application. There is no way we could keep up with the developers without Ansible.
  • Agentless. For our implementation, this is the single biggest factor. If we have to touch the machine and install an agent before we can start managing it, that's already too much effort and slows us down.
  • Re-entrant. This is not unique to Ansible, but certainly a huge improvement over custom scripts and such. Because it's such a huge effort to make scripts re-entrant, most of our scripts did not allow an elegant way to recover on failure. Manually cleaning up the half-attempt and re-trying is still too cumbersome, and being able to just re-run Ansible is a great improvement!
  • Infrastructure as code. This is new to Ansible, and there are still a few minor bugs with their AWS modules, but it's been a huge help being able to define our infrastructure in an Ansible playbook, commit it to source control, and use one tool for all our DevOps tasks.
  • Syntax.
  • Lacks descriptive error messages. The most basic errors are easy enough, but the more edge case errors can send you on a wild goose chase real quick.
  • Open Source. In many ways, this is a good thing, but it also means support is limited to community forums and such. So many people use it that it hasn't been an issue for us, but it means researching your own answer instead of just calling support.
I would recommend Ansible to anyone, but I recognize it might not fit everyone's needs. I'm not as familiar with Chef, Puppet, or Salt, but they each have their strengths. For us, we needed to be able to manage a new server the moment it was created, so agent-based solutions were out. For our use, Ansible does everything we've asked it to.
Blagovest Petrov | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Ansible was used mainly for provisioning our internal virtual environments and containers. It was used only in the IT department of course. Different environments were provisioned with our custom Ansible roles. We have been also experimenting with Ansible for Docker. It is a good alternative to the Dockerfile for creating containers.
  • Easy YAML syntax
  • Provisioning over SSH. Management sever is not needed
  • Big community
  • Python 2.7 was required for the older versions
  • SSH as a requirement by default
  • Not as fast as container driven development
Ansible is perfect for provisioning virtual machines or containers. It's also useful for standardized setup of different software projects. For example, the main supported setup configuration of Red Hat Open Shift is made in Ansible.
December 01, 2017

DevOps Swiss Army Knife

Aiman Najjar | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Ansible is a powerful tool for many DevOps cases, including generic automation scripts, configuration management, and infrastructure orchestration. We've used it mainly for complex application deployments - for each application, we wrote an Ansible playbook to deploy the application and all dependencies to target Chef-managed environments. The deployment process for each application varied a lot and was often very complex, and each playbook would have different logic for configuration and validations.

Those applications ranged from J2EE applications to cron jobs. Target VMs would range from Tomcat application servers to plain Linux machines.

I have also used Ansible for other uses such as for simplifying interaction with a large cluster of nodes to perform system administration tasks (e.g. fetching logs, investigating issues across nodes of a cluster..etc). I have also used its Python library to create custom automation scripts. It worked very well for all cases above.
  • Decentralized configuration management - Ansible supports "desired state" syntax and is a great alternative to centralized configuration management solutions. If you think that maintaining an infrastructure is an overkill for your needs, then you should consider Ansible. Ansible is "agentless" and all you need is version control, SSH access, and proper organization skills!
  • Great for writing clean and readable automation scripts. In my opinion, Ansible Playbooks are the new Shell scripts. It enforces readable structure yet maintains a great flexibility. Add to that, the ability to write playbooks in reusable "roles" as well as the large repository of built-in Ansible modules, Ansible becomes a very awesome alternative to writing complex Shell/Bash scripts.
  • Very powerful tool for system administrators to reliably and quickly interact with nodes of large clusters. With proper organization of your host inventory in versioned-control files, Ansible becomes an indispensable tool for Sys Admins to investigate issues and perform routine tasks across large clusters.
  • Steep learning curve - I have found that Ansible has a steeper learning curve when it comes to playbooks and roles. This could be a side-effect of its power and flexibility. I still believe more could be done to make writing roles simpler.
  • There is no a public repository of playbooks or a "package manager" that facilitates download community-maintained Ansible playbooks.
Ansible is really unique in that it works well for various DevOps needs. I find it very well suited for:
  1. Automation Scripts - think: deployment scripts, configuration scripts, start-up/shut-down scripts, cron jobs, etc.
  2. Infrastructure as Code - although I would not say it is Ansible's primary use case, Ansible still has a good amount (albeit not comprehensive) of cloud infrastructure orchestration modules, things like creating EC2 instances, ELBs, S3 buckets, Azure resources, etc.
  3. Decentralized / "Push" Configuration Management - that means you trigger Ansible from a client machine and it will remotely execute the configuration scripts over SSH. This is actually enough for many configuration management use cases.

