Pluribus NETVISOR Ansible modules only support CLI connections today.
httpapi modules may be added in future.
This page offers details on how to use
network_cli on NETVISOR in Ansible.
uses SSH keys / SSH-agent if present
|Indirect Access||via a bastion (jump host)|
|not supported by NETVISOR|
|Returned Data Format||
Pluribus NETVISOR does not support
ansible_connection: local. You must use
ansible_connection: network_cli ansible_network_os: netvisor ansible_user: myuser ansible_password: !vault... ansible_ssh_common_args: '-o ProxyCommand="ssh -W %h:%p -q bastion01"'
- If you are using SSH keys (including an ssh-agent) you can remove the
- If you are accessing your host directly (not through a bastion/jump host) you can remove the
- If you are accessing your host through a bastion/jump host, you cannot include your SSH password in the
ProxyCommanddirective. To prevent secrets from leaking out (for example in
psoutput), SSH does not support providing passwords via environment variables.
- name: Create access list pn_access_list: pn_name: "foo" pn_scope: "local" state: "present" register: acc_list when: ansible_network_os == 'netvisor'
Never store passwords in plain text. We recommend using SSH keys to authenticate SSH connections. Ansible supports ssh-agent to manage your SSH keys. If you must use passwords to authenticate SSH connections, we recommend encrypting them with Ansible Vault.