Forge Home

cisco_aci

Puppet Module to configure ACI via APIC Controller

5,678 downloads

5,651 latest version

4.2 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Support the Puppet Community by contributing to this module

You are welcome to contribute to this module by suggesting new features, currency updates, or fixes. Every contribution is valuable to help ensure that the module remains compatible with the latest Puppet versions and continues to meet community needs. Complete the following steps:

  1. Review the module’s contribution guidelines and any licenses. Ensure that your planned contribution aligns with the author’s standards and any legal requirements.
  2. Fork the repository on GitHub, make changes on a branch of your fork, and submit a pull request. The pull request must clearly document your proposed change.

For questions about updating the module, contact the module’s author.

Version information

  • 0.2.0 (latest)
  • 0.1.0 (deleted)
released Jun 27th 2018
This version is compatible with:
  • Puppet Enterprise 2023.8.x, 2023.7.x, 2023.6.x, 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x, 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x, 2018.1.x
  • Puppet >= 5.5

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'cisco-cisco_aci', '0.2.0'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add cisco-cisco_aci
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install cisco-cisco_aci --version 0.2.0

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download

Documentation

cisco/cisco_aci — version 0.2.0 Jun 27th 2018

cisco_aci Module

Table of Contents

  1. Overview
  2. Module Description - What the module does and why it is useful
  3. Background
  4. Solution Overview
  5. Setup - The basics of getting started with aci_puppet_module
  6. Usage - Configuration options and additional functionality
  7. Troubleshooting
  8. Limitations - OS compatibility, etc.
  9. Reference

Overview

This module allows network administrators to use Puppet's infrastructure to provision Cisco's ACI Fabric via the Cisco APIC controller. This module requires the use of a Puppet Agent running as a proxy and leverages the puppet device construct to send REST provisioning requests to the APIC controller. Puppet Agent version 5.5 or later is required when using this module.

This document assumes that you are already familiar with Puppet. If you are not familiar with Puppet, refer to Puppet Course Catalog for different training options.

Module Description

This module bundles a set of Puppet Types, Providers and Classes along with sample manifests for effective network management. Several automated tests are included in the module for quick validation. The resources and capabilities provided by this module will grow with contributions from Cisco, Puppet Labs and the Open Source Community. Refer to the Resource Support Matrix for a list if currently supported Types and Providers.

This GitHub repository contains the latest version of the cisco_aci module source code. Supported versions of the cisco_aci module are available at Puppet Forge. Refer to SUPPORT.md for additional details.

Background

Cisco Application Centric Infrastructure

Cisco Application Centric Infrastructure (ACI) is an innovative architecture that radically simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cisco ACI uses a holistic systems-based approach, with tight integration between physical and virtual elements, an open ecosystem model, and innovation-spanning application-specific integrated circuits (ASICs), hardware, and software. This unique approach uses a common policy-based operating model across ACI-ready network, and security elements (computing, storage in future), overcoming IT silos and drastically reducing costs and complexity [source]. For additional details refer to the following [link].

Cisco Application Centric Policy Infrastructure Controller

The Cisco Application Policy Infrastructure Controller (APIC) is the main architectural component of the Cisco ACI solution. It is the unified point of automation and management for the Cisco ACI fabric, policy enforcement, and health monitoring. The Cisco APIC is a centralized clustered controller that optimizes performance, supports any application anywhere, and unifies operation of physical and virtual environments. The controller manages and operates a scalable multi-tenant Cisco ACI fabric. The Cisco APIC is responsible for tasks ranging from fabric activation, maintenance of switch firmware, network policy configuration and instantiation. Cisco APIC is completely removed from the data path. This means that the fabric can still forward traffic even when communication with the APIC is lost. The APIC itself is delivered as an appliance and will typically be run as three or more appliances for performance and availability [source].

Cisco Application Centric Infrastructure Controller REST API

The Application Policy Infrastructure Controller (APIC) REST API is a programmatic interface that uses REST architecture. The API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You can use any programming language to generate the messages and the JSON or XML documents that contain the API methods or Managed Object (MO) descriptions. Standard REST methods are supported on the API, which includes POST, GET, and DELETE operations through HTTP. The POST and DELETE methods are idempotent, meaning that there is no additional effect if they are called more than once with the same input parameters. The GET method is nullipotent, meaning that it can be called zero or more times without making any changes (or that it is a read-only operation). Payloads to and from the REST interface can be encapsulated through either XML or JSON encoding [source]. This Puppet Module uses the JSON encoding over the REST interface for provisioning the APIC. Individual Managed Objects are documented at the following [link].

Puppet Device

For devices such as the APIC that do not include an embedded Puppet Agent, Puppet provides the puppet device [link] command. This command requests certificates, collects facts, retrieves and applies catalogs, and stores reports for each device defined in device.conf [link]. This command can be executed manually or scheduled to run periodically. For additional details please refer to the corresponding documentation.

Solution Overview

Puppet requires the use of a proxy agent along with the puppet device command to provision devices where the Puppet Agent is not installed on the device. This solution follows the recommended approach and is illustrated in the following diagram.

1

Network Administrators follow the typical Puppet workflow to install the cisco_aci module on the Puppet Server and configure an agent (ex: a Linux or Windows system) to act as the proxy for the APIC. The configuration of the proxy agent includes running the Puppet Agent periodically. The Puppet Agent running on the proxy retrieves its catalog from the Puppet Server and synchronizes this module and its libraries as necessary. The Puppet Manifest for the proxy agent configures its device.conf file and schedules execution of the puppet device command.

The Puppet Manifest for the APIC includes the desired configuration generated by the Puppet Types and Classes included in the cisco_aci Module. The configuration of the proxy agent includes running the puppet device command periodically. When the puppet device command executes on the proxy agent, it requests the catalog for the APIC and executes the appropriate Puppet Providers. The Puppet Providers generate a JSON payload and send that payload to the APIC via its REST API.

2

Setup

Puppet Server

This document assumes that a Puppet Server has already been installed and configured properly. If a Puppet Server does not exist in your network please follow the guidelines from Puppet to set one up [Puppet Server Setup]

Install Puppet Module

Network administrators need to install the cisco_aci Puppet Module on the Puppet Server. For details on the installation of Puppet Modules on the Puppet Server please refer to the following documentation:[Puppet: Installing Modules].


# If you have an older module installed, you need to uninstall it.
puppet module uninstall cisco-cisco_aci --ignore-changes

# Install the new module from the Puppet Forge.
puppet module install cisco-cisco_aci

# Install the puppetlabs-device_manager module from the Puppet Forge.
puppet module install puppetlabs-device_manager

Please note that installation of the cisco_aci module will automatically install the puppetlabs-device_manager module from Puppet Forge as a dependency along with any modules that puppetlabs-device_manager depends on. For additional details on this module please refer to its documentation on the Puppet Forge [link]. That module automates the configuration of the device.conf file and provides an option to schedule execution of the puppet device command on the proxy agent.

Configure Puppet Manifest

Network administrators must define a Puppet Manifest which configures both the proxy agent and the APIC device. This manifest must define two nodes: one for the proxy agent and the other for the APIC device.

Configure Proxy Node in the Manifest

To configure the proxy agent, another Puppet Module will be used. For additional details on that module please refer to it's documentation [link].

