Information Technology Reference
In-Depth Information
Figure 13-5. Encrypted data bags use a shared key
Let's try working with an encrypted data bag item. Make sure the root
chef-playground
dir-
ectory is your current working directory.