Ansible : How do I protect sensitive data with encrypted files
MAR, 2023
by Jane Temov.
Jane Temov is an IT Environments Evangelist at Enov8, specializing in IT and Test Environment Management, Test Data Management, Data Security, Disaster Recovery, Release Management, Service Resilience, Configuration Management, DevOps, and Infrastructure/Cloud Migration. Jane is passionate about helping organizations optimize their IT environments for maximum efficiency.
One of the great things about Enov8 Environment Manager is our DevOps Management area. An area that allows you to add your favourite automation independent of language. This includes the ability to “plug in” some very cool IT Automation tools like Ansible.
Enov8 IT & Test Environment Manager
*Innovate with Enov8
Streamlining delivery through effective transparency & control of your IT & Test Environments.
Ansible is an open-source automation tool used to manage and configure systems and applications. It uses a simple and powerful language to describe and automate IT workflows, making it easy to manage complex systems and processes with ease. Ansible is agentless, meaning it does not require any software or daemons to be installed on remote hosts, making it easy to deploy and use. With Ansible, IT teams can automate tasks such as configuration management, application deployment, and orchestration, allowing them to improve efficiency, reduce errors, and improve overall infrastructure reliability.
Protecting Sensitive Data with Encrypted Files
To protect sensitive data with encrypted files or elements in Ansible, you can use Ansible Vault. Ansible Vault is a feature in Ansible that allows you to encrypt sensitive data using a password, and then decrypt it when needed during playbook execution. Here are the steps to use Ansible Vault:
- Create a file that contains sensitive data, such as passwords, API keys, or private keys. For example, let’s say you have a file named
secrets.ymlthat contains the following:
username: myusername
password: mypassword
- Encrypt the file using the
ansible-vaultcommand:
ansible-vault encrypt secrets.yml
This will prompt you to enter a password that will be used to encrypt the file.
- Edit your playbook to include the encrypted file.
For example, let’s say your playbook includes the following task:
# yaml
“ name: Configure the server
become: yesvars:
my_username: “{{ username }}”
my_password: “{{ password }}”template:
src: template.j2
dest: /etc/config.cfg
You can replace the username and password variables with the encrypted values by modifying the task as follows:
# yaml
“ name: Configure the server
become: yes
vars_files:
“ secrets.yml
vars:
my_username: “{{ username }}”
my_password: “{{ password }}”
template:
src: template.j2
dest: /etc/config.cfg
Note that we added the vars_files option to include the encrypted file.
- Run your playbook using the
ansible-playbookcommand and provide the password for the encrypted file:
python ansible-playbook playbook.yml –ask-vault-pass
This will prompt you to enter the password* you used to encrypt the file.
Once you enter the password, Ansible will decrypt the file and use the values in your playbook.
Tip: *Parameterising the Ansible Secret
If you need to parameterise the secret then you can pass the password for the encrypted file as a parameter to the ansible-playbook command using the –vault-password-file option. For example, if your password is mysecretpassword, you can run the following command: ansible-playbook playbook.yml –vault-password-file=/path/to/password_file where /path/to/password_file is a file containing your password, such as: mysecretpassword. This can be particularly useful when you need to run the Enov8 environment automation on a schedule.
With these steps, you can protect sensitive data in your Ansible playbooks using Ansible Vault.
Enov8, DevOps Manager: Screenshot
Conclusion
In conclusion, Ansible Vault provides a powerful and flexible way to protect sensitive data in Ansible playbooks and configuration files. By encrypting sensitive data using strong encryption algorithms and protecting the decryption key with a password or key file, Ansible Vault helps ensure that critical data such as passwords, API keys, and other secrets are kept secure and confidential. Ansible Vault also integrates seamlessly with the rest of the Enov8 & Ansible automation framework, making it easy to incorporate secure credential management into your overall infrastructure management workflow. Overall, Ansible Vault is an essential tool for any organization that wants to ensure the security and integrity of its IT infrastructure and data.
Other TEM Reading
Interested in reading more about Test Environment Management. Why not start here:
Enov8 Blog: Your Essential Test Environment Management Checklist
Enov8 Blog: What makes a good Test Environment Manager
Enov8 Blog: Understanding the Types of Test Environments
Relevant Articles
The People, Process Product (PPP) Framework
The PPP Framework, also known as the People, Process, Product Model or Three P's Framework, is a robust and widely recognized approach to driving organizational progress. The framework operates on the premise that an organization's performance is dependent on three...
What is Data Compliance? A Detailed Guide
As a DevOps manager or agile team leader, how do you ensure that users’ sensitive information is properly secured? Users are on the internet daily for communication, business, etc. They often supply apps with sensitive information like credit card details, and their...
MongoDB Clone Database Explained
Every engineering team relies on MongoDB cloning, but very few do it safely at scale. What starts as a simple way to copy data often turns into security risks, rising costs, and inconsistent environments. Cloning a MongoDB database is used to create safe,...
What is Database Virtualization? A Complete Explanation
In today’s data-driven world, businesses are constantly looking for ways to streamline their data management processes and maximize the value of their data assets. One approach that has gained popularity in recent years is virtualization, which allows multiple virtual...
SDLC Rationalization: Why Application Portfolio Thinking Is Already Obsolete
For the better part of two decades, enterprise IT has organised itself around a deceptively sensible idea: understand which applications you have, assess their strategic value, and rationalise accordingly. Retire the redundant. Consolidate the overlapping. Modernise...
Data Anonymization Tools: 9 to Know About in 2026
A common risk in modern software delivery is using copies of production data for development and testing. These environments rely on realistic datasets but often include sensitive customer, financial, or health data that should not leave production systems. Data...








