Cisco Catalyst WAN SDK for Python
Project description
Cisco Catalyst WAN SDK is a package for creating simple and parallel automatic requests via official SD-WAN Manager API. It is intended to serve as a multiple session handler (provider, provider as a tenant, tenant). The library is not dependent on environment which is being run in, you just need a connection to any SD-WAN Manager.
Important Notice: Early Beta Release
Welcome to the Cisco Catalyst WAN SDK!
We are thrilled to announce that Cisco Catalyst WAN SDK is now available in early beta. This is an exciting step forward in enabling developers to harness the full potential of Cisco's networking solutions. Please be aware that, as an early beta release, this version of the SDK is still undergoing development and testing. As such, it is provided "as is" and support to address any issues are limited and best effort.
Not recommend to use in production environments.
We encourage developers to explore and test the SDK's capabilities, but please exercise caution when using it in production environments. We are dedicated to improving the Cisco Catalyst WAN SDK and we value your input. Your feedback is crucial to us-it will guide us in refining and enhancing the SDK to better meet your needs. To report any issues, share your insights, or suggest improvements, please visit our Issues page on GitHub or reach out to us through the provided communication channels.
Thank you for being a part of our development journey!
Installation
pip install catalystwan
Manager Session
In order to execute SDK APIs ManagerSession needs to be created. The fastest way to get started is to use create_manager_session()
method which configures session, performs authentication for given credentials and returns ManagerSession instance in operational state. ManagerSession provides a collection of supported APIs in api
instance variable.
Please check example below:
from catalystwan.session import create_manager_session
url = "example.com"
username = "admin"
password = "password123"
with create_manager_session(url=url, username=username, password=password) as session:
devices = session.api.devices.get()
print(devices)
ManagerSession extends requests.Session so all functionality from requests library is avaiable to user, it also implements python contextmanager and automatically frees server resources on exit.
Configure Manager Session before using (click to expand)
It is possible to configure ManagerSession prior sending any request.
from catalystwan.session import ManagerSession
url = "example.com"
username = "admin"
password = "password123"
# configure session using constructor - nothing will be sent to target server yet
session = ManagerSession(url=url, username=username, password=password)
# login and send requests
session.login()
session.get("/dataservice/device")
session.close()
When interacting with the SDWAN Manager API without using a context manager, it's important
to manually execute the close()
method to release the user session resource.
Ensure that the close()
method is called after you have finished using the session to maintain optimal resource management and avoid potential errors.
Login as Tenant (click to expand)
Tenant domain needs to be provided in url together with Tenant credentials.
from catalystwan.session import create_manager_session
url = "tenant.example.com"
username = "tenant_user"
password = "password123"
with create_manager_session(url=url, username=username, password=password) as session:
print(session.session_type)
Login as Provider-as-Tenant (click to expand)
Tenant subdomain
needs to be provided as additional argument together with Provider credentials.
from catalystwan.session import create_manager_session
url = "example.com"
username = "provider"
password = "password123"
subdomain = "tenant.example.com"
with create_manager_session(url=url, username=username, password=password, subdomain=subdomain) as session:
print(session.session_type)
API usage examples
All examples below assumes session
variable contains logged-in Manager Session instance.
Get devices (click to expand)
devices = session.api.devices.get()
Admin Tech (click to expand)
admin_tech_file = session.api.admin_tech.generate("172.16.255.11")
session.api.admin_tech.download(admin_tech_file)
session.api.admin_tech.delete(admin_tech_file)
Speed test (click to expand)
devices = session.api.devices.get()
speedtest = session.api.speedtest.speedtest(devices[0], devices[1])
Upgrade device (click to expand)
# Prepare devices list
controllers = session.endpoints.configuration_device_inventory.get_device_details('controllers')
vsmarts = controllers.filter(personality=Personality.VSMART)
image = "viptela-20.7.2-x86_64.tar.gz"
# Upload image
session.api.repository.upload_image(image)
# Install software
install_task = session.api.software.install(devices=vsmarts, image=image)
# Check action status
install_task.wait_for_completed()
Get alarms (click to expand)
To get all alarms:alarms = session.api.alarms.get()
To get all not viewed alarms:
not_viewed_alarms = session.api.alarms.get().filter(viewed=False)
To get all alarms from past n
hours:
n = 24
alarms_from_n_hours = session.api.alarms.get(from_time=n)
To get all critical alarms from past n
hours:
from catalystwan.utils.alarm_status import Severity
n = 48
critical_alarms = session.api.alarms.get(from_time=n).filter(severity=Severity.CRITICAL)
Users (click to expand)
# Get all users
session.api.users.get()
# Create user
from catalystwan.endpoints.administration_user_and_group import User
new_user = User(username="new_user", password="new_user", group=["netadmin"], description="new user")
session.api.users.create(new_user)
# Update user data
new_user_update = UserUpdateRequest(username="new_user", group=["netadmin", "netops"], locale="en_US", description="updated-new_user-description")
session.api.users.update(new_user_update)
# Update user password
session.api.users.update_password("new_user", "n3W-P4s$w0rd")
# Reset user
session.api.users.reset("new_user")
# Delete user
session.api.users.delete("new_user")
