ncpeek (short for netconf peek) is a netconf client that retrieves data using the ncclient library.
Project description
ncpeek
ncpeek
(short for netconf peek
) is a netconf client that retrieves data using the ncclient
library.
It parses the rpc-reply into json format by default, removing any namespaces.[^1] Additional data as such as ip
, device
and field
are also included in the output.
Here's an example on how ncpeek
works, using the following xml filter:
<filter>
<system xmlns="http://openconfig.net/yang/system">
<state>
<hostname />
</state>
</system>
</filter>
It will yield this result.
[
{
"ip": "sandbox-iosxr-1.cisco.com",
"device": "sandbox-iosxr-1.cisco.com",
"field": "generic",
"data": {
"system": {
"state": {
"hostname": "sandbox-iosxr"
}
}
}
}
]
For more complex data manipulation or logic, you can add a custom parser for your xml filter or xpath. See Adding a Parser for instructions.
Use cases
I developed originally ncpeek
to be used within Telegraf to gather telemetry data from network devices and print the metrics. This was showcased in a demo presented at Cisco Impact 2023. In this scenario, a CLI client with a simple interface was what I needed.
For an upcoming talk I will deliver at Cisco Live Amsterdam 2024, I improved the netconf client and added an API layer. This allows other systems, such as AI, to call ncpeek
and fetch data from network devices. For this use case, I needed a simple API for the AI to use.
State
It's important to note upfront that ncpeek
is a pet project primarily used for demos. So far, testing has been limited to C8000V 17.09.02a and IOSXR 7.3.2 running on the DevNet always-on sandbox.
PRs are welcome, but the support provided might be limited due to the nature of the project. If you have specific requirements or need extensive modifications, you might find it more efficient to fork the project.
See the file Contributing for more information.
Installation
For CLI or API you can install ncpeek
via pip. See Details on pypi.
pip install ncpeek
To add a custom parser or work directly with the code see Development.
ncpeek
was developed on Python 3.11, consider using a virtual or dedicated environment when use it.
Usage
There are two ways to use ncpeek
; via the command-line interface (CLI) or through the API. Note that filters can be either xml
or xpath
, but only one type can be used at a time.
CLI
❯ python -m ncpeek
usage: __main__.py [-h] [-d DEVICE_SETTINGS] (-x XML_FILTER | -p XPATH_FILTER)
'ncpeek' is a netconf client designed to fetch data from various devices.
The client can be utilized in two distinct ways,
either via Command Line Interface (CLI) or Application Programming Interface (API).
The data retrieval can be filtered through either XML or XPath,
however, only one filter type can be applied at a given time.
Note that in CLI mode, only filenames can be treated as arguments.
Source code: https://github.com/jillesca/ncpeek
options:
-h, --help show this help message and exit
-d DEVICE_SETTINGS, --device-settings DEVICE_SETTINGS
Specify JSON filename containing device settings.
Visit https://github.com/jillesca/ncpeek/tree/main/ncpeek/devices for examples.
-x XML_FILTER, --xml-filter XML_FILTER
Specify XML filename containing XML filter.
Visit https://github.com/jillesca/ncpeek/tree/main/ncpeek/filters for more details.
-p XPATH_FILTER, --xpath-filter XPATH_FILTER
Formats: <xpath> OR <namespace>:<xpath>
Example: 'interfaces/interface' OR
'http://cisco.com/ns/yang/Cisco-IOS-XE-interfaces-oper:interfaces/interface'
Here's an example of how to use ncpeek
with a specific device setting and xml filter:
python -m ncpeek --device-settings=devnet_xe_sandbox.json --xml-filter=Cisco-IOS-XE-memory-oper.xml
Or with a specific device setting and xpath filter:
python -m ncpeek --device-settings=devnet_xe_sandbox.json --xpath-filter=http://cisco.com/ns/yang/Cisco-IOS-XE-native:/native/hostname
ncpeek
will print the data retrieved from the network device to stdout.
API
from ncpeek.client import NetconfClient
def api_call() -> None:
"""Example NetconfClient API"""
client = NetconfClient()
client.set_devices_settings(xr_device_settings)
client.set_xml_filter(xml_filter)
try:
result = client.fetch()
except Exception as err:
result = [{"error": f"{err=}"}]
print(result)
ncpeek
will return the data as json. See api_example.py for the full example.
Device Settings
The device settings should follow a specific structure.
-
CLI: json filename containing the device settings.
--device-settings=devnet_xe_sandbox.json
-
API: json filename, valid json string or a python dictionary with the same structure. Use the
set_devices_settings
method.def set_devices_settings( self, device_settings: Union[list, str] ) -> None:
The required fields are:
host
username
password
The rest of the fields take defaults on netconf_device
Here, you can find an example of the device settings.
[
{
"host": "sandbox-iosxe-latest-1.cisco.com",
"port": 830,
"username": "admin",
"password": "C1sco12345",
"hostkey_verify": "False",
"timeout": 10,
"device_params": {
"name": "iosxe"
}
}
]
You can add multiple devices in a single json array. However, please note that the data is retrieved sequencially.
