Shell Ansible

Open-source Shell projects categorized as Ansible

Top 23 Shell Ansible Projects

  • 90DaysOfDevOps

    This repository started out as a learning in public project for myself and has now become a structured learning map for many in the community. We have 3 years under our belt covering all things DevOps, including Principles, Processes, Tooling and Use Cases surrounding this vast topic.

  • Project mention: What is DevOps? | | 2024-01-07

    90DaysOfDevOps 2022

  • mac-dev-playbook

    Mac setup and configuration via Ansible.

  • Project mention: Linus Torvalds statement | /r/linux | 2023-07-07

    To get your Linux ready to use after a fresh install you might have an Ansible playbook to get the system ready to go with all the tools you need.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • pigsty

    Battery-Included PostgreSQL Distro as a Free RDS Alternative

  • Project mention: Show HN: OSS PostgreSQL RDS with Supabase,PGML,Vector,Ha,PITR,Monitor,&100 Exts | | 2023-09-24

    And the only extension activated (`CREATE EXTENSION`) by default is pg_repack.

    The AGPLv3 is infected by the Grafana, MinIO and citus.

  • Cloudbox

    Ansible-based solution for rapidly deploying a Docker containerized cloud media server.

  • content

    Security automation content in SCAP, Bash, Ansible, and other formats (by ComplianceAsCode)

  • Project mention: Oracle linux CIS benchmark | /r/ansible | 2023-06-07
  • home-ops

    Wife approved HomeOps driven by Kubernetes and GitOps using Flux

  • Project mention: Rebuilding my homelab: Suffering as a service | | 2024-05-18

    This is incredibly popular a take, and this anti-k8s is rapidly upvoted almost every time.

    The systemd hate has cooled a bit, but it too functions as a sizable attractor for disdain & accusation hurling. Let's look at one of my favorite excerpts from the article, on systemd:

    > Fleet was glorious. It was what made me decide to actually learn how to use systemd in earnest. Before I had just been a "bloat bad so systemd bad" pleb, but once I really dug into the inner workings I ended up really liking it. Everything being composable units that let you build up to what you want instead of having to be an expert in all the ways shell script messes with you is just such a better place to operate from. Not to mention being able to restart multiple units with the same command, define ulimits, and easily create "oneshot" jobs. If you're a "systemd hater", please actually give it a chance before you decry it as "complicated bad lol". Shit's complicated because life is complicated.

    Shits complicated because life is complicated. In both cases, having encompassing ways to compose connectivity has created a stable base - starting point to expert/advanced capable - that allowed huge communities to bloom. Rather than every person being out there by ourselves, the same tools work well for all users, the same tools are practiced with the same conventions.

    Overarching is key to commanlity being possible. You could walk up to my computer and run 'systemd cat' on any service on it, and quickly see how stuff was setup (especially on my computers which make heavy use of environment variables where possible); before every distro and to a sizable degree every single program was launched & configured differently, requires plucking through init scripts to see how or if the init script was modified. But everything has a well defined shape and form in systemd, a huge variety of capabilities for controlling launch characteristics, process isolation, ulimits, user/group privileges, special tmp directories is all provided out of the box in a way that means there's one man page to go to, and that's instantly visible, so we don't have to go spelunking.

    The Cloud Native paradigm that Kubernetes practices is a similar work of revelation, offering similar batteries included capabilities. Is it confusing having pods, replicasets, and services? Yes perhaps at first. But it's unparalleled that one just POSTs resources one wants to an API-server and let's the system start & keep that running; this autonomic behavior is incredibly freeing, leaving control loops doing what humans have had to shepherd & maintain themselves for decades; a paradigm break turning human intent directly into consistent running managed systems.

    The many abstractions/resource types are warranted, they are separate composable pieces that allow so much. Need to serve on a second port? Easy. Why are there so many different types? Because computers are complex, because this is a model of what really is. Maybe we can reshuffle to get different views, but most of that complexity will need to stay around, but perhaps in refactores shapes.

    And like systemd, Kubernetes with it's Desired State Management and operators, it creates a highly visible highly explorable system; any practitioner can walk up to any cluster and start gleening tons of information from it, can easily see it run.

    It's a wrong hearted view to think that simpler is better. We should start with essential complexity & figure out simultaneously a) how to leverage and b) how to cut direct paths through our complex capable systems. We gain more by permitting and enabling than by pruning. We gain my by being capable of working at both big and small scales than we gain by winnowing down/down scoping our use cases. The proof is in the pudding. Today there's hundreds of guides one can go through in an hour to setup & get started running some services on k3s. Today there's a colossal communities of homelab operators sharing helm charts & resources (ex:, the likes of which has vastly outclassed where we have stood before. Being afraid of & shying away from complexity is a natural response, but i want people to show that they see so many of the underlying simplicities & conceptions that we have gotten from kube that do make things vastly simpler than the wild West untamed world we came from, where there weren't unified patterns of API servers & operators, handling different resources but all alike & consistent. To conquer complexity you must understand it, and I think very few of those with a true view of Kubernetes complexity have the sense that there are massive opportunities for better, for simpler. To me, the mission, the goal, the plan should be to better manage & better package Kubernetes to better onboard & help humans through it, to try to walk people into what these abstractions are for & shine lights on how they all mirror real things computers need to be doing.

