Python script to automate the upgrade process of PAN-OS firewalls.
Project description
PAN-OS and Panorama Upgrade Automation
Streamlining Upgrades of Palo Alto Networks Firewall and Panorama appliances
Documentation Website ยป
View Demo
Report Bug
Request Feature
Table of Contents
About The Project
pan-os-upgrade
is designed to provide network administrators and security professionals with an efficient tool to execute configuration backups, network state snapshots, system readiness checks, and operating system upgrades of Palo Alto Networks firewalls and Panorama appliances.
Project Link: https://github.com/cdot65/pan-os-upgrade
Documentation Website: https://cdot65.github.io/pan-os-upgrade/
YouTube Documentation:
Support
For details on the support provided by Palo Alto Networks for this project, please consult the SUPPORT.md file in the repository.
Key Features
- Three Unique Upgrade Workflows Supported:
firewall
: targets and upgrades an individual PAN-OS firewallpanorama
: targets and upgrades an individual Panorama appliancebatch
: targets a Panorama appliance and upgrades firewalls in bulk
- Automation of Routine Tasks: Reduces manual errors and saves time by automating upgrades, configurations, and system checks.
- Support for Direct and Proxy Connections: Connect directly to firewalls or through a Panorama appliance, with support for targeting specific devices using filters.
- Pre/Post Diff: Network snapshots are taken before and after the upgrade process, providing a PDF report of changes within the network environment after the upgrade completes.
- Active/Passive and Active/Active High Availability (HA) Workflow: Fully supports upgrading devices in active/passive or active/active HA configurations when executed in
batch
mode, ensuring both members are properly upgraded and synchronized. - Multi-threading for Efficiency: Utilizes multi-threading to parallelize upgrades, especially beneficial when upgrading multiple devices through Panorama, enhancing performance and reducing overall upgrade time.
- Customizable and Extensible: Execution of the script can be tailored to fit diverse network environments and requirements, offering flexibility for various deployment scenarios.
- Comprehensive PAN-OS Interactions: Facilitates extensive interactions with Palo Alto Networks appliances for operations like readiness checks, state snapshots, and report generation.
Note: While this script is optimized for standalone and active/passive HA environments, it has not been tested against active/active or clustered firewalls.
Logic Workflow
You can view the logical workflow of the pan-os-upgrade
subcommands by viewing these diagrams:
Example Execution
โฏ pan-os-upgrade batch
Panorama hostname or IP: panorama1.cdot.io
Panorama username: officehours
Panorama password:
Firewall target version (ex: 10.1.2): 10.1.3-h3
Dry Run? [Y/n]: n
=================================================================================================
Welcome to the PAN-OS upgrade tool
This script software is provided on an 'as-is' basis with no warranties, and no support provided.
The selected `batch` subcommand will upgrade one or more firewalls.
Settings: No settings.yaml file was found, default values will be used.
You can create a settings.yaml file with 'pan-os-upgrade settings' command.
Inventory: No inventory.yaml file was found, firewalls will need be selected through the menu.
You can create an inventory.yaml file with 'pan-os-upgrade inventory' command.
=================================================================================================
๐ panorama1.cdot.io: Connection to the appliance successful.
โ
panorama1.cdot.io: Connection to Panorama established. Firewall connections will be proxied!
๐ง panorama1.cdot.io: Retrieving a list of all firewalls connected to Panorama...
๐ง panorama1.cdot.io: Retrieving detailed information of each firewall...
โโโโโโโคโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโคโโโโโโโโโโคโโโโโโโโโโโโคโโโโโโโโโโโโคโโโโโโโโโโโโคโโโโโโโโโโโโ
โ # โ Hostname โ IP Address โ Model โ PAN-OS โ Content โ HA Mode โ Preempt โ
โโโโโโโชโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโชโโโโโโโโโโชโโโโโโโโโโโโชโโโโโโโโโโโโชโโโโโโโโโโโโชโโโโโโโโโโโโก
โ 1 โ katy-fw1 โ 192.168.255.41 โ PA-VM โ 10.1.3-h3 โ 8799-8509 โ passive โ no โ
โโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโค
โ 2 โ katy-fw2 โ 192.168.255.42 โ PA-VM โ 10.1.3-h3 โ 8799-8509 โ active โ no โ
โโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโค
โ 3 โ lab-fw1 โ 192.168.255.11 โ PA-VM โ 10.1.3 โ 8729-8157 โ disabled โ N/A โ
โโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโค
โ 4 โ lab-fw2 โ 192.168.255.12 โ PA-VM โ 10.1.3 โ 8729-8157 โ disabled โ N/A โ
โโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโค
โ 5 โ lab-fw3 โ 192.168.255.13 โ PA-VM โ 10.1.3 โ 8729-8157 โ disabled โ N/A โ
โโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโค
โ 6 โ lab-fw4 โ 192.168.255.14 โ PA-VM โ 10.1.3 โ 8729-8157 โ disabled โ N/A โ
โโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโค
โ 7 โ lab-fw5 โ 192.168.255.15 โ PA-VM โ 10.1.3 โ 8729-8157 โ disabled โ N/A โ
โโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโค
โ 8 โ lab-fw6 โ 192.168.255.16 โ PA-VM โ 10.1.4-h4 โ 8729-8157 โ active โ yes โ
โโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโค
โ 9 โ lab-fw7 โ 192.168.255.17 โ PA-VM โ 10.1.4-h4 โ 8729-8157 โ passive โ yes โ
โโโโโโโงโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโงโโโโโโโโโโงโโโโโโโโโโโโงโโโโโโโโโโโโงโโโโโโโโโโโโงโโโโโโโโโโโโ
You can select devices by entering their numbers, ranges, or separated by commas.
Examples: '1', '2-4', '1,3,5-7'.
Type 'done' on a new line when finished.
Enter your selection(s): 3-4
- lab-fw1 selected.
- lab-fw2 selected.
Enter your selection(s): done
๐ง panorama1.cdot.io: Selected 2 firewalls from inventory.yaml for upgrade.
๐ panorama1.cdot.io: Upgrading 2 devices to version 10.1.3-h3...
๐ panorama1.cdot.io: Please confirm the selected firewalls:
- lab-fw1 (192.168.255.11)
- lab-fw2 (192.168.255.12)
๐ง panorama1.cdot.io: Dry run mode is disabled, upgrade workflow will be executed.
๐ panorama1.cdot.io: Do you want to proceed with the upgrade? [y/N]: y
๐ Proceeding with the upgrade...
๐ Proceeding with the upgrade...
๐ง panorama1.cdot.io: Using 10 threads.
๐ lab-fw1: 007054000654321 192.168.255.41
๐ lab-fw2: 007054000654322 192.168.255.42
๐ lab-fw1: HA mode: active
๐ lab-fw2: HA mode: passive
๐ lab-fw1: Local state: active, Local version: 10.1.3, Peer version: 10.1.3
๐ lab-fw1: Version comparison: equal
๐ lab-fw1: Detected active target device in HA pair running the same version as its peer. Added target device to revisit list.
๐ lab-fw2: Local state: passive, Local version: 10.1.3, Peer version: 10.1.3
๐ lab-fw2: Version comparison: equal
๐ lab-fw2: Target device is passive
๐ lab-fw2: Current version: 10.1.3
๐ lab-fw2: Target version: 10.1.3-h3
โ
lab-fw2: Upgrade required from 10.1.3 to 10.1.3-h3
๐ง lab-fw2: Refreshing list of available software versions
โ
lab-fw2: version 10.1.3-h3 is available for download
โ
lab-fw2: Base image for 10.1.3-h3 is already downloaded
๐ lab-fw2: Performing test to see if 10.1.3-h3 is already downloaded.
โ
lab-fw2: version 10.1.3-h3 already on target device.
โ
lab-fw2: 10.1.3-h3 has been downloaded and sync'd to HA peer.
๐ lab-fw2: Performing snapshot of network state information.
๐ lab-fw2: Attempting to capture network state snapshot (Attempt 1 of 3).
โ
lab-fw2: Network snapshot created successfully on attempt 1.
๐พ lab-fw2: Network state snapshot collected and saved to assurance/snapshots/lab-fw2/pre/2024-02-25_04-14-15.json
๐ lab-fw2: Performing readiness checks of target firewall.
๐ lab-fw2: Performing readiness checks to determine if firewall is ready for upgrade.
