ANSIBLE INVENTORY, THE GOOD, THE BAD AND THE UGLY
DEALING WITH CREDENTIALS IN ANSIBLE INVENTORY IS PRETTY SIMPLE, AND STILL NOT SO POPULAR TO MAKE IT GOOD
LET’S EXPLORE 3 SIMPLE SCENARIOS.
THE BAD - PLAIN TEXT
We start with installing Ansible on your Local Host (LH).
Ansible is using SSH to connect with the Remote Host (RH), so we need to have a way to specify which user, password, or private key Ansible needs to use. We can specify it directly in the inventory file as plain text or use the secrets vault.
We need to create an inventory file. A configuration file specifies machines MNs we want to connect to and work with.
project_dir/ ├─ inventory.yaml
docker-nodes: hosts: docker-node1.local: ansible_user: provisioner ansible_password: topsecret
To check if everything is ok, we will create a simple playbook that will connect to the RH and confirm that the user exists:
project_dir/ ├─ inventory.yaml ├─ provision-playbook.yaml
- name: Provision Docker Node hosts: - docker-node1.lab tasks: - name: Check if host is configured correctly ansible.builtin.ping:
And let’s run it by calling the command in the terminal
$ ansible-playbook -i inventory.yaml provision-playbook.yaml
Encrypting credentials - the ugly
We all know using plain text credentials in the source code is very insecure. It is much better to use a vault to keep sensitive data encrypted and fetch it when needed. So let’s do it now.
Let’s move the variables from the inventory host definition to a separate file and we need to create a separate file, that will hold the password used by Ansible Vault to encrypt and decrypt the variables.
project_dir/ ├─ vault / │ ├─ vars.yaml │ ├─ vault_password ├─ inventory.yaml ├─ provision-playbook.yaml
ansible_user: provisioner ansible_password: topsecret
secretvaultpassword
And let’s encrypt these vars with Ansible Vault
$ ansible-vault encrypt \ --vault-password-file vault/vault_password \ --output vault/vars_encrypted \ vault/vars.yaml
Now we should have a file with encrypted values that we can use in our playbook. Remember not to add vars.yaml or vault_password to the GIT.
project_dir/ ├─ vault / │ ├─ vars.yaml │ ├─ vars_encrypted │ ├─ vault_password ├─ inventory.yaml ├─ provision-playbook.yaml
$ANSIBLE_VAULT;1.1;AES256 38396565343839313366386265646332346535643833343361323565383731633638363635383535 3731356138643939316532396131323436336336366133380a666336663139333363393139373764 65653666653763653730636430303439393530376564396430386663343461616238653434636462 6337336138363165340a366134663661313463646264383036353863346431636330623665333035 62376434386361373162313762656236383533636338373564393931363162633434303031666135 65393931323539383231376464613534353537323437373764343730383061636637336138646162 363265343032383361306362303663633136
Let’s modify the command and see if it still works
$ ansible-playbook \ -i inventory.yaml \ --vault-password-file vault/vault_password \ -e @vault/vars_encrypted \ provision-playbook.yaml
And we can see that the playbook is still working fine
Using Ansible with 1Password - the good
If you liked this content and see it useful, help us create more articles and tutorials like this one by becoming a Patreon or by buying us a coffee.
My favorite way to store Ansible secrets is to use a third-party password manager. I recommend 1Password as it has attractive pricing and professional tools, and, until now, it has no data breaches.
Before we continue, make sure you have 1Password App and 1Password CLI installed
We start by creating a new 1Password resource as follows:
type SSH Key
vault name: Ops
name SSH provisioner
field username with value provisioner
field password with value topsecret
If you haven’t done this yet, now is the time to connect your 1Password CLI tool to your account with the command:
$ op signin
After confirming the sign-in intention with a password or fingerprint, we can use 1Password secrets in the playbook.
Let’s modify the inventory file
project_dir/ ├─ inventory.yaml ├─ provision-playbook.yaml
docker-nodes: hosts: docker-node1.local: ansible_user: "{{ lookup('community.general.onepassword', 'SSH provisioner', field='username', vault='Ops') }}" ansible_password: "{{ lookup('community.general.onepassword', 'SSH provisioner', field='password', vault='Ops') }}"
And that’s it! We can use the Ansible playbook without many additional parameters.
$ ansible-playbook \ -i inventory.yaml \ provision-playbook.yaml
All we need is to unlock the 1Password vault on the playbook launch and it works. Simple, clean and secure solution.
Rafal Kozlowski
From OutOfBoxLab
If you liked this content and see it helpful, help us create more articles and tutorials by becoming a Patreon or buying us a coffee.
Have a great day!