My current playbook looks like this:
---
- hosts: iloms
remote_user: root
gather_facts: false
tasks:
-name: run show faulty command
raw: show faulty
register: showfaulty
Upon running this playbook, I get this in my stdout:
shell: Invalid credentials\n\n\n
It appears that despite ansible is executing "raw commands", it first tries to set a shell, which is non-existent on an ilom adapter, because it has a fixed limited shell which works totally different.
Is there some way to truly issue raw commands? This would open up Ansible usage to a lot of devices that are talking ssh.
Thanks!
[ansible@ansiblevm ansible]$ ssh root@enkdb01-ilom "show faulty"
Password:
shell: Invalid credentials
[ansible@ansiblevm ansible]$ echo "show faulty" | ssh root@enkdb01-ilomPseudo-terminal will not be allocated because stdin is not a terminal.Password:Oracle(R) Integrated Lights Out ManagerVersion 3.0.16.15.e r87097Copyright (c) 2014, Oracle and/or its affiliates. All rights reserved.-> show faultyTarget | Property | Value--------------------+------------------------+----------------------------------> Session closed
[ansible@ansiblevm ansible]$ ssh -vvvv root@enkdb01-ilom "show faulty"OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013debug1: Reading configuration data /etc/ssh/ssh_configdebug1: Applying options for *debug2: ssh_connect: needpriv 0debug1: Connecting to enkdb01-ilom [192.168.8.206] port 22.debug1: Connection established.debug1: identity file /home/ansible/.ssh/identity type -1debug1: identity file /home/ansible/.ssh/identity-cert type -1debug3: Not a RSA1 key file /home/ansible/.ssh/id_rsa.debug2: key_type_from_name: unknown key type '-----BEGIN'debug3: key_read: missing keytypedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug2: key_type_from_name: unknown key type '-----END'debug3: key_read: missing keytypedebug1: identity file /home/ansible/.ssh/id_rsa type 1debug1: identity file /home/ansible/.ssh/id_rsa-cert type -1debug1: identity file /home/ansible/.ssh/id_dsa type -1debug1: identity file /home/ansible/.ssh/id_dsa-cert type -1debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1debug1: match: OpenSSH_5.1 pat OpenSSH*debug1: Enabling compatibility mode for protocol 2.0debug1: Local version string SSH-2.0-OpenSSH_5.3debug2: fd 3 setting O_NONBLOCKdebug1: SSH2_MSG_KEXINIT sentdebug3: Wrote 960 bytes for a total of 981debug1: SSH2_MSG_KEXINIT receiveddebug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1debug2: kex_parse_kexinit: ssh-rsa-...@openssh.com,ssh-dss-...@openssh.com,ssh-rsa-...@openssh.com,ssh-dss-...@openssh.com,ssh-rsa,ssh-dssdebug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijnda...@lysator.liu.sedebug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijnda...@lysator.liu.sedebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,uma...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ri...@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,uma...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ri...@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zl...@openssh.com,zlibdebug2: kex_parse_kexinit: none,zl...@openssh.com,zlibdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1debug2: kex_parse_kexinit: ssh-rsa,ssh-dssdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijnda...@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijnda...@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,uma...@openssh.com,hmac-ripemd160,hmac-ri...@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,uma...@openssh.com,hmac-ripemd160,hmac-ri...@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zl...@openssh.comdebug2: kex_parse_kexinit: none,zl...