Skip to content

Commit 2a42003

Browse files
committed
Docs: Update docs about devtype and transport for Ansible source
Signed-off-by: Dinesh Dutt <[email protected]>
1 parent c882d35 commit 2a42003

File tree

1 file changed

+18
-3
lines changed

1 file changed

+18
-3
lines changed

docs/inventory.md

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ The new inventory is structured in 4 major pieces, explained in its own section:
1414
- `namespaces`: where you put together all the above. A namespace is be defined by a `source`, an `auth` and a `device`
1515

1616
Here is an example of an inventory file with a bunch of different options, but non-exhaustive, for each section:
17+
1718
```yaml
1819
sources:
1920
- name: netbox-instance-123
@@ -86,6 +87,7 @@ namespaces:
8687
- It is possible to [map different sources to the same namespace](#mapping-different-sources-to-the-same-namespace)
8788

8889
## <a name='sensitive-data'></a>Sensitive data
90+
8991
A sensitive data is an information that the user doesn't want to store in plain-text inside the inventory.
9092
For this reason, SuzieQ inventory now supports three different options to store these kind of informations
9193

@@ -94,6 +96,7 @@ For this reason, SuzieQ inventory now supports three different options to store
9496
- `ask`: the user can write the sensitive information on the stdin
9597

9698
Currently this method is used to specify passwords, passphrases and tokens.
99+
97100
## <a name='inventory-sources'></a>Sources
98101

99102
The device sources currently supported are:
@@ -121,9 +124,11 @@ Whenever a source has many fields in common with another, you don't have to rewr
121124
- suzieq-copy
122125
123126
```
127+
124128
### <a name='source-host-list'></a>Host list
125129

126130
The host list contains the IP address, the access method (SSH or REST), the IP address of the node, the user name, the type of OS if using REST and the access token such as a private key file. Here is an example of a native suzieq source type. For example (all possible combinations are shown for illustration):
131+
127132
```yaml
128133
- name: dc-01-native
129134
type: native # optional, if type is not present this is the default value
@@ -149,14 +154,16 @@ ansible-inventory --list > ansible.json
149154
```
150155

151156
Now you can set the path of the ansible inventory in the source:
157+
152158
```yaml
153159
- name: ansible-01
154160
type: ansible
155161
path: /path/to/ansible.json
156162
```
157163

164+
Since Ansible devices cannot really be split up, the device and auth sections apply to **all** the devices in the Ansible inventory file. This is a limitaion of the Ansible source input. We always assume ssh as the transport unless otherwise specified in the device section of the SuzieQ inventory file.
158165
!!! info
159-
The Ansible source assumes REST transport with Arista EOS and PanOs devices by default, and SSH for the others
166+
From 0.21.0, with Ansible inventories, the device type and transport are taken from the specification in the device section of the suzieq inventory file. You must specify the transport as rest if you want to use rest as the transport for EOS devices. By default, we assume ssh as the transport. For PANOS also, you must specify the device type and transport. Before version 0.21.0, Ansible inventory assumed REST as the transport for EOS, even if the user specified the transport as SSH in the device section.
160167

161168
### <a name='source-netbox'></a>Netbox
162169

@@ -173,6 +180,7 @@ Since Netbox is a _dynamic source_, the data are periodically pulled, the period
173180
If the user manually sets `ssl-verify: true` with an http netbox server, an error will be notified.
174181

175182
Here is an example of the configuration of a netbox type source:
183+
176184
```yaml
177185
- name: netbox-dc-01
178186
type: netbox
@@ -183,6 +191,7 @@ Here is an example of the configuration of a netbox type source:
183191
period: 3600 # How frequently Netbox should be polled
184192
ssl-verify: false # Netbox certificate validation will be skipped
185193
```
194+
186195
#### Selecting devices from Netbox
187196

188197
Starting from 0.19, it's possible to specify more than one tag to be matched, defining a list of one or more rules.
@@ -198,6 +207,7 @@ A device is polled by SuzieQ if it matches at least one of the defined rules.
198207
- alpha
199208
- bravo, charlie
200209
```
210+
201211
For example, the source above tells SuzieQ to select from Netbox all the devices having the `alpha` OR `bravo & charlie` tags.
202212

203213
!!!Warning
@@ -210,6 +220,7 @@ Netbox type source is capable to assign each device to a namespace which corresp
210220
To obtain this behaviour, we need to declare a `namespace` object with `name: netbox-sitename`.
211221

212222
Here is an example:
223+
213224
```yaml
214225
sources:
215226
- name: netbox-dc-01
@@ -270,6 +281,7 @@ In case you want to ignore the check of the device's key against the `known_host
270281
```
271282

272283
Moreover if all the devices inside a namespace run the same NOS, it is possible to specify it via the `devtype` option:
284+
273285
```yaml
274286
- name: eos-devices
275287
devtype: eos
@@ -294,13 +306,15 @@ This section is optional in case SuzieQ native and ansible source types. Here a
294306
Currently for both SSH and REST API, the only supported is username and password, therefore you will not be able to set api keys.
295307

296308
The simplest method is defining either username and password/private key.
309+
297310
```yaml
298311
- name: suzieq-user
299312
username: suzieq
300313
password: plain:pass
301314
```
302315

303316
In case a private key is used to authenticate:
317+
304318
```yaml
305319
- name: suzieq-user
306320
keyfile: path/to/private/key
@@ -326,6 +340,7 @@ A `cred-file` is an external file where you store credentials for all the device
326340
Each device credentials can be specified via its `hostname` or its `address`
327341
(with Netbox, it's encouraged the usage of `hostname`).
328342
The credential file should look like this:
343+
329344
```yaml
330345
- namespace: testing
331346
devices:
@@ -348,6 +363,7 @@ The credential file should look like this:
348363

349364
In the `namespaces` section sources, auths and devices can be put together to define namespaces.
350365
For example the following namespace will be defined by the source named `netbox-1`, the auths named `dc-01-credentials`, and the device named `ssh-jump-devs`:
366+
351367
```yaml
352368
namespaces:
353369
- name: example
@@ -430,15 +446,14 @@ Suppose we have this inventory valid for version 0.15.x:
430446
- url: ssh://[email protected]:2023 keyfile=/home/netenglabs/cloud-native-data-center-networking/topologies/dual-attach/.vagrant/machines/server104/libvirt/private_key
431447
- url: https://[email protected] password=vagrant
432448
```
433-
The new inventory format consists of four sections (sources, auths, devices, namespaces) which are described above. We need to add the devices specified in the old inventory format in a new source inside the `sources` section and link it to a namespace.
434449

450+
The new inventory format consists of four sections (sources, auths, devices, namespaces) which are described above. We need to add the devices specified in the old inventory format in a new source inside the `sources` section and link it to a namespace.
435451

436452
Here is how the new format will look like:
437453

438454
!!! important
439455
Sections [auths](#auths) and [devices](#devices) are optional. See the full documentation to know how to use them.
440456

441-
442457
```yaml
443458
sources:
444459
- name: eos-source # namespace is defined below, this is only a name to be used as reference

0 commit comments

Comments
 (0)