    (Technical note, Kubernetes typically runs 0 vm's, it runs containers. With notable exceptions being snap-in OCI runtimes like Firecracker and Kata which indeed host pods as vms. Kine relies on containers are far more optimizable; works like Puzzlefs and Composefs CSIs can snap-in to allow vastly more memory-and-storage-efficient filesystems to boot. So many wonderful pluggable/snappable layers; CNI for networking too.)


    Welcome to ~ Rapidly deploy multiple-hasty Docker Containers through Ansible with local or Unlimited Google HD Space!

  • SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
  • ansible-interactive-tutorial

    Interactive Ansible tutorials with dead simple setup via Docker

  • ansible-easy-vpn

    An Ansible playbook that sets up a Wireguard server with ad blocking, DNS-over-HTTPS, and a WebUI with 2FA

  • Project mention: Set up a WireGuard server with ad blocking, DNS-over-HTTPS, and a WebUI with 2FA | | 2023-09-08
  • ansible-for-kubernetes

    Ansible and Kubernetes examples from Ansible for Kubernetes Book

  • ansible-role-nginx

    Ansible role for installing NGINX (by nginxinc)


    Main repository for the service

  • Project mention: Where does everyone get shapefiles/basemaps? | /r/QGIS | 2023-12-11 may have additional material regarding Federal parcels / properties.

  • ansible-role-firewall

    Ansible Role - iptables Firewall configuration.

  • dotfiles

    Sway acid dark (by eoli3n)

  • pi-cluster

    Pi Kubernetes Cluster. Homelab kubernetes cluster automated with Ansible and ArgoCD

  • Sway-DE

    🏠 Sway desktop environment dotfile installation for Arch Linux

  • ansible-for-devops-manuscript

    Ansible for DevOps Manuscript

  • Project mention: Ansible for DevOps Manuscript | | 2023-12-20
  • ansible-collection-mac

    Collection of macOS automation tools for Ansible.

  • jmx-monitoring-stacks

    📊 Monitoring examples for Confluent Cloud and Confluent Platform

  • docker-pdns

    Docker images for PowerDNS

  • realworlddevopscourse

    Accompanying files for "Real world Devops project from start to finish" course

  • Project mention: Ask HN: Those making $500/month on side projects in 2024 – Show and tell | | 2024-01-23 - DevOps course for small companies and individuals/self-hosters.

    I’ve posted this previously, but it’s been more than a year since I published the course and it’s still right about $500/mon.

    When I was starting all this, I had higher hopes, but it’s been difficult competing with instructors who already have tens of thousands of students and thousands of reviews - they appear on first page when you search for a particular subject and “no one” goes past the first page.

  • pimp-my-box

    :seedling: Automated seedbox install of rTorrent-PS and PyroScope CLI etc. via Ansible.

  • debian

    A complete, minimalist Debian setup for power users (by rtts)

  • SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The open source projects on this list are ordered by number of github stars. The number of mentions indicates repo mentiontions in the last 12 Months or since we started tracking (Dec 2020).

Shell Ansible related posts

  • Rebuilding my homelab: Suffering as a service

    5 projects | | 18 May 2024
  • The NSA is just from taking over the internet

    1 project | | 17 Apr 2024
  • OpenSUSE Leap 15.6 to Be the Last in Its Current Form

    1 project | | 16 Jan 2024
  • Sphynx CLI tool to automate boring/repetitive tasks

    1 project | | 12 Dec 2023
  • Where does everyone get shapefiles/basemaps?

    1 project | /r/QGIS | 11 Dec 2023
  • Legislative records House of Representatives?

    1 project | /r/datavisualization | 22 Oct 2023
  • OnlyOffice: Free open source office suite with business productivity tools

    4 projects | | 29 Sep 2023
  • A note from our sponsor - InfluxDB | 28 May 2024
    Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →


What are some of the best open-source Ansible projects in Shell? This list will help you:

Project Stars
1 90DaysOfDevOps 25,942
2 mac-dev-playbook 5,821
3 pigsty 2,844
4 Cloudbox 2,312
5 content 2,102
6 home-ops 1,775
7 1,646
8 ansible-interactive-tutorial 1,476
9 ansible-easy-vpn 956
10 ansible-for-kubernetes 665
11 ansible-role-nginx 613
12 528
13 ansible-role-firewall 507
14 dotfiles 497
15 pi-cluster 344
16 Sway-DE 334
17 ansible-for-devops-manuscript 309
18 ansible-collection-mac 287
19 jmx-monitoring-stacks 243
20 docker-pdns 242
21 realworlddevopscourse 217
22 pimp-my-box 146
23 debian 142

SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives