Skip to content

Commit a1eaa71

Browse files
committed
Asciidoc conversion of hardening guide changes
Edited and renamed modules Asciidoc conversion of new and revised content for hardening guide v4. https://issues.redhat.com/browse/AAP-48749
1 parent 732074e commit a1eaa71

File tree

5 files changed

+57
-48
lines changed

5 files changed

+57
-48
lines changed

downstream/assemblies/aap-hardening/assembly-hardening-aap.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ include::aap-hardening/ref-security-variables-install-inventory.adoc[leveloffset
5757

5858
include::aap-hardening/proc-install-user-pki.adoc[leveloffset=+2]
5959

60-
include::aap-hardening/ref-sensitive-variables-install-inventory.adoc[leveloffset=+2]
60+
include::aap-hardening/proc-sensitive-variables-install-inventory.adoc[leveloffset=+2]
6161

62-
include::aap-hardening/ref-install-rpm-deployment.adoc[leveloffset=+3]
62+
include::aap-hardening/proc-install-rpm-deployment.adoc[leveloffset=+3]
6363

6464
include::aap-hardening/ref-install-containerized-deployment.adoc[leveloffset=+3]
6565

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
[id="ref-install-rpm-deployment"]
1+
[id="proc-install-rpm-deployment"]
22

33
= Using an external vault file with an RPM-based {PlatformNameShort} deployment
44

5-
For RPM-based installations, you can provide the Ansible Vault at runtime when executing the setup script.
5+
For RPM-based installations, you can provide the Ansible vault at runtime when executing the setup script.
66

77
Sensitive variables used are as follows:
88

@@ -16,11 +16,15 @@ automationhub_pg_password: <secure_password>
1616
automationedacontroller_admin_password: <secure_password>
1717
automationedacontroller_pg_password: <secure_password>
1818
----
19-
To use the new Ansible vault with the {Installer}, ensure the file, for example, `vault.yml`, contains all required sensitive variables and run it with the following command:
2019

21-
`./setup.sh -e @vault.yml –ask-vault-pass`
20+
To use the vault during installation, use the following procedure:
21+
22+
.Procedure
2223

23-
Ensure that the vault file is located in the working directory, or provide the full path. Do not duplicate the encrypted variables in the plaintext inventory file.
24+
. Ensure the vault file, for example, `vault.yml`, contains all required sensitive variables.
25+
. Run the installation using the following command:
26+
+
27+
`./setup.sh -e @vault.yml –ask-vault-pass`
2428

25-
This ensures that the installer reads encrypted variables from the vault and prompts for the vault password.
29+
Using this procedure ensures that the installer reads encrypted variables from the vault and prompts for the vault password.
2630

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
// Module included in the following assemblies:
2+
// downstream/assemblies/assembly-hardening-aap.adoc
3+
4+
[id="proc-sensitive-variables-install-inventory_{context}"]
5+
6+
= Securing sensitive variables with ansible vault
7+
8+
The installation inventory file for {PlatformNameShort} contains a number of sensitive variables, such as default administrative and database passwords.
9+
By default, these are stored in plain text.
10+
By securing sensitive values with Ansible Vault, both RPM-based and containerized {PlatformNameShort} installations benefit from improved security, password hygiene, and maintainability.
11+
12+
To create an Ansible vault file, use the following procedure:
13+
14+
.Procedure
15+
16+
. Navigate to the install directory by using the following command:
17+
+
18+
`cd /path/to/ansible-automation-platform-setup-bundle-2.5-<version>`
19+
. Create a vault file by using the following command:
20+
+
21+
`ansible-vault create vault.yml`
22+
. When prompted, enter a vault password
23+
This password is required to access or modify the vault and is required for day-two operations such as backups and reconfigurations.
24+
+
25+
[IMPORTANT]
26+
====
27+
Passwords with special characters must be in double quotes.
28+
====
29+
. Store the vault password securely, in accordance with your organizations security policy, for example, using a password manager or vault service.
30+
. Add your sensitive variables to the vault and ensure they are not also defined in the inventory file.
31+
32+
To edit your vault file use:
33+
34+
`ansible-vault edit <file>`
35+
36+
Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[id="ref-install-containerized-deployment"]
22

3-
= Using an external vault file with a Containerized deployment of {PlatformNameShort}
3+
= Using an external vault file with a containerized installation
44

5-
For containerized installations of {PlatformNameShort}, you can use the provided automation execution playbook with the external vault file.
5+
For containerized installations of {PlatformNameShort}, use the provided automation execution playbook with the external vault file.
66

77
Use the following sensitive variables:
88
----
@@ -11,15 +11,17 @@ gateway_admin_password: <secure_password>
1111
gateway_pg_password: <secure_password>
1212
controller_admin_password: <secure_password>
1313
controller_pg_password: <secure_password>
14-
hub_admin_password: <secure_password>
14+
hub_admin_password: <secure_password>c
1515
hub_pg_password: <secure_password>
1616
eda_admin_password: <secure_password>
1717
eda_pg_password: <secure_password>
1818
----
19-
To use the new Ansible vault with the {Installer}, ensure the file, for example, `vault.yml`, contains all required sensitive variables and run it with the following command:
19+
To use the new Ansible vault with the {Installer}, use the following procedure:
2020

21+
.Procedure
22+
. Ensure your vault file, for example, `vault.yml`, contains all required sensitive variables.
23+
. Run the container installer using the following command:
24+
+
2125
`ansible-playbook ansible.containerized_installer.install -e @vault.yml –ask-become-pass`.
2226

23-
Ensure that the vault file is located in the working directory, or provide the full path. Do not duplicate the encrypted variables in the plaintext inventory file.
24-
25-
By securing sensitive values with ansible vault, both RPM-based and containerized installations of {PlatformNameShort} benefit from improved security, password hygiene, and maintainability.
27+
Ensure that the vault file is located in the working directory, or provide the full path. Do not duplicate the encrypted variables in the `plaintext` inventory file.

downstream/modules/aap-hardening/ref-sensitive-variables-install-inventory.adoc

Lines changed: 0 additions & 33 deletions
This file was deleted.

0 commit comments

Comments
 (0)