@ -43,9 +43,77 @@ The names of one or more YAML format files to run as ansible playbooks\&.
.RE
.SH"OPTIONS"
.PP
\fB\-v\fR, \fB\-\-verbose\fR
\fB\-k\fR, \fB\-\-ask\-pass\fR
.RS4
Verbose mode, more output from successful actions will be shown\&. Give up to three times for more output\&.
Prompt for the SSH password instead of assuming key\-based authentication with ssh\-agent\&.
.RE
.PP
\fB\-K\fR, \fB\-\-ask\-sudo\-pass\fR
.RS4
Prompt for the password to use for playbook plays that request sudo access, if any\&.
.RE
.PP
\fB\-b\fR, \fB\-\-become\fR
.RS4
Run operations with become (nopasswd implied)
.RE
.PP
\fB\-\-become\-method=BECOME_METHOD\fR
.RS4
Privilege escalation method to use (default=sudo), valid choices: [ sudo | su | pbrun | pfexec | runas ]
.RE
.PP
\fB\-\-become\-user=BECOME_USER\fR
.RS4
Run operations as this user (default=None)\&.
.RE
.PP
\fB\-C\fR, \fB\-\-check\fR
.RS4
Do not make any changes on the remote system, but test resources to see what might have changed\&. Note this can not scan all possible resource types and is only a simulation\&.
When changing any templated files, show the unified diffs of how they changed\&. When used with \-\-check, shows how the files would have changed if \-\-check were not used\&.
Extra variables to inject into a playbook, in key=value key=value format or as quoted JSON (hashes and arrays)\&. To load variables from a file, specify the file preceded by @ (e\&.g\&. @vars\&.yml)\&.
Extra variables to inject into a playbook, in key=value key=value format or as quoted JSON (hashes and arrays)\&. To load variables from a file, specify the file preceded by @ (e\&.g\&. @vars\&.yml)\&.
Use this file to authenticate the connection
.RE
.PP
\fB\-f\fR\fINUM\fR, \fB\-\-forks=\fR\fINUM\fR
\fB\-\-skip\-tages=\fR\fISKIP_TAGS\fR
.RS4
Level of parallelism\&.
\fINUM\fR
is specified as an integer, the default is 5\&.
Only run plays and tasks whose tags do not match these values\&.
.RE
.PP
\fB\-k\fR, \fB\-\-ask\-pass\fR
\fB\-\-start\-at\-task=\fR\fISTART_AT\fR
.RS4
Prompt for the SSH password instead of assuming key\-based authentication with ssh\-agent\&.
Start the playbook at the task matching this name\&.
.RE
.PP
\fB\-K\fR, \fB\-\-ask\-sudo\-pass\fR
\fB\-\-step\fR
.RS4
Prompt for the password to use for playbook plays that request sudo access, if any\&.
One\-step\-at\-a\-time: confirm each task before running\&.
Desired sudo user (default=root) (deprecated, use become)\&.
.RE
.PP
\fB\-\-skip\-tags=\fR\fISKIP_TAGS\fR
@ -106,14 +202,9 @@ Only run plays and tasks whose tags do not match these values\&.
Look for syntax errors in the playbook, but don\(cqt run anything
.RE
.PP
\fB\-\-check\fR
.RS4
Do not make any changes on the remote system, but test resources to see what might have changed\&. Note this can not scan all possible resource types and is only a simulation\&.
.RE
.PP
\fB\-\-diff\fR
\fB\-t\fR, \fITAGS\fR, \fB\-\-tags=\fR\fITAGS\fR
.RS4
When changing any templated files, show the unified diffs of how they changed\&. When used with \-\-check, shows how the files would have changed if \-\-check were not used\&.
Only run plays and tasks tagged with these values\&.
Set additional variables as key=value or YAML/JSON
.RE
.PP
\fB\-f\fR, \fB\-\-force\fR
.RS4
Force running of playbook even if unable to update playbook repository\&. This can be useful, for example, to enforce run\-time state when a network connection may not always be up or possible\&.