cisco.aci.aci_access_span_src_group_src_path module – Manage Access SPAN source paths (span:RsSrcToPathEp)
Note
This module is part of the cisco.aci collection (version 2.12.0).
You might already have this collection installed if you are using the ansible package.
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install cisco.aci.
To use it in a playbook, specify: cisco.aci.aci_access_span_src_group_src_path.
Synopsis
- Manage Access SPAN source paths on Cisco ACI fabrics. 
Parameters
| Parameter | Comments | 
|---|---|
| User-defined string for annotating an object. If the value is not specified in the task, the value of environment variable  If the value is not specified in the task and environment variable  Default:  | |
| The X.509 certificate name attached to the APIC AAA user used for signature-based authentication. If a  If PEM-formatted content was provided for  If the value is not specified in the task, the value of environment variable  | |
| IP Address or hostname of APIC resolvable by Ansible control host. If the value is not specified in the task, the value of environment variable  | |
| The node of the source access path. Provide one node to the list for port, direct_port_channel or vpc_component_pc types. Provide two nodes to the list for virtual_port_channel type. | |
| Influence the output of this ACI module. 
 
 
 If the value is not specified in the task, the value of environment variable  Choices: 
 | |
| Path to a file that will be used to dump the ACI JSON configuration objects generated by the module. If the value is not specified in the task, the value of environment variable  | |
| The password to use for authentication. This option is mutual exclusive with  If the value is not specified in the task, the value of environment variables  | |
| The path of the source access path. When path is of type port a interface like  When path is of type direct_port_channel the name of a pc interface policy group like  When path is of type virtual_port_channel or vpc_component_pc the name of a vpc interface policy group like  | |
| The pod id of the source access path. | |
| Port number to be used for REST connection. The default value depends on parameter  If the value is not specified in the task, the value of environment variable  | |
| Either a PEM-formatted private key file or the private key content used for signature-based authentication. This value also influences the default  This option is mutual exclusive with  If the value is not specified in the task, the value of environment variable  | |
| The name of the Access SPAN source. | |
| The name of the Access SPAN source group. | |
| Use  Use  Choices: 
 | |
| If  If the value is not specified in the task, the value of environment variable  The default value is  WARNING - This causes the previous return value to be empty. The previous state of the object will not be checked and the POST update will contain all properties. Choices: 
 | |
| If  If the value is not specified in the task, the value of environment variable  The default value is  WARNING - This causes the current return value to be set to the proposed value. The current object including default values will be unverifiable in a single task. Choices: 
 | |
| The socket level timeout in seconds. If the value is not specified in the task, the value of environment variable  The default value is 30. | |
| If  If the value is not specified in the task, the value of environment variable  The default value is true. Choices: 
 | |
| If  If the value is not specified in the task, the value of environment variable  The default value is true when the connection is local. Choices: 
 | |
| The username to use for authentication. If the value is not specified in the task, the value of environment variables  The default value is admin. | |
| If  This should only set to  If the value is not specified in the task, the value of environment variable  The default value is true. Choices: 
 | 
Notes
Note
- The source_group and source must exist before using this module in your playbook. The cisco.aci.aci_access_span_src_group and cisco.aci.aci_access_span_src_group_src modules can be used for this. 
See Also
See also
- cisco.aci.aci_access_span_src_group
- Manage Access SPAN source groups (span:SrcGrp). 
- cisco.aci.aci_access_span_src_group_src
- Manage Access SPAN sources (span:Src). 
- APIC Management Information Model reference
- More information about the internal APIC class span:RsSrcToPathEp. 
- Cisco ACI Guide
- Detailed information on how to manage your ACI infrastructure using Ansible. 
- Developing Cisco ACI modules
- Detailed guide on how to write your own Cisco ACI modules to contribute. 
Examples
- name: Create a Access SPAN source path of type Port
  cisco.aci.aci_access_span_src_group_src_path:
    host: apic
    username: admin
    password: SomeSecretPassword
    source_group: my_span_source_group
    source: my_source
    pod: 1
    nodes:
      - 101
    path_ep: eth1/1
    state: present
  delegate_to: localhost
- name: Create a Access SPAN source path of type Direct Port Channel
  cisco.aci.aci_access_span_src_group_src_path:
    host: apic
    username: admin
    password: SomeSecretPassword
    source_group: my_span_source_group
    source: my_source
    pod: 1
    nodes:
      - 101
    path_ep: test_PolGrp
    state: present
  delegate_to: localhost
- name: Create a Access SPAN source path of type VPC component PC
  cisco.aci.aci_access_span_src_group_src_path:
    host: apic
    username: admin
    password: SomeSecretPassword
    source_group: my_span_source_group
    source: my_source
    pod: 1
    nodes:
      - 101
    path_ep: test_vPC_PolGrp
    state: present
  delegate_to: localhost
- name: Create a Access SPAN source path of type Virtual Port Channel
  cisco.aci.aci_access_span_src_group_src_path:
    host: apic
    username: admin
    password: SomeSecretPassword
    source_group: my_span_source_group
    source: my_source
    pod: 1
    nodes:
      - 101
      - 102
    path_ep: test_vPC_PolGrp
    state: present
  delegate_to: localhost
- name: Delete a Access SPAN source path
  cisco.aci.aci_access_span_src_group_src_path:
    host: apic
    username: admin
    password: SomeSecretPassword
    source_group: my_span_source_group
    source: my_source
    pod: 1
    nodes:
      - 101
    path_ep: test_vPC_PolGrp
    state: absent
  delegate_to: localhost
- name: Query all Access SPAN source paths
  cisco.aci.aci_access_span_src_group_src_path:
    host: apic
    username: admin
    password: SomeSecretPassword
    state: query
  delegate_to: localhost
  register: query_result
- name: Query a specific Access SPAN source path
  cisco.aci.aci_access_span_src_group_src_path:
    host: apic
    username: admin
    password: SomeSecretPassword
    source_group: my_span_source_group
    source: my_source
    pod: 1
    nodes:
      - 101
    path_ep: test_vPC_PolGrp
    state: query
  delegate_to: localhost
  register: query_result
Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Description | 
|---|---|
| The existing configuration from the APIC after the module has finished Returned: success Sample:  | |
| The error information as returned from the APIC Returned: failure Sample:  | |
| The filter string used for the request Returned: failure or debug Sample:  | |
| The HTTP method used for the request to the APIC Returned: failure or debug Sample:  | |
| The original configuration from the APIC before the module has started Returned: info Sample:  | |
| The assembled configuration from the user-provided parameters Returned: info Sample:  | |
| The raw output returned by the APIC REST API (xml or json) Returned: parse error Sample:  | |
| The HTTP response from the APIC Returned: failure or debug Sample:  | |
| The actual/minimal configuration pushed to the APIC Returned: info Sample:  | |
| The HTTP status from the APIC Returned: failure or debug Sample:  | |
| The HTTP url used for the request to the APIC Returned: failure or debug Sample:  | 
