.. Document meta :orphan: .. |antsibull-internal-nbsp| unicode:: 0xA0 :trim: .. role:: ansible-attribute-support-label .. role:: ansible-attribute-support-property .. role:: ansible-attribute-support-full .. role:: ansible-attribute-support-partial .. role:: ansible-attribute-support-none .. role:: ansible-attribute-support-na .. role:: ansible-option-type .. role:: ansible-option-elements .. role:: ansible-option-required .. role:: ansible-option-versionadded .. role:: ansible-option-aliases .. role:: ansible-option-choices .. role:: ansible-option-choices-default-mark .. role:: ansible-option-default-bold .. role:: ansible-option-configuration .. role:: ansible-option-returned-bold .. role:: ansible-option-sample-bold .. Anchors .. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module: .. Anchors: short name for ansible.builtin .. Anchors: aliases .. Title cisco.dnac.sda_extranet_policies_playbook_config_generator module -- Generate YAML playbooks for SDA extranet policies from existing configurations. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ .. Collection note .. note:: This module is part of the `cisco.dnac collection `_ (version 6.49.0). To install it, use: :code:`ansible-galaxy collection install cisco.dnac`. You need further requirements to be able to use this module, see :ref:`Requirements ` for details. To use it in a playbook, specify: :code:`cisco.dnac.sda_extranet_policies_playbook_config_generator`. .. version_added .. rst-class:: ansible-version-added New in cisco.dnac 6.45.0 .. contents:: :local: :depth: 1 .. Deprecated Synopsis -------- .. Description - Generates YAML playbooks compatible with the \ :literal:`sda\_extranet\_policies\_workflow\_manager`\ module by extracting existing SDA extranet policy configurations from Cisco Catalyst Center. - Reduces manual effort by programmatically retrieving extranet policy details including provider virtual networks, subscriber virtual networks, and fabric site assignments. - Supports selective filtering by extranet policy name to generate targeted playbooks. - Enables complete infrastructure discovery with auto-generation mode when \ :literal:`generate\_all\_configurations`\ is enabled. - Resolves fabric site UUIDs to human-readable site hierarchy paths for generated playbooks. - Requires Cisco Catalyst Center version 2.3.7.9 or higher for SDA extranet policy API support. .. Aliases .. Requirements .. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module_requirements: Requirements ------------ The below requirements are needed on the host that executes this module. - dnacentersdk \>= 2.10.10 - python \>= 3.9 - Cisco Catalyst Center \>= 2.3.7.9 - Requires minimum Cisco Catalyst Center version 2.3.7.9 for SDA extranet policies API support. - Module will fail with an error if connected to an unsupported version. - Generated playbooks are compatible with the \ :literal:`sda\_extranet\_policies\_workflow\_manager`\ module for extranet policy management operations. - Fabric site UUIDs are automatically resolved to human-readable site hierarchy paths in the generated playbook. - The module operates in check mode but does not make any changes to Cisco Catalyst Center. - Use \ :literal:`dnac\_log`\ and \ :literal:`dnac\_log\_level`\ parameters for detailed operation logging and troubleshooting. .. Options Parameters ---------- .. rst-class:: ansible-option-table .. list-table:: :width: 100% :widths: auto :header-rows: 1 * - Parameter - Comments * - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-config: .. rst-class:: ansible-option-title **config** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`dictionary` .. raw:: html
- .. raw:: html
A dictionary of filters for generating YAML playbook compatible with the \ :literal:`sda\_extranet\_policies\_workflow\_manager`\ module. Filters specify which components to include in the YAML configuration file. If "components\_list" is specified, only those components are included, regardless of the filters. If config is not provided or is empty, all configurations for all extranet policies will be generated. This is useful for complete brownfield infrastructure discovery and documentation. .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-config/component_specific_filters: .. rst-class:: ansible-option-title **component_specific_filters** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`dictionary` / :ansible-option-required:`required` .. raw:: html
- .. raw:: html
Filters to specify which components to include in the YAML configuration file. This parameter is mandatory when \ :literal:`config`\ is provided. Omitting it or providing an empty value will result in a validation error. If \ :literal:`components\_list`\ is specified, only those components are included, regardless of other filters. If filters for specific components (e.g., \ :literal:`extranet\_policies`\ ) are provided without explicitly including them in \ :literal:`components\_list`\ , those components will be automatically added to \ :literal:`components\_list`\ . .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-config/component_specific_filters/components_list: .. rst-class:: ansible-option-title **components_list** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`list` / :ansible-option-elements:`elements=string` .. raw:: html
- .. raw:: html
List of component types to include in the generated YAML playbook. Currently supports only \ :literal:`extranet\_policies`\ for SDA extranet policy configurations. If omitted, all supported components are included by default. .. rst-class:: ansible-option-line :ansible-option-choices:`Choices:` - :ansible-option-choices-entry:`"extranet\_policies"` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-config/component_specific_filters/extranet_policies: .. rst-class:: ansible-option-title **extranet_policies** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`list` / :ansible-option-elements:`elements=dictionary` .. raw:: html
- .. raw:: html
Filters for retrieving specific extranet policy configurations from Cisco Catalyst Center. Multiple filter entries can be specified to target different policies. If no filters are provided, all extranet policies are retrieved. .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-config/component_specific_filters/extranet_policies/extranet_policy_name: .. rst-class:: ansible-option-title **extranet_policy_name** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
Name of the extranet policy to filter. Must match the exact policy name as configured in Cisco Catalyst Center. Example: \ :literal:`Test\_1`\ .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_api_task_timeout: .. rst-class:: ansible-option-title **dnac_api_task_timeout** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`integer` .. raw:: html
- .. raw:: html
Defines the timeout in seconds for API calls to retrieve task details. If the task details are not received within this period, the process will end, and a timeout notification will be logged. .. rst-class:: ansible-option-line :ansible-option-default-bold:`Default:` :ansible-option-default:`1200` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_debug: .. rst-class:: ansible-option-title **dnac_debug** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`boolean` .. raw:: html
- .. raw:: html
Indicates whether debugging is enabled in the Cisco Catalyst Center SDK. .. rst-class:: ansible-option-line :ansible-option-choices:`Choices:` - :ansible-option-choices-entry-default:`false` :ansible-option-choices-default-mark:`← (default)` - :ansible-option-choices-entry:`true` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_host: .. rst-class:: ansible-option-title **dnac_host** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` / :ansible-option-required:`required` .. raw:: html
- .. raw:: html
The hostname of the Cisco Catalyst Center. .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_log: .. rst-class:: ansible-option-title **dnac_log** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`boolean` .. raw:: html
- .. raw:: html
Flag to enable/disable playbook execution logging. When true and dnac\_log\_file\_path is provided, - Create the log file at the execution location with the specified name. When true and dnac\_log\_file\_path is not provided, - Create the log file at the execution location with the name 'dnac.log'. When false, - Logging is disabled. If the log file doesn't exist, - It is created in append or write mode based on the "dnac\_log\_append" flag. If the log file exists, - It is overwritten or appended based on the "dnac\_log\_append" flag. .. rst-class:: ansible-option-line :ansible-option-choices:`Choices:` - :ansible-option-choices-entry-default:`false` :ansible-option-choices-default-mark:`← (default)` - :ansible-option-choices-entry:`true` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_log_append: .. rst-class:: ansible-option-title **dnac_log_append** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`boolean` .. raw:: html
- .. raw:: html
Determines the mode of the file. Set to True for 'append' mode. Set to False for 'write' mode. .. rst-class:: ansible-option-line :ansible-option-choices:`Choices:` - :ansible-option-choices-entry:`false` - :ansible-option-choices-entry-default:`true` :ansible-option-choices-default-mark:`← (default)` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_log_file_path: .. rst-class:: ansible-option-title **dnac_log_file_path** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
Governs logging. Logs are recorded if dnac\_log is True. If path is not specified, - When 'dnac\_log\_append' is True, 'dnac.log' is generated in the current Ansible directory; logs are appended. - When 'dnac\_log\_append' is False, 'dnac.log' is generated; logs are overwritten. If path is specified, - When 'dnac\_log\_append' is True, the file opens in append mode. - When 'dnac\_log\_append' is False, the file opens in write (w) mode. - In shared file scenarios, without append mode, content is overwritten after each module execution. - For a shared log file, set append to False for the 1st module (to overwrite); for subsequent modules, set append to True. .. rst-class:: ansible-option-line :ansible-option-default-bold:`Default:` :ansible-option-default:`"dnac.log"` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_log_level: .. rst-class:: ansible-option-title **dnac_log_level** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
Sets the threshold for log level. Messages with a level equal to or higher than this will be logged. Levels are listed in order of severity [CRITICAL, ERROR, WARNING, INFO, DEBUG]. CRITICAL indicates serious errors halting the program. Displays only CRITICAL messages. ERROR indicates problems preventing a function. Displays ERROR and CRITICAL messages. WARNING indicates potential future issues. Displays WARNING, ERROR, CRITICAL messages. INFO tracks normal operation. Displays INFO, WARNING, ERROR, CRITICAL messages. DEBUG provides detailed diagnostic info. Displays all log messages. .. rst-class:: ansible-option-line :ansible-option-default-bold:`Default:` :ansible-option-default:`"WARNING"` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_password: .. rst-class:: ansible-option-title **dnac_password** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
The password for authentication at the Cisco Catalyst Center. .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_port: .. rst-class:: ansible-option-title **dnac_port** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
Specifies the port number associated with the Cisco Catalyst Center. .. rst-class:: ansible-option-line :ansible-option-default-bold:`Default:` :ansible-option-default:`"443"` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_task_poll_interval: .. rst-class:: ansible-option-title **dnac_task_poll_interval** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`integer` .. raw:: html
- .. raw:: html
Specifies the interval in seconds between successive calls to the API to retrieve task details. .. rst-class:: ansible-option-line :ansible-option-default-bold:`Default:` :ansible-option-default:`2` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_username: .. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-user: .. rst-class:: ansible-option-title **dnac_username** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-aliases:`aliases: user` .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
The username for authentication at the Cisco Catalyst Center. .. rst-class:: ansible-option-line :ansible-option-default-bold:`Default:` :ansible-option-default:`"admin"` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_verify: .. rst-class:: ansible-option-title **dnac_verify** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`boolean` .. raw:: html
- .. raw:: html
Flag to enable or disable SSL certificate verification. .. rst-class:: ansible-option-line :ansible-option-choices:`Choices:` - :ansible-option-choices-entry:`false` - :ansible-option-choices-entry-default:`true` :ansible-option-choices-default-mark:`← (default)` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-dnac_version: .. rst-class:: ansible-option-title **dnac_version** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
Specifies the version of the Cisco Catalyst Center that the SDK should use. .. rst-class:: ansible-option-line :ansible-option-default-bold:`Default:` :ansible-option-default:`"2.2.3.3"` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-file_mode: .. rst-class:: ansible-option-title **file_mode** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
Controls how config is written to the YAML file. \ :literal:`overwrite`\ replaces existing file content. \ :literal:`append`\ appends generated YAML content to the existing file. This parameter is only relevant when \ :literal:`file\_path`\ is specified. Defaults to \ :literal:`overwrite`\ . .. rst-class:: ansible-option-line :ansible-option-choices:`Choices:` - :ansible-option-choices-entry-default:`"overwrite"` :ansible-option-choices-default-mark:`← (default)` - :ansible-option-choices-entry:`"append"` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-file_path: .. rst-class:: ansible-option-title **file_path** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
Path where the YAML configuration file will be saved. If not provided, the file will be saved in the current working directory with a default file name \ :literal:`sda\_extranet\_policies\_playbook\_config\_\.yml`\ . For example, \ :literal:`sda\_extranet\_policies\_playbook\_config\_2026-01-30\_19-16-01.yml`\ . .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-state: .. rst-class:: ansible-option-title **state** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`string` .. raw:: html
- .. raw:: html
The desired state for the module operation. Only \ :literal:`gathered`\ state is supported to generate YAML playbooks from existing configurations. .. rst-class:: ansible-option-line :ansible-option-choices:`Choices:` - :ansible-option-choices-entry-default:`"gathered"` :ansible-option-choices-default-mark:`← (default)` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__parameter-validate_response_schema: .. rst-class:: ansible-option-title **validate_response_schema** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`boolean` .. raw:: html
- .. raw:: html
Flag for Cisco Catalyst Center SDK to enable the validation of request bodies against a JSON schema. .. rst-class:: ansible-option-line :ansible-option-choices:`Choices:` - :ansible-option-choices-entry:`false` - :ansible-option-choices-entry-default:`true` :ansible-option-choices-default-mark:`← (default)` .. raw:: html
.. Attributes .. Notes Notes ----- .. note:: - SDK Methods used are - sites.Sites.get\_site - sda.Sda.get\_extranet\_policies - sda.Sda.get\_fabric\_sites - sda.Sda.get\_fabric\_zones - sda.Sda.get\_fabric\_sites\_by\_id - sda.Sda.get\_fabric\_zones\_by\_id - Paths used are - GET /dna/intent/api/v1/sites - GET /dna/intent/api/v1/sda/extranet-policies - GET /dna/intent/api/v1/sda/fabric-sites - GET /dna/intent/api/v1/sda/fabric-zones - GET /dna/intent/api/v1/sda/fabric-sites/{id} - GET /dna/intent/api/v1/sda/fabric-zones/{id} - Does not support \ :literal:`check\_mode`\ - The plugin runs on the control node and does not use any ansible connection plugins instead embedded connection manager from Cisco Catalyst Center SDK - The parameters starting with dnac\_ are used by the Cisco Catalyst Center Python SDK to establish the connection .. Seealso See Also -------- .. seealso:: \ :ref:`cisco.dnac.sda\_extranet\_policies\_workflow\_manager `\ Manage SDA extranet policies in Cisco Catalyst Center .. Examples Examples -------- .. code-block:: yaml+jinja # Example 1: Generate all configurations (default behavior when config is omitted) - name: Generate YAML playbook for all SDA extranet policies cisco.dnac.sda_extranet_policies_playbook_config_generator: dnac_host: "{{dnac_host}}" dnac_username: "{{dnac_username}}" dnac_password: "{{dnac_password}}" dnac_verify: "{{dnac_verify}}" dnac_port: "{{dnac_port}}" dnac_version: "{{dnac_version}}" dnac_debug: "{{dnac_debug}}" dnac_log: true dnac_log_level: DEBUG state: gathered # No config provided - generates all configurations # Example 2: Generate all configurations with custom file path - name: Generate complete SDA extranet policies configuration with custom filename cisco.dnac.sda_extranet_policies_playbook_config_generator: dnac_host: "{{dnac_host}}" dnac_username: "{{dnac_username}}" dnac_password: "{{dnac_password}}" dnac_verify: "{{dnac_verify}}" dnac_port: "{{dnac_port}}" dnac_version: "{{dnac_version}}" dnac_debug: "{{dnac_debug}}" dnac_log: true dnac_log_level: DEBUG state: gathered file_path: "/tmp/complete_sda_extranet_policies_config.yaml" file_mode: "overwrite" # No config provided - generates all configurations # Example 3: Generate extranet policies configurations for a specific policy - name: Generate YAML playbook for specific extranet policy by name cisco.dnac.sda_extranet_policies_playbook_config_generator: dnac_host: "{{dnac_host}}" dnac_username: "{{dnac_username}}" dnac_password: "{{dnac_password}}" dnac_verify: "{{dnac_verify}}" dnac_port: "{{dnac_port}}" dnac_version: "{{dnac_version}}" dnac_debug: "{{dnac_debug}}" dnac_log: true dnac_log_level: DEBUG state: gathered file_path: "/tmp/policy_specific.yaml" file_mode: "overwrite" config: component_specific_filters: components_list: - extranet_policies extranet_policies: - extranet_policy_name: "Test_1" # Example 4: Generate configuration for multiple specific extranet policies - name: Generate YAML playbook for multiple specific extranet policies cisco.dnac.sda_extranet_policies_playbook_config_generator: dnac_host: "{{dnac_host}}" dnac_username: "{{dnac_username}}" dnac_password: "{{dnac_password}}" dnac_verify: "{{dnac_verify}}" dnac_port: "{{dnac_port}}" dnac_version: "{{dnac_version}}" dnac_debug: "{{dnac_debug}}" dnac_log: true dnac_log_level: DEBUG state: gathered file_path: "/tmp/selected_extranet_policies.yaml" file_mode: "overwrite" config: component_specific_filters: components_list: - extranet_policies extranet_policies: - extranet_policy_name: "Test_1" - extranet_policy_name: "Test_2" - extranet_policy_name: "Test_3" # Example 5: Auto-populate components_list from component filters - name: Generate configuration with auto-populated components_list cisco.dnac.sda_extranet_policies_playbook_config_generator: dnac_host: "{{dnac_host}}" dnac_username: "{{dnac_username}}" dnac_password: "{{dnac_password}}" dnac_verify: "{{dnac_verify}}" dnac_port: "{{dnac_port}}" dnac_version: "{{dnac_version}}" dnac_debug: "{{dnac_debug}}" dnac_log: true dnac_log_level: DEBUG state: gathered file_path: "/tmp/test_policy.yaml" file_mode: "overwrite" config: component_specific_filters: # No components_list specified, but extranet_policies filters are provided # The 'extranet_policies' component will be automatically added to components_list extranet_policies: - extranet_policy_name: "Test_1" # Example 6: Generate configuration with append mode - name: Generate and append SDA extranet policies configuration cisco.dnac.sda_extranet_policies_playbook_config_generator: dnac_host: "{{dnac_host}}" dnac_username: "{{dnac_username}}" dnac_password: "{{dnac_password}}" dnac_verify: "{{dnac_verify}}" dnac_port: "{{dnac_port}}" dnac_version: "{{dnac_version}}" dnac_debug: "{{dnac_debug}}" dnac_log: true dnac_log_level: DEBUG state: gathered file_path: "/tmp/all_extranet_policies.yaml" file_mode: "append" config: component_specific_filters: components_list: - extranet_policies extranet_policies: - extranet_policy_name: "Test_2" .. Facts .. Return values Return Values ------------- Common return values are documented :ref:`here `, the following are the fields unique to this module: .. rst-class:: ansible-option-table .. list-table:: :width: 100% :widths: auto :header-rows: 1 * - Key - Description * - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__return-response_1: .. rst-class:: ansible-option-title **response_1** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`dictionary` .. raw:: html
- .. raw:: html
A dictionary with the response returned by the Cisco Catalyst Center Python SDK .. rst-class:: ansible-option-line :ansible-option-returned-bold:`Returned:` always .. rst-class:: ansible-option-line .. rst-class:: ansible-option-sample :ansible-option-sample-bold:`Sample:` :ansible-rv-sample-value:`{"msg": {"YAML config generation Task succeeded for module 'sda\_extranet\_policies\_workflow\_manager'": {"file\_path": "sda\_extranet\_policies\_playbook\_config\_2026-02-03\_15-22-02.yml"}}, "response": {"YAML config generation Task succeeded for module 'sda\_extranet\_policies\_workflow\_manager'": {"file\_path": "sda\_extranet\_policies\_playbook\_config\_2026-02-03\_15-22-02.yml"}}}` .. raw:: html
* - .. raw:: html
.. _ansible_collections.cisco.dnac.sda_extranet_policies_playbook_config_generator_module__return-response_2: .. rst-class:: ansible-option-title **response_2** .. raw:: html .. rst-class:: ansible-option-type-line :ansible-option-type:`dictionary` .. raw:: html
- .. raw:: html
A string with the response returned by the Cisco Catalyst Center Python SDK .. rst-class:: ansible-option-line :ansible-option-returned-bold:`Returned:` on failure .. rst-class:: ansible-option-line .. rst-class:: ansible-option-sample :ansible-option-sample-bold:`Sample:` :ansible-rv-sample-value:`{"msg": "YAML config generation Task failed for module 'sda\_extranet\_policies\_workflow\_manager': Invalid file path", "response": []}` .. raw:: html
.. Status (Presently only deprecated) .. Authors Authors ~~~~~~~ - Apoorv Bansal (@Apoorv74-dot) - Madhan Sankaranarayanan (@madhansansel) .. Extra links Collection links ~~~~~~~~~~~~~~~~ .. raw:: html .. Parsing errors