Extreme SLX-OS Ansible modules only support CLI connections today.
httpapi modules may be added in future.
This page offers details on how to use
network_cli on SLX-OS in Ansible.
uses SSH keys / SSH-agent if present
|Indirect Access||via a bastion (jump host)|
|not supported by SLX-OS|
|Returned Data Format||
SLX-OS does not support
ansible_connection: local. You must use
ansible_connection: network_cli ansible_network_os: slxos ansible_user: myuser ansible_password: !vault... ansible_ssh_common_args: '-o ProxyCommand="ssh -W %h:%p -q bastion01"'
- If you are using SSH keys (including an ssh-agent) you can remove the
- If you are accessing your host directly (not through a bastion/jump host) you can remove the
- If you are accessing your host through a bastion/jump host, you cannot include your SSH password in the
ProxyCommanddirective. To prevent secrets from leaking out (for example in
psoutput), SSH does not support providing passwords via environment variables.
- name: Backup current switch config (slxos) slxos_config: backup: yes register: backup_slxos_location when: ansible_network_os == 'slxos'
Never store passwords in plain text. We recommend using SSH keys to authenticate SSH connections. Ansible supports ssh-agent to manage your SSH keys. If you must use passwords to authenticate SSH connections, we recommend encrypting them with Ansible Vault.