On this page
aci_switch_policy_vpc_protection_group - Manage switch policy explicit vPC protection groups (fabric:ExplicitGEp, fabric:NodePEp).
New in version 2.5.
Synopsis
- Manage switch policy explicit vPC protection groups on Cisco ACI fabrics.
Parameters
| Parameter | Choices/Defaults | Comments |
|---|---|---|
| certificate_name | Default:
C(private_key) basename
|
The X.509 certificate name attached to the APIC AAA user used for signature-based authentication.
It defaults to the
private_key basename, without extension.
aliases: cert_name |
| host
required
|
IP Address or hostname of APIC resolvable by Ansible control host.
aliases: hostname |
|
| output_level |
|
Influence the output of this ACI module.
normal means the standard output, incl. current dict
info means informational output, incl. previous, proposed and sent dicts
debug means debugging output, incl. filter_string, method, response, status and url information
|
| password
required
|
The password to use for authentication.
|
|
| port | Default:
443 (for https) and 80 (for http)
|
Port number to be used for REST connection.
|
| private_key |
PEM formatted file that contains your private key to be used for signature-based authentication.
The name of the key (without extension) is used as the certificate name in ACI, unless
certificate_name is specified.
aliases: cert_key |
|
| protection_group
required
|
The name of the Explicit vPC Protection Group.
aliases: name, protection_group_name |
|
| protection_group_id
required
|
The Explicit vPC Protection Group ID.
aliases: id |
|
| state |
|
Use
present or absent for adding or removing.
Use query for listing an object or multiple objects.
|
| switch_1_id
required
|
The ID of the first Leaf Switch for the Explicit vPC Protection Group.
|
|
| switch_2_id
required
|
The ID of the Second Leaf Switch for the Explicit vPC Protection Group.
|
|
| timeout | Default:
30
|
The socket level timeout in seconds.
|
| use_proxy |
|
If no, it will not use a proxy, even if one is defined in an environment variable on the target hosts.
|
| use_ssl |
|
If no, an HTTP connection will be used instead of the default HTTPS connection.
|
| username
required
|
Default:
admin
|
The username to use for authentication.
aliases: user |
| validate_certs |
|
If
no, SSL certificates will not be validated.
This should only set to no used on personally controlled sites using self-signed certificates.
|
| vpc_domain_policy |
The vPC domain policy to be associated with the Explicit vPC Protection Group.
aliases: vpc_domain_policy_name |
Notes
Note
- More information about the internal APIC classes fabric:ExplicitGEp and fabric:NodePEp from the APIC Management Information Model reference.
- By default, if an environment variable
<protocol>_proxyis set on the target host, requests will be sent through that proxy. This behaviour can be overridden by setting a variable for this task (see setting the environment), or by using theuse_proxyoption. - HTTP redirects can redirect from HTTP to HTTPS so you should be sure that your proxy environment for both protocols is correct.
Examples
- name: Add vPC Protection Group
aci_switch_policy_vpc_protection_group:
host: apic
username: admin
password: SomeSecretPassword
protection_group: leafPair101-vpcGrp
protection_group_id: 6
switch_1_id: 1011
switch_2_id: 1012
state: present
- name: Remove Explicit vPC Protection Group
aci_switch_policy_vpc_protection_group:
host: apic
username: admin
password: SomeSecretPassword
protection_group: leafPair101-vpcGrp
state: absent
- name: Query vPC Protection Groups
aci_switch_policy_vpc_protection_group:
host: apic
username: admin
password: SomeSecretPassword
state: query
- name: Query our vPC Protection Group
aci_switch_policy_vpc_protection_group:
host: apic
username: admin
password: SomeSecretPassword
protection_group: leafPair101-vpcGrp
state: query
Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Returned | Description |
|---|---|---|
| current
list
|
success |
The existing configuration from the APIC after the module has finished
Sample:
[{'fvTenant': {'attributes': {'dn': 'uni/tn-production', 'ownerKey': '', 'name': 'production', 'descr': 'Production environment', 'nameAlias': '', 'ownerTag': ''}}}]
|
| error
dict
|
failure |
The error information as returned from the APIC
Sample:
{'text': 'unknown managed object class foo', 'code': '122'}
|
| filter_string
string
|
failure or debug |
The filter string used for the request
Sample:
?rsp-prop-include=config-only
|
| method
string
|
failure or debug |
The HTTP method used for the request to the APIC
Sample:
POST
|
| previous
list
|
info |
The original configuration from the APIC before the module has started
Sample:
[{'fvTenant': {'attributes': {'dn': 'uni/tn-production', 'ownerKey': '', 'name': 'production', 'descr': 'Production', 'nameAlias': '', 'ownerTag': ''}}}]
|
| proposed
dict
|
info |
The assembled configuration from the user-provided parameters
Sample:
{'fvTenant': {'attributes': {'name': 'production', 'descr': 'Production environment'}}}
|
| raw
string
|
parse error |
The raw output returned by the APIC REST API (xml or json)
Sample:
<?xml version="1.0" encoding="UTF-8"?><imdata totalCount="1"><error code="122" text="unknown managed object class foo"/></imdata>
|
| response
string
|
failure or debug |
The HTTP response from the APIC
Sample:
OK (30 bytes)
|
| sent
list
|
info |
The actual/minimal configuration pushed to the APIC
Sample:
{'fvTenant': {'attributes': {'descr': 'Production environment'}}}
|
| status
int
|
failure or debug |
The HTTP status from the APIC
Sample:
200
|
| url
string
|
failure or debug |
The HTTP url used for the request to the APIC
Sample:
https://10.11.12.13/api/mo/uni/tn-production.json
|
Status
This module is flagged as preview which means that it is not guaranteed to have a backwards compatible interface.
Author
- Bruno Calogero (@brunocalogero)
Hint
If you notice any issues in this documentation you can edit this document to improve it.
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.5/modules/aci_switch_policy_vpc_protection_group_module.html