@openssh.comdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: mac_setup: found hmac-md5debug1: kex: server->client aes128-ctr hmac-md5 nonedebug2: mac_setup: found hmac-md5debug1: kex: client->server aes128-ctr hmac-md5 nonedebug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sentdebug1: expecting SSH2_MSG_KEX_DH_GEX_GROUPdebug3: Wrote 24 bytes for a total of 1005debug2: dh_gen_key: priv key bits set: 129/256debug2: bits set: 525/1024debug1: SSH2_MSG_KEX_DH_GEX_INIT sentdebug1: expecting SSH2_MSG_KEX_DH_GEX_REPLYdebug3: Wrote 144 bytes for a total of 1149debug3: check_host_in_hostfile: host enkdb01-ilom filename /home/ansible/.ssh/known_hostsdebug3: check_host_in_hostfile: host enkdb01-ilom filename /home/ansible/.ssh/known_hostsdebug3: check_host_in_hostfile: match line 6debug3: check_host_in_hostfile: host 192.168.8.206 filename /home/ansible/.ssh/known_hostsdebug3: check_host_in_hostfile: host 192.168.8.206 filename /home/ansible/.ssh/known_hostsdebug3: check_host_in_hostfile: match line 8debug1: Host 'enkdb01-ilom' is known and matches the RSA host key.debug1: Found key in /home/ansible/.ssh/known_hosts:6debug2: bits set: 505/1024debug1: ssh_rsa_verify: signature correctdebug2: kex_derive_keysdebug2: set_newkeys: mode 1debug1: SSH2_MSG_NEWKEYS sentdebug1: expecting SSH2_MSG_NEWKEYSdebug3: Wrote 16 bytes for a total of 1165debug2: set_newkeys: mode 0debug1: SSH2_MSG_NEWKEYS receiveddebug1: SSH2_MSG_SERVICE_REQUEST sentdebug3: Wrote 48 bytes for a total of 1213debug2: service_accept: ssh-userauthdebug1: SSH2_MSG_SERVICE_ACCEPT receiveddebug2: key: /home/ansible/.ssh/identity ((nil))debug2: key: /home/ansible/.ssh/id_rsa (0x7f4fa7d33f10)debug2: key: /home/ansible/.ssh/id_dsa ((nil))debug3: Wrote 64 bytes for a total of 1277debug1: Authentications that can continue: publickey,keyboard-interactivedebug3: start over, passed a different list publickey,keyboard-interactivedebug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,passworddebug3: authmethod_lookup publickeydebug3: remaining preferred: keyboard-interactive,passworddebug3: authmethod_is_enabled publickeydebug1: Next authentication method: publickeydebug1: Trying private key: /home/ansible/.ssh/identitydebug3: no such identity: /home/ansible/.ssh/identitydebug1: Offering public key: /home/ansible/.ssh/id_rsadebug3: send_pubkey_testdebug2: we sent a publickey packet, wait for replydebug3: Wrote 368 bytes for a total of 1645debug1: Authentications that can continue: publickey,keyboard-interactivedebug1: Trying private key: /home/ansible/.ssh/id_dsadebug3: no such identity: /home/ansible/.ssh/id_dsadebug2: we did not send a packet, disable methoddebug3: authmethod_lookup keyboard-interactivedebug3: remaining preferred: passworddebug3: authmethod_is_enabled keyboard-interactivedebug1: Next authentication method: keyboard-interactivedebug2: userauth_kbdintdebug2: we sent a keyboard-interactive packet, wait for replydebug3: Wrote 96 bytes for a total of 1741debug2: input_userauth_info_reqdebug2: input_userauth_info_req: num_prompts 1Password:debug3: packet_send2: adding 32 (len 22 padlen 10 extra_pad 64)debug3: Wrote 80 bytes for a total of 1821debug2: input_userauth_info_reqdebug2: input_userauth_info_req: num_prompts 0debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64)debug3: Wrote 80 bytes for a total of 1901debug1: Authentication succeeded (keyboard-interactive).debug1: channel 0: new [client-session]debug3: ssh_session2_open: channel_new: 0debug2: channel 0: send opendebug1: Requesting no-more-...@openssh.comdebug1: Entering interactive session.debug3: Wrote 128 bytes for a total of 2029debug2: callback startdebug2: client_session2_setup: id 0debug1: Sending environment.debug3: Ignored env HOSTNAMEdebug3: Ignored env SELINUX_ROLE_REQUESTEDdebug3: Ignored env ANSIBLE_SSH_ARGSdebug3: Ignored env TERMdebug3: Ignored env SHELLdebug3: Ignored env HISTSIZEdebug3: Ignored env SSH_CLIENTdebug3: Ignored env SELINUX_USE_CURRENT_RANGEdebug3: Ignored env QTDIRdebug3: Ignored env OLDPWDdebug3: Ignored env QTINCdebug3: Ignored env SSH_TTYdebug3: Ignored env USERdebug3: Ignored env LS_COLORSdebug3: Ignored env MAILdebug3: Ignored env PATHdebug3: Ignored env PWDdebug1: Sending env LANG = en_US.UTF-8debug2: channel 0: request env confirm 0debug3: Ignored env SELINUX_LEVEL_REQUESTEDdebug3: Ignored env HISTCONTROLdebug3: Ignored env SHLVLdebug3: Ignored env HOMEdebug3: Ignored env LOGNAMEdebug3: Ignored env QTLIBdebug3: Ignored env CVS_RSHdebug3: Ignored env SSH_CONNECTIONdebug3: Ignored env LESSOPENdebug3: Ignored env G_BROKEN_FILENAMESdebug3: Ignored env _debug1: Sending command: show faultydebug2: channel 0: request exec confirm 1debug2: fd 3 setting TCP_NODELAYdebug2: callback donedebug2: channel 0: open confirm rwindow 0 rmax 32768debug3: Wrote 128 bytes for a total of 2157debug2: channel 0: rcvd adjust 2097152debug2: channel_input_status_confirm: type 99 id 0debug2: exec request accepted on channel 0shell: Invalid credentialsdebug2: channel 0: rcvd eofdebug2: channel 0: output open -> draindebug2: channel 0: obuf emptydebug2: channel 0: close_writedebug2: channel 0: output drain -> closeddebug1: client_input_channel_req: channel 0 rtype exit-status reply 0debug1: client_input_channel_req: channel 0 rtype e...@openssh.com reply 0debug2: channel 0: rcvd eowdebug2: channel 0: close_readdebug2: channel 0: input open -> closeddebug2: channel 0: rcvd closedebug3: channel 0: will not send data after closedebug2: channel 0: almost deaddebug2: channel 0: gc: notify userdebug2: channel 0: gc: user detacheddebug2: channel 0: send closedebug2: channel 0: is deaddebug2: channel 0: garbage collectingdebug1: channel 0: free: client-session, nchannels 1debug3: channel 0: status: The following connections are open:#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)debug3: channel 0: close_fds r -1 w -1 e 6 c -1debug3: Wrote 32 bytes for a total of 2189debug3: Wrote 64 bytes for a total of 2253Transferred: sent 2040, received 1912 bytes, in 0.5 secondsBytes per second: sent 3861.5, received 3619.3debug1: Exit status 0
[ansible@ansiblevm ansible]$ echo "show faulty" | ssh -vvvv root@enkdb01-ilomOpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013Pseudo-terminal will not be allocated because stdin is not a terminal.debug1: Reading configuration data /etc/ssh/ssh_configdebug1: Applying options for *debug2: ssh_connect: needpriv 0debug1: Connecting to enkdb01-ilom [192.168.8.206] port 22.debug1: Connection established.debug1: identity file /home/ansible/.ssh/identity type -1debug1: identity file /home/ansible/.ssh/identity-cert type -1debug3: Not a RSA1 key file /home/ansible/.ssh/id_rsa.debug2: key_type_from_name: unknown key type '-----BEGIN'debug3: key_read: missing keytypedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug3: key_read: missing whitespacedebug2: key_type_from_name: unknown key type '-----END'debug3: key_read: missing keytypedebug1: identity file /home/ansible/.ssh/id_rsa type 1debug1: identity file /home/ansible/.ssh/id_rsa-cert type -1debug1: identity file /home/ansible/.ssh/id_dsa type -1debug1: identity file /home/ansible/.ssh/id_dsa-cert type -1debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1debug1: match: OpenSSH_5.1 pat OpenSSH*debug1: Enabling compatibility mode for protocol 2.0debug1: Local version string SSH-2.0-OpenSSH_5.3debug2: fd 3 setting O_NONBLOCKdebug1: SSH2_MSG_KEXINIT sentdebug3: Wrote 960 bytes for a total of 981debug1: SSH2_MSG_KEXINIT receiveddebug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1debug2: kex_parse_kexinit: ssh-rsa-...