The Cisco IOS-XR collection supports multiple connections. This page offers details on how each connection works in Ansible and how to use it.
CLI |
NETCONF only for modules | |
---|---|---|
Protocol | SSH | XML over SSH |
Credentials |
uses SSH keys / SSH-agent if present accepts |
uses SSH keys / SSH-agent if present accepts |
Indirect Access | via a bastion (jump host) | via a bastion (jump host) |
Connection Settings |
|
|
Enable Mode | not supported | not supported |
Returned Data Format | Refer to individual module documentation | Refer to individual module documentation |
The ansible_connection: local
has been deprecated. Please use ansible_connection: ansible.netcommon.network_cli
or ansible_connection: ansible.netcommon.netconf
instead.
[iosxr:vars]
[iosxr:vars] ansible_connection=ansible.netcommon.network_cli ansible_network_os=cisco.iosxr.iosxr ansible_user=myuser ansible_password=!vault... ansible_ssh_common_args='-o ProxyCommand="ssh -W %h:%p -q bastion01"'
ansible_password
configuration.ansible_ssh_common_args
configuration.ProxyCommand
directive. To prevent secrets from leaking out (for example in ps
output), SSH does not support providing passwords via environment variables.- name: Retrieve IOS-XR version cisco.iosxr.iosxr_command: commands: show version when: ansible_network_os == 'cisco.iosxr.iosxr'
Before you can use NETCONF to connect to a switch, you must:
ncclient
python package on your control node(s) with pip install ncclient
To enable NETCONF on a new switch via Ansible, use the cisco.iosxr.iosxr_netconf
module through the CLI connection. Set up your platform-level variables just like in the CLI example above, then run a playbook task like this:
- name: Enable NETCONF connection: ansible.netcommon.network_cli cisco.iosxr.iosxr_netconf: when: ansible_network_os == 'cisco.iosxr.iosxr'
Once NETCONF is enabled, change your variables to use the NETCONF connection.
[iosxr:vars]
[iosxr:vars] ansible_connection=ansible.netcommon.netconf ansible_network_os=cisco.iosxr.iosxr ansible_user=myuser ansible_password=!vault | ansible_ssh_common_args='-o ProxyCommand="ssh -W %h:%p -q bastion01"'
- name: Configure hostname and domain-name cisco.iosxr.iosxr_system: hostname: iosxr01 domain_name: test.example.com domain_search: - ansible.com - redhat.com - cisco.com
Warning
Never store passwords in plain text. We recommend using SSH keys to authenticate SSH connections. Ansible supports ssh-agent to manage your SSH keys. If you must use passwords to authenticate SSH connections, we recommend encrypting them with Ansible Vault.
See also
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.10/network/user_guide/platform_iosxr.html