Menu Close

Appendix C. Creating an encrypted credentials.yml file

This section describes how to create an encrypted credentials.yml file that is passed to the Ansible Automation Platform installer.

Warning

The passwords used must match between Environment A and Environment B.

Within your initial Environment B Ansible Automation Platform environment,

  1. Create a credentials.yml file to store the encrypted credentials

    $ cat credentials.yml
    admin_password: my_long_admin_password
    pg_password: my_long_pg_password
    registry_password: my_long_registry_password
  2. Encrypt the credentials.yml file using ansible-vault

    $ ansible-vault encrypt credentials.yml
    New Vault password:
    Confirm New Vault password:
    Encryption successful
    Warning

    The admin_password and pg_password credentials need to match the value used in your Ansible Automation Platform 1.2 Environment A.

    Warning

    Ensure to store your encrypted vault password in a safe location.

  3. Verify the credentials.yml file is encrypted

    $ cat credentials.yml
    $ANSIBLE_VAULT;1.1;AES256
    36383639653562386534316333333961383336306465336465613831353435313530376464616539
    3765393063303065323466663330646232363065316666310a373062303133376339633831303033
    34313534383962613632303761636632623932653062343839613639653635643365616233313365
    3636616639313864300a353239373433313339613465326339313035633565353464356538653631
    63346434383534643237663862353361366632613634333231316334363939396461326561643336
    3430633534303935646264633034383966336232303365383763
Note

The creation of encrypted credentials is optional but recommended as storing passwords within your inventory file should not be in plain text.

If you are already using encrypted credentails, use your credentials.yml file instead of creating a new one.