cisco.dnac.wired_campus_automation_playbook_config_generator module -- Generate YAML configurations playbook for 'wired_campus_automation_workflow_manager' module.
Note
This module is part of the cisco.dnac collection (version 6.49.0).
To install it, use: ansible-galaxy collection install cisco.dnac.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: cisco.dnac.wired_campus_automation_playbook_config_generator.
New in cisco.dnac 6.40.0
Synopsis
Generates YAML configurations compatible with the 'wired_campus_automation_workflow_manager' module, reducing the effort required to manually create Ansible playbooks and enabling programmatic modifications.
The YAML configurations generated represent the layer 2 configurations deployed on network devices within the Cisco Catalyst Center.
Supports extraction of VLANs, CDP, LLDP, STP, VTP, DHCP Snooping, IGMP Snooping, MLD Snooping, Authentication, Logical Ports, and Port Configuration settings.
Requirements
The below requirements are needed on the host that executes this module.
dnacentersdk >= 2.10.10
python >= 3.9
Parameters
Parameter |
Comments |
|---|---|
A list of filters for generating YAML playbook compatible with the 'wired_campus_automation_workflow_manager' module. Filters specify which components and devices to include in the YAML configuration file. Global filters identify target devices by IP address, hostname, or serial number. Component-specific filters allow selection of specific layer2 features and detailed filtering. |
|
Filters to specify which layer2 components and features to include in the YAML configuration file. Allows granular selection of specific features and their parameters. If not specified, all supported layer2 features will be extracted. |
|
List of components to include in the YAML configuration file. Valid values are ["layer2_configurations"] If not specified, all supported components are included. Future versions may support additional component types. |
|
List of specific layer2 features to extract from devices. Valid values are ["vlans", "cdp", "lldp", "stp", "vtp", "dhcp_snooping", "igmp_snooping", "mld_snooping", "authentication", "logical_ports", "port_configuration"] If not specified, all supported layer2 features will be extracted. Example ["vlans", "stp", "cdp"] to extract only VLAN, STP, and CDP configurations. Choices: |
|
Specific port configuration filtering options. Allows extraction of configurations for only specific interfaces. If not specified, all configured interfaces will be extracted. |
|
List of specific interface names to extract configurations from. Interface names must match the format used by the device. Example ["GigabitEthernet1/0/1", "GigabitEthernet1/0/2", "TenGigabitEthernet1/0/1"] Only interfaces in this list will have their configurations extracted. |
|
Specific VLAN filtering options. Allows extraction of only specific VLANs based on VLAN IDs. If not specified, all VLANs configured on the device will be extracted. |
|
List of specific VLAN IDs to extract from devices. Each VLAN ID must be between 1 and 4094. Only VLANs in this list will be included in the generated configuration. Example ["10", "20", "100", "200"] to extract only these specific VLANs. |
|
Path where the YAML configuration file will be saved. If not provided, the file will be saved in the current working directory with a default file name For example, |
|
When set to True, automatically generates YAML configurations for all devices and all supported layer2 features. This mode discovers all managed devices in Cisco Catalyst Center and extracts all supported configurations. When enabled, the config parameter becomes optional and will use default values if not provided. A default filename will be generated automatically if file_path is not specified. This is useful for complete brownfield infrastructure discovery and documentation. IMPORTANT NOTE - Currently, this module only supports layer2 configurations. When generate_all_configurations is enabled, it will attempt to retrieve layer2 configurations from ALL managed devices without filtering for layer2 capability. This may result in API errors for devices that do not support layer2 configuration features (such as older switch models, routers, wireless controllers, etc.). It is recommended to use specific device filters (ip_address_list, hostname_list, or serial_number_list) to target only layer2-capable devices when not using generate_all_configurations mode. Supported layer2 devices include Catalyst 9000 series switches (9200/9300/9350/9400/9500/9600) and IE series switches (IE3400/IE3400H/IE3500/IE9300) running IOS-XE 17.3 or higher. Choices: |
|
Global filters to apply when generating the YAML configuration file. These filters identify which network devices to extract configurations from. At least one filter type must be specified to identify target devices. |
|
