Difference between revisions of "Ansible-vault"
Jump to navigation
Jump to search
↑ https://docs.ansible.com/ansible/latest/user_guide/vault.html
↑ https://docs.ansible.com/ansible/latest/user_guide/vault.html
↑ http://manpages.org/ansible-vault
Tags: Mobile web edit, Mobile edit |
Tags: Mobile web edit, Mobile edit |
||
Line 8: | Line 8: | ||
== Commands == | == Commands == | ||
+ | * <code>ansible-vault encrypt YOUR_FILE</code> | ||
+ | * <code>ansible-vault decrypt YOUR_FILE</code> | ||
+ | * <code>ansible-vault view YOUR_FILE</code> | ||
* <code>ansible-playbook --vault-id @prompt create-users.yml</code> | * <code>ansible-playbook --vault-id @prompt create-users.yml</code> | ||
Revision as of 12:20, 28 March 2020
Support for saving encrypted information (passwords, API Keys ...) in playbooks using Ansible Vault (ansible-vault
[1]) since 2014
ansible-vault encrypt passwords.yml
[2][3]
ansible-vault [create|decrypt|edit|encrypt|rekey] [--help] [options] file_name
Commands
ansible-vault encrypt YOUR_FILE
ansible-vault decrypt YOUR_FILE
ansible-vault view YOUR_FILE
ansible-playbook --vault-id @prompt create-users.yml
Activities
- Learn about
ansible-vault
common uses cases
Related commands
See also
- Ansible: modules, plugins, Playbooks (examples)
ansible-playbook
,ansible-vault
,ansible-inventory
,ansible-config
, Ansible Tower, Ansible Galaxy (Roles) (ansible-galaxy
),ansible-cmdb
,gather facts
,ansible.cfg
,Ansible Molecule
, Ansible collections,register
,template
,--ask-pass
,--ask-become-pass
,remote_user:
,/etc/ansible/hosts
,ansible-doc
,ansible-lint
,.ansible/
,--forks
,--start-at-task
,changelog
,inventory
,Notify:
,ansible HOSTNAME -m ping
,gathering
,/usr/bin/ansible
,ansible -m ping
,ansible.builtin
,hosts: (Ansible)
,set fact:
,when:
,blockinfile:
,become method:
,include:
,git:
, AWX,ansible --help
, Tags, Ansible variables, versions - HTTP, HTTP client, HTTP/1.1, HTTP/2, HTTP/3, HTTPS, HSTS CSR, TLS, SSL,
openSSL
, WebSockets, WebRTC,ssl_certificate
QUIC, HPKP, CT, List of HTTP status codes, URL redirection, Content-type:, Webhook, HTTP headers,--insecure
, Axios HTTP client, HTTP cookies, HTTP ETag, Hypertext Transfer Protocol -- HTTP/1.1 - Secrets: Kubernetes secrets,
ansible-vault
, Hashicorp Vault, AWS Secrets Manager, Google Secret Manager,git-crypt
, SOPS: Secrets OPerationS, Google Cloud Secret Manager, GitHub secret scanning alerts
Advertising: