Ce contenu n'est pas disponible dans la langue sélectionnée.
Appendix C. Creating an encrypted credentials.yml file
This section describes how to create an encrypted credentials.yml file that is passed to the Ansible Automation Platform installer.
The passwords used must match between Environment A and Environment B.
Within your initial Environment B Ansible Automation Platform environment,
Create a credentials.yml file to store the encrypted credentials
$ cat credentials.yml
admin_password: my_long_admin_password pg_password: my_long_pg_password registry_password: my_long_registry_password
Encrypt the credentials.yml file using
ansible-vault
$ ansible-vault encrypt credentials.yml
New Vault password: Confirm New Vault password: Encryption successful
WarningThe
admin_password
andpg_password
credentials need to match the value used in your Ansible Automation Platform 1.2 Environment A.WarningEnsure to store your encrypted vault password in a safe location.
Verify the credentials.yml file is encrypted
$ cat credentials.yml
$ANSIBLE_VAULT;1.1;AES256 36383639653562386534316333333961383336306465336465613831353435313530376464616539 3765393063303065323466663330646232363065316666310a373062303133376339633831303033 34313534383962613632303761636632623932653062343839613639653635643365616233313365 3636616639313864300a353239373433313339613465326339313035633565353464356538653631 63346434383534643237663862353361366632613634333231316334363939396461326561643336 3430633534303935646264633034383966336232303365383763
The creation of encrypted credentials is optional but recommended as storing passwords within your inventory file should not be in plain text.
If you are already using encrypted credentails, use your credentials.yml file instead of creating a new one.