cisco.dnac.wired_campus_automation_playbook_config_generator module -- Generate YAML configurations playbook for 'wired_campus_automation_workflow_manager' module.

Note

This module is part of the cisco.dnac collection (version 6.51.0).

To install it, use: ansible-galaxy collection install cisco.dnac. You need further requirements to be able to use this module, see Requirements for details.

To use it in a playbook, specify: cisco.dnac.wired_campus_automation_playbook_config_generator.

New in cisco.dnac 6.40.0

Synopsis

  • Generates YAML configurations compatible with the 'wired_campus_automation_workflow_manager' module, reducing the effort required to manually create Ansible playbooks and enabling programmatic modifications.

  • The YAML configurations generated represent the layer 2 configurations deployed on network devices within the Cisco Catalyst Center.

  • Supports extraction of VLANs, CDP, LLDP, STP, VTP, DHCP Snooping, IGMP Snooping, MLD Snooping, Authentication, Logical Ports, and Port Configuration settings.

Requirements

The below requirements are needed on the host that executes this module.

  • dnacentersdk >= 2.10.10

  • python >= 3.9

Parameters

Parameter

Comments

config

dictionary

A dictionary of filters for generating a YAML playbook compatible with the 'wired_campus_automation_workflow_manager' module.

If omitted, all managed devices and all supported layer2 features are extracted automatically.

Global filters identify target devices by IP address, hostname, or serial number.

Component-specific filters select which layer2 features to extract and allow VLAN ID or interface name filtering.

Global filters and component-specific filters are combined with AND logic. Omitting a filter means no restriction on that attribute.

component_specific_filters

dictionary

Filters to specify which layer2 components and features to include in the YAML configuration file.

Allows granular selection of specific features and their parameters.

If not specified, all supported layer2 features will be extracted.

components_list

list / elements=string

List of components to include in the YAML configuration file.

Valid values are ["layer2_configurations"]

If not specified, all supported components are included.

Future versions may support additional component types.

Choices:

layer2_configurations

list / elements=dictionary

Filters specific to layer2 configurations.

Allows selection of specific layer2 features and detailed filtering options.

If not specified, all supported layer2 features and their configurations will be extracted.

layer2_features

list / elements=string

List of specific layer2 features to extract from devices.

Valid values are ["vlans", "cdp", "lldp", "stp", "vtp", "dhcp_snooping", "igmp_snooping", "mld_snooping", "authentication", "logical_ports", "port_configuration"]

If not specified, all supported layer2 features will be extracted.

Example ["vlans", "stp", "cdp"] to extract only VLAN, STP, and CDP configurations.

Choices:

port_configuration

dictionary

Specific port configuration filtering options.

Allows extraction of configurations for only specific interfaces.

If not specified, all configured interfaces will be extracted.

interface_names_list

list / elements=string

List of specific interface names to extract configurations from.

Interface names must match the format used by the device.

Example ["GigabitEthernet1/0/1", "TenGigabitEthernet1/0/1"].

Only interfaces in this list will have their configurations extracted.

vlans

dictionary

Specific VLAN filtering options.

Allows extraction of only specific VLANs based on VLAN IDs.

If not specified, all VLANs configured on the device will be extracted.

vlan_ids_list

list / elements=string

List of specific VLAN IDs to extract from devices.

Each VLAN ID must be between 1 and 4094.

Only VLANs in this list will be included in the generated configuration.

Example ["10", "20", "100", "200"] to extract only these specific VLANs.

global_filters

dictionary

Filters that identify which network devices to extract configurations from.

If no global filters are specified, all managed devices in Cisco Catalyst Center are targeted.

When multiple filter types are provided, only the highest-priority type is used (IP > serial > hostname). Lower-priority filters are ignored.

hostname_list

list / elements=string

List of device hostnames to extract configurations from.

LOWEST PRIORITY - Only used if neither ip_address_list nor serial_number_list are provided.

Hostnames must match those registered in Catalyst Center.

Case-sensitive and must be exact matches.

Example ["switch01.lab.com", "core-switch-01", "access-sw-floor2"]

ip_address_list

list / elements=string

List of device IP addresses to extract configurations from.

HIGHEST PRIORITY - If provided, serial numbers and hostnames will be ignored.

Each IP address must be a valid IPv4 address format.

Devices must be managed by Cisco Catalyst Center.

Example ["192.168.1.10", "192.168.1.11", "10.1.1.5"]

serial_number_list

list / elements=string

List of device serial numbers to extract configurations from.

MEDIUM PRIORITY - Only used if ip_address_list is not provided.

Serial numbers must match those registered in Catalyst Center.

Useful when IP addresses may change but serial numbers remain constant.