# Example:
node 'proxy-agent.example.com' {
  device_manager {'apic.example.com':
    type             => 'apic',  # Specifies the type of the device in device.conf.
    url              => 'https://username:password@apic.example.com', # Specifies the URL of the device in device.conf.
    run_interval     =>  30,     # Execute `puppet device --target apic.example.com` every 30 minutes.
  }
}

This manifest will configure the device.conf on the proxy agent device (by default located in /etc/puppetlabs/puppet/) and is used by the puppet device command. Additionally, it will create a Cron or Scheduled Task resource to schedule the puppet device command to run at the specified interval.

Configure APIC Node in the Manifest

To provision the ACI Fabric via the APIC, network administrators can use the resource defined in the cisco_aci module and apply them to the APIC node from the manifest. Administrators can use the component Puppet Classes or Puppet Types to manage the resources on the APIC. Here is an example for configuring a tenant on the APIC. The first option uses a Puppet component class cisco_aci::classes::cisco_aci_fvtenant that is essentially a wrapper over the Puppet Type cisco_aci_fvtenant. The second example makes use of the Puppet Type directly.

# Example Option-1: Use Puppet component class
node 'apic.example.com' {
  class {"cisco_aci::classes::cisco_aci_fvtenant":
      fvtenant_ensure => 'present',
      fvtenant_name   => 'example_tenant',
      fvtenant_descr  => 'This is an example tenant',
   }
}
# Example Option-2: Use Puppet Type resource
node 'apic.example.com' {
  cisco_aci_fvtenant { "demo_cisco_aci_fvtenant":
      ensure => 'present',
      name   => 'example_tenant',
      descr  => 'This is an example tenant',
   }
}

Puppet Agent

Any Linux or Windows system with proper network connectivity to the Puppet Server and the APIC can function as the proxy agent. Please ensure that Puppet Agent version 5.5 or greater is already installed and configured on the node. After the installation of the Puppet Agent, the administrator can run the puppet agent command manually or periodically using the typical Puppet workflow.

When the Puppet Agent runs, it synchronizes modules and obtains the catalog for the proxy agent. It also uses the device_manager resource module to (i) configure device.conf and (ii) schedule execution of the puppet device command using a Linux Cron Job or Windows Scheduled Task. The puppet device command requests certificates, collect facts, retrieves catalogs, and stores reports on behalf of the APIC, and applies catalogs to provision the APIC.

Since puppet device is executed as a background task, it is detached from the standard output. Therefore you will not see any debug or error messages in the console window. To ensure that everything is setup correctly, it is advised to run the puppet device --verbose command manually at least once and address any errors.

When the Puppet Agent and the puppet device command are scheduled to run periodically, the administrator should configure a Puppet reporting service to the collect logs. To setup reporting for Puppet PE please refer to the following link. Open source Puppet users can refer to the appropriate guides to setup the reporting tool.

Please note that puppet device command manages the APIC and will not synchronize changes to modules on the Puppet Server with the proxy agent. Therefore, it is essential that puppet agent be scheduled to run periodically to synchronize changes to modules from the Puppet Server to the proxy agent.

Puppet Agent Authentication

No configuration of the APIC is necessary. Please follow the typical workflow for Puppet Agent authentication. For example, a network administrator may decide to explicitly sign each certificate request on the Puppet Server or decide to configure the Puppet Server to autosign certificate requests. For details on the certificate signing and configuration please refer to the Puppet documentation [link].

Please note that certificate requests from both the proxy agent and APIC must be signed (or autosigned).

# Example, on the Puppet Server, in /etc/puppetlabs/puppet/autosign.conf
*.example.com

Quick Start with aci_puppet_module

For this quick start guide assume the following:

  • Puppet Server: Hostname is puppet-server with DNS name puppet-server.example.com.
  • Puppet Proxy Agent Device: Hostname is proxy-agent with DNS name proxy-agent.example.com.
  • APIC Device: with DNS name apic.example.com.

On Puppet Server

  • Check Puppet version (minimum requirement: version 5.2 or later)
root@puppet-server:~ puppetserver --version
  • Install cisco_aci module
# Choose one of the following:
root@puppet-server:~ puppet module install cisco-cisco_aci #Install from Puppet Forge
# OR:
root@puppet-server:~ puppet module install /<path>/cisco-cisco_aci-<version>.tar.gz #From local tar

NOTE: This will automatically install any dependent modules.

  • (Optional) Restart Puppet Server
root@puppet-server:~ service puppetserver restart
  • Update the Puppet Manifest

Contents of /etc/puppetlabs/code/environments/production/manifests/site.pp

node 'proxy-agent.example.com' {
  include cisco_aci
  device_manager {'apic.example.com':
    type             => 'apic',  # Specifies the type of the device in device.conf.
    url              => 'https://username:password@apic.example.com', # Specifies the URL of the device in device.conf.
    run_interval     =>  30,     # Execute `puppet device --target apic.example.com` every 30 minutes.
  }
}
node 'apic.example.com' {
  cisco_aci_fvtenant {'test_tenant1':
    ensure => 'present',
    name   => 'test_tenant1',
    descr  => 'My test tenant',
  }
  cisco_aci_fvap { 'test_app1':
    ensure   => 'present',
    name     => 'test_app1',    # Instance Identifier
    fvtenant => 'test_tenant1', # Parent cisco_aci_fvtenant Identifier
    descr    => 'My test application profile tenant test_tenant1',
  }
  cisco_aci_fvaepg { 'test_epg1':
    ensure    => 'present',
    name      => 'test_epg1',    # Instance Identifier
    fvtenant  => 'test_tenant1', # Parent cisco_aci_fvtenant Identifier
    fvap      => 'test_app1',    # Parent cisco_aci_fvap Identifier
    descr     => 'My EPF test_epg1 in the application profile test_app1 in tenant test_tenant1',
  }
  cisco_aci_fvbd { 'test_bd1':
    ensure    => 'present',
    name      => 'test_bd1',     # Instance Identifier
    fvtenant  => 'test_tenant1', # Parent cisco_aci_fvtenant Identifier
    descr     => 'My bridge domain in tenant test_tenant1',
  }
  cisco_aci_fvctx { 'test_vrf1':
    ensure    => 'present',
    name      => 'test_vrf1',    # Instance Identifier
    fvtenant  => 'test_tenant1', # Parent cisco_aci_fvtenant Identifier
    descr     => 'My VRF context in tenant test_tenant1',
  }
  cisco_aci_fvsubnet { 'subnet1':
    ensure    => 'present',
    ip        => '20.20.20.1/24', # Instance Identifier
    fvtenant  => 'test_tenant1',  # Parent cisco_aci_fvtenant Identifier
    fvbd      => 'test_bd1',      # Parent cisco_aci_fvbd Identifier
    descr     => 'My subnet subnet1 in bridge domain test_bd1 in tenant test_tenant1',
  }
  cisco_aci_vzbrcp { 'test_contract1':
    ensure    => 'present',
    name      => 'test_contract1', # Instance Identifier
    fvtenant  => 'test_tenant1',   # Parent cisco_aci_fvtenant Identifier
    descr     => 'My contract test_contract1 on my tenant test_tenant1',
  }
  cisco_aci_vzfilter { 'test_filter1':
    ensure    => 'present',
    name      => 'test_filter1', # Instance Identifier
    fvtenant  => 'test_tenant1', # Parent cisco_aci_fvtenant Identifier
    descr     => 'My filter test_filter1',
  }
  cisco_aci_vzsubj { 'test_subject1':
    ensure    => 'present',
    name      => 'test_subject1',  # Instance Identifier
    fvtenant  => 'test_tenant1',   # Parent cisco_aci_fvtenant Identifier
    vzbrcp    => 'test_contract1', # Parent cisco_aci_vzbrcp Identifier
    descr     => 'My subject test_subject1 for contract test_contract1 in tenant test_tenant1',
  }
  cisco_aci_vzentry { 'test_filter_entry1':
    ensure    => 'present',
    name      => 'test_filter_entry1', # Instance Identifier
    fvtenant  => 'test_tenant1',       # Parent cisco_aci_fvtenant Identifier
    vzfilter  => 'test_filter1',       # Parent cisco_aci_vzfilter Identifier
    descr     => 'My filter entry test_filter_entry1 for filter test_filter1 in tenant test_tenant1',
  }
  # Explicitly declare resources relationships.
  Cisco_aci_fvtenant['test_tenant1'] ->
  Cisco_aci_fvap['test_app1'] ->
  Cisco_aci_fvaepg['test_epg1'] ->
  Cisco_aci_fvbd['test_bd1'] ->
  Cisco_aci_fvctx['test_vrf1'] ->
  Cisco_aci_fvsubnet['subnet1'] ->
  Cisco_aci_vzbrcp['test_contract1'] ->
  Cisco_aci_vzfilter['test_filter1'] ->
  Cisco_aci_vzsubj['test_subject1'] ->
  Cisco_aci_vzentry['test_filter_entry1']
}
  • (optional) Ensure that Agents are authorized
# If using autosign, ensure that /etc/puppetlabs/puppet/autosign.conf contains the following.
*.example.com

