You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/docsite/rst/collections_guide/collections_using_playbooks.rst
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Once installed, you can reference a collection content by its fully qualified co
18
18
19
19
This works for roles or any type of plugin distributed within the collection:
20
20
21
-
.. code-block:: yaml
21
+
.. code-block:: yaml+jinja
22
22
23
23
- name: Reference collections contents using their FQCNs
24
24
hosts: all
@@ -64,7 +64,7 @@ Using ``collections`` in playbooks
64
64
65
65
In a playbook, you can control the collections Ansible searches for modules and action plugins to execute. However, any roles you call in your playbook define their own collections search order; they do not inherit the calling playbook's settings. This is true even if the role does not define its own ``collections`` keyword.
66
66
67
-
.. code-block:: yaml
67
+
.. code-block:: yaml+jinja
68
68
69
69
- name: Run a play using the collections keyword
70
70
hosts: all
@@ -116,7 +116,7 @@ From inside a playbook:
116
116
117
117
A few recommendations when creating such playbooks, ``hosts:`` should be generic or at least have a variable input.
118
118
119
-
.. code-block:: yaml
119
+
.. code-block:: yaml+jinja
120
120
121
121
- hosts: all # Use --limit or customized inventory to restrict hosts targeted
Copy file name to clipboardExpand all lines: docs/docsite/rst/dev_guide/developing_collections_distributing.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -220,7 +220,7 @@ For example, to exclude the :file:`sensitive` folder within the ``playbooks`` fo
220
220
221
221
By default, the ``MANIFEST.in`` style directives would exclude all files by default, but there are default directives in place. Those default directives are described below. To see the directives in use during build, pass ``-vvv`` with the ``ansible-galaxy collection build`` command.
Copy file name to clipboardExpand all lines: docs/docsite/rst/network/user_guide/network_debug_troubleshooting.rst
+26-26Lines changed: 26 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ Be sure to fully understand the security implications of enabling this option. T
113
113
114
114
Before running ``ansible-playbook`` run the following commands to enable logging:
115
115
116
-
.. code-block:: text
116
+
.. code-block:: shell
117
117
118
118
# Specify the location for the log file
119
119
export ANSIBLE_LOG_PATH=~/ansible.log
@@ -140,7 +140,7 @@ To make this a global setting, add the following to your ``ansible.cfg`` file:
140
140
141
141
or enable the environment variable `ANSIBLE_PERSISTENT_LOG_MESSAGES`:
142
142
143
-
.. code-block:: text
143
+
.. code-block:: shell
144
144
145
145
# Enable device interaction logging
146
146
export ANSIBLE_PERSISTENT_LOG_MESSAGES=True
@@ -168,9 +168,9 @@ For Ansible this can be done by ensuring you are only running against one remote
168
168
169
169
`ad hoc` refers to running Ansible to perform some quick command using ``/usr/bin/ansible``, rather than the orchestration language, which is ``/usr/bin/ansible-playbook``. In this case we can ensure connectivity by attempting to execute a single command on the remote device:
@@ -303,7 +303,7 @@ Indicates that the remote host you are trying to connect to can not be reached
303
303
304
304
For example:
305
305
306
-
.. code-block:: yaml
306
+
.. code-block:: text
307
307
308
308
2017-04-04 11:39:48,147 p=15299 u=fred | control socket path is /home/fred/.ansible/pc/ca5960d27a
309
309
2017-04-04 11:39:48,147 p=15299 u=fred | current working directory is /home/fred/git/ansible-inc/stable-2.3/test/integration
@@ -332,7 +332,7 @@ Occurs if the credentials (username, passwords, or ssh keys) passed to ``ansible
332
332
333
333
For example:
334
334
335
-
.. code-block:: yaml
335
+
.. code-block:: text
336
336
337
337
<ios01> ESTABLISH CONNECTION FOR USER: cisco on PORT 22 TO ios01
338
338
<ios01> Authentication failed.
