Ansible : How do I protect sensitive data with encrypted files
MAR, 2023
by Jane Temov.
Jane Temov is an IT Environments Evangelist at Enov8, specializing in IT and Test Environment Management, Test Data Management, Data Security, Disaster Recovery, Release Management, Service Resilience, Configuration Management, DevOps, and Infrastructure/Cloud Migration. Jane is passionate about helping organizations optimize their IT environments for maximum efficiency.
One of the great things about Enov8 Environment Manager is our DevOps Management area. An area that allows you to add your favourite automation independent of language. This includes the ability to “plug in” some very cool IT Automation tools like Ansible.
Enov8 IT & Test Environment Manager
*Innovate with Enov8
Streamlining delivery through effective transparency & control of your IT & Test Environments.
Ansible is an open-source automation tool used to manage and configure systems and applications. It uses a simple and powerful language to describe and automate IT workflows, making it easy to manage complex systems and processes with ease. Ansible is agentless, meaning it does not require any software or daemons to be installed on remote hosts, making it easy to deploy and use. With Ansible, IT teams can automate tasks such as configuration management, application deployment, and orchestration, allowing them to improve efficiency, reduce errors, and improve overall infrastructure reliability.
Protecting Sensitive Data with Encrypted Files
To protect sensitive data with encrypted files or elements in Ansible, you can use Ansible Vault. Ansible Vault is a feature in Ansible that allows you to encrypt sensitive data using a password, and then decrypt it when needed during playbook execution. Here are the steps to use Ansible Vault:
- Create a file that contains sensitive data, such as passwords, API keys, or private keys. For example, let’s say you have a file named
secrets.ymlthat contains the following:
username: myusername
password: mypassword
- Encrypt the file using the
ansible-vaultcommand:
ansible-vault encrypt secrets.yml
This will prompt you to enter a password that will be used to encrypt the file.
- Edit your playbook to include the encrypted file.
For example, let’s say your playbook includes the following task:
# yaml
– name: Configure the server
become: yesvars:
my_username: “{{ username }}”
my_password: “{{ password }}”template:
src: template.j2
dest: /etc/config.cfg
You can replace the username and password variables with the encrypted values by modifying the task as follows:
# yaml
– name: Configure the server
become: yes
vars_files:
– secrets.yml
vars:
my_username: “{{ username }}”
my_password: “{{ password }}”
template:
src: template.j2
dest: /etc/config.cfg
Note that we added the vars_files option to include the encrypted file.
- Run your playbook using the
ansible-playbookcommand and provide the password for the encrypted file:
python ansible-playbook playbook.yml –ask-vault-pass
This will prompt you to enter the password* you used to encrypt the file.
Once you enter the password, Ansible will decrypt the file and use the values in your playbook.
Tip: *Parameterising the Ansible Secret
If you need to parameterise the secret then you can pass the password for the encrypted file as a parameter to the ansible-playbook command using the –vault-password-file option. For example, if your password is mysecretpassword, you can run the following command: ansible-playbook playbook.yml –vault-password-file=/path/to/password_file where /path/to/password_file is a file containing your password, such as: mysecretpassword. This can be particularly useful when you need to run the Enov8 environment automation on a schedule.
With these steps, you can protect sensitive data in your Ansible playbooks using Ansible Vault.
Enov8, DevOps Manager: Screenshot
Conclusion
In conclusion, Ansible Vault provides a powerful and flexible way to protect sensitive data in Ansible playbooks and configuration files. By encrypting sensitive data using strong encryption algorithms and protecting the decryption key with a password or key file, Ansible Vault helps ensure that critical data such as passwords, API keys, and other secrets are kept secure and confidential. Ansible Vault also integrates seamlessly with the rest of the Enov8 & Ansible automation framework, making it easy to incorporate secure credential management into your overall infrastructure management workflow. Overall, Ansible Vault is an essential tool for any organization that wants to ensure the security and integrity of its IT infrastructure and data.
Other TEM Reading
Interested in reading more about Test Environment Management. Why not start here:
Enov8 Blog: Your Essential Test Environment Management Checklist
Enov8 Blog: What makes a good Test Environment Manager
Enov8 Blog: Understanding the Types of Test Environments
Relevant Articles
Smoke Testing: A Detailed Definition and Guide
In the realm of software development, ensuring the reliability and functionality of applications is of paramount importance. Central to this process is software testing, which helps identify bugs, glitches, and other issues that could mar the user experience. A...
What is Observability? A Foundation for SRE
Site Reliability Engineering (SRE) is a methodology for building and maintaining large-scale, highly available software systems. It involves applying software engineering practices to operations in order to increase reliability, reduce downtime, and improve the...
What is Ansible? A Detailed Guide for Dummies
As IT & Test environments become increasingly complex and dynamic, IT professionals need tools that can help them manage the complexity and ensure consistency across systems. Ansible is designed to address these challenges. In this post, we’ll provide an...
Database Virtualization Tools: 9 to Know About in 2026
Organizations evaluating database virtualization tools are usually trying to solve a very practical problem: how to give teams fast, safe access to realistic data without copying production databases over and over again. Whether the driver is test automation,...
Enterprise Release Management: A Comprehensive Guide
Enterprise Release Management (ERM) is a set of end-to-end practices that enable large organizations to effectively manage software releases. ERM is uniquely designed for the challenges of multiple teams building and releasing software simultaneously. ERM establishes...
Your Essential Test Environment Management Checklist
“Test Environment Management Checklist.” Yep, that sounds like a mouthful, but don’t let that discourage you. The idea here is quite simple—adopting a checklist to evaluate the soundness of your test environment management approach. Even though the idea sounds simple...