On Puppet Proxy Agent Device Execution

  • Check Puppet version (minimum requirement: version 5.5 or later)
root@proxy-agent:~ puppet --version
  • Configure the /etc/puppetlabs/puppet/puppet.conf with the puppet server information.
[main]
  server = puppet-server.example.com
  • Run Puppet Agent
root@proxy-agent:~ puppet agent -t
  • Run puppet device
root@proxy-agent:~ puppet device --debug --trace
  • (optional) Run puppet device --target
root@proxy-agent:~ puppet device --debug --trace --target apic.example.com

On Puppet Proxy Agent Device Validation

  • Check configuration using the puppet device --resource command.
root@proxy-agent:~# puppet device --verbose --target apic.example.com --resource cisco_aci_fvtenant

NOTE: The current implementation of puppet device --resource does not display the parent namevar identifiers.

  • Check configuration using APIC GUI Login to the APIC GUI to validate the configuration provisioned by Puppet. For convenience, the provider for this module generates a Puppet Notice log message with the URL corresponding to the APIC GUI. The reference section of this document captures the URL format for offline reference.
# Example output
Notice: Cisco_aci_fvaepg[test_epg1](provider=cisco_aci): APIC GUI URI for provisioned resource https://apic.example.com/#bTenants:test_tenant1|uni/tn-test_tenant1/ap-test_app1/epg-[test_epg1]

Known Limitation: Notice messages are visible when executing the puppet device command directly. User will need to make use of a Puppet reporting tool.

Usage

Using Puppet Resource Types

The ACI fabric represents the physical and logical components as a Management Information Model (MIM), in a hierarchical management information tree (MIT). The information model is stored and managed by processes that run on the APIC. Each node in the tree represents a managed object (MO) or group of objects. MOs are abstractions of fabric resources. An MO can represent a concrete object, such as a switch, adapter, or a logical object, such as an application profile, endpoint group, or fault (for additional details refer to ACI Policy Model)

This Puppet Module defines several Puppet Resource Types that correspond to several key configurable ACI Managed Objects exported by the APIC. Future versions of this module will be enhanced to add (i) additional attributes to Type and (ii) new Types on an as need basis. Note that Puppet is a configuration management tool therefore, this module will not attempt to add Puppet representation of non-configurable entities.

Puppet Type and Properties Naming Scheme

To keep the provisioning model predictable, this Puppet module derives the name of the Type and associated properties from the corresponding Managed Object. This approach removes the need for a decoder ring making the module easy to debug. The identifier for the Managed Object is defined as a Puppet namevar. Additional Puppet namevars are defined to capture the identity of the parent Puppet Types. The following diagram illustrates the naming scheme.

3

Puppet Type dependency and Management Information Tree

Since the APIC organizes the Managed Objects in a tree structure, there are relationship dependencies between the corresponding Puppet Types. The dependencies between the types are documented at type-dependency-tree.md. The dependancies among the resources used in the manifest can be enforced using the Puppet chaining arrow model described in the following document [link].

To keep the provisioning simple, the resource types defined in this module require administrators to explicitly specify the values for the namevars (keys), instead of depending on the title patterns. The namevars associated with a Type can be grouped into two categories:

Category 1: namevar that identifies the parent resource type instance. Category 2: namevar that identifies the resource type being configured.

We recommend that the title pattern be set using the same value as the namevar that identifies the resource type being configured. Following diagram illustrates the concept.

4

Puppet Provider to APIC Inter Working

Puppet Providers in this module make use of several helper libraries to transform the user's intent from Puppet's DSL to JSON payload based on APIC REST API rules. The JSON REST request is then forwarded to a vendor specific implementation of Puppet's NetworkDevice class (called 'apic'). Following diagram illustrates the approach.

4

Puppet Types in this module define Puppet attributes using Puppet DSL. The corresponding providers maintain the knowledge of both Puppet attributes and their mapping to ACI Managed Objects. The Puppet Providers in this module use a Ruby library to transform the Puppet operations into APIC REST API actions. The library uses the Puppet attribute to Managed Object mapping information in the Providers to build proper URLs and REST API payload in JSON format. It also maintains logic to extract data from APIC responses and populate the Puppet attributes. Aforementioned provider library invokes GET, POST and DELETE operation on the Apic Network Device. This device is Ruby child class of Puppet::Util::NetworkDevice and primarily serves as plug-in in to Puppet's device infrastructure. The Apic Network Device forwards requests to a Ruby library that implements the APIC REST API client logic. Following diagram illustrates the overall control flow.

5

Using Puppet Component Classes

For convenience this module includes Puppet component classes that wrap around the Puppet Types supported by the module. These parameterized classes can be used as reference for defining Puppet Classes for specific use cases. Puppet Classes are singletons that may not be useful for all use cases; this module makes use of these classes for automated testing. The dependency between the classes are same as the corresponding Puppet Types [type-dependency-tree.md].

These classes expose each Puppet Type attribute as a class parameter. Each class supports two additional optional parameters: override_ensure, override_descr. These optional parameters are primarily used for automated testing across a large number of classes.

One special Puppet class 'cisco_aci_all' is included among the classes [link]. This class makes use of all the Puppet Classes (except cisco_aci_rest) and is primarily used for demonstration.

Using Custom Facts

This module exports several custom facts containing ACI Fabric Member information that can be leveraged within the Puppet Manifest. The facts are collected using a DHCP client query sent to the APIC where the selection criteria specifies nodes that have a role of leaf or spine.

