This repository contains NSX-T Ansible Modules, which one can use with Ansible to work with VMware NSX-T Data Center.
For general information about Ansible, visit the GitHub project page.
These modules are maintained by VMware.
Documentation on the NSX platform can be found at the NSX-T Documentation page
The following versions of NSX are supported:
- NSX-T 3.1
- NSX-T 3.0
- NSX-T 2.5.1
Using Ansible-for-nsxt requires the following packages to be installated. Installation steps differ based on the platform (Mac/iOS, Ubuntu, Debian, CentOS, RHEL etc). Please follow the links below to pick the right platform.
- Ansible >= 2.9.x Ansible Installation Documentation
- Python3 >= 3.6.x Python Documentation
- pip >= 9.x Python Installation PIP installation
- PyVmOmi - Python library for vCenter api. Installation via pip: pyVmomi installation
- OVF Tools >= 4.4.x - Ovftool is used for ovf deployment OVFTool Download and Installation
ansible-for-nsxt modules are distributed as Ansible Galaxy collection. Please use the following command to install it
ansible-galaxy collection install vmware.ansible_for_nsxt
Once installed, the modules can be directly run with ansible-playbook. For example, you can run:
ansible-playbook test_logical_switches.yml
The modules require you to provide details about how to authenticate with NSX-T.
There are complete workflow example modules in the tests/playbooks folder. To use them, edit the corresponding vars file if rqeuired. Then run using ansible-playbook. For example,
ansible-playbook 01_create_t0_gateway.yml
The modules in this repository are focused on enabling automation of installation workflows of NSX-T. We have modules that support the legacy MP and new Policy API.
MP API modules can be used to configure an NSX resource with one-to-one mapping.
This repository has different branches with each branch providing support for upto a specific NSX-T release. Below is the list:
- Master: Latest code, under development
- v3.0.1: NSX-T 3.1.x and below
- v3.0.0: NSX-T 3.0.x and below
- v1.1.0: NSX-T 2.4, NSX-T 2.5
- v1.0.0: NSX-T 2.3
- nsxt_deploy_ova
- nsxt_licenses
- nsxt_manager_status
- nsxt_licenses_facts
- nsxt_edge_clusters
- nsxt_edge_clusters_facts
- nsxt_fabric_compute_managers
- nsxt_fabric_compute_managers_facts
- nsxt_ip_pools
- nsxt_ip_pools_facts
- nsxt_uplink_profiles
- nsxt_uplink_profiles_facts
- nsxt_transport_zones
- nsxt_transport_zones_facts
- nsxt_transport_nodes
- nsxt_transport_nodes_facts
- nsxt_transport_node_collections
- nsxt_transport_node_collections_facts
- nsxt_transport_node_profiles
- nsxt_transport_node_profiles_facts
- nsxt_controller_manager_auto_deployment
- nsxt_logical_ports
- nsxt_logical_ports_facts
- nsxt_logical_routers
- nsxt_logical_routers_facts
- nsxt_logical_router_ports
- nsxt_logical_router_ports_facts
- nsxt_logical_router_static_routes
- nsxt_logical_switches
- nsxt_logical_switches_facts
- nsxt_ip_blocks
- nsxt_ip_blocks_facts
Policy API modules are aggregated such that logical constructs related to an NSX resource can be configured using a single playbook. They can be identified with prefix nsxt_policy_. The below list outlines the supported modules and the resources that can be configured through a module.
Note that the Policy modules are supported only for NSX-T 3.0 and above.
- Tier-0 Gateway (nsxt_policy_tier0)
- Tier-0 Locale Services
- Tier-0 Static Routes
- Tier-0 Interface
- Tier-0 BGP
- Tier-0 BGP Neighbors
- Tier-0 VRF
- Tier-0 BFD Peers
- Tier-1 Gateway (nsxt_policy_tier1)
- Tier-1 Locale Services
- Tier-1 Static Routes
- Tier-1 Interface
- Segment (nsxt_policy_segment)
- Segment Port
- Policy Group (nsxt_policy_group)
- Security Policy and Firewall rules (nsxt_policy_security_policy)
- IP Pools (nsxt_policy_ip_pool)
- IP Address Pool Block Subnet
- IP Address Pool Static Subnet
- IP Blocks (nsxt_policy_ip_block)
- BFD Profile (nsxt_policy_bfd_profile)
- VM Tags (nsxt_vm_tags)
Note that to add a new modules in Policy API, it's base class name should be added in the BASE_RESOURCES in module_utils/nsxt_base_resource.py
pip install --upgrade pyvmomi pyvim requests ssl
Download and Install Ovf tool 4.3 - Ovftool
(Note: Using ovftool version 4.0/4.1 causes OVA/OVF deployment failure with Error: cURL error: SSL connect error\nCompleted with errors\n)
Ansible-for-nsxt supports two types of authentication using MP API.
- Basic server authentication
- Certificate based authentication
In basic server authentication, client has to explicitly provide NSX username and password for the NSX manager. The credentials have to be listed in ansible-playbook.