List of device hostnames to extract configurations from. LOWEST PRIORITY - Only used if neither ip_address_list nor serial_number_list are provided. Hostnames must match those registered in Catalyst Center. Case-sensitive and must be exact matches. Example ["switch01.lab.com", "core-switch-01", "access-sw-floor2"] |
|
List of device IP addresses to extract configurations from. HIGHEST PRIORITY - If provided, serial numbers and hostnames will be ignored. Each IP address must be a valid IPv4 address format. Devices must be managed by Cisco Catalyst Center. Example ["192.168.1.10", "192.168.1.11", "10.1.1.5"] |
|
List of device serial numbers to extract configurations from. MEDIUM PRIORITY - Only used if ip_address_list is not provided. Serial numbers must match those registered in Catalyst Center. Useful when IP addresses may change but serial numbers remain constant. If both serial_number_list and hostname_list are provided, serial_number_list takes priority. Example ["FCW2140L05Y", "FCW2140L06Z", "9080V0I41J3"] |
|
Set to True to verify the Cisco Catalyst Center after applying the playbook config. Choices: |
|
Defines the timeout in seconds for API calls to retrieve task details. If the task details are not received within this period, the process will end, and a timeout notification will be logged. Default: :ansible-option-default:`1200` |
|
Indicates whether debugging is enabled in the Cisco Catalyst Center SDK. Choices: |
|
The hostname of the Cisco Catalyst Center. |
|
Flag to enable/disable playbook execution logging. When true and dnac_log_file_path is provided, - Create the log file at the execution location with the specified name. When true and dnac_log_file_path is not provided, - Create the log file at the execution location with the name 'dnac.log'. When false, - Logging is disabled. If the log file doesn't exist, - It is created in append or write mode based on the "dnac_log_append" flag. If the log file exists, - It is overwritten or appended based on the "dnac_log_append" flag. Choices: |
|
Determines the mode of the file. Set to True for 'append' mode. Set to False for 'write' mode. Choices: |
|
Governs logging. Logs are recorded if dnac_log is True. If path is not specified, - When 'dnac_log_append' is True, 'dnac.log' is generated in the current Ansible directory; logs are appended. - When 'dnac_log_append' is False, 'dnac.log' is generated; logs are overwritten. If path is specified, - When 'dnac_log_append' is True, the file opens in append mode. - When 'dnac_log_append' is False, the file opens in write (w) mode. - In shared file scenarios, without append mode, content is overwritten after each module execution. - For a shared log file, set append to False for the 1st module (to overwrite); for subsequent modules, set append to True. Default: :ansible-option-default:`"dnac.log"` |
|
Sets the threshold for log level. Messages with a level equal to or higher than this will be logged. Levels are listed in order of severity [CRITICAL, ERROR, WARNING, INFO, DEBUG]. CRITICAL indicates serious errors halting the program. Displays only CRITICAL messages. ERROR indicates problems preventing a function. Displays ERROR and CRITICAL messages. WARNING indicates potential future issues. Displays WARNING, ERROR, CRITICAL messages. INFO tracks normal operation. Displays INFO, WARNING, ERROR, CRITICAL messages. DEBUG provides detailed diagnostic info. Displays all log messages. Default: :ansible-option-default:`"WARNING"` |
|
The password for authentication at the Cisco Catalyst Center. |
|
Specifies the port number associated with the Cisco Catalyst Center. Default: :ansible-option-default:`"443"` |
|
Specifies the interval in seconds between successive calls to the API to retrieve task details. Default: :ansible-option-default:`2` |
|
The username for authentication at the Cisco Catalyst Center. Default: :ansible-option-default:`"admin"` |
|
Flag to enable or disable SSL certificate verification. Choices: |
|
Specifies the version of the Cisco Catalyst Center that the SDK should use. Default: :ansible-option-default:`"2.2.3.3"` |
|
The desired state of Cisco Catalyst Center after module execution. Choices: |
|
Flag for Cisco Catalyst Center SDK to enable the validation of request bodies against a JSON schema. Choices: |
Notes
Note
SDK Methods used are - devices.Devices.get_device_list - wired.Wired.get_configurations_for_a_deployed_layer2_feature_on_a_wired_device
Paths used are - GET /dna/intent/api/v1/network-device - GET /dna/intent/api/v1/networkDevices/${id}/configFeatures/deployed/layer2/${feature}
Does not support
check_modeThe plugin runs on the control node and does not use any ansible connection plugins instead embedded connection manager from Cisco Catalyst Center SDK
The parameters starting with dnac_ are used by the Cisco Catalyst Center Python SDK to establish the connection