These custom facts can be accessed from within the Puppet Manifest using the typical Puppet workflow (https://puppet.com/docs/puppet/5.5/lang_facts_and_builtin_vars.html#the-factsfactname-hash).

Example:

if ${facts['aci_fabric_members'][0]['SAL1814PTC6']['nodeRole'] == 'leaf' {
  # Perform Action
}

The $facts['aci_fabric_members'][0] is an array of nested Ruby hashes, where the serial number associated with fabric members are defined as keys and the value is a hash of different attributes related to the member. For example, $facts['aci_fabric_members'][0]['SAL1814PTC6'] is a hash with key-value pairs that describe properties of the fabric member SAL1814PTC6.

The following table describes facts that are collected for each ACI Fabric Member.

Fact             Description                            
capabilities Fabric Member Capabilities
fabricId Fabric Identifier
id Serial Number
ip Node IP Address
model Fabric Member Model Number
name Node Name
nameAlias Node Name Alias
nodeId Node Identifier
nodeRole Fabric Node Role
podId Fabric Pod Identifier
runningVer Firmware Version
status Fabric Member Status
supported Node Model Support Indication

An additional set of custom ruby functions is also provided that can be used to easily access the following information and act as examples for creating new custom functions if needed.

  • Custom Function cisco_aci::facts::fabric_member_get('count')
    • Returns the total number of ACI Fabric members
  • Custom Function cisco_aci::facts::fabric_member_get('ids')
    • Returns an Array of ACI Fabric Member IDs
  • Custom Function cisco_aci::facts::fabric_member_get('all')
    • Returns complete Hash of all fabric member hashes.
  • Custom Function cisco_aci::facts::fabric_member_get({"SAL1814PTC6"=>"model"})
    • Returns model number for fabric member SAL1814PTC6.
    • The value can be any data key that is available for fabric member SAL1814PTC6
  • Custom Function cisco_aci::facts::fabric_member_get({"SAL1814PTC6"=>"all"})
    • Returns all Hash data for fabric member SAL1814PTC6.

A sample manifiest is provided with examples detailing function usage.

Here is the output that is generated when running the sample manifest.

[puppetserver] Scope(Class[Cisco_aci::Facts]) Number of ACI Fabric Members: 5
[puppetserver] Scope(Class[Cisco_aci::Facts]) ACI Fabric Members: [SAL1814PTC6, SAL1934MR08, SAL1815Q7ZT, SAL2014N5TK, SAL2004XMKM]
[puppetserver] Scope(Class[Cisco_aci::Facts]) Model number for SAL1814PTC6, N9K-C9396PX
[puppetserver] Scope(Class[Cisco_aci::Facts]) Model number for SAL1934MR08, N9K-C9372PX
[puppetserver] Scope(Class[Cisco_aci::Facts]) Model number for SAL1815Q7ZT, N9K-C9396PX
[puppetserver] Scope(Class[Cisco_aci::Facts]) Model number for SAL2014N5TK, N9K-C9336PQ
[puppetserver] Scope(Class[Cisco_aci::Facts]) Model number for SAL2004XMKM, N9K-C9336PQ
[puppetserver] Scope(Class[Cisco_aci::Facts]) ACI Fabric Member Data for Member: SAL1814PTC6
[puppetserver] Scope(Class[Cisco_aci::Facts])
  {
  "capabilities": "multi-pod-bringup",
  "fabricId": "1",
  "id": "SAL1814PTC6",
  "ip": "10.0.64.91/32",
  "model": "N9K-C9396PX",
  "name": "Leaf3",
  "nameAlias": "",
  "nodeId": "103",
  "nodeRole": "leaf",
  "podId": "1",
  "runningVer": "n9000-13.0(1k)",
  "status": "",
  "supported": "yes"
}

Using Examples

Resource Based Manifest

This module includes sample Puppet Manifest fragments that configure different Puppet Types [/examples/demo_resource_data/]. To use one of the examples, please copy and paste the desired fragments into the proper location in your site.pp manifest file. When a resource type requires parents, please ensure that you are copying the corresponding samples to the right place in the hierarchy.

# Proxy Agent Node Setup
node 'proxy-agent.example.com' {
  device_manager {'apic.example.com':
    type             => 'apic',  # Specifies the type of the device in device.conf.
    url              => 'https://username:password@apic.example.com', # Specifies the URL of the device in device.conf.
    run_interval     =>  30,     # Execute `puppet device --target apic.example.com` every 30 minutes.
  }
}
# APIC Device Configuration

#Modify the APIC node specification in the site.pp to add bridge domain example
#Copy the content from
#1. <module top>/examples/demo_resource_data/cisco_aci_fvtenant_demo_resource_data.pp
#2. <module top>/examples/demo_resource_data/cisco_aci_fvbd_demo_resource_data.pp
node 'apic.example.com' {
  #
  #Demo Resource data for resource cisco_aci_fvtenant
  #
  cisco_aci_fvtenant { "test_tenant1":
    ensure => "present",
    name => "test_tenant1", #Instance Identifier
    descr => "My test tenant",
    name_alias => "test_tenant_1",
    owner_key => "admin_cisco",
    owner_tag => "cisco",
  }
  #
  #Demo Resource data for resource cisco_aci_fvbd
  #
  cisco_aci_fvbd { "test_bd1":
    ensure => "present",
    name => "test_bd1", #Instance Identifier
    fvtenant => "test_tenant1", #Parent cisco_aci_fvtenant Identifier
    arp_flood => "yes",
    descr => "My bridge domain in tenant test_tenant1",
    ep_clear => "no",
    ep_move_detect_mode => "",
    intersite_bum_traffic_allow => "no",
    intersite_l2_stretch => "no",
    ip_learning => "yes",
    limit_ip_learn_to_subnets => "yes",
    ll_addr => "::",
    mac => "00:22:BD:F8:19:FF",
    mcast_allow => "yes",
    multi_dst_pkt_act => "encap-flood",
    name_alias => "test_bd_1",
    optimize_wan_bandwidth => "no",
    owner_key => "admin_cisco",
    owner_tag => "cisco",
    type => "regular",
    unicast_route => "yes",
    unk_mac_ucast_act => "proxy",
    unk_mcast_act => "opt-flood",
    vmac => "not-applicable",
  }

  # Explicitly declare resources relationships. Refer to
  #<module top>/docs/type-dependency-tree.md for hierarchy
  Cisco_aci_fvtenant['test_tenant1'] ->
  Cisco_aci_fvbd['test_bd1']
}

Hiera Driven Class Based Manifest

A sample Puppet Manifest that uses all the Puppet classes in the module is located at: /examples/demoall_manifest_hieradriven.pp.

This sample manifest makes use of Puppets built-in key-value configuration data lookup system called Hiera to drive the manifest.

The corresponding Hiera datafile is located at demo_hiera_data.yaml.

To make use of this sample manifest, please follow these steps.

  • [Puppet Server puppet-server.example.com] Configure the /etc/puppetlabs/puppet/hiera.yaml file.

