Our first playbook will include the following steps: Make sure the control node can use key-based authorization. Create an inventory File. Create a playbook. Execute and test it.