Check out the checks in Spotter and what is on our roadmap

5. junij 2023 - Avtor Sara Platiše

5. junij 2023
Avtor Sara Platiše

This post was originally published on the XLAB Steampunk blog.

This post was originally published on March 30, 2023. The content has been updated to reflect the latest releases.

Steampunk Spotter, an Ansible Playbook scanning tool, includes a variety of checks that improve the quality, reliability, and security of your Ansible Playbooks. The checks are divided into several categories:  

Best practice checks

Best practice checks help you write playbooks that keep a common standard and aim to be more consistent, reliable, and readable. They also support the Red Hat Ansible Best Practice guide:

  • Check for fully qualified collection names (FQCN) and automatically apply rewrites.
  • Check for inline parameters and get suggestions for simpler rewrites.
  • Check if the file mode is set and configured correctly.
  • Check if modules are certified.
  • Check for Ansible requirements file (requirements.yml), version mismatch, and missing collections.

Validation checks

Validation checks perform validation of your use of modules, parameters, and parameter values within playbooks to prevent misconfigurations during the development:

  • Check if parameters are deprecated, required, or unknown.
  • Check for specific conditions depending on parameter values.
  • Check for missing arguments, reserved variables, and default value changes.
  • Check the stdout callback. 
  • Check for short names with alternatives. 
  • Check for callback with FQCN. 

They allow you to perform validation on arbitrary versions of Ansible and Ansible Collections, ensuring your playbooks are always supported with target versions. These checks are also used to support upgrades of Ansible Playbooks and help you keep them up to date:

  • Check for removal or renaming of modules, and removal, or deprecation of parameters.
  • Check for allowed value changes and default parameter value changes.

Checks are based on publicly available Ansible Porting Guides. You no longer have to follow all the necessary changes in Ansible as Spotter automatically warns you about them.

Spotter ensures you always keep up to date with the progress of Ansible, facilitating upgrades of the Ansible core engine and Red Hat Ansible Automation Platform. 

Security checks

They are used to prevent security vulnerabilities in code infrastructure and ensure the secure execution of automation. They help you proactively evaluate runtime security threats and prevent security breaches. They allow you to follow the industry’s security best practices, and not only that, but you can also define your internal security team standards.

Spotter considers the security of Ansible Playbooks by static analysis of playbooks considering security best practices provided by vendors, such as cloud providers. 

Custom rules and policies checks

They allow you to define your very own custom rules and policies. You are able to configure your specific requirements and use cases, which allow you to enhance the security of your playbooks the way you envisioned it. This includes defining new corporate policies and further specifying Ansible Playbook standards to achieve highly customizable automation:

  • Specify modules/collections that are allowed.
  • Define specific naming conventions.
  • Limit required values on specific modules and entities (exposed ports, VM size, and so on).
  • Have custom security rules, for example, to comply with Center for Internet Security (CIS) or Health Insurance Portability and Accountability Act (HIPAA) standards.

Because the custom rules and policy support are based on Open Policy Agent (OPA), existing OPA-based policies may be included in Spotter with minimum additional effort.

Short-term roadmap checks

Our team is constantly working hard on adding new checks, and the checks below are at the top of our priority list for the very near future. Among other checks to be, we are focusing on security checks for Windows PowerShell modules and custom policies checks for specific cloud platforms. Furthermore, after attending the Red Hat Summit, we listened to your feedback and are focusing on checks related to upgrades and Ansible Automation Platform 2 (AAP2) migration.

See what exciting new checks we have planned for you:

  • Get warnings about deprecated modules/collections in upcoming Ansible versions.
  • Get warnings for changes in default values for upcoming versions of Ansible.
  • Check the defined connection option. 
  • Define the required Python version for a specific Ansible version. 
  • Get warnings about changes in return values in different Ansible versions. 
  • Support for migrating your Python virtual environment (venv) to Ansible Execution Environment (EE).

New Security checks

  • Check static code in Windows PowerShell modules.

Skipping and enforcing checks feature

  • Enforce or skip checks on the organization, or workspace level.
  • Skip checks on task level.

Full Steam(punk) Ahead

At Steampunk Spotter, we are entirely dedicated to creating a seamless user experience. We assess every feature from your perspective and then use our extensive expertise to design it in an applicable and functional way. Our checks are no different. They are designed to benefit you in every way; achieve secure and reliable automation, the Spotter way!

We invite you to try Spotter for yourselves, you can register for free here.

And if you are a user already, let us know what you think, here. All feedback is warmly welcomed and appreciated.


Družbena omrežja

Ostanite v stiku z nami.