Use Ansible network roles

Roles are sets of Ansible defaults, files, tasks, templates, variables, and other Ansible components that work together. As you saw on Run Your First Command and Playbook, moving from a command to a playbook makes it easy to run multiple tasks and repeat the same tasks in the same order. Moving from a playbook to a role makes it even easier to reuse and share your ordered tasks. You can look at Ansible Galaxy, which lets you share your roles and use others’ roles, either directly or as inspiration.

Understanding roles

So what exactly is a role, and why should you care? Ansible roles are basically playbooks broken up into a known file structure. Moving to roles from a playbook makes sharing, reading, and updating your Ansible workflow easier. Users can write their own roles. So for example, you don’t have to write your own DNS playbook. Instead, you specify a DNS server and a role to configure it for you.

To simplify your workflow even further, the Ansible Network team has written a series of roles for common network use cases. Using these roles means you don’t have to reinvent the wheel. Instead of writing and maintaining your own create_vlan playbooks or roles, you can concentrate on designing, codifying and maintaining the parser templates that describe your network topologies and inventory, and let Ansible’s network roles do the work. See the network-related roles on Ansible Galaxy.

A sample DNS playbook

To demonstrate the concept of what a role is, the example playbook.yml below is a single YAML file containing a two-task playbook. This Ansible Playbook configures the hostname on a Cisco IOS XE device, then it configures the DNS (domain name system) servers.

  1. ---
  2. - name: configure cisco routers
  3. hosts: routers
  4. connection: network_cli
  5. gather_facts: no
  6. vars:
  7. dns: "8.8.8.8 8.8.4.4"
  8.  
  9. tasks:
  10. - name: configure hostname
  11. ios_config:
  12. lines: hostname {{ inventory_hostname }}
  13.  
  14. - name: configure DNS
  15. ios_config:
  16. lines: ip name-server {{dns}}

If you run this playbook using the ansible-playbook command, you’ll see the output below. This example used -l option to limit the playbook to only executing on the rtr1 node.

  1. [[email protected] ~]$ ansible-playbook playbook.yml -l rtr1
  2.  
  3. PLAY [configure cisco routers] *************************************************
  4.  
  5. TASK [configure hostname] ******************************************************
  6. changed: [rtr1]
  7.  
  8. TASK [configure DNS] ***********************************************************
  9. changed: [rtr1]
  10.  
  11. PLAY RECAP *********************************************************************
  12. rtr1 : ok=2 changed=2 unreachable=0 failed=0

This playbook configured the hostname and DNS servers. You can verify that configuration on the Cisco IOS XE rtr1 router:

  1. rtr1#sh run | i name
  2. hostname rtr1
  3. ip name-server 8.8.8.8 8.8.4.4

Convert the playbook into a role

The next step is to convert this playbook into a reusable role. You can create the directory structure manually, or you can use ansible-galaxy init to create the standard framework for a role.

  1. [[email protected] ~]$ ansible-galaxy init system-demo
  2. [[email protected] ~]$ cd system-demo/
  3. [[email protected] system-demo]$ tree
  4. .
  5. ├── defaults
  6. └── main.yml
  7. ├── files
  8. ├── handlers
  9. └── main.yml
  10. ├── meta
  11. └── main.yml
  12. ├── README.md
  13. ├── tasks
  14. └── main.yml
  15. ├── templates
  16. ├── tests
  17. ├── inventory
  18. └── test.yml
  19. └── vars
  20. └── main.yml

This first demonstration uses only the tasks and vars directories. The directory structure would look as follows:

  1. [[email protected] system-demo]$ tree
  2. .
  3. ├── tasks
  4. └── main.yml
  5. └── vars
  6. └── main.yml

Next, move the content of the vars and tasks sections from the original Ansible Playbook into the role. First, move the two tasks into the tasks/main.yml file:

