cisco.mso.ndo_match_rule_prefix module – Manage Match Prefix List on Cisco Nexus Dashboard Orchestrator (NDO).
Note
This module is part of the cisco.mso collection (version 2.12.0).
You might already have this collection installed if you are using the ansible package.
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install cisco.mso.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: cisco.mso.ndo_match_rule_prefix.
New in cisco.mso 2.12.0
Synopsis
Manage Match Prefix List inside a Match Rule Policy on Cisco Nexus Dashboard Orchestrator (NDO).
This module is only supported on ND v4.1 (NDO v5.1) and later.
Requirements
The below requirements are needed on the host that executes this module.
Multi Site Orchestrator v2.1 or newer
Parameters
Parameter |
Comments |
|---|---|
The aggregate flag enabling route aggregation. Defaults to Choices:
|
|
The description of the Match Prefix. |
|
The subnet value from which to aggregate. The value must be below The value must be between 0 and 32. Defaults to |
|
IP Address or hostname of the ACI Multi Site Orchestrator host. If the value is not specified in the task, the value of environment variable |
|
The login domain name to use for authentication. The default value is Local. If the value is not specified in the task, the value of environment variable When using a HTTPAPI connection plugin the inventory variable |
|
The name of the Match Rule Policy. This parameter or |
|
The UUID of the Match Rule Policy. This parameter or |
|
Influence the output of this MSO module.
If the value is not specified in the task, the value of environment variable Choices:
|
|
The password to use for authentication. If the value is not specified in the task, the value of environment variables |
|
Port number to be used for the REST connection. The default value depends on parameter `use_ssl`. If the value is not specified in the task, the value of environment variable |
|
The Prefix IP to match. |
|
Use Use Use Choices:
|
|
The name of the template. The template must be a Tenant Policy template. This parameter or |
|
The ID of the template. The template must be a Tenant Policy template. This parameter or |
|
The socket level timeout in seconds. The default value is 30 seconds. If the value is not specified in the task, the value of environment variable |
|
The subnet value to which to aggregate. The value must be above The value must be between 0 and 32. Defaults to |
|
If If the value is not specified in the task, the value of environment variable The default is Choices:
|
|
If If the value is not specified in the task, the value of environment variable When using a HTTPAPI connection plugin the inventory variable The default is Choices:
|
|
The username to use for authentication. If the value is not specified in the task, the value of environment variables |
|
If This should only set to If the value is not specified in the task, the value of environment variable The default is Choices:
|
Notes
Note
The
templatemust exist before using this module in your playbook. Use cisco.mso.ndo_template to create the Tenant Policy template.The
match_rule_policymust exist before using this module in your playbook. Use cisco.mso.ndo_match_rule_policy to create the Match Rule Policy.This module was written to support Multi Site Orchestrator v2.1 or newer. Some or all functionality may not work on earlier versions.
See Also
See also
- cisco.mso.ndo_template
Manage Templates on Cisco Nexus Dashboard Orchestrator (NDO).
- cisco.mso.ndo_match_rule_policy
Manage Match Rule Policies on Cisco Nexus Dashboard Orchestrator (NDO).
Examples
- name: Create a Match Prefix
cisco.mso.ndo_match_rule_prefix:
host: mso_host
username: admin
password: SomeSecretPassword
template: ansible_test
match_rule_policy: ansible_match_rule_policy
prefix: 10.10.10.1/24
description: Ansible Match Prefix
aggregate: false
from_prefix: 0
to_prefix: 0
state: present
register: create_match_prefix
- name: Update a Match Prefix using Match Rule Policy's name
cisco.mso.ndo_match_rule_prefix:
host: mso_host
username: admin
password: SomeSecretPassword
template: ansible_test
match_rule_policy: ansible_match_rule_policy
prefix: 10.10.10.1/24
description: Updated Ansible Match Prefix
aggregate: true
from_prefix: 25
to_prefix: 31
state: present
- name: Update a Match Prefix using Match Rule Policy's UUID
cisco.mso.ndo_match_rule_prefix:
host: mso_host
username: admin
password: SomeSecretPassword
template: ansible_test
match_rule_policy_uuid: "{{ create_match_prefix.current.matchRulePolicyUuid }}"
prefix: 10.10.10.1/24
description: Updated Ansible Match Prefix
aggregate: true
from_prefix: 25
to_prefix: 31
state: present
- name: Query a Match Prefix using Match Rule Policy's name
cisco.mso.ndo_match_rule_prefix:
host: mso_host
username: admin
password: SomeSecretPassword
template: ansible_test
match_rule_policy: ansible_match_rule_policy
prefix: 10.10.10.1/24
state: query
register: query_with_name
- name: Query a Match Prefix using Match Rule Policy's UUID
cisco.mso.ndo_match_rule_prefix:
host: mso_host
username: admin
password: SomeSecretPassword
template: ansible_test
match_rule_policy_uuid: "{{ create_match_prefix.current.matchRulePolicyUuid }}"
prefix: 10.10.10.1/24
state: query
register: query_with_uuid
- name: Query all Match Prefixes in a Match Rule Policy
cisco.mso.ndo_match_rule_prefix:
host: mso_host
username: admin
password: SomeSecretPassword
template: ansible_test
match_rule_policy: ansible_match_rule_policy
state: query
register: query_all_objects
- name: Delete a Match Prefix using Match Rule Policy's name
cisco.mso.ndo_match_rule_prefix:
host: mso_host
username: admin
password: SomeSecretPassword
template: ansible_test
match_rule_policy: ansible_match_rule_policy
prefix: 10.10.10.1/24
state: absent
- name: Delete a Match Prefix using Match Rule Policy's UUID
cisco.mso.ndo_match_rule_prefix:
host: mso_host
username: admin
password: SomeSecretPassword
template_id: ansible_test
match_rule_policy_uuid: "{{ create_match_prefix.current.matchRulePolicyUuid }}"
prefix: 10.10.10.1/24
state: absent