| CLI | |
|---|---|
| Protocol | SSH |
| Credentials |
uses SSH keys / SSH-agent if present accepts |
| Indirect Access | via a bastion (jump host) |
| Connection Settings | ansible_connection: network_cli |
| Enable Mode (Privilege Escalation) | not supported by RouterOS |
| Returned Data Format | stdout[0]. |
RouterOS does not support ansible_connection: local. You must use ansible_connection: network_cli.
group_vars/routeros.yml
ansible_connection: network_cli ansible_network_os: routeros ansible_user: myuser ansible_password: !vault... ansible_become: yes ansible_become_method: enable ansible_become_password: !vault... ansible_ssh_common_args: '-o ProxyCommand="ssh -W %h:%p -q bastion01"'
ansible_password configuration.ansible_ssh_common_args configuration.ProxyCommand directive. To prevent secrets from leaking out (for example in ps output), SSH does not support providing passwords via environment variables.- name: Display resource statistics (routeros)
routeros_command:
commands: /system resource print
register: routeros_resources
when: ansible_network_os == 'routeros'
Warning
Never store passwords in plain text. We recommend using SSH keys to authenticate SSH connections. Ansible supports ssh-agent to manage your SSH keys. If you must use passwords to authenticate SSH connections, we recommend encrypting them with Ansible Vault.
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.9/network/user_guide/platform_routeros.html