cisco.catalystcenter.security_rogue_additional_details_count module -- Resource module for Security Rogue Additional Details Count
Note
This module is part of the cisco.catalystcenter collection (version 2.2.1).
To install it, use: ansible-galaxy collection install cisco.catalystcenter.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: cisco.catalystcenter.security_rogue_additional_details_count.
New in cisco.catalystcenter 6.16.0
Synopsis
Manage operation create of the resource Security Rogue Additional Details Count.
This API returns the count for the Rogue Additional Details.
Note
This module has a corresponding action plugin.
Requirements
The below requirements are needed on the host that executes this module.
catalystcentersdk >= 3.1.3.0.0
python >= 3.5
Parameters
Parameter |
Comments |
|---|---|
The Cisco Catalyst Center port. Default: :ansible-option-default:`443` |
|
Flag for Cisco Catalyst Center SDK to enable debugging. Choices: |
|
The Cisco Catalyst Center hostname. |
|
The Cisco Catalyst Center password to authenticate. |
|
The Cisco Catalyst Center username to authenticate. Default: :ansible-option-default:`"admin"` |
|
Flag to enable or disable SSL certificate verification. Choices: |
|
Informs the SDK which version of Cisco Catalyst Center to use. Default: :ansible-option-default:`"2.3.7.6"` |
|
This is the epoch end time in milliseconds upto which data need to be fetched. Default value is current time. |
|
Filter Rogues by location. Site IDs information can be fetched from "Get Site" API. |
|
This is the epoch start time in milliseconds from which data need to be fetched. Default value is 24 hours earlier to endTime. |
|
This information can be fetched from "Get Threat Levels" API. |
|
This information can be fetched from "Get Threat Types" API. |
|
Flag for Cisco Catalyst Center SDK to enable the validation of request bodies against a JSON schema. Choices: |
Notes
Note
SDK Method used are devices.Devices.rogue_additional_detail_count,
Paths used are post /dna/intent/api/v1/security/rogue/additional/details/count,
Does not support
check_modeThe plugin runs on the control node and does not use any ansible connection plugins,
but instead uses the embedded connection manager from Cisco CATALYST SDK
See Also
See also
- Cisco DNA Center documentation for Devices RogueAdditionalDetailCount
Complete reference of the RogueAdditionalDetailCount API.
Examples
---
- name: Create
cisco.catalystcenter.security_rogue_additional_details_count:
catc_host: "{{catc_host}}"
catc_username: "{{catc_username}}"
catc_password: "{{catc_password}}"
catc_verify: "{{catc_verify}}"
catc_api_port: "{{catc_api_port}}"
catc_version: "{{catc_version}}"
catc_debug: "{{catc_debug}}"
endTime: 0
siteId:
- string
startTime: 0
threatLevel:
- string
threatType:
- string
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
|---|---|
A dictionary or list with the response returned by the Cisco CATALYST Python SDK Returned: always Sample: :ansible-rv-sample-value:`{"response": 0, "version": "string"}` |