https://github.com/netascode/terraform-nxos-acl-example
Managing Cisco Nexus 9000 ACLs using Terraform
https://github.com/netascode/terraform-nxos-acl-example
cisco iac nexus nx-os nxos terraform
Last synced: 3 months ago
JSON representation
Managing Cisco Nexus 9000 ACLs using Terraform
- Host: GitHub
- URL: https://github.com/netascode/terraform-nxos-acl-example
- Owner: netascode
- License: apache-2.0
- Created: 2022-06-25T20:24:50.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-06-29T15:43:17.000Z (over 3 years ago)
- Last Synced: 2025-05-31T07:07:32.787Z (4 months ago)
- Topics: cisco, iac, nexus, nx-os, nxos, terraform
- Language: HCL
- Homepage:
- Size: 4.88 KB
- Stars: 3
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Cisco Nexus 9000 ACL Terraform Example
This example demonstrates how the [NX-OS Terraform Provider](https://registry.terraform.io/providers/netascode/nxos/latest/docs) can be used to maintain ACLs on one or more Nexus 9000 switches.
The configuration is derived from a set of yaml files in the `data` [directory](https://github.com/netascode/terraform-nxos-acl-example/tree/main/data).
To point this to your own Nexus 9000 switches, update the `data/inventory.yaml` file accordingly.
```yaml
---
switches:
- name: SWITCH-1
url: https://10.1.1.1
- name: SWITCH-2
url: https://10.1.1.2
```Credentials can either be provided via environment variables:
```shell
export NXOS_USERNAME=admin
export NXOS_PASSWORD=Cisco123
```Or by updating the provider configuration in `main.tf`:
```terraform
provider "nxos" {
username = admin
password = Cisco123
devices = local.devices
}
```