cisco.dnac.security_rogue_additional_details module – Resource module for Security Rogue Additional Details
Note
This module is part of the cisco.dnac collection (version 6.27.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install cisco.dnac
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: cisco.dnac.security_rogue_additional_details
.
New in cisco.dnac 6.16.0
Synopsis
This module represents an alias of the module security_rogue_additional_details_v1
Note
This module has a corresponding action plugin.
Requirements
The below requirements are needed on the host that executes this module.
dnacentersdk >= 2.4.9
python >= 3.5
Parameters
Parameter |
Comments |
---|---|
Flag for Cisco DNA Center SDK to enable debugging. Choices:
|
|
The Cisco DNA Center hostname. |
|
The Cisco DNA Center password to authenticate. |
|
The Cisco DNA Center port. Default: |
|
The Cisco DNA Center username to authenticate. Default: |
|
Flag to enable or disable SSL certificate verification. Choices:
|
|
Informs the SDK which version of Cisco DNA Center to use. Default: |
|
This is the epoch end time in milliseconds upto which data need to be fetched. Default value is current time. |
|
The maximum number of entries to return. Default value is 1000. |
|
The offset of the first item in the collection to return. Default value is 1. |
|
Filter Rogues by location. Site IDs information can be fetched from “Get Site” API. |
|
This is the epoch start time in milliseconds from which data need to be fetched. Default value is 24 hours earlier to endTime. |
|
Filter Rogues by Threat Level. Threat Level information can be fetched from “Get Threat Levels” API. |
|
Filter Rogues by Threat Type. Threat Type information can be fetched from “Get Threat Types” API. |
|
Flag for Cisco DNA Center SDK to enable the validation of request bodies against a JSON schema. Choices:
|
Notes
Note
SDK Method used are devices.Devices.rogue_additional_details_v1,
Paths used are post /dna/intent/api/v1/security/rogue/additional/details,
It should be noted that this module is an alias of security_rogue_additional_details_v1
Does not support
check_mode
The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco DNAC SDK
The parameters starting with dnac_ are used by the Cisco DNAC Python SDK to establish the connection
See Also
See also
- Cisco DNA Center documentation for Devices RogueAdditionalDetailsV1
Complete reference of the RogueAdditionalDetailsV1 API.
Examples
- name: Create
cisco.dnac.security_rogue_additional_details:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
endTime: 0
limit: 0
offset: 0
siteId:
- string
startTime: 0
threatLevel:
- string
threatType:
- string
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
A dictionary or list with the response returned by the Cisco DNAC Python SDK Returned: always Sample: |