It may not work extremely well for the following cases:

  1. Complex Infrastructure as Code needs - i.e. cloud infrastructure that consists of many cloud resources of different types and advanced configuration.
  2. Configuring Complex Clusters or Ecosystems - for this I would prefer "Pull" / Centralized Configuration Management solution that offers inventory look-ups and integrated data store solution as part of the configuration process.
Kashif Iqbal | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Ansible is one the best automation tools for deploying an application on remote servers. It helps us avoid repetitive tasks and handles workflows.

Our organization using it mainly for below cases:
  • Cloud Application Automation
  • Virtual Machine/Instance configuration and Managment
  • Automated or Auto Deploy of Cloud supported Application
  • Easy creation of YAML PlayBook (configuration ) file
  • Easy and fast deployment
  • Save unnecessary onsite travel cost
  • Secure SSH connection
  • Ready to use built in many useful modules
  • Use Python for modules
  • Minimal support for Windows
  • Not so interactive and featured GUI
  • For a fast auto-deploy of instances where resource elasticity is taking place.
  • Also to reduce onsite travel costs and deliver projects as soon as possible in case we have a number of servers to be configured to host application services.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Widely used in the organization from IT to dev. It is mainly addressing not very large clusters of servers avoiding repetitive tasks and handling workflows. Use cases: - Cloud Services Orchestration - Cloud Instances Configuration Management - Continuous Application Deployment
  • Ease of use due to its simple, human-readable language (YAML)
  • Lot of built-in modules (batteries included)
  • Secure Connection (SSH)
  • No remote agent installation needed (all done over SSH)
  • The docs are great
  • Uses Python, which is built into Linux
  • Basic support for Windows
  • Underdeveloped GUI with limited features
[it's] simple, straight forward, easy to set up and get started with. It's very well suited for automatic server provisioning. It might not perform as well as more mature solutions (Chef, Puppet, etc.) for very large environments with thousands of servers. But it will outperform in a dynamic phase environment where speed is critical.
Eric Mann | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Ansible to automate provisioning of both Amazon AMIs and other EC2 resources. It orchestrates the installation of all of the software we need to power our platform in production and leaves us with a reliable, predictable machine state on every run.

We've also used Ansible to vary the state of dependencies installed on a machine after it's been deployed to production.
  • Predictable machine state.
  • Cross-platform operation. We run Ansible from both Mac and Linux reliably.
  • There is no "official" Windows support for a host machine. Some of our team is on Windows, so this is a major drawback.
  • Some of the community-maintained packages break dependencies, requiring us to toggle a "verbose" flag in Ansible to dive into the details of what failed.
  • A recent update to Ansible itself broke on the LTS version of Ubuntu we were using. As older versions of Ansible had been purged from the package manager, we had to switch to a different installation routine entirely (using Python and pip) to restore to an active, reliable state.
Well suited: Automatic server provisioning for multiple deployment environments (development, staging, quality assurance, production, etc). It's also useful for kick-starting a new engineer's development environment so they can be productive on day 1.

Less appropriate: Rebuilding projects for integration testing. Tests are things that (should) run frequently on every build. As Ansible downloads a lot of resources over the wire (and often without a local cache), this can drastically increase the time required for an incremental build and test.
Return to navigation