From 3471773c4357bd405d43f0c5dbb155900e3ae5d8 Mon Sep 17 00:00:00 2001 From: Jameria Self Date: Mon, 14 Apr 2025 18:21:56 -0400 Subject: [PATCH] AAP-40240 Added Important admonitions to encourage use of credentials, not extra vars --- downstream/assemblies/eda/assembly-eda-credentials.adoc | 4 ++++ .../modules/eda/proc-eda-set-up-rulebook-activation.adoc | 5 +++++ 2 files changed, 9 insertions(+) diff --git a/downstream/assemblies/eda/assembly-eda-credentials.adoc b/downstream/assemblies/eda/assembly-eda-credentials.adoc index bf6f35cf06..083d77fa67 100644 --- a/downstream/assemblies/eda/assembly-eda-credentials.adoc +++ b/downstream/assemblies/eda/assembly-eda-credentials.adoc @@ -8,6 +8,10 @@ Credentials authenticate users when launching jobs against machines and importin You can grant users and teams the ability to use these credentials without exposing the credential to the user. If a user moves to a different team or leaves the organization, you do not have to rekey all of your systems just because that credential was previously available. +[IMPORTANT] +==== +In the context of {ControllerName} and {EDAcontroller}, you can use both `extra_vars` and credentials to store a variety of information. However, credentials are the preferred method of storing sensitive information such as passwords or API keys because they offer better security and centralized management, whereas `extra_vars` are more suitable for passing dynamic, non-sensitive data. +==== include::eda/con-credentials-list-view.adoc[leveloffset=+1] include::eda/proc-eda-set-up-credential.adoc[leveloffset=+1] diff --git a/downstream/modules/eda/proc-eda-set-up-rulebook-activation.adoc b/downstream/modules/eda/proc-eda-set-up-rulebook-activation.adoc index 8326dd5a8f..e6b8831087 100644 --- a/downstream/modules/eda/proc-eda-set-up-rulebook-activation.adoc +++ b/downstream/modules/eda/proc-eda-set-up-rulebook-activation.adoc @@ -51,6 +51,11 @@ Service name:: This defines a service name for Kubernetes to configure inbound c Rulebook activation enabled?:: This automatically enables the rulebook activation to run. Variables:: The variables for the rulebook are in a JSON or YAML format. The content would be equivalent to the file passed through the `--vars` flag of ansible-rulebook command. ++ +[IMPORTANT] +==== +In the context of {ControllerName} and {EDAcontroller}, you can use both `extra_vars` and credentials to store a variety of information. However, credentials are the preferred method of storing sensitive information such as passwords or API keys because they offer better security and centralized management, whereas `extra_vars` are more suitable for passing dynamic, non-sensitive data. +==== Options:: Check the *Skip audit events* option if you do not want to see your events in the Rule Audit. . Click btn:[Create rulebook activation].