# Get current user authentication type and role
session.api.users.get_auth_type()
session.api.users.get_role()
User Groups (click to expand)
# Get all user groups
session.api.user_groups.get()
# Create user group
group = UserGroup("new_user_group", [])
group.enable_read({"Audit Log", "Alarms"})
group.enable_read_and_write({"Device Inventory"})
session.api.user_groups.create(group)
# Update user group
group.disable({"Alarms"})
session.api.user_groups.update(group)
# Delete user group
session.api.user_groups.delete(group.group_name)
Sessions (click to expand)
# Get all active sessions
active_sessions = session.api.sessions.get()
# Invalidate sessions for given user
new_user_sessions = active_sessions.filter(raw_username="new_user")
session.api.sessions.invalidate(new_user_sessions)
Resource Groups (click to expand)
# get resource groups
session.api.resource_groups.get()
# create resource group
new_resource_group = ResourceGroup(
name="new_resource_group",
desc="Custom Resource Group #1",
siteIds=[]
)
session.api.resource_groups.create(new_resource_group)
# update resource group
resource_group = session.api.resource_groups.get().filter(name="new_resource_group").single_or_default()
updated_resource_group = ResourceGroupUpdateRequest(
id=resource_group.id,
name=resource_group.name,
desc="Custom Resource Group #1 with updated description and site ids",
siteIds=[200]
)
# switch to resource group view
session.api.resource_groups.switch("new_resource_group")
# delete resource group
session.api.resource_groups.delete(resource_group.id)
Tenant management (click to expand)
api = session.api.tenant_management
# create tenants
tenants = [
Tenant(
name="tenant1",
org_name="CiscoDevNet",
subdomain="alpha.bravo.net",
desc="This is tenant for unit tests",
edge_connector_enable=True,
edge_connector_system_ip="172.16.255.81",
edge_connector_tunnel_interface_name="GigabitEthernet1",
wan_edge_forecast=1,
)
]
create_task = api.create(tenants)
create_task.wait_for_completed()
# list all tenants
tenants_data = api.get_all()
# pick tenant from list by name
tenant = tenants_data.filter(name="tenant1").single_or_default()
# get selected tenant id
tenant_id = tenant.tenant_id
# get vsession id of selected tenant
vsessionid = api.vsession_id(tenant_id)
# delete tenant by ids
delete_task = api.delete([tenant_id])
delete_task.wait_for_completed()
# others
api.get_hosting_capacity_on_vsmarts()
api.get_statuses()
api.get_vsmart_mapping()
Tenant migration (click to expand)
from pathlib import Path
from catalystwan.session import create_manager_session
from catalystwan.models.tenant import TenantExport
from catalystwan.workflows.tenant_migration import migration_workflow
tenant = TenantExport(
name="mango",
desc="Mango tenant description",
org_name="Provider Org-Mango Inc",
subdomain="mango.fruits.com",
wan_edge_forecast=100,
migration_key="MangoTenantMigrationKey", # only for SDWAN Manager >= 20.13
is_destination_overlay_mt=True, # only for SDWAN Manager >= 20.13
)
with create_manager_session(url="10.0.1.15", username="st-admin", password="") as origin_session, \
create_manager_session(url="10.9.0.16", username="mt-provider-admin", password="") as target_session:
migration_workflow(
origin_session=origin_session,
target_session=target_session,
workdir=Path("workdir"),
tenant=tenant,
validator="10.9.12.26"
)
migration_workflow
performs multi-step migration procedure according to Migrate Single-Tenant Cisco SD-WAN Overlay to Multitenant Cisco SD-WAN Deployment
Since 20.13 also MT to ST is supported (just provide suitable origin/target sessions, and is_destination_overlay_mt
parameter)
Each step of the migration_workflow
procedure can be executed independently using api methods: export_tenant
, download
, import_tenant
, store_token
, migrate_network
origin_api = origin_session.api.tenant_migration_api
target_api = target_session.api.tenant_migration_api
tenant_file = Path("~/tenant.tar.gz")
token_file = Path("~/tenant-token.txt")
# export
export_task = origin_api.export_tenant(tenant=tenant)
remote_filename = export_task.wait_for_file()
# download
origin_api.download(export_path, remote_filename)
# import
import_task = target_api.import_tenant(export_path, tenant.migration_key)
import_task.wait_for_completed()
# get token
migration_id = import_task.import_info.migration_token_query_params.migration_id
target_api.store_token(migration_id, token_path)
# migrate network
migrate_task = origin_api.migrate_network(token_path)
migrate_task.wait_for_completed()
Note:
To remove InsecureRequestWarning
, you can include in your scripts (warning is suppressed when catalystwan_devel
environment variable is set):
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
Catching Exceptions
try:
session.api.users.delete("bogus-user-name")
except ManagerHTTPError as error:
# Process an error.
print(error.response.status_code)
print(error.info.code)
print(error.info.message)
print(error.info.details)
Supported API endpoints
Contributing, bug reporting and feature requests
Seeking support
You can contact us by submitting issues, or directly via mail on catalystwan@cisco.com.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file catalystwan-0.33.8.dev2.tar.gz
.
File metadata
- Download URL: catalystwan-0.33.8.dev2.tar.gz
- Upload date:
- Size: 644.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.3.1 CPython/3.8.18 Linux/6.5.0-1022-azure
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2881622a8bc7a29ac6f974c39f8ce76a4132fcdd1d7914e69ad8b708d1af22ac |
|
MD5 | 105a1705dcc147f33fc73dc53c59caa4 |
|
BLAKE2b-256 | 9f4afe445dbd2014742712f62132b78fbbfde1acb1758882697aafd3919cbd15 |
File details
Details for the file catalystwan-0.33.8.dev2-py3-none-any.whl
.
File metadata
- Download URL: catalystwan-0.33.8.dev2-py3-none-any.whl
- Upload date:
- Size: 961.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.3.1 CPython/3.8.18 Linux/6.5.0-1022-azure
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0bfc728b38b1f9fd9169b57df31ca29b285548bdd21d35a22244b0a45c54ba80 |
|
MD5 | 3d28e6f5da44224af783fe048d2548e6 |
|
BLAKE2b-256 | 20aaea290269efee4fe36a8bf03ab59ba7361b22442c68c4f1b82a6c53a2b0b5 |