Closed orb71 closed 2 years ago
I think that ZAPI is correct. Note that in the CLI, vserver is not present. The vserver defaults to the custer admin vserver. What value are you using in the playbook?
@orb71 can you try what @lonico metioned above.
My apologies for the late reply. @lonico is correct, I was not targeting the cluster.
All work as exptected.
Summary
Hello,
It is not directly related to the module, but to ZAPI it looks like. The ONTAP command line works fine (just a few warnings)
Component Name
netapp.ontap.na_ontap_user module
Ansible Version
ONTAP Collection Version
ONTAP Version
Playbook
Steps to Reproduce
Expected Results
NETAPP::> security login role create -role harvest2-role -access readonly -cmddirname "storage disk"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "cluster"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "lun"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "snapmirror"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "statistics"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "storage aggregate"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "storage disk"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "storage shelf"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "system health status show"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "system health subsystem show"
Warning: This operation will also affect the following commands: "system health subsystem modify"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "system node"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "version"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "volume"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "network interface"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "security"
Warning: "security certificate authority show-text" will not be accessible. Set the access to "all" if you want to allow it. Warning: "security certificate keystore show-text" will not be accessible. Set the access to "all" if you want to allow it. Warning: "security certificate truststore show-text" will not be accessible. Set the access to "all" if you want to allow it.
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "storage encryption disk"
NETAPP::> security login role create -role harvest2-nabox -access readonly -cmddirname "vserver"
Warning: "vserver services access-check authentication show-creds" will not be accessible. Set the access to "all" if you want to allow it. Warning: "vserver services access-check authentication show-ontap-admin-unix-creds" will not be accessible. Set the access to "all" if you want to allow it. Warning: "vserver services access-check name-mapping show" will not be accessible. Set the access to "all" if you want to allow it. Warning: "vserver services access-check server-discovery show-host" will not be accessible. Set the access to "all" if you want to allow it. Warning: "vserver services access-check server-discovery show-site" will not be accessible. Set the access to "all" if you want to allow it. Warning: "vserver services name-service nis-domain group-database show" will not be accessible. Set the access to "all" if you want to allow it. Warning: "vserver services name-service nis-domain netgroup-database show" will not be accessible. Set the access to "all" if you want to allow it. Warning: "vserver services name-service unix-group file show" will not be accessible. Set the access to "all" if you want to allow it. Warning: "vserver services name-service unix-user file show" will not be accessible. Set the access to "all" if you want to allow it.
Actual Results