If both serial_number_list and hostname_list are provided, serial_number_list takes priority.

Example ["FCW2140L05Y", "FCW2140L06Z", "9080V0I41J3"]

dnac_api_task_timeout

integer

Defines the timeout in seconds for API calls to retrieve task details. If the task details are not received within this period, the process will end, and a timeout notification will be logged.

Default: :ansible-option-default:`1200`

dnac_debug

boolean

Indicates whether debugging is enabled in the Cisco Catalyst Center SDK.

Choices:

dnac_host

string / required

The hostname of the Cisco Catalyst Center.

dnac_log

boolean

Flag to enable/disable playbook execution logging.

When true and dnac_log_file_path is provided, - Create the log file at the execution location with the specified name.

When true and dnac_log_file_path is not provided, - Create the log file at the execution location with the name 'dnac.log'.

When false, - Logging is disabled.

If the log file doesn't exist, - It is created in append or write mode based on the "dnac_log_append" flag.

If the log file exists, - It is overwritten or appended based on the "dnac_log_append" flag.

Choices:

dnac_log_append

boolean

Determines the mode of the file. Set to True for 'append' mode. Set to False for 'write' mode.

Choices:

dnac_log_file_path

string

Governs logging. Logs are recorded if dnac_log is True.

If path is not specified, - When 'dnac_log_append' is True, 'dnac.log' is generated in the current Ansible directory; logs are appended. - When 'dnac_log_append' is False, 'dnac.log' is generated; logs are overwritten.

If path is specified, - When 'dnac_log_append' is True, the file opens in append mode. - When 'dnac_log_append' is False, the file opens in write (w) mode. - In shared file scenarios, without append mode, content is overwritten after each module execution. - For a shared log file, set append to False for the 1st module (to overwrite); for subsequent modules, set append to True.

Default: :ansible-option-default:`"dnac.log"`

dnac_log_level

string

Sets the threshold for log level. Messages with a level equal to or higher than this will be logged. Levels are listed in order of severity [CRITICAL, ERROR, WARNING, INFO, DEBUG].

CRITICAL indicates serious errors halting the program. Displays only CRITICAL messages.

ERROR indicates problems preventing a function. Displays ERROR and CRITICAL messages.

WARNING indicates potential future issues. Displays WARNING, ERROR, CRITICAL messages.

INFO tracks normal operation. Displays INFO, WARNING, ERROR, CRITICAL messages.

DEBUG provides detailed diagnostic info. Displays all log messages.

Default: :ansible-option-default:`"WARNING"`

dnac_password

string

The password for authentication at the Cisco Catalyst Center.

dnac_port

string

Specifies the port number associated with the Cisco Catalyst Center.

Default: :ansible-option-default:`"443"`

dnac_task_poll_interval

integer

Specifies the interval in seconds between successive calls to the API to retrieve task details.

Default: :ansible-option-default:`2`

dnac_username

aliases: user

string

The username for authentication at the Cisco Catalyst Center.

Default: :ansible-option-default:`"admin"`

dnac_verify

boolean

Flag to enable or disable SSL certificate verification.

Choices:

dnac_version

string

Specifies the version of the Cisco Catalyst Center that the SDK should use.

Default: :ansible-option-default:`"2.2.3.3"`

file_mode

string

Controls how the generated configuration is written to the output YAML file.

overwrite replaces the existing file content entirely.

append appends the generated YAML content to the existing file. If the file does not exist, it is created.

Choices:

file_path

string

Absolute or relative path for YAML configuration file output.

If not provided, a default filename is generated in the current working directory using the pattern wired_campus_automation_playbook_config_<YYYY-MM-DD_HH-MM-SS>.yml.

Example default filename 'wired_campus_automation_playbook_config_2026-02-27_14-31-46.yml'

Directory created automatically if path does not exist.

Supports YAML file extension (.yml or .yaml).

state

string

The desired state of Cisco Catalyst Center after module execution.

Choices:

validate_response_schema

boolean

Flag for Cisco Catalyst Center SDK to enable the validation of request bodies against a JSON schema.

Choices:

Notes

Note

  • SDK Methods used are - devices.Devices.get_device_list - wired.Wired.get_configurations_for_a_deployed_layer2_feature_on_a_wired_device

  • Paths used are - GET /dna/intent/api/v1/network-device - GET /dna/intent/api/v1/networkDevices/${id}/configFeatures/deployed/layer2/${feature}

  • Auto-population of components_list - If component-specific filters (such as 'projects' or 'configuration_templates') are provided without explicitly including them in 'components_list', those components will be automatically added to 'components_list'. This simplifies configuration by eliminating the need to redundantly specify components in both places.

