The Control-Plane Configuration & Identity track governs the configuration layer of the datacenter. Once a target host has been physically and structurally stabilized by the bootstrapping phase, this track injects the cryptographic profiles, local lookup tables, and management portals required to coordinate multi-node workflows.
The configuration track establishes security anchors before hydrating platform connectivity and automation controllers:
graph LR
A[Cryptographic Trust<br/><code>--tags bootstrap-ca-certs</code>] --> B[Core Network Control Plane<br/><code>--tags config-dns</code>]
B --> C[Orchestration Nodes<br/><code>--tags config-tower</code>]
style A fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
style B fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
style C fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
Bootstrap CA Certificatesbootstrap-ca-certsbootstrap_ca_certsConfigure Bind DNS Service, Configure Knot DNS Service, Configure PowerDNS Serviceconfig-dns, config-dns-bind, config-dns-knot, config-dns-powerdnsbootstrap_bind_dns_host, bootstrap_knot_dns_host, bootstrap_powerdns_hostConfigure Ansible Tower/AWX Resources, Configure Jenkins Serverconfig-tower, config-awx, config-jenkinsbootstrap_awx_resources, bootstrap_jenkins_hostTo avoid configuration drift across varying DNS backends or separate automation runner environments, all data matrices are completely decoupled from the execution code blocks.
For instance, changing an internal network domain IP pointer requires mutating exactly one record inside your inventory’s global variables (group_vars/all.yml). The downstream plays automatically iterate through that flat schema to update Bind tables, refresh Jenkins worker paths, and push updated parameters to Tower endpoints in a single pass.
ansible-playbook -i inventory/hosts site.yml --tags "config-dns"
ansible-playbook -i inventory/hosts site.yml --tags "config-tower"
ansible-playbook -i inventory/hosts site.yml --tags "bootstrap-ca-certs" --limit "edge_compute"