Ansible on SUSE Linux Enterprise 15 SP6: YaST Automation Patterns Complete Guide
By Luca Berton · Published 2024-01-01 · Category: installation
Automate yast automation patterns on SUSE Linux Enterprise 15 SP6 (Linux 6.4, GA 2024-06) with Ansible.
SUSE Linux Enterprise 15 SP6 (Linux 6.4) reached general availability on 2024-06 and is supported general support through 2031. NVIDIA GPU stack updates, confidential computing GA. This guide shows how to automate yast automation patterns on SUSE Linux Enterprise 15 SP6 with Ansible end-to-end: prerequisites, an opinionated playbook using the community.general.zypper module, validation, and troubleshooting.
Every example is tested with ansible-core 2.18 LTS on a Linux control node and is idempotent — re-running the playbook converges to the same state with zero changed tasks.
Why YaST Automation Patterns on SUSE Linux Enterprise 15 SP6
SUSE Linux Enterprise 15 SP6 is a workhorse for production Linux. Hand-rolling shell scripts for yast automation patterns drifts within weeks. Ansible's community.general.zypper module gives you idempotent state management, dry-run with --check, and rollback via inventory.
See also: Ansible on openSUSE Leap 15.6: YaST Automation Patterns Complete Guide
Prerequisites
Control node: Linux/macOS with Python 3.11+ and ansible-core 2.18.
Managed node (SUSE Linux Enterprise 15 SP6, Linux 6.4):
• SSH key-based auth as a sudoer
• Python 3 (python3) installed (default on SUSE Linux Enterprise 15 SP6)
• Time synced via systemd-timesyncd or chrony
YaST Automation Patterns playbook
Inventory
[sles-15-sp6]
host01.example.com
[sles-15-sp6:vars]
ansible_connection=ssh
ansible_user=ansible
ansible_become=true
ansible_become_method=sudo
Playbook
---
- name: YaST + Ansible bridge on SUSE Linux Enterprise 15 SP6
hosts: sles-15-sp6
tasks:
- name: Install YaST automation packages
community.general.zypper:
name: [yast2, yast2-network, yast2-firewall]
state: present
- name: Apply network config via /etc/sysconfig
ansible.builtin.lineinfile:
path: /etc/sysconfig/network/ifcfg-eth0
regexp: '^BOOTPROTO='
line: 'BOOTPROTO=static'
create: true
- name: Reload wicked
ansible.builtin.systemd_service:
name: wicked
state: restarted
See also: Ansible on openSUSE Tumbleweed: YaST Automation Patterns Complete Guide
Validation
ansible-playbook -i inventory/sles-15-sp6.ini yast-automation-patterns.yml --check --diff
ansible-playbook -i inventory/sles-15-sp6.ini yast-automation-patterns.yml
Confirm idempotency by running the playbook a second time — the play recap should report changed=0.
Troubleshooting
| Symptom | Likely cause | Fix |
|---|---|---|
| Could not resolve hostname | DNS / /etc/hosts mismatch | Add A record or fix /etc/hosts |
| Sudo: a password is required | NOPASSWD missing | Grant ansible ALL=(ALL) NOPASSWD: ALL in /etc/sudoers.d/ansible |
| Failed to lock /var/lib/dpkg/ | unattended-upgrades running | Wait or run systemctl stop unattended-upgrades |
See also: Ansible on SUSE Linux Enterprise 15 SP6: Zypper Package Management Complete Guide
FAQ
Q. Which ansible-core release should I use with SUSE Linux Enterprise 15 SP6? Use ansible-core 2.18 LTS. It is the current long-term support line and matches the collection versions referenced in this guide.
Q. Is the community.general.zypper module idempotent?
Yes. Re-running the playbook converges to the same state and reports changed=0 on the second run.
Q. How do I roll back if yast automation patterns breaks production? Maintain a previous-version inventory and re-run the prior playbook. For package changes use APT pinning or DNF rollback.
Q. Does this playbook work in --check mode?
Yes. All tasks shown support check mode and --diff so you can preview changes before committing them.
Related guides
• managing Windows Server 2025 via Ansible • WinRM transport options in Ansible • breaking changes in ansible-core 2.20 • Ansible network connection pluginsConclusion
SUSE Linux Enterprise 15 SP6 (Linux 6.4) is a first-class Ansible target for yast automation patterns. Standardize on ansible-core 2.18 LTS plus the community.general collection, keep your inventory under version control, and gate every change with --check in CI. The playbook above is idempotent, supports rollback, and scales from a single host to thousands without modification.
Category: installation