Thanks for the information and your help here; however, this isn't working either. When running "panos_match_rule" module I got the following error: ======================== fatal: [mypanorama]: FAILED! => { "changed": false, "invocation": { "module_args": { "api_key": null, "application": "ntp", "category": null, "destination_ip": "any", "destination_port": 123, "destination_zone": null, "ip_address": "1.2.3.4", "password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", "protocol": null, "rule_type": "security", "source_ip": "any", "source_port": null, "source_user": null, "source_zone": null, "to_interface": null, "username": "ansiblepan", "vsys_id": "vsys3456" } } } MSG: Panorama is not supported. ======================== However!, what I did find out was that "panos_query_rules" works when using the following playbook: tasks: - name: Find a specific security rule panos_query_rules: ip_address: '{{ firewall_host }}' username: '{{ pan_username }}' password: '{{ pan_password }}' tag_name: 'NTP_permit' devicegroup: 'LABGroup' register: result I really appreciate you guys helped me here. My concern is that the official PAN and Ansible documentation isn't accurate, as you can see in the last example described at https://docs.ansible.com/ansible/latest/modules/panos_security_rule_module.html. Thanks!
... View more