  1. [[email protected] system-demo]$ cat tasks/main.yml

  • name: configure hostnameios_config: lines: hostname {{ inventory_hostname }}

  • name: configure DNSios_config: lines: ip name-server {{dns}}

Next, move the variables into the vars/main.yml file:

  1. [[email protected] system-demo]$ cat vars/main.yml

dns: "8.8.8.8 8.8.4.4"

Finally, modify the original Ansible Playbook to remove the tasks and vars sections and add the keyword roles with the name of the role, in this case system-demo. You’ll have this playbook:

  1. ---
  2. - name: configure cisco routers
  3. hosts: routers
  4. connection: network_cli
  5. gather_facts: no
  6.  
  7. roles:
  8. - system-demo

To summarize, this demonstration now has a total of three directories and three YAML files. There is the system-demo folder, which represents the role. This system-demo contains two folders, tasks and vars. There is a main.yml is each respective folder. The vars/main.yml contains the variables from playbook.yml. The tasks/main.yml contains the tasks from playbook.yml. The playbook.yml file has been modified to call the role rather than specifying vars and tasks directly. Here is a tree of the current working directory:

  1. [[email protected] ~]$ tree
  2. .
  3. ├── playbook.yml
  4. └── system-demo
  5. ├── tasks
  6. └── main.yml
  7. └── vars
  8. └── main.yml

Running the playbook results in identical behavior with slightly different output:

  1. [[email protected] ~]$ ansible-playbook playbook.yml -l rtr1
  2.  
  3. PLAY [configure cisco routers] *************************************************
  4.  
  5. TASK [system-demo : configure hostname] ****************************************
  6. ok: [rtr1]
  7.  
  8. TASK [system-demo : configure DNS] *********************************************
  9. ok: [rtr1]
  10.  
  11. PLAY RECAP *********************************************************************
  12. rtr1 : ok=2 changed=0 unreachable=0 failed=0

As seen above each task is now prepended with the role name, in this case system-demo. When running a playbook that contains several roles, this will help pinpoint where a task is being called from. This playbook returned ok instead of changed because it has identical behavior for the single file playbook we started from.

As before, the playbook will generate the following configuration on a Cisco IOS-XE router:

  1. rtr1#sh run | i name
  2. hostname rtr1
  3. ip name-server 8.8.8.8 8.8.4.4

This is why Ansible roles can be simply thought of as deconstructed playbooks. They are simple, effective and reusable. Now another user can simply include the system-demo role instead of having to create a custom “hard coded” playbook.

Variable precedence

What if you want to change the DNS servers? You aren’t expected to change the vars/main.yml within the role structure. Ansible has many places where you can specify variables for a given play. See Using Variables for details on variables and precedence. There are actually 21 places to put variables. While this list can seem overwhelming at first glance, the vast majority of use cases only involve knowing the spot for variables of least precedence and how to pass variables with most precedence. See Variable precedence: Where should I put a variable? for more guidance on where you should put variables.

Lowest precedence

The lowest precedence is the defaults directory within a role. This means all the other 20 locations you could potentially specify the variable will all take higher precedence than defaults, no matter what. To immediately give the vars from the system-demo role the least precedence, rename the vars directory to defaults.

  1. [[email protected] system-demo]$ mv vars defaults
  2. [[email protected] system-demo]$ tree
  3. .
  4. ├── defaults
  5. └── main.yml
  6. ├── tasks
  7. └── main.yml

Add a new vars section to the playbook to override the default behavior (where the variable dns is set to 8.8.8.8 and 8.8.4.4). For this demonstration, set dns to 1.1.1.1, so playbook.yml becomes:

  1. ---
  2. - name: configure cisco routers
  3. hosts: routers
  4. connection: network_cli
  5. gather_facts: no
  6. vars:
  7. dns: 1.1.1.1
  8. roles:
  9. - system-demo

Run this updated playbook on rtr2:

  1. [[email protected] ~]$ ansible-playbook playbook.yml -l rtr2

The configuration on the rtr2 Cisco router will look as follows:

  1. rtr2#sh run | i name-server
  2. ip name-server 1.1.1.1

The variable configured in the playbook now has precedence over the defaults directory. In fact, any other spot you configure variables would win over the values in the defaults directory.