@openssh.com,ssh-dss-...@openssh.com,ssh-rsa-...@openssh.com,ssh-dss-...@openssh.com,ssh-rsa,ssh-dssdebug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijnda...@lysator.liu.sedebug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijnda...@lysator.liu.sedebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,uma...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ri...@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,uma...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ri...@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zl...@openssh.com,zlibdebug2: kex_parse_kexinit: none,zl...@openssh.com,zlibdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1debug2: kex_parse_kexinit: ssh-rsa,ssh-dssdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijnda...@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijnda...@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,uma...@openssh.com,hmac-ripemd160,hmac-ri...@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,uma...@openssh.com,hmac-ripemd160,hmac-ri...@openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zl...@openssh.comdebug2: kex_parse_kexinit: none,zl...@openssh.comdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: mac_setup: found hmac-md5debug1: kex: server->client aes128-ctr hmac-md5 nonedebug2: mac_setup: found hmac-md5debug1: kex: client->server aes128-ctr hmac-md5 nonedebug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sentdebug1: expecting SSH2_MSG_KEX_DH_GEX_GROUPdebug3: Wrote 24 bytes for a total of 1005debug2: dh_gen_key: priv key bits set: 119/256debug2: bits set: 503/1024debug1: SSH2_MSG_KEX_DH_GEX_INIT sentdebug1: expecting SSH2_MSG_KEX_DH_GEX_REPLYdebug3: Wrote 144 bytes for a total of 1149debug3: check_host_in_hostfile: host enkdb01-ilom filename /home/ansible/.ssh/known_hostsdebug3: check_host_in_hostfile: host enkdb01-ilom filename /home/ansible/.ssh/known_hostsdebug3: check_host_in_hostfile: match line 6debug3: check_host_in_hostfile: host 192.168.8.206 filename /home/ansible/.ssh/known_hostsdebug3: check_host_in_hostfile: host 192.168.8.206 filename /home/ansible/.ssh/known_hostsdebug3: check_host_in_hostfile: match line 8debug1: Host 'enkdb01-ilom' is known and matches the RSA host key.debug1: Found key in /home/ansible/.ssh/known_hosts:6debug2: bits set: 499/1024debug1: ssh_rsa_verify: signature correctdebug2: kex_derive_keysdebug2: set_newkeys: mode 1debug1: SSH2_MSG_NEWKEYS sentdebug1: expecting SSH2_MSG_NEWKEYSdebug3: Wrote 16 bytes for a total of 1165debug2: set_newkeys: mode 0debug1: SSH2_MSG_NEWKEYS receiveddebug1: SSH2_MSG_SERVICE_REQUEST sentdebug3: Wrote 48 bytes for a total of 1213debug2: service_accept: ssh-userauthdebug1: SSH2_MSG_SERVICE_ACCEPT receiveddebug2: key: /home/ansible/.ssh/identity ((nil))debug2: key: /home/ansible/.ssh/id_rsa (0x7fa50b3cff10)debug2: key: /home/ansible/.ssh/id_dsa ((nil))debug3: Wrote 64 bytes for a total of 1277debug1: Authentications that can continue: publickey,keyboard-interactivedebug3: start over, passed a different list publickey,keyboard-interactivedebug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,passworddebug3: authmethod_lookup publickeydebug3: remaining preferred: keyboard-interactive,passworddebug3: authmethod_is_enabled publickeydebug1: Next authentication method: publickeydebug1: Trying private key: /home/ansible/.ssh/identitydebug3: no such identity: /home/ansible/.ssh/identitydebug1: Offering public key: /home/ansible/.ssh/id_rsadebug3: send_pubkey_testdebug2: we sent a publickey packet, wait for replydebug3: Wrote 368 bytes for a total of 1645debug1: Authentications that can continue: publickey,keyboard-interactivedebug1: Trying private key: /home/ansible/.ssh/id_dsadebug3: no such identity: /home/ansible/.ssh/id_dsadebug2: we did not send a packet, disable methoddebug3: authmethod_lookup keyboard-interactivedebug3: remaining preferred: passworddebug3: authmethod_is_enabled keyboard-interactivedebug1: Next authentication method: keyboard-interactivedebug2: userauth_kbdintdebug2: we sent a keyboard-interactive packet, wait for replydebug3: Wrote 96 bytes for a total of 1741debug2: input_userauth_info_reqdebug2: input_userauth_info_req: num_prompts 1Password:debug3: packet_send2: adding 32 (len 22 padlen 10 extra_pad 64)debug3: Wrote 80 bytes for a total of 1821debug2: input_userauth_info_reqdebug2: input_userauth_info_req: num_prompts 0debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64)debug3: Wrote 80 bytes for a total of 1901debug1: Authentication succeeded (keyboard-interactive).debug2: fd 4 setting O_NONBLOCKdebug1: channel 0: new [client-session]debug3: ssh_session2_open: channel_new: 0debug2: channel 0: send opendebug1: Requesting no-more-...@openssh.comdebug1: Entering interactive session.debug3: Wrote 128 bytes for a total of 2029debug2: callback startdebug2: client_session2_setup: id 0debug1: Sending environment.debug3: Ignored env HOSTNAMEdebug3: Ignored env SELINUX_ROLE_REQUESTEDdebug3: Ignored env ANSIBLE_SSH_ARGSdebug3: Ignored env TERMdebug3: Ignored env SHELLdebug3: Ignored env HISTSIZEdebug3: Ignored env SSH_CLIENTdebug3: Ignored env SELINUX_USE_CURRENT_RANGEdebug3: Ignored env QTDIRdebug3: Ignored env OLDPWDdebug3: Ignored env QTINCdebug3: Ignored env SSH_TTYdebug3: Ignored env USERdebug3: Ignored env LS_COLORSdebug3: Ignored env MAILdebug3: Ignored env PATHdebug3: Ignored env PWDdebug1: Sending env LANG = en_US.UTF-8debug2: channel 0: request env confirm 0debug3: Ignored env SELINUX_LEVEL_REQUESTEDdebug3: Ignored env HISTCONTROLdebug3: Ignored env SHLVLdebug3: Ignored env HOMEdebug3: Ignored env LOGNAMEdebug3: Ignored env QTLIBdebug3: Ignored env CVS_RSHdebug3: Ignored env SSH_CONNECTIONdebug3: Ignored env LESSOPENdebug3: Ignored env G_BROKEN_FILENAMESdebug3: Ignored env _debug2: channel 0: request shell confirm 1debug2: fd 3 setting TCP_NODELAYdebug2: callback donedebug2: channel 0: open confirm rwindow 0 rmax 32768debug3: Wrote 112 bytes for a total of 2141debug2: channel 0: rcvd adjust 2097152debug2: channel_input_status_confirm: type 99 id 0debug2: shell request accepted on channel 0debug2: channel 0: read<=0 rfd 4 len 0debug2: channel 0: read faileddebug2: channel 0: close_readdebug2: channel 0: input open -> draindebug3: Wrote 48 bytes for a total of 2189debug2: channel 0: ibuf emptydebug2: channel 0: send eofdebug2: channel 0: input drain -> closeddebug3: Wrote 32 bytes for a total of 2221Oracle(R) Integrated Lights Out ManagerVersion 3.0.16.15.e r87097Copyright (c) 2014, Oracle and/or its affiliates. All rights reserved.-> sdebug2: channel 0: rcvd eofdebug2: channel 0: output open -> draindebug1: client_input_channel_req: channel 0 rtype exit-status reply 0debug2: channel 0: rcvd closedebug3: channel 0: will not send data after closedebug1: channel 0: forcing writehow faultyTarget | Property | Value--------------------+------------------------+----------------------------------> Session closeddebug3: channel 0: will not send data after closedebug2: channel 0: obuf emptydebug2: channel 0: close_writedebug2: channel 0: output drain -> closeddebug2: channel 0: almost deaddebug2: channel 0: gc: notify userdebug2: channel 0: gc: user