Skip to main content

Network Automation Simplified

Project description

Network Automation Simplified - NAMS

API to the ncclient, nornir and napalm libraries that promotes code reuse, reduces development time and simplifies network automation in Python. All network changes have a set or subset of functions in common. NAMS supports many functions across multiple vendor platforms, that are executed in a predetermined order. This simplifies the automation process, without restricting the user to a domain-specific language (DSL) or sacrificing flexability, granularity or speed.

Installation

Download as a Python package or deploy as a Docker Container. Docker Container is recommended for exploring code examples.

Python Package

Ubuntu
apt-get install python3.7 python3.7-dev python3-pip
python3.7 -m pip install network-automation-simplified

https://pypi.org/project/network-automation-simplified/

Docker

Important: the docker container will only save host data stored in the "/home" and "/svr/nams" directories. All other data will be lost upon reboot/shutdown.

Linux
sudo apt-get update
sudo apt-get install docker docker-compose
git clone <project path>
cd cox_nams/docker && sudo bash build.sh
Mac
# 'brew' must be installed
brew install docker
brew install docker-compose
brew install docker-machine
git clone <project path>
cd <project name>/docker
bash build.sh
Authentication
Defaults Shell SSH Jupyter HTTP
username root admin n/a n/a
password install install n/a n/a
port n/a 10000 10001 10002
Interfaces
Service Client Interface Example
Linux host's shell docker exec -it nams bash
SSH ssh client ssh <user>@<host_ip> -p 10000
Jupyter web browser http://<host_ip>:10001
HTTP web browser http://<host_ip>:10002
Problems

Its possible that the host's docker network can assign a subnet that overlaps with devices you are attempting to connect to via nams. In this case, static routes are required on the host. e.g. create a static route to '172.17.248.0/24' if the Docker subnet is '172.17.0.0/16' and the router is '172.17.248.1/32'.

Automation Libraries

ncclient

ncclient is Python library for interfacing with a NETCONF device. ncclient is leveraged by tools like Jsnapy and Ansible. It is vendor neutral and provides a 'raw', or unabstracted interface. The downside of working with ncclient is that it requires the user to perform inventory management, multiprocessing, error-handling, encoding conversions, file saving, etc.

https://ncclient.readthedocs.io/en/latest/index.html

Nornir

Nornir is a relatively new Python framework developed by the same creators of NAPALM and netmiko. It's primary role is to provide inventory management and multiprocessing for APIs like ncclient, NAPALM, netmiko, and others. One downfall of Nornir the ability to integrate Jsnapy. This is a critical component for health checks on Juniper devices. Because Nornir is an Open framework, a component of the framework, like inventory, can be re-used by others. Nornir's inventory is re-used by NAMS.

https://nornir.readthedocs.io/en/stable/

Jsnapy

Jsnapy is an excellent Python tool for executing health checks against JunOS platforms. It abstracts netconf requests and responses, by allowing test case definitions via a 'yaml' file. In the yaml file, various parameters state parameters of 'show' output can be validated. When a response is received and the test case passes, the node is considered health (vice versa for a failure). Jsnapy uses ncclient to interface with a device.

https://github.com/Juniper/jsnapy

NAPALM

NAPALM is unified API for multi-vendor network environments. It translates high-level 'orders' into CLI commands. Additionally, it returns output as Python objects e.g. lists, dictionaries, etc. for easy parsing. This output is the same for all vendors. However, because there are so many results that would have to be translated into Python objects, not all commands are supported. Additionally, some vendors have support than others. The majority of support is in EOS systems which are uncommon to most network environments. To workaround this, the developers allow interfacing with devices through Netconf or netmiko without translating results but while performing with error handling. In a network domain of Juniper routers, it makes more sense to avoid the NAPALM API and leverage Juniper's Jsnapy interface with ncclient. This is because Jsnapy cannot easily be integrated into NAPALM without developer involvement.

https://napalm.readthedocs.io/en/latest/

Ansible

Ansible is a YAML driven, network automation solution that supports native commands and Netconf for multiple vendors. It has an excellent inventory system for device management and generating configurations. YAML is a simple 'language' that users interface with; this hides the underlying Python code. Because of YAML abstraction, Ansible sacrifices flexibility. YAML is also not a 'programming language'. This can make seemingly simple tasks quite difficult to 'program' or even impossible. Another downside of Ansible is that an operation is executed on all routers before the next operation is performed. Examples below describe some scenarios that become quite challenging or impossible with Ansible:

  1. Group Operations: Executing multiple operations on a single router before moving to the next. Additionally, user prompting at each device.

  2. Conditional Operations: Suppose you want you want to get the configuration from all routers, find routers with 'X' configuration, and then make a change to only those select routers.

  3. Speed: Each operation requires a new SSH / NETCONF session. Suppose you have two tasks (1) get configuration (2) edit configuration. Each operation requires a new session.

https://docs.ansible.com/

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

network-automation-simplified-0.7.1.tar.gz (18.4 kB view details)

Uploaded Source

Built Distribution

File details

Details for the file network-automation-simplified-0.7.1.tar.gz.

File metadata

  • Download URL: network-automation-simplified-0.7.1.tar.gz
  • Upload date:
  • Size: 18.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.14.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.35.0 CPython/3.5.2

File hashes

Hashes for network-automation-simplified-0.7.1.tar.gz
Algorithm Hash digest
SHA256 9b144bfb152a1f5d12a3f4f40301ca87164f5ac6caa9f93ee4854116278d3755
MD5 808c21be93f24fa832c22913eb6638cd
BLAKE2b-256 d30b956f177e64370cec1fe8866a93001a6ac927c597a5753a48359163e2e4d0

See more details on using hashes here.

File details

Details for the file network_automation_simplified-0.7.1-py3-none-any.whl.

File metadata

  • Download URL: network_automation_simplified-0.7.1-py3-none-any.whl
  • Upload date:
  • Size: 19.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.14.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.35.0 CPython/3.5.2

File hashes

Hashes for network_automation_simplified-0.7.1-py3-none-any.whl
Algorithm Hash digest
SHA256 dd8245c40c6a458188031250ed6fa7f666876d7a11c42fb5f46297d16529dfbf
MD5 6c1da98b304c9d938374420be9f559a2
BLAKE2b-256 6e10091ab48df8289bc75cc228b31528e57902904793cfb0c988aef662d1bc51

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page