  • Example of auto-population behavior - If you provide filters for 'projects' without including 'projects' in 'components_list', the module will automatically add 'projects' to 'components_list' before processing. This allows you to write more concise playbooks.

  • Module result behavior (changed/ok/failed) - The module result reflects local file state only, not Catalyst Center state. In overwrite mode, the full generated YAML content is compared against the existing file after excluding generated header comment lines. In append mode, only the last YAML document in the file is compared against the newly generated configuration. If a file contains multiple config entries from previous appends, only the most recent entry is used for the idempotency check. changed=true (status success) means the generated YAML configuration differs from the existing output file (or the file does not exist). The file was written and the configuration was updated. changed=false (status ok) means the generated YAML configuration matches the existing output file content. The write was skipped as the file is already up-to-date. failed=true (status failed) means the module encountered a validation error, API failure, or file write error. No file was written or modified. Re-running with identical inputs and unchanged Catalyst Center state will produce changed=false, ensuring idempotent playbook behavior. If append mode creates multiple config entries in the generated file, replaying the file as config in the workflow manager module applies only the last config entry because yaml.safe_load uses last-key-wins semantics for duplicate keys in a single YAML document.

  • Does not support check_mode

  • The plugin runs on the control node and does not use any ansible connection plugins instead embedded connection manager from Cisco Catalyst Center SDK

  • The parameters starting with dnac_ are used by the Cisco Catalyst Center Python SDK to establish the connection

See Also

See also

cisco.dnac.wired_campus_automation_workflow_manager

Module for managing wired campus automation workflows in Cisco Catalyst Center.

Examples

# NOT Recommended for actual use cases due to potential API errors on non-layer2 devices.
# - name: Auto-generate YAML Configuration for all devices and features
#   cisco.dnac.wired_campus_automation_playbook_config_generator:
#     dnac_host: "{{dnac_host}}"
#     dnac_username: "{{dnac_username}}"
#     dnac_password: "{{dnac_password}}"
#     dnac_verify: "{{dnac_verify}}"
#     dnac_port: "{{dnac_port}}"
#     dnac_version: "{{dnac_version}}"
#     dnac_debug: "{{dnac_debug}}"
#     dnac_log: true
#     dnac_log_level: "{{dnac_log_level}}"
#     state: gathered
#     file_mode: "append"

# NOT Recommended for actual use cases due to potential API errors on non-layer2 devices.
# - name: Auto-generate YAML Configuration with custom file path
#   cisco.dnac.wired_campus_automation_playbook_config_generator:
#     dnac_host: "{{dnac_host}}"
#     dnac_username: "{{dnac_username}}"
#     dnac_password: "{{dnac_password}}"
#     dnac_verify: "{{dnac_verify}}"
#     dnac_port: "{{dnac_port}}"
#     dnac_version: "{{dnac_version}}"
#     dnac_debug: "{{dnac_debug}}"
#     dnac_log: true
#     dnac_log_level: "{{dnac_log_level}}"
#     state: gathered
#     file_path: "/tmp/complete_infrastructure_config.yml"
#     file_mode: "append"

- name: Generate YAML Configuration with default file path
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10"]

- name: Generate YAML Configuration with specific devices by IP address
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10", "192.168.1.11", "192.168.1.12"]

- name: Generate YAML Configuration with specific devices by hostname
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        hostname_list: ["switch01.lab.com", "switch02.lab.com", "core-switch-01"]

- name: Generate YAML Configuration with specific devices by serial number
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        serial_number_list: ["FCW2140L05Y", "FCW2140L06Z", "9080V0I41J3"]

- name: Generate YAML Configuration with specific devices by hostname
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        hostname_list: ["switch01.lab.com", "switch02.lab.com", "core-switch-01"]

- name: Generate YAML Configuration with specific devices by serial number
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        serial_number_list: ["FCW2140L05Y", "FCW2140L06Z", "9080V0I41J3"]

- name: Generate YAML Configuration using explicit components list
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10", "192.168.1.11"]
      component_specific_filters:
        components_list: ["layer2_configurations"]

- name: Generate YAML Configuration with components list and specific features
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10"]
      component_specific_filters:
        components_list: ["layer2_configurations"]
        layer2_configurations:
          - layer2_features: ["vlans", "stp", "cdp"]

- name: Generate YAML Configuration for specific VLANs
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10"]
      component_specific_filters:
        components_list: ["layer2_configurations"]
        layer2_configurations:
          - layer2_features: ["vlans"]
            vlans:
              vlan_ids_list: ["10", "20", "100", "200"]

