=====how to protect your sensitive data: ansible-vault===== * define vault file inside the /etc/ansible/secret_routeros put the file within your playbook ansible-vault create secret_routeros put inside your sensitive data, for example ansible_password: password ansible_become_password: password then recall the playbook with the following command: ansible-playbook routeros.yml --ask-vault-pass otherwise you can consider to use the var encrypted inside the normal group_vars like this: my_encrypted_var: !vault | $ANSIBLE_VAULT;1.1;AES256 64636132383835663964626132393530663764656634663230353038333866623634343635646465 3434333931643762313635656339396564306435326234610a633735663430663965323038313433 63373765316230656265636164626164383036613838363738316263343531656437303530313732 3835646366313730310a343363326239393364636230666561346461353137306334656663386638 38633462613530636536353064376236663066356536313163303265336133396134313736613730 37666635613961636431653134653439393263613830306132333266323537373937363766626530 386261363230343865333662336461386533 where you can encrypt your data as follow: root@u-studio:/etc/ansible/playbooks# ansible-vault encrypt_string New Vault password: Confirm New Vault password: Reading plaintext input from stdin. (ctrl-d to end input, twice if your content does not already have a newline) ansible_password: password ansible_become_password: password !vault | $ANSIBLE_VAULT;1.1;AES256 64636132383835663964626132393530663764656634663230353038333866623634343635646465 3434333931643762313635656339396564306435326234610a633735663430663965323038313433 63373765316230656265636164626164383036613838363738316263343531656437303530313732 3835646366313730310a343363326239393364636230666561346461353137306334656663386638 38633462613530636536353064376236663066356536313163303265336133396134313736613730 37666635613961636431653134653439393263613830306132333266323537373937363766626530 386261363230343865333662336461386533 Encryption successful