Basic playbook to test and understand AVD L3LS EVPN Role
1. Use Ansible to Generate YAML Structured Configuration and Fabric Documentation
# Go to the lab08 directory
$ $ cd ../lab08-avd-l3ls-evpn
# Run playbook to generate the required folders
$ ansible-playbook playbook.create.folders.yml
# Run playbook to generate the structured configuration (YAML files) and the fabric documentation
$ ansible-playbook playbook.build.structured.yml
# Check the playbook and identify the use of AVD collection in the playbook as well as the specific AVD role
$ more playbook.build.structured.yml
# Check the rendered structured configuration
$ ls intended/structured_configs
$ more intended/structured_configs/DC1-SPINE1.yml
$ more intended/structured_configs/DC1-LEAF1A.yml
# Check the rendered Fabric documentation
$ ls documentation/DC1_FABRIC/
$ more documentation/DC1_FABRIC/DC1_FABRIC.md
2. Understand the Fabric Description Structure
# Modify the IP range used for the VTEP VXLAN Tunnel source loopbacks
# Change "vtep_loopback_network_summary" value in group_vars/DC1_FABRIC.yml
$ vi group_vars/DC1_FABRIC.yml
# Run playbook to generate the structured configuration files with IP changes
$ ansible-playbook playbook.build.structured.yml
# Verify the change in structured files under loopback_interfaces
$ more intended/structured_configs/DC1-LEAF1A.yml
Add a server to the Fabric:
- Server03
- Part of TENANT_B
- In RackB
- Connected on port Ethernet 8 of switch DC1-LEAF1A
$ vi group_vars/DC1_SERVERS.yml
# Add the following lines:
server03:
rack: RackB
adapters:
- type: nic
server_ports: [Eth0]
switch_ports: [Ethernet8]
switches: [DC1-LEAF1A]
profile: TENANT_B
# Run playbook to generate the structured configuration files with the new addition
$ ansible-playbook playbook.build.structured.yml
# Check the newly rendered structured configuration files and documentation