    ---
    :backends:
      - yaml
    :yaml:
      :datadir: "/etc/puppetlabs/code/environments/%{::environment}/hieradata"
    :hierarchy:
      - "nodes/%{::trusted.certname}"
      - "virtual/%{::virtual}"
      - "common"
    
  • [Puppet Server puppet-server.example.com] Copy the demo_hiera_data.yaml to proper location in the hiera data hierarchy.

    root@puppet-server:~ cp examples/demo_hiera_data.yaml /etc/puppetlabs/code/environments/production/hieradata/common.yaml
    
    # Note, your location might differ but this is provided as a working example.
    
  • [Puppet Server puppet-server.example.com] Copy demoall_manifest_hieradata.pp to the site.pp on Puppet Manifest for the node and modify FQDN for the nodes.

    root@puppet-server:~ cp examples/demoall_manifest_hieradriven.pp /etc/puppetlabs/code/environments/production/manifests/site.pp
    
    # Note, your location might differ but this is provided as a working example.
    

Troubleshooting

The focus of this section is to present a high level approach to narrow down issues encountered during the usage of this module. Issues can be broadly categorized into five different buckets: (i) Issues during setup (ii) Issues during execution of puppet agent (iii) Issues during execution of puppet device (iv) Issues during the usage of the cisco_aci module and (v) Issues originating from APIC.

6

(0) Issues during setup

cisco_aci Module Installation

By default, the puppet module install command attempts to fetch modules from Puppet Forge. If the puppet server sits behind a firewall, network administrators must either enable external network access or place the module in an accessible location within the firewall boundary. Refer to the puppet module install documentation for additional details.

(1) Issues during execution of puppet agent

When administrators run puppet agent -t on the Linux server hosting the proxy agent, Puppet Agent exchanges certificates with the server, plugin syncs Puppet modules installed on the Puppet Server and fetches the catalog for the Linux server. This is a typical Puppet Server and Puppet Agent interaction. Follow the standard Puppet troubleshooting techniques to isolate the issue [Puppet Troubleshooting]. Few quick tips are listed below.

  • Ensure that the time between the server hosting Puppet Server and the Linux server hosting the Proxy Puppet Agent are synchronized
  • Ensure that the certificate exchange between the server and agent is successful.
    • puppet agent --debug --trace generates message that can help with troubleshooting
    • Executing puppet cert list on Puppet Server should list the FQDN associated with the Linux server (hosting proxy agent)
    • Examine the puppetserver-access.log and puppetserver.log on Puppet Server (default location: /var/log/puppetlabs/puppetserver)
    • Ensure the Puppet manifest on Puppet Server contains an entry for the Linux node serving as the proxy node.
    • If the optional module (puppetlabs-device_manager)to help with management of device.conf for puppet device is used, it should create the configuration file in the /etc/puppetlabs/puppet directory. Ensure that this file has the desired configuration.

(2) Issues during execution of puppet device

When the puppet device command is executed manually or periodically, it exchanges certificates with the server on behalf of APIC and fetches the catalog for the APIC node. This is a typical Puppet Server and Puppet Agent interaction. Follow the standard Puppet troubleshooting techniques to isolate the issue [Puppet Troubleshooting]. For troubleshooting details on the puppet device command refer to the corresponding document. A few quick tips are listed below.

  • Ensure that the certificate exchange between the server and agent is successful.
    • puppet device --debug --trace generates message that can help with troubleshooting
    • Executing puppet cert list on Puppet Server should list the FQDN associated with the APIC in addition to the FQDN of the Linux server hosting the Proxy Agent
    • Examine the puppetserver-access.log and puppetserver.log on Puppet Server (default location: /var/log/puppetlabs/puppetserver)
    • Ensure the Puppet manifest on Puppet Server contains an entry for the APIC node.
Failures during compilation of Puppet Manifest
When the `puppet device` command is executed it starts processing the catalog for the APIC node from `Puppet Server`. During this process, the `Puppet Server` compiles the administrator created Puppet manifest. If there are failures during the compilation, Puppet will generate appropriate error messages. When `puppet device` runs in background it will be difficult to see the messages, unless a Puppet reporting tool is used. Here is a quick tip:
  * Run `puppet device` manually on the Linux server acting as the `Proxy Agent` (`puppet device --debug --trace`). Examine the outputs on the console and on the `Puppet Server`
  * Use Puppet Notice and Notify tools add debugging hooks in the manifest
Failures during the Fact from APIC
Before processing the user intent from catalog, it will fetch Puppet Facts from APIC. When Puppet requests facts from APIC, it uses service provided by the `cisco_aci` module. To interact with the APIC, `cisco_aci` module performs authentication using the username and password specified in the `device.conf`. If the manual execution of `puppet device` command generates error messages related to authentication, following aspects should be examined.
  * Network connectivity between the Liux server and APIC
  * username and password specified in the `device.conf`. If the optional puppetlabs-device_manager  module is used to create the configuration file, verify the Puppet manifest. If a manually created `device.conf` is used, ensure that the URL specified is correct.
  * Check log message on APIC

(3) Issues during the usage of the cisco_aci module

When puppet device starts processing catalog it uses cisco_aci module to provision APIC. This operation can fail because of syntactic or semantic errors in the resource specification the Puppet manifest. Few tips to isolate such issues are presented below.

  • Execute puppet device --debug --trace to obtain the error messages.
    • Look for syntactic errors in the Puppet manifest
    • Examine the Type documentation to ensure that required namevars and properties
    • Ensure that each resources provides keys (namevars) for the instance and its parents types. Type documentation clearly identifies the instance identifiers along with namevars that take the identity of the parent types. Demo manifest provides examples configuration for each supported types.
    • Ensure that the manifest uses the typical Puppet chaining approach to declare dependency between the types. Refer to sample manifests and dependency tree in the documentation directory.
    • Ensure that each properties associated with each type are providing proper values. The documentation associated with properties in a Puppet Type contains a URL. This URL points to the corresponding APIC Managed object, which explicitly states the value type and range associated with the property.
Enabling Debugging
  • To enable debugging at the Puppet Agent or puppet device level pass in the --debug flag to the respective commands. This flag will generate a lot of debug level message on the stdout. If --trace flag is added to aforementioned debug flag, debug output will contain code trace that can help developers isolate issues quicker. For additional details refer to the appropriate documentation from Puppet Labs.

    #Enable debug and trace for puppet agent
    puppet agent --debug --trace
    #Enable debug and trace for puppet device
    puppet device --debug --trace
    

    Debug output from the puppet device command execution will be displayed to the console window. The debug option in the device.conf is optional and generates additional debugging output related to the HTTP requests. For additional details on the puppet device command, refer to the puppet documentation .

  • If there is a need to debug the issue at a deeper level, another debug option can be enabled to dump the HTTP message exchange between the puppet device and APIC. To enable this message level debugging, set the debug option in the device.conf file. The change can be enabled by (i) manually editing the device.conf file on the Linux server serving as the Proxy Agent or (ii) specifying the debug option using puppetlabs-device_manager module on the Puppet Server.