In certificate based authentication, client has to register their certificates to NSX manager using nsxt_certificates task. After registering the certificates, client has to create its own principal identity on NSX manager using nsxt_principal_identities taks. The process of certificate registration and creation of principal identity has to be done using basic server authentication. Use test_certificates.yml and test_principal_identities.yml to match the values according to the client's environment.
ansible-playbook test_certificates.yml -vvv
ansible-playbook test_principal_identities -vvv
The path of the .p12 file i.e the file containing public and private key has to be set to an environment variable named NSX_MANAGER_CERT_PATH. Note: Make sure NSX_MANAGER_CERT_PATH is set in the same remote host, where modules would be executed.
Following commands can be used in order to generate certificates.
openssl req -newkey rsa:2048 -extensions usr_cert -nodes -keyout nsx_certificate.key -x509 -days 365 -out nsx_certificate.crt -subj "/C=US/ST=California/L=PaloAlto/O=VMware/CN=certauth-test" -sha256
openssl pkcs12 -export -out nsx_certificate.pfx -inkey nsx_certificate.key -in nsx_certificate.crt
openssl pkcs12 -in nsx_certificate.pfx -out nsx_certificate.p12 -nodes
The nsx_certificate.crt file generated as output from the above command contains the public key certificate. the file nsx_certificate.p12 file contains the public and private key generated. The path of nsx_certificate.p12 file has to be set in the environment variable NSX_MANAGER_CERT_PATH.
Note: usr_cert tells OpenSSL to generate a client certificate. This must be defined in openssl.cnf.
To validate ceritificate authority (CA), set NSX_MANAGER_CA_PATH environment variable on Ansible control node pointing to CA certificate of NSX manager and pass validate_certs as True
in ansible playbook.
All the Policy API based Ansible Modules provide the following authentication mechanisms:
This is the same as in MP API. It can be used by specifying the following fields in the playbook:
- username: The username to authenticate with the NSX manager
- password: The password to authenticate with the NSX manager
For example:
- hosts: localhost
tasks:
- name: Update Tier0
nsxt_policy_tier0:
hostname: "default"
username: admin
password: my-password
validate_certs: False
display_name: test-tier0-1
state: present
There are 2 ways to consume the Principal Identity certificates.
This is same as explained in the previous section: Certificate based authentication
By specifying the following fields in the playbook:
- nsx_cert_path: Path to the certificate created for the Principal Identity using which the CRUD operations should be performed. If the certificate is a .p12 file, only this attribute is required. Otherwise, nsx_key_path is also required.
- nsx_key_path: Path to the certificate key created for the Principal Identity using which the CRUD operations should be performed
For example:
- hosts: localhost
tasks:
- name: Update Tier0
nsxt_policy_tier0:
hostname: "default"
nsx_cert_path: /root/com.vmware.nsx.ncp/nsx.crt
nsx_key_path: /root/com.vmware.nsx.ncp/nsx.key
validate_certs: False
display_name: test-tier0-1
state: present
When NSX-T is configured to use VMware Identity Manager (vIDM) for authentication, you can supply an Authorization header with an authentication type of Remote. The header content should consist of a base64-encoded string containing the username@domain and password separated by a single colon (":") character, as specified in RFC 1945 section 11.1.
For example, to authenticate a request using the credentials of user [email protected] with password Sk2LkPM!, include the following key:value pair under request_headers in the playbook::
- Authorization: 'Remote anNtaXRoQGV4YW1wbGUuY29tOlNrMkxrUE0h'
For example:
- hosts: localhost
tasks:
- name: Update Tier0
nsxt_policy_tier0:
hostname: "default"
request_headers:
Authorization: 'Remote anNtaXRoQGV4YW1wbGUuY29tOlNrMkxrUE0h'
validate_certs: False
display_name: test-tier0-1
state: present
You can use the flag validate_certs to perform SSL verification. You can also specify the path to a CA bundle using the paratemer ca_path in the playbook.
For example:
- hosts: localhost
tasks:
- name: Update Tier0
nsxt_policy_tier0:
hostname: "default"
nsx_cert_path: /root/com.vmware.nsx.ncp/nsx.crt
nsx_key_path: /root/com.vmware.nsx.ncp/nsx.key
validate_certs: True
ca_path: /path/to/my/ca-bundle
display_name: test-tier0-1
state: present
The ansible-for-nsxt project team welcomes contributions from the community. Before you start working with ansible-for-nsxt, please read our Developer Certificate of Origin. All contributions to this repository must be signed as described on that page. Your signature certifies that you wrote the patch or have the right to pass it on as an open-source patch. For more detailed information, refer to CONTRIBUTING.md.
Please open a Pull-Request against the Master branch.
Released NSX-T Ansible modules are fully supported by VMware. The released modules are available in the specific numbered release branches:
- v3.0.1
- v3.0.0
- v1.1.0
- v1.0.0
They are also available for download from VMware's download page.
The master branch contains the latest development code which is community supported.
For bugs and feature requests, please open a Github Issue and label it appropriately.
Copyright (c) 2020 VMware, Inc. All rights reserved
The NSX-T Ansible modules in this repository are available under BSD-2 license or GPLv3 applies to all parts of the ansible-for-nsxt. You may not use them except in compliance with the License.