2020-02-03, 14:50–15:40, B.2.011
At SUSE we love Salt for configuration management and infrastructure orchestration. We actively develop and integrate Salt as a core component of some of our products. At times we work with customers and users who chose Ansible as their configuration management engine. They invested time and effort designing Ansible playbooks to define their infrastructure and they don't want to waste the effort. But often they then realize that with Salt they can do even more to configure and control their infrastructure with real-time, persistent monitoring, event-driven orchestration, extreme modularity, and more.
The Fluorine release of Salt comes with a new module called ansiblegate which was created by SUSE and allows Ansible to be run from within Salt, offering the best of both worlds. You can execute any Ansible module directly using Salt and you can even reuse your own Ansible playbooks and apply them using Salt.
This session will show how Salt is able to run Ansible using ansiblegate providing users with the flexibility and optionality required to manage and secure diverse infrastructure at scale. SUSE loves openness, and this project gives Ansible and Salt users alike the ability to protect existing investments while leveraging the best infrastructure automation and configuration management for the job.