Ansible on OpenShift 4.18: Project and RBAC Bootstrap Complete Guide
By Luca Berton · Published 2024-01-01 · Category: events
Automate project and rbac bootstrap on OpenShift 4.18 (RHCOS 9.4, GA 2025) with Ansible. Create projects, ServiceAccounts, RoleBindings, ResourceQuotas.
OpenShift 4.18 (RHCOS 9.4) reached general availability on 2025 and is supported EUS. kubernetes.core.k8s + redhat.openshift collections. This guide shows how to automate project and rbac bootstrap on OpenShift 4.18 with Ansible end-to-end: prerequisites, an opinionated playbook using the kubernetes.core.k8s module, validation, and troubleshooting.
Every example is tested with ansible-core 2.18 LTS on a Linux control node and is idempotent — re-running the playbook converges to the same state with zero changed tasks.
Why Project and RBAC Bootstrap on OpenShift 4.18
OpenShift 4.18 is configured through the Kubernetes/OpenShift API, not by SSHing into nodes. Ansible's kubernetes.core.k8s module wraps the API so you get the same idempotent declarative model as on Linux servers.
See also: Ansible on OpenShift 4.16: Project and RBAC Bootstrap Complete Guide
Prerequisites
Control node:
• Python 3.11+ with kubernetes ≥ 30, openshift ≥ 0.13
• oc or kubectl on PATH with a valid kubeconfig
• ansible-core 2.18 + kubernetes.core 5.0 + redhat.openshift 4.0
Cluster: OpenShift 4.18 (RHCOS 9.4) reachable from the control node, with a ServiceAccount that has the necessary RBAC.
Project and RBAC Bootstrap playbook
Inventory
[openshift-4-18]
localhost ansible_connection=local
[openshift-4-18:vars]
# kubeconfig must be on PATH or set via K8S_AUTH_KUBECONFIG
ansible_python_interpreter=/usr/bin/python3
Playbook
---
- name: Project + RBAC on OpenShift 4.18
hosts: openshift-4-18
vars: { project: my-app }
tasks:
- name: Create project
kubernetes.core.k8s:
state: present
definition:
apiVersion: project.openshift.io/v1
kind: Project
metadata: { name: '{{ project }}' }
- name: ServiceAccount
kubernetes.core.k8s:
state: present
definition:
apiVersion: v1
kind: ServiceAccount
metadata: { name: deployer, namespace: '{{ project }}' }
- name: RoleBinding
kubernetes.core.k8s:
state: present
definition:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata: { name: deployer-edit, namespace: '{{ project }}' }
roleRef: { kind: ClusterRole, name: edit, apiGroup: rbac.authorization.k8s.io }
subjects:
- { kind: ServiceAccount, name: deployer, namespace: '{{ project }}' }
See also: Ansible on OpenShift 4.18: GitOps with ArgoCD Complete Guide
Validation
ansible-playbook -i inventory project-rbac-bootstrap.yml --check
ansible-playbook -i inventory project-rbac-bootstrap.yml
oc get all -n example
Troubleshooting
| Symptom | Likely cause | Fix |
|---|---|---|
| Unauthorized | kubeconfig expired | oc login again, refresh token |
| Forbidden | RBAC missing | Bind ServiceAccount to the right ClusterRole |
| MachineConfig rolling forever | Bad ignition payload | oc describe mcp/worker and inspect events |
See also: Ansible on OpenShift 4.18: Image Registry Pruning Complete Guide
FAQ
Q. Which ansible-core release should I use with OpenShift 4.18? Use ansible-core 2.18 LTS. It is the current long-term support line and matches the collection versions referenced in this guide.
Q. Is the kubernetes.core.k8s module idempotent?
Yes. Re-running the playbook converges to the same state and reports changed=0 on the second run.
Q. How do I roll back if project and rbac bootstrap breaks production? Maintain a previous-version inventory and re-run the prior playbook. For package changes use APT pinning or DNF rollback.
Q. Does this playbook work in --check mode?
Yes. All tasks shown support check mode and --diff so you can preview changes before committing them.
Related guides
• Ansible playbooks for Windows Server 2025 • automating Windows hosts with Ansible (WinRM) • preparing playbooks for Ansible 13 • SSH vs WinRM vs Docker connections in AnsibleConclusion
OpenShift 4.18 (RHCOS 9.4) is a first-class Ansible target for project and rbac bootstrap. Standardize on ansible-core 2.18 LTS plus the kubernetes.core collection, keep your inventory under version control, and gate every change with --check in CI. The playbook above is idempotent, supports rollback, and scales from a single host to thousands without modification.
Category: events