    • Manually edit device.conf to enable HTTP packet level debug
    # Manually adding the debug option to the device.conf on the Linux server acting as the Proxy Agent
    # If the administrator used the puppetlabs-device_manager the file will be located in the /etc/puppetlabs/puppet directory
    [apic.example.com]
    type apic
    url https://username:password@apic.example.com/
    debug
    
    • Use Puppet Manifest to enable HTTP packet level debug
    # This option requires administrator to execute `puppet agent -t` on the Linux server serving as the proxy agent
    node 'proxy-agent.example.com' {
      device_manager {'apic.example.com':
        #... Existing configuration
        debug            => True,  #Enabled # DEBUG:     
      }
    }
    
Manual Execution of puppet device
In a typical deployment scenario, the `puppet device` command will be scheduled to run periodically on the proxy agent. To diagnose issues with the module, administrators can manually execute the `puppet device` command on the proxy agent against a locally available `device.conf` with debugging enabled.

```bash
# Example: device.conf
[apic.example.com]
type apic
url https://username:password@apic.example.com/
debug
```

```bash
puppet device --debug --trace --verbose --deviceconfig ./device.conf
```
Examine Debugging Messages

The first step to diagnose issues with the module is to examine the log messages generated during the agent execution. The log messages generated by the cisco_aci module can be retrieved from the typical location (#https://puppet.com/docs/puppet/5.5/services_agent_unix.html#logging-for-puppet-agent-on-nix-systems). For administrator convenience, this module generates a Puppet Notice message each time a Puppet resource is provisioned. One of the Notice messages will include the APIC URL for easy reference.

7 8

Examine Exceptions from APIC

When the cisco_aci module encounters error responses from the APIC, it generates two types of exceptions (with detailed error codes): ApicAuthenticationError and ApicErrorResponse.

The first exception is related to authentication issues between the puppet device and the APIC. When you encounter this exception, ensure that user credentials provided in the manifest (which configures device.conf) are valid.

The second exception is generated when the APIC encounters errors while processing the provisioning request. Commonly these types of errors result from specifying incorrect values in the Puppet Manifest. Verify the manifest to ensure that (i) parent Puppet Types are already configured, and (ii) property values specified for a Puppet Type are correct. For details on property value constraints, refer to the corresponding MO documentation

(4) APIC Issues

The cisco_aci module transforms user intent from Puppet's DSL to REST API exposed by the APIC. For troubleshooting issues with the APIC refer to the APIC Troubleshooting Guide.

Limitations

This Puppet Module requires a Puppet Agent version 5.5 or later. A Puppet Server version 5.3 or later is recommended. This module has been tested with APIC running 3.3.1

Reference

Puppet Types supported by this module correspond to ACI Managed Objects. Documentation for the types are derived from the corresponding Managed documentation available at the following URL. For the most up-to-date information please refer to the aforementioned URL.

Cisco ACI Resource Type Catalog

*cisco_aci_fvaepg

*cisco_aci_fvap

*cisco_aci_fvbd

*cisco_aci_fvctx

*cisco_aci_fvsubnet

*cisco_aci_fvtenant

*cisco_aci_rest

*cisco_aci_vzbrcp

*cisco_aci_vzentry

*cisco_aci_vzfilter

*cisco_aci_vzsubj

Type: cisco_aci_fvaepg

A set of requirements for the application-level EPG instance. The policy regulates connectivity and visibility among the end points within the scope of the policy.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_fvaepg
#
cisco_aci_fvaepg { 'test_epg1':
  ensure             => 'present',
  name               => 'test_epg1', #Instance Identifier
  fvtenant           => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  fvap               => 'test_app1', #Parent cisco_aci_fvap Identifier
  descr              => 'My EPF test_epg1 in the application profile test_app1 in tenant test_tenant1',
  fwd_ctrl           => 'proxy-arp',
  is_attr_based_e_pg => 'no',
  match_t            => 'AtmostOne',
  name_alias         => 'test_epg_1',
  pc_enf_pref        => 'enforced',
  pref_gr_memb       => 'include',
  prio               => 'level2',
}

Parameters

name

The name for the endpoint group.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

fvap

Parent cisco_aci_fvap instance Identifier"

Properties

descr

Specifies the description of a policy component.

For supported values for this parameter please refer to the following link

fwd_ctrl

Forwarding Control.

For supported values for this parameter please refer to the following link

is_attr_based_e_pg

Specify if EPG is attribute based.

For supported values for this parameter please refer to the following link

match_t

The provider label match criteria.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

pc_enf_pref

The preferred policy control.

For supported values for this parameter please refer to the following link

pref_gr_memb

Represents parameter used to determine if EPg is part of a group that does not a contract for communication.

For supported values for this parameter please refer to the following link

prio

The QoS priority class identifier.

For supported values for this parameter please refer to the following link

Type: cisco_aci_fvap

The application profile is a set of requirements that an application instance has on the virtualizable fabric. The policy regulates connectivity and visibility among endpoints within the scope of the policy.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_fvap
#
cisco_aci_fvap { 'test_app1':
  ensure     => 'present',
  name       => 'test_app1', #Instance Identifier
  fvtenant   => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  descr      => 'My test application profile tenant test_tenant1',
  name_alias => 'test_app_1',
  owner_key  => 'admin_cisco',
  owner_tag  => 'cisco',
  prio       => 'level3',
}

Parameters

name

The name of the application profile.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

Properties

descr

Specifies a description of the policy definition root.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

owner_key

The key for enabling clients to own their data for entity correlation.

For supported values for this parameter please refer to the following link

owner_tag

A tag for enabling clients to add their own data. For example, to indicate who created this object.

For supported values for this parameter please refer to the following link

prio

The priority class identifier.

For supported values for this parameter please refer to the following link

Type: cisco_aci_fvbd

A bridge domain is a unique layer 2 forwarding domain that contains one or more subnets. Each bridge domain must be linked to a context.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_fvbd
#
cisco_aci_fvbd { 'test_bd1':
  ensure                      => 'present',
  name                        => 'test_bd1', #Instance Identifier
  fvtenant                    => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  arp_flood                   => 'yes',
  descr                       => 'My bridge domain in tenant test_tenant1',
  ep_clear                    => 'no',
  ep_move_detect_mode         => '',
  intersite_bum_traffic_allow => 'no',
  intersite_l2_stretch        => 'no',
  ip_learning                 => 'yes',
  limit_ip_learn_to_subnets   => 'yes',
  ll_addr                     => '::',
  mac                         => '00:22:BD:F8:19:FF',
  mcast_allow                 => 'yes',
  multi_dst_pkt_act           => 'encap-flood',
  name_alias                  => 'test_bd_1',
  optimize_wan_bandwidth      => 'no',
  owner_key                   => 'admin_cisco',
  owner_tag                   => 'cisco',
  type                        => 'regular',
  unicast_route               => 'yes',
  unk_mac_ucast_act           => 'proxy',
  unk_mcast_act               => 'opt-flood',
  vmac                        => 'not-applicable',
}

Parameters

name

The bridge domain name.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

Properties

arp_flood

A property to specify whether ARP flooding is enabled. If flooding is disabled, unicast routing will be performed on the target IP address.

For supported values for this parameter please refer to the following link

descr

Specifies a description of the policy definition root.

For supported values for this parameter please refer to the following link

ep_clear

Represents the parameter used by the node (i.e. Leaf) to clear all EPs in all leaves for this BD.

For supported values for this parameter please refer to the following link

ep_move_detect_mode

The End Point move detection option uses the Gratuitous Address Resolution Protocol (GARP). A gratuitous ARP is an ARP broadcast-type of packet that is used to verify that no other device on the network has the same IP address as the sending device.