detacheddebug2: channel 0: send closedebug2: channel 0: is deaddebug2: channel 0: garbage collectingdebug1: channel 0: free: client-session, nchannels 1debug3: channel 0: status: The following connections are open:#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)debug3: channel 0: close_fds r -1 w -1 e 6 c -1debug3: Wrote 32 bytes for a total of 2253debug3: Wrote 64 bytes for a total of 2317debug1: fd 0 clearing O_NONBLOCKTransferred: sent 2072, received 2696 bytes, in 0.8 secondsBytes per second: sent 2565.8, received 3338.6debug1: Exit status 0
Anyone else interested in looking into this issue?
--
You received this message because you are subscribed to the Google Groups "Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ansible-proje...@googlegroups.com.
To post to this group, send email to ansible...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-project/69dc177c-f626-4af9-a90d-796354790c23%40googlegroups.com.
I am actually quite surprised by the lack of response.When using Ansible for implementing changes across systems, I can't help to think you want to talk to network devices and alter rules? Also, when doing operating system and hardware updates, you want to talk to the BMC, for which the ssh port is the most reliable way!
I've gone through researching, and actually this seems to be a question/feature request that pops up reasonably frequently at different places.When seen as a feature request, it would be to implement a mode in the raw module, which makes raw to just log on, and issues a command and reads the output, instead of requesting a shell. mode=shell or plain.
In my opinion adding a raw plain mode would open up access to a lot of devices which are inherently unreachable by other orchestration engines because they require an agent. The magic is in the fact that you can issue any command to the device, instead of writing a module specifically for a specific device.Cheers,Frits
On Wednesday, September 3, 2014 1:45:30 PM UTC+2, Michael DeHaan wrote:I don't think it's an issue so much as a feature request - though it doesn't seem like there are, given lack of response to this email thread.I will say connections in ansible aren't meant to talk to non-computers, and in many cases, this may be something that needs to write a module to talk to them, similar to what we do with various load balancers.There was a recent thread about HP switches and not really having a shell when you login that's the same kind of thing.Most folks are using ILO's for basic power management via fence and haven't automated a lot more.Anyway, a module is probably appropriate, though we are probably unlikely to include it in core if the goal is to simulate a monitoring system.
On Wed, Sep 3, 2014 at 7:41 AM, Frits Hoogland <frits.h...@gmail.com> wrote:
Anyone else interested in looking into this issue?--To unsubscribe from this group and stop receiving emails from it, send an email to ansible-proje...@googlegroups.com.
You received this message because you are subscribed to the Google Groups "Ansible Project" group.
To post to this group, send email to ansible...@googlegroups.com.To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-project/69dc177c-f626-4af9-a90d-796354790c23%40googlegroups.com.--
You received this message because you are subscribed to the Google Groups "Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ansible-proje...@googlegroups.com.
To post to this group, send email to ansible...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-project/871f0904-3bf8-4dcf-ac30-5378d6e67be6%40googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-project/37d75320-4a0b-450f-9306-3936fe774e97%40googlegroups.com.