Highest precedence

Specifying variables in the defaults directory within a role will always take the lowest precedence, while specifying vars as extra vars with the -e or —extra-vars= will always take the highest precedence, no matter what. Re-running the playbook with the -e option overrides both the defaults directory (8.8.4.4 and 8.8.8.8) as well as the newly created vars within the playbook that contains the 1.1.1.1 dns server.

  1. [[email protected] ~]$ ansible-playbook playbook.yml -e "dns=192.168.1.1" -l rtr3

The result on the Cisco IOS XE router will only contain the highest precedence setting of 192.168.1.1:

  1. rtr3#sh run | i name-server
  2. ip name-server 192.168.1.1

How is this useful? Why should you care? Extra vars are commonly used by network operators to override defaults. A powerful example of this is with Red Hat Ansible Tower and the Survey feature. It is possible through the web UI to prompt a network operator to fill out parameters with a Web form. This can be really simple for non-technical playbook writers to execute a playbook using their Web browser. See Ansible Tower Job Template Surveys for more details.

Ansible supported network roles

The Ansible Network team develops and supports a set of network-related roles on Ansible Galaxy. You can use these roles to jump start your network automation efforts. These roles are updated approximately every two weeks to give you access to the latest Ansible networking content.

These roles come in the following categories:

  • User roles - User roles focus on tasks, such as managing your configuration. Use these roles, such as config_manager and cloud_vpn, directly in your playbooks. These roles are platform/provider agnostic, allowing you to use the same roles and playbooks across different network platforms or cloud providers.
  • Platform provider roles - Provider roles translate between the user roles and the various network OSs, each of which has a different API. Each provider role accepts input from a supported user role and translates it for a specific network OS. Network user roles depend on these provider roles to implement their functions. For example, the config_manager user role uses the cisco_ios provider role to implement tasks on Cisco IOS network devices.
  • Cloud provider and provisioner roles - Similarly, cloud user roles depend on cloud provider and provisioner roles to implement cloud functions for specific cloud providers. For example, the cloud_vpn role depends on the aws provider role to communicate with AWS.

You need to install at least one platform provider role for your network user roles, and set ansible_network_provider to that provider (for example, ansible_network_provider: ansible-network.cisco_ios). Ansible Galaxy automatically installs any other dependencies listed in the role details on Ansible Galaxy.

For example, to use the config_manager role with Cisco IOS devices, you would use the following commands:

  1. [[email protected]]$ ansible-galaxy install ansible-network.cisco_ios
  2. [[email protected]]$ ansible-galaxy install ansible-network.config_manager

Roles are fully documented with examples in Ansible Galaxy on the Read Me tab for each role.

Network roles release cycle

The Ansible network team releases updates and new roles every two weeks. The role details on Ansible Galaxy lists the role versions available, and you can look in the GitHub repository to find the changelog file (for example, the cisco_ios CHANGELOG.rst ) that lists what has changed in each version of the role.

The Ansible Galaxy role version has two components:

  • Major release number - (for example, 2.6) which shows the Ansible engine version this role supports.
  • Minor release number (for example .1) which denotes the role release cycle and does not reflect the Ansible engine minor release version.

Update an installed role

The Ansible Galaxy page for a role lists all available versions. To update a locally installed role to a new or different version, use the ansible-galaxy install command with the version and —force option. You may also need to manually update any dependent roles to support this version. See the role Read Me tab in Galaxy for dependent role minimum version requirements.

  1. [[email protected]]$ ansible-galaxy install ansible-network.network_engine,v2.7.0 --force
  2. [[email protected]]$ ansible-galaxy install ansible-network.cisco_nxos,v2.7.1 --force

See also