For supported values for this parameter please refer to the following link

intersite_bum_traffic_allow

Control whether BUM traffic is allowed between sites.

For supported values for this parameter please refer to the following link

intersite_l2_stretch

l2Stretch flag is enabled between sites.

For supported values for this parameter please refer to the following link

ip_learning

Specify if IP learning should be enabled.

For supported values for this parameter please refer to the following link

limit_ip_learn_to_subnets

Limits IP address learning to the bridge domain subnets only. Every BD can have multiple subnets associated with it. By default, all IPs are learned.

For supported values for this parameter please refer to the following link

ll_addr

The override of the system generated IPv6 link-local address.

For supported values for this parameter please refer to the following link

mac

The MAC address of the bridge domain (BD) or switched virtual interface (SVI). Every BD by default takes the fabric wide default mac address. If user wants then he can override that address and with a different one By default the BD will take a 00:22:BD:F8:19:FF mac address.

For supported values for this parameter please refer to the following link

mcast_allow

Multicast. Flag to indicate if multicast is enabled.

For supported values for this parameter please refer to the following link

multi_dst_pkt_act

The multiple destination forwarding method for L2 Multicast, Broadcast, and Link Layer traffic types.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

optimize_wan_bandwidth

OptimizeWanBandwidth flag is enabled between sites.

For supported values for this parameter please refer to the following link

owner_key

The key for enabling clients to own their data for entity correlation.

For supported values for this parameter please refer to the following link

owner_tag

A tag for enabling clients to add their own data. For example, to indicate who created this object.

For supported values for this parameter please refer to the following link

type

The specific type of the object or component.

For supported values for this parameter please refer to the following link

unicast_route

The forwarding method based on predefined forwarding criteria (IP or MAC address).

For supported values for this parameter please refer to the following link

unk_mac_ucast_act

The forwarding method for unknown layer 2 destinations.

For supported values for this parameter please refer to the following link

unk_mcast_act

The parameter used by the node (i.e. a leaf) for forwarding data for an unknown multicast destination.

For supported values for this parameter please refer to the following link

vmac

Virtual MAC address of the BD/SVI. This is used when the BD is extended to multiple sites using l2 Outside.

For supported values for this parameter please refer to the following link

Type: cisco_aci_fvctx

The private layer 3 network context that belongs to a specific tenant or is shared.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_fvctx
#
cisco_aci_fvctx { 'test_vrf1':
  ensure             => 'present',
  name               => 'test_vrf1', #Instance Identifier
  fvtenant           => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  bd_enforced_enable => 'no',
  descr              => 'My VRF context in tenant test_tenant1',
  knw_mcast_act      => 'permit',
  name_alias         => 'test_vrf_1',
  owner_key          => 'admin_cisco',
  owner_tag          => 'cisco',
  pc_enf_dir         => 'egress',
  pc_enf_pref        => 'unenforced',
}

Parameters

name

A name for the network context.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

Properties

bd_enforced_enable

BD Enforced Flag.

For supported values for this parameter please refer to the following link

descr

Specifies a description of the policy definition root.

For supported values for this parameter please refer to the following link

knw_mcast_act

Specify knwMcastAct.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

owner_key

The key for enabling clients to own their data for entity correlation.

For supported values for this parameter please refer to the following link

owner_tag

A tag for enabling clients to add their own data. For example, to indicate who created this object.

For supported values for this parameter please refer to the following link

pc_enf_dir

Policy Control Enforcement Direction. It is used for defining policy enforcemnt direction for the traffic coming to or from an L3Out. Egress and Ingress directions are wrt L3Out. Default will be Ingress. But on the existing L3Outs during upgrade it will get set to Egress so that right after upgrade behavior doesnt change for them. This also means that there is no special upgrade sequence needed for upgrading to the release introducing this feature. After upgrade user would have to change the property value to Ingress. Once changed, system will reprogram the rules and prefix entry. Rules will get removed from the egress leaf and will get insatlled on the ingress leaf. Actrl prefix entry, if not already, will get installed on the ingress leaf. This feature will be ignored for the following cases 1. Golf Gets applied at Ingress by design. 2. Transit Rules get applied at Ingress by design. 4. vzAny 5. Taboo

For supported values for this parameter please refer to the following link

pc_enf_pref

The Policy Control Enforcement preference.

For supported values for this parameter please refer to the following link

Type: cisco_aci_fvsubnet

A subnet defines the IP address range that can be used within the bridge domain. While a context defines a unique layer 3 space, that space can consist of multiple subnets. These subnets are defined per bridge domain. A bridge domain can contain multiple subnets, but a subnet is contained within a single bridge domain.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_fvsubnet
#
cisco_aci_fvsubnet { '20.20.20.1/24':
  ensure     => 'present',
  ip         => '20.20.20.1/24', #Instance Identifier
  fvtenant   => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  fvbd       => 'test_bd1', #Parent cisco_aci_fvbd Identifier
  ctrl       => 'nd,no-default-gateway,querier',
  descr      => 'My subnet subnet1 in bridge domain test_bd1 in tenant test_tenant1',
  name       => 'subnet1',
  name_alias => 'subnet_1',
  preferred  => 'yes',
  scope      => 'private,shared',
  virtual    => 'yes',
}

Parameters

ip

The IP address and mask of the default gateway.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

fvbd

Parent cisco_aci_fvbd instance Identifier"

Properties

ctrl

The subnet control state. The control can be specific protocols applied to the subnet such as IGMP Snooping.

For supported values for this parameter please refer to the following link

descr

Specifies the description of a policy component.

For supported values for this parameter please refer to the following link

name

The subnet name.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

preferred

Indicates if the subnet is preferred (primary) over the available alternatives. Only one preferred subnet is allowed.

For supported values for this parameter please refer to the following link

scope

The network visibility of the subnet.

For supported values for this parameter please refer to the following link

virtual

Treated as virtual IP address. Used in case of BD extended to multiple sites.

For supported values for this parameter please refer to the following link

Type: cisco_aci_fvtenant

A policy owner in the virtual fabric. A tenant can be either a private or a shared entity. For example, you can create a tenant with contexts and bridge domains shared by other tenants. A shared type of tenant is typically named common, default, or infra.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_fvtenant
#
cisco_aci_fvtenant { 'test_tenant1':
  ensure     => 'present',
  name       => 'test_tenant1', #Instance Identifier
  descr      => 'My test tenant',
  name_alias => 'test_tenant_1',
  owner_key  => 'admin_cisco',
  owner_tag  => 'cisco',
}

Parameters

name

The name of the tenant.

For supported values for this parameter please refer to the following link

Properties

descr

The description of the tenant.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

owner_key

The key for enabling clients to own their data for entity correlation.

For supported values for this parameter please refer to the following link

owner_tag

A tag for enabling clients to add their own data. For example, to indicate who created this object.

For supported values for this parameter please refer to the following link

Type: cisco_aci_rest

Configures ACI using REST APIs

Example Usage

  #
  #Demo Resource data for resource cisco_aci_rest
  #
  cisco_aci_rest {'configure_tenant':
    http_request_type => post,
    resource_uri      => '/api/mo/uni.json',
    http_request_body => '{
      "fvTenant": {
        "attributes": {
           "name": "puppet_test"
        }
      }
    }',
  }

Parameters

name

Name of the cisco_aci_rest resource

Properties

resource_uri

URI being used to execute API calls. Only JSON format is supported. Eg: '/api/mo/uni.json'

http_request_body

Configuration of the ACI MO in json format.