See examples on ncpeek/devices
Filters
XML
-
CLI. filename with the xml filter.
--xml-filter=cisco_xe_ietf-interfaces.xml
- See examples on ncpeek/filters
-
API. filename or xml string. Use the
set_xml_filter
method.def set_xml_filter(self, xml_filter: str) -> None:
xpath
The following formats are accepted:
<xpath>
<namespace>:<xpath>
-
CLI.
xpath
string.-
Examples:
--xpath-filter=interfaces/interface
--xpath-filter=http://cisco.com/ns/yang/Cisco-IOS-XE-interfaces-oper:interfaces/interface
-
-
API.
xpath
string. Use theset_xpath_filter
method.def set_xpath_filter(self, xpath_filter: str) -> None:
Operations
Currently, ncpeek
only uses the GET operation to retrieve data. More operations may be added in future versions.
Built-in filters and parsers
You can call directly any of these filters by its name, without specifying their path.
Use the devnet sandbox for testing.
-
cisco_xe_ietf-interfaces.xml
(custom parser added)Cisco-IOS-XE-interfaces-oper.xml
(custom parser added)Cisco-IOS-XE-memory-oper.xml
(custom parser added)Cisco-IOS-XR-facts.xml
Cisco-IOS-XR-hostname.xml
-
xpath parser built-in
http://cisco.com/ns/yang/Cisco-IOS-XE-isis-oper:/isis-oper-data/isis-instance
(custom parser added)
Development
To Install the dependencies needed, use these commands.
poetry install
peotry shell
If you use
vscode
, startpoetry shell
and then start vscode withcode .
In case you don't have poetry, install it with curl -sSL https://install.python-poetry.org | python3 -
If you want to use pip, install the dependencies manually. The only requirement is paramiko <=2.8.1 for working with older XR and Junos versions.
If you ran into module import problems, add the root project to your PYHTONPATH
export PYTHONPATH=.
Default directories
- Device Settings default directory is ncpeek/devices.
- XML Filters default directory is ncpeek/filters.
Adding a Parser
To add a custom parser follow the steps below:
-
Clone this repository.
-
Create a parser under the parsers directory
-
Your custom parser must implement the
Parser
class. See an existing parser for an example -
the
parse
function must take three arguments and return a list with a dictionary inside.def parse( self, data_to_parse: dict, device: NetconfDevice, netconf_filter_id: str, ) -> list[dict]:
-
The variable
data_to_parse
holds a dictionary with data as key, and the rpc-reply as the value.{ "data": { "@xmlns": "urn:ietf:params:xml:ns:netconf:base:1.0", "@xmlns:nc": "urn:ietf:params:xml:ns:netconf:base:1.0", "memory-statistics": { "@xmlns": "http://cisco.com/ns/yang/Cisco-IOS-XE-memory-oper", "memory-statistic": [ { "name": "Processor", "total-memory": "2028113884", "used-memory": "192040880", }, ], }, } }
Review the tests for the parsers to get more familiar.
-
Is recommended to return the following fields beside the data on your parser
"field": self.netconf_filter_id, "device": self.device.hostname, "ip": self.device.host,
-
-
Add your new parser to the factory mapping. This way,
ncpeek
knows which parser to use for which filter.-
Follow the dictionary structure, where the first keys are the name of the filter you are using.
- If using a
xml
file, use the filename as ID, including the.xml
extension. - If using
xpath
, use the whole xpath expression.
- If using a
-
On the second level of the dictionary, add the module that has your parser and the class to import.
PARSER_MAPPING: Dict[str, Dict[str, str]] = { "cisco_xe_ietf-interfaces.xml": { "module": "ncpeek.parsers.cisco_xe_ietf_interfaces", "class": "InterfaceStatsIETF_IOSXEParser", }, "http://cisco.com/ns/yang/Cisco-IOS-XE-isis-oper:/isis-oper-data/isis-instance": { "module": "ncpeek.parsers.cisco_ios_xe_isis_oper", "class": "ISISStatsIOSXEParser", }, }
-
FAQ
- Why I see a deprecation message?
- Unfortunately, paramiko >=2.9 and IOS-XR 7.3.2 don't go well together, so I had to use an old paramiko <=2.8.1 which has this deprecation message. See ncclient/issues/526 for more info.
[^1]: Up to a maximum of 10 nested dictionaries. After that, all remaining nested directionaries will be return as they are. This limit can be configured per custom parser.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file ncpeek-0.1.3.tar.gz
.
File metadata
- Download URL: ncpeek-0.1.3.tar.gz
- Upload date:
- Size: 18.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/4.0.2 CPython/3.11.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 10a1f9b9d8d0078a0eab92d4ffb7e78eb550c6c399852d2bcca6d1c085dea2bd |
|
MD5 | 7222d9908b9c3d2f3a573b686734d5a5 |
|
BLAKE2b-256 | 417ec90ba3a2c31f4d380fa7215df30ddf1fb3d30fcd7080e0ca1e371b7b9f3b |
File details
Details for the file ncpeek-0.1.3-py3-none-any.whl
.
File metadata
- Download URL: ncpeek-0.1.3-py3-none-any.whl
- Upload date:
- Size: 24.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/4.0.2 CPython/3.11.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | a461413f130febeafc3e07b6d1de2dc8f60f5a3dc878ca19809aecf879b88720 |
|
MD5 | e1c1c2f0c36ab2a08f351b9a83609bd9 |
|
BLAKE2b-256 | f385a06a176e1b5abfcc112ac2dc9f14e59ae1ac0594da94b99e404897a94a8b |