Examples
# NOT Recommended for actual use cases due to potential API errors on non-layer2 devices.
# - name: Auto-generate YAML Configuration for all devices and features
# cisco.dnac.wired_campus_automation_playbook_config_generator:
# dnac_host: "{{dnac_host}}"
# dnac_username: "{{dnac_username}}"
# dnac_password: "{{dnac_password}}"
# dnac_verify: "{{dnac_verify}}"
# dnac_port: "{{dnac_port}}"
# dnac_version: "{{dnac_version}}"
# dnac_debug: "{{dnac_debug}}"
# dnac_log: true
# dnac_log_level: "{{dnac_log_level}}"
# state: gathered
# config:
# - generate_all_configurations: true
# NOT Recommended for actual use cases due to potential API errors on non-layer2 devices.
# - name: Auto-generate YAML Configuration with custom file path
# cisco.dnac.wired_campus_automation_playbook_config_generator:
# dnac_host: "{{dnac_host}}"
# dnac_username: "{{dnac_username}}"
# dnac_password: "{{dnac_password}}"
# dnac_verify: "{{dnac_verify}}"
# dnac_port: "{{dnac_port}}"
# dnac_version: "{{dnac_version}}"
# dnac_debug: "{{dnac_debug}}"
# dnac_log: true
# dnac_log_level: "{{dnac_log_level}}"
# state: gathered
# config:
# - file_path: "/tmp/complete_infrastructure_config.yml"
- name: Generate YAML Configuration with default file path
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- global_filters:
ip_address_list: ["192.168.1.10"]
- name: Generate YAML Configuration with specific devices by IP address
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10", "192.168.1.11", "192.168.1.12"]
- name: Generate YAML Configuration with specific devices by hostname
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
hostname_list: ["switch01.lab.com", "switch02.lab.com", "core-switch-01"]
- name: Generate YAML Configuration with specific devices by serial number
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
serial_number_list: ["FCW2140L05Y", "FCW2140L06Z", "9080V0I41J3"]
- name: Generate YAML Configuration with specific devices by hostname
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
hostname_list: ["switch01.lab.com", "switch02.lab.com", "core-switch-01"]
- name: Generate YAML Configuration with specific devices by serial number
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
serial_number_list: ["FCW2140L05Y", "FCW2140L06Z", "9080V0I41J3"]
- name: Generate YAML Configuration using explicit components list
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10", "192.168.1.11"]
component_specific_filters:
components_list: ["layer2_configurations"]
- name: Generate YAML Configuration with components list and specific features
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10"]
component_specific_filters:
components_list: ["layer2_configurations"]
layer2_configurations:
layer2_features: ["vlans", "stp", "cdp"]
- name: Generate YAML Configuration for specific VLANs
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10"]
component_specific_filters:
components_list: ["layer2_configurations"]
layer2_configurations:
layer2_features: ["vlans"]
vlans:
vlan_ids_list: ["10", "20", "100", "200"]
- name: Generate YAML Configuration for specific interfaces
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10"]
component_specific_filters:
components_list: ["layer2_configurations"]
layer2_configurations:
layer2_features: ["port_configuration"]
port_configuration:
interface_names_list:
- "GigabitEthernet1/0/1"
- "GigabitEthernet1/0/2"
- "TenGigabitEthernet1/0/1"
- name: Generate YAML Configuration with comprehensive filtering
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10", "192.168.1.11"]
component_specific_filters:
components_list: ["layer2_configurations"]
layer2_configurations:
layer2_features: ["vlans", "stp", "port_configuration"]
vlans:
vlan_ids_list: ["10", "20", "100"]
port_configuration:
interface_names_list:
- "GigabitEthernet1/0/1"
- "GigabitEthernet1/0/24"
- name: Generate YAML Configuration for specific interfaces
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10"]
component_specific_filters:
layer2_features: ["port_configuration"]
port_configuration:
interface_names_list:
- "GigabitEthernet1/0/1"
- "GigabitEthernet1/0/2"
- "TenGigabitEthernet1/0/1"
- name: Generate YAML Configuration with comprehensive filtering
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10", "192.168.1.11"]
component_specific_filters:
layer2_features: ["vlans", "stp", "port_configuration"]
vlans:
vlan_ids_list: ["10", "20", "100"]
port_configuration:
interface_names_list:
- "GigabitEthernet1/0/1"
- "GigabitEthernet1/0/24"
- name: Generate YAML Configuration for all features (no component filters)
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/wired_campus_automation_config.yml"
global_filters:
ip_address_list: ["192.168.1.10"]
- name: Generate YAML Configuration with default file path
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- global_filters:
ip_address_list: ["192.168.1.10"]
- name: Generate YAML Configuration for protocol features
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/protocol_features_config.yml"
global_filters:
hostname_list: ["switch01.lab.com", "switch02.lab.com"]
component_specific_filters:
layer2_features: ["cdp", "lldp", "stp", "vtp"]
- name: Generate YAML Configuration for security features
cisco.dnac.wired_campus_automation_playbook_config_generator:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
dnac_log: true
dnac_log_level: "{{dnac_log_level}}"
state: gathered
config:
- file_path: "/tmp/security_features_config.yml"
global_filters:
serial_number_list: ["FCW2140L05Y", "FCW2140L06Z"]
component_specific_filters:
layer2_features: ["dhcp_snooping", "igmp_snooping", "authentication"]
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
|---|---|
A dictionary with the response when no configurations are found Returned: always |
|