Populate Ansible from Amazon secrets manager
One of the ways to improve your security and avoid passing around env files is to follow the twelve factor app and start populating your secrets from the environment. Another improvement is to pull those secrets from a known secret store, with features like rotation, auditing etc. Requirements Ansible Have some secrets stored in AWS Secrets Manager Ansible should have access to the latest aws-cli command(secrets manager is a recent addition) Jq if you’re storing json in your secrets It’s worth testing your AWS calls to just extract the secret you’re interested in to stdout, from the terminal tests some calls like: ...