@@ -342,7 +342,7 @@ Suggestions to resolve:
342
342
343
343
If you are specifying credentials through ``password:`` (either directly or through ``provider:``) or the environment variable `ANSIBLE_NET_PASSWORD` it is possible that ``paramiko`` (the Python SSH library that Ansible uses) is using ssh keys, and therefore the credentials you are specifying are being ignored. To find out if this is the case, disable "look for keys". This can be done like this:
344
344
345
-
.. code-block:: yaml
345
+
.. code-block:: shell
346
346
347
347
export ANSIBLE_PARAMIKO_LOOK_FOR_KEYS=False
348
348
@@ -363,7 +363,7 @@ When using persistent connections with Paramiko, the connection runs in a backgr
363
363
364
364
For example:
365
365
366
-
.. code-block:: yaml
366
+
.. code-block:: text
367
367
368
368
2017-04-04 12:06:03,486 p=17981 u=fred | using connection plugin network_cli
369
369
2017-04-04 12:06:04,680 p=17981 u=fred | connecting to host veos01 returned an error
@@ -412,7 +412,7 @@ Error: "No authentication methods available"
412
412
413
413
For example:
414
414
415
-
.. code-block:: yaml
415
+
.. code-block:: text
416
416
417
417
2017-04-04 12:19:05,670 p=18591 u=fred | creating new control socket for host veos01:None as user admin
418
418
2017-04-04 12:19:05,670 p=18591 u=fred | control socket path is /home/fred/.ansible/pc/ca5960d27a
By default, ``ANSIBLE_PERSISTENT_CONNECT_TIMEOUT`` is set to 30 (seconds). You may see the following error if this value is too low:
453
453
454
-
.. code-block:: yaml
454
+
.. code-block:: text
455
455
456
456
2017-04-04 12:19:05,670 p=18591 u=fred | persistent connection idle timeout triggered, timeout value is 30 secs
457
457
458
458
Suggestions to resolve:
459
459
460
460
Increase value of persistent connection idle timeout:
461
461
462
-
.. code-block:: sh
462
+
.. code-block:: shell
463
463
464
464
export ANSIBLE_PERSISTENT_CONNECT_TIMEOUT=60
465
465
@@ -477,7 +477,7 @@ By default, ``ANSIBLE_PERSISTENT_COMMAND_TIMEOUT`` is set to 30 (seconds). Prior
477
477
You may see the following error if this value is too low:
478
478
479
479
480
-
.. code-block:: yaml
480
+
.. code-block:: text
481
481
482
482
2017-04-04 12:19:05,670 p=18591 u=fred | command timeout triggered, timeout value is 30 secs
483
483
@@ -486,7 +486,7 @@ Suggestions to resolve:
486
486
* Option 1 (Global command timeout setting):
487
487
Increase value of command timeout in configuration file or by setting environment variable.
488
488
489
-
.. code-block:: yaml
489
+
.. code-block:: shell
490
490
491
491
export ANSIBLE_PERSISTENT_COMMAND_TIMEOUT=60
492
492
@@ -510,7 +510,7 @@ Suggestions to resolve:
510
510
Suggestions to resolve:
511
511
512
512
Some modules support a ``timeout`` option, which is different to the ``timeout`` keyword for tasks.
513
-
513
+
514
514
.. code-block:: yaml
515
515
516
516
- name: save running-config
@@ -521,7 +521,7 @@ Suggestions to resolve:
521
521
522
522
523
523
Suggestions to resolve:
524
-
524
+
525
525
If the module does not support the ``timeout`` option directly, most networking connection plugins can enable similar functionality with the ``ansible_command_timeout`` variable.
Copy file name to clipboardExpand all lines: docs/docsite/rst/os_guide/windows_ssh.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ SSH key authentication on Windows works in the same way as SSH key authenticatio
128
128
129
129
One difference is that the ``authorized_keys`` file for admin users is not located in the ``.ssh`` folder in the user's profile directory but in ``C:\ProgramData\ssh\administrators_authorized_keys``. It is possible to change the location of the ``authorized_keys`` file for admin users back to the user profile directory by removing, or commenting, the lines in ``C:\ProgramData\ssh\sshd_config`` and restarting the ``sshd`` service.
0 commit comments