  {
    "fvTenant": {
      "attributes": {
        "name": "puppet_test"
      }
    }
  }

Type: cisco_aci_vzbrcp

A contract is a logical container for the subjects which relate to the filters that govern the rules for communication between endpoint groups (EPGs). Without a contract, the default forwarding policy is to not allow any communication between EPGs but all communication within an EPG is allowed.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_vzbrcp
#
cisco_aci_vzbrcp { 'test_contract1':
  ensure      => 'present',
  name        => 'test_contract1', #Instance Identifier
  fvtenant    => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  descr       => 'My contract test_contract1 on my tenant test_tenant1',
  name_alias  => 'test_contract_1',
  owner_key   => 'admin_cisco',
  owner_tag   => 'cisco',
  prio        => 'level1',
  scope       => 'global',
  target_dscp => 'CS3',
}

Parameters

name

Name of a contract to apply between two or more EPGs under the Application Profile.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

Properties

descr

Specifies a description of the policy definition.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

owner_key

The key for enabling clients to own their data for entity correlation.

For supported values for this parameter please refer to the following link

owner_tag

A tag for enabling clients to add their own data. For example, to indicate who created this object.

For supported values for this parameter please refer to the following link

prio

Specify priority level.

For supported values for this parameter please refer to the following link

scope

Represents the scope of this contract. If the scope is set as application- profile, the epg can only communicate with epgs in the same application-profile

For supported values for this parameter please refer to the following link

target_dscp

The target differentiated services code point (DSCP) of the path attached to the layer 3 outside profile.

For supported values for this parameter please refer to the following link

Type: cisco_aci_vzentry

A filter entry is a combination of network traffic classification properties.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_vzentry
#
cisco_aci_vzentry { 'test_filter_entry1':
  ensure        => 'present',
  name          => 'test_filter_entry1', #Instance Identifier
  fvtenant      => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  vzfilter      => 'test_filter1', #Parent cisco_aci_vzfilter Identifier
  apply_to_frag => 'no',
  arp_opc       => 'reply',
  d_from_port   => 'unspecified',
  d_to_port     => 'unspecified',
  descr         => 'My filter entry test_filter_entry1 for filter test_filter1 in tenant test_tenant1',
  ether_t       => 'arp',
  icmpv4_t      => 'unspecified',
  icmpv6_t      => 'unspecified',
  match_dscp    => 'unspecified',
  name_alias    => 'test_filter_entry_1',
  prot          => 'unspecified',
  s_from_port   => 'unspecified',
  s_to_port     => 'unspecified',
  stateful      => 'no',
  tcp_rules     => '',
}

Parameters

name

The name of a filter entry. This name can be up to 64 alphanumeric characters. Note that you cannot change this name after the object has been saved.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

vzfilter

Parent cisco_aci_vzfilter instance Identifier"

Properties

apply_to_frag

Apply to fragment.

For supported values for this parameter please refer to the following link

arp_opc

ARP opcodes.

For supported values for this parameter please refer to the following link

d_from_port

Destination From Port.

For supported values for this parameter please refer to the following link

d_to_port

Destination To Port.

For supported values for this parameter please refer to the following link

descr

Specifies the description of a policy component.

For supported values for this parameter please refer to the following link

ether_t

Ether type.

For supported values for this parameter please refer to the following link

icmpv4_t

The ICMP v4 Type.

For supported values for this parameter please refer to the following link

icmpv6_t

The ICMP v6 Type.

For supported values for this parameter please refer to the following link

match_dscp

Specify DSCP constants.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

prot

L3 Ip Protocol.

For supported values for this parameter please refer to the following link

s_from_port

Source From Port.

For supported values for this parameter please refer to the following link

s_to_port

Source To Port.

For supported values for this parameter please refer to the following link

stateful

Specify if stateful.

For supported values for this parameter please refer to the following link

tcp_rules

TCP Session Rules.

For supported values for this parameter please refer to the following link

Type: cisco_aci_vzfilter

A filter policy is a group of resolvable filter entries. Each filter entry is a combination of network traffic classification properties.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_vzfilter
#
cisco_aci_vzfilter { 'test_filter1':
  ensure     => 'present',
  name       => 'test_filter1', #Instance Identifier
  fvtenant   => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  descr      => 'My filter test_filter1',
  name_alias => 'test_filter_1',
  owner_key  => 'admin_cisco',
  owner_tag  => 'cisco',
}

Parameters

name

The name of a filter policy. This name can be up to 64 alphanumeric characters. Note that you cannot change this name after the object has been saved.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

Properties

descr

Specifies a description of the policy definition.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

owner_key

The key for enabling clients to own their data for entity correlation.

For supported values for this parameter please refer to the following link

owner_tag

A tag for enabling clients to add their own data. For example, to indicate who created this object.

For supported values for this parameter please refer to the following link

Type: cisco_aci_vzsubj

A subject is a sub-application running behind an endpoint group (for example, an Exchange server). A subject is parented by the contract, which can encapsulate multiple subjects. An endpoint group associated to a contract is providing one or more subjects or is communicating with the subject as a peer entity. An endpoint group always associates with a subject and defines rules under the association for consuming/providing/peer-to-peer communications to that subject.

For up-to-date information on the Managed Object corresponding to this Puppet Type refer to the following link

Example Usage

#
#Demo Resource data for resource cisco_aci_vzsubj
#
cisco_aci_vzsubj { 'test_subject1':
  ensure        => 'present',
  name          => 'test_subject1', #Instance Identifier
  fvtenant      => 'test_tenant1', #Parent cisco_aci_fvtenant Identifier
  vzbrcp        => 'test_contract1', #Parent cisco_aci_vzbrcp Identifier
  cons_match_t  => 'AtleastOne',
  descr         => 'My subject test_subject1 for contract test_contract1 in tenant test_tenant1',
  name_alias    => 'test_subject_1',
  prio          => 'level3',
  prov_match_t  => 'AtleastOne',
  rev_flt_ports => 'yes',
  target_dscp   => 'CS3',
}

Parameters

name

The name of a sub application running behind an endpoint group, such as an Exchange server. This name can be up to 64 alphanumeric characters. Note that you cannot change this name after the object has been saved.

For supported values for this parameter please refer to the following link

fvtenant

Parent cisco_aci_fvtenant instance Identifier"

vzbrcp

Parent cisco_aci_vzbrcp instance Identifier"

Properties

cons_match_t

The subject match criteria across consumers.

For supported values for this parameter please refer to the following link

descr

Specifies the description of a policy component.

For supported values for this parameter please refer to the following link

name_alias

Specify an alias for the Managed Object.

For supported values for this parameter please refer to the following link

prio

The priority level of a sub application running behind an endpoint group, such as an Exchange server.

For supported values for this parameter please refer to the following link

prov_match_t

The subject match criteria across consumers.

For supported values for this parameter please refer to the following link

rev_flt_ports

Enables the filter to apply on both ingress and egress traffic.

For supported values for this parameter please refer to the following link

target_dscp

The target differentiated services code point (DSCP) of the path attached to the layer 3 outside profile.

For supported values for this parameter please refer to the following link