Files
product-demos/network/README.md

4.7 KiB

Network Demos

Table of Contents

About These Demos

This category of demos shows examples of network operations and management with Ansible Automation Platform. The list of demos can be found below. See the Suggested Usage section of this document for recommendations on how to best use these demos.

Project

These demos leverage playbooks from a git repo that is added as the Network Golden Configs Project in your Ansible Controller. Review this repo for the playbooks to configure different resources and network config templates that will be configured.

Inventory

These demos leverage "always-on" instances for Cisco IOS, IOSXR, and NXOS from Cisco DevNet Sandboxes. These instances are shared and do not provide admin access but they are instantly avaible all the time meaning no setup time is required.

A Demo Inventory is created when setting up these demos and a dynamic source is added to populate the Always-On instances. Review the inventory file here. Demo Inventory is the default inventory for Product Demos.

Suggested Usage

NETWORK / Report - Use this job to gather facts from Cisco Network devices and create a report with information about the device such as code version, along with configuration information about layers 1, 2, and 3. This shows how Ansible can be used to gather facts and build reports. Generating html pages is just one potential output. This information can be used in a number of ways, such as integration with different network management tools.

  • to run this you will first need to run the Deploy Cloud Stack in AWS job template to deploy the report server. This will ask you for an SSH public key. After running this playbook, you will need to add the SSH private key to the Demo Credential before you can run the report, so it can connect to the report server.

NETWORK / Configuration - Use this job to execute different Ansible Network Resource Modules to deploy golden configs. Below is a list of the different resources the can be configured with a link to their golden config.

NETWORK / DISA STIG - Use this job to run the DISA STIG role (in check mode) and show how Ansible can be used for configuration compliance of network devices. Click into tasks to see what is changed for each compliance rule, i.e.: { "changed": true, "warnings": [ "To ensure idempotency and correct diff the input configuration lines should be similar to how they appear if present in the running configuration on device" ], "commands": [ "ip http max-connections 2" ], "updates": [ "ip http max-connections 2" ], "banners": {}, "invocation": { "module_args": { "defaults": true, "lines": [ "ip http max-connections 2" ], "match": "line", "replace": "line", "multiline_delimiter": "@", "backup": false, "save_when": "never", "src": null, "parents": null, "before": null, "after": null, "running_config": null, "intended_config": null, "backup_options": null, "diff_against": null, "diff_ignore_lines": null } }, "_ansible_no_log": false }