- name: Generate YAML Configuration for specific interfaces
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10"]
      component_specific_filters:
        components_list: ["layer2_configurations"]
        layer2_configurations:
          - layer2_features: ["port_configuration"]
            port_configuration:
              interface_names_list:
                - "GigabitEthernet1/0/1"
                - "GigabitEthernet1/0/2"
                - "TenGigabitEthernet1/0/1"

- name: Generate YAML Configuration with comprehensive filtering
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10", "192.168.1.11"]
      component_specific_filters:
        components_list: ["layer2_configurations"]
        layer2_configurations:
          - layer2_features: ["vlans", "stp", "port_configuration"]
            vlans:
              vlan_ids_list: ["10", "20", "100"]
            port_configuration:
              interface_names_list:
                - "GigabitEthernet1/0/1"
                - "GigabitEthernet1/0/24"

- name: Generate YAML Configuration for specific interfaces
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10"]
      component_specific_filters:
        components_list: ["layer2_configurations"]
        layer2_configurations:
          - layer2_features: ["port_configuration"]
            port_configuration:
              interface_names_list:
                - "GigabitEthernet1/0/1"
                - "GigabitEthernet1/0/2"
                - "TenGigabitEthernet1/0/1"

- name: Generate YAML Configuration with comprehensive filtering
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10", "192.168.1.11"]
      component_specific_filters:
        components_list: ["layer2_configurations"]
        layer2_configurations:
          - layer2_features: ["vlans", "stp", "port_configuration"]
            vlans:
              vlan_ids_list: ["10", "20", "100"]
            port_configuration:
              interface_names_list:
                - "GigabitEthernet1/0/1"
                - "GigabitEthernet1/0/24"

- name: Generate YAML Configuration for all features (no component filters)
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10"]

- name: Generate YAML Configuration with default file path
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        ip_address_list: ["192.168.1.10"]

- name: Generate YAML Configuration for protocol features
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        hostname_list: ["switch01.lab.com", "switch02.lab.com"]
      component_specific_filters:
        components_list: ["layer2_configurations"]
        layer2_configurations:
          - layer2_features: ["cdp", "lldp", "stp", "vtp"]

- name: Generate YAML Configuration for security features
  cisco.dnac.wired_campus_automation_playbook_config_generator:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    dnac_log: true
    dnac_log_level: "{{dnac_log_level}}"
    state: gathered
    file_path: "/tmp/wired_campus_automation_config.yml"
    file_mode: "append"
    config:
      global_filters:
        serial_number_list: ["FCW2140L05Y", "FCW2140L06Z"]
      component_specific_filters:
        components_list: ["layer2_configurations"]
        layer2_configurations:
          - layer2_features: ["dhcp_snooping", "igmp_snooping", "authentication"]

Return Values

Common return values are documented here, the following are the fields unique to this module:

Key

Description

response_1

dictionary

A dictionary with the response returned by the Cisco Catalyst Center Python SDK

Returned: always

Sample: :ansible-rv-sample-value:`{"changed": true, "diff": [], "invocation": {"module\_args": {"config": {"component\_specific\_filters": {"components\_list": ["layer2\_configurations"], "layer2\_configurations": [{"layer2\_features": ["vlans", "cdp"]}]}, "global\_filters": {"ip\_address\_list": ["1.1.1.1"]}}, "dnac\_api\_task\_timeout": 1200, "dnac\_debug": false, "dnac\_host": "10.22.40.214", "dnac\_log": true, "dnac\_log\_append": true, "dnac\_log\_file\_path": "dnac.log", "dnac\_log\_level": "DEBUG", "dnac\_password": "VALUE\_SPECIFIED\_IN\_NO\_LOG\_PARAMETER", "dnac\_port": "443", "dnac\_task\_poll\_interval": 2, "dnac\_username": "admin", "dnac\_verify": false, "dnac\_version": "3.1.3.0", "file\_mode": "overwrite", "file\_path": "wired\_campus\_automation\_config.yml", "state": "gathered", "validate\_response\_schema": true}}, "msg": {"components\_processed": 1, "components\_skipped": 0, "configurations\_count": 1, "file\_mode": "overwrite", "file\_path": "wired\_campus\_automation\_config.yml", "message": "YAML configuration file generated successfully for module 'wired\_campus\_automation\_workflow\_manager'", "status": "success"}, "response": {"components\_processed": 1, "components\_skipped": 0, "configurations\_count": 1, "file\_mode": "overwrite", "file\_path": "wired\_campus\_automation\_config.yml", "message": "YAML configuration file generated successfully for module 'wired\_campus\_automation\_workflow\_manager'", "status": "success"}, "status": "success"}`

response_2

dictionary

response_3

dictionary

Authors

  • Rugvedi Kapse (@rukapse)

  • Vivek Raj (@vivekraj2000)

  • Madhan Sankaranarayanan (@madhansansel)