+

Search Tips   |   Advanced Search

EOS Platform Options

The Arista EOS collection supports multiple connections. This page offers details on how each connection works in Ansible and how to use it.


Connections available

CLI

eAPI

Protocol SSH HTTP(S)
Credentials uses SSH keys / SSH-agent if present

accepts -u myuser -k if using password

uses HTTPS certificates if present
Indirect Access via a bastion (jump host) via a web proxy
Connection Settings ansible_connection: ansible.netcommon.network_cli ansible_connection: ansible.netcommon.httpapi
Enable Mode
(Privilege Escalation)
supported:
supported:
Returned Data Format stdout[0]. stdout[0].messages[0].

The ansible_connection: local has been deprecated. Please use ansible_connection: ansible.netcommon.network_cli or ansible_connection: ansible.netcommon.httpapi instead.


Using CLI in Ansible


Example CLI group_vars/eos.yml


Example CLI task


Using eAPI in Ansible


Enabling eAPI

Before you can use eAPI to connect to a switch, you must enable eAPI. To enable eAPI on a new switch with Ansible, use the arista.eos.eos_eapi module through the CLI connection. Set up group_vars/eos.yml just like in the CLI example above, then run a playbook task like this:

You can find more options for enabling HTTP/HTTPS connections in the arista.eos.eos_eapi module documentation.

Once eAPI is enabled, change your group_vars/eos.yml to use the eAPI connection.


Example eAPI group_vars/eos.yml


Example eAPI task

In this example the proxy_env variable defined in group_vars gets passed to the environment option of the module in the task.

Warning

Never store passwords in plain text. We recommend using SSH keys to authenticate SSH connections. Ansible supports ssh-agent to manage your SSH keys. If you must use passwords to authenticate SSH connections, we recommend encrypting them with Ansible Vault.


See also

Setting timeout options

Next Previous