โ
lab-fw2: Passed Readiness Check: Check if active support is available
๐จ lab-fw2: Skipped Readiness Check: Check if a given ARP entry is available in the ARP table
โ
lab-fw2: Passed Readiness Check: Check if there are pending changes on device
๐จ lab-fw2: Skipped Readiness Check: Check if the certificates' keys meet minimum size requirements
๐จ lab-fw2: Skipped Readiness Check: Running Latest Content Version
โ
lab-fw2: Passed Readiness Check: Check if any Dynamic Update job is scheduled to run within the specified time window
โ
lab-fw2: Passed Readiness Check: No Expired Licenses
๐จ lab-fw2: Skipped Readiness Check: Check if a there is enough space on the `/opt/panrepo` volume for downloading an PanOS image.
โ
lab-fw2: Passed Readiness Check: Checks HA pair status from the perspective of the current device
๐จ lab-fw2: Skipped Readiness Check: Check if a given IPsec tunnel is in active state
๐จ lab-fw2: Skipped Readiness Check: Check for any job with status different than FIN
๐จ lab-fw2: Skipped Readiness Check: Check if NTP is synchronized
โ
lab-fw2: Passed Readiness Check: Check if the clock is synchronized between dataplane and management plane
โ
lab-fw2: Passed Readiness Check: Check connectivity with the Panorama appliance
๐จ lab-fw2: Skipped Readiness Check: Check if a critical session is present in the sessions table
โ
lab-fw2: Readiness Checks completed
๐ lab-fw2: Checking if HA peer is in sync.
โ
lab-fw2: HA peer sync test has been completed.
๐ lab-fw2: Performing backup of configuration to local filesystem.
๐ lab-fw2: Not a dry run, continue with upgrade.
๐ lab-fw2: Performing upgrade to version 10.1.3-h3.
๐ lab-fw2: The install will take several minutes, check for status details within the GUI.
๐ lab-fw2: Attempting upgrade to version 10.1.3-h3 (Attempt 1 of 3).
Device 007054000654322 installing version: 10.1.3-h3
โ
lab-fw2: Upgrade completed successfully
๐ lab-fw2: Rebooting the target device.
๐ง lab-fw2: Retry attempt 1 due to error: 007054000654322 not connected
๐ง lab-fw2: Retry attempt 2 due to error: 007054000654322 not connected
๐ง lab-fw2: Retry attempt 3 due to error: 007054000654322 not connected
๐ง lab-fw2: Retry attempt 4 due to error: 007054000654322 not connected
๐ง lab-fw2: Retry attempt 5 due to error: 007054000654322 not connected
๐ง lab-fw2: Retry attempt 6 due to error: 007054000654322 not connected
๐ง lab-fw2: Retry attempt 7 due to error: 007054000654322 not connected
๐ง lab-fw2: Retry attempt 8 due to error: 007054000654322 not connected
๐ lab-fw2: Current device version: 10.1.3-h3
โ
lab-fw2: Device rebooted to the target version successfully.
๐ lab-fw2: Performing backup of configuration to local filesystem.
๐ง lab-fw2: Waiting for the device to become ready for the post upgrade snapshot.
๐ lab-fw2: Performing snapshot of network state information.
๐ lab-fw2: Attempting to capture network state snapshot (Attempt 1 of 3).
โ lab-fw2: Error running snapshots: ElementTree.fromstring ParseError: junk after document element: line 1, column 3703
๐ lab-fw2: Attempting to capture network state snapshot (Attempt 1 of 3).
โ
lab-fw2: Network snapshot created successfully on attempt 1.
๐พ lab-fw2: Network state snapshot collected and saved to assurance/snapshots/lab-fw2/post/2024-02-25_04-32-05.json
๐พ lab-fw2: Snapshot comparison PDF report saved to assurance/snapshots/lab-fw2/diff/2024-02-25_04-32-08_report.pdf
๐ panorama1.cdot.io: Revisiting firewalls that were active in an HA pair and had the same version as their peers.
๐ lab-fw1: 007054000654321 192.168.255.41
๐ lab-fw1: HA mode: active
๐ lab-fw1: Local state: active, Local version: 10.1.3, Peer version: 10.1.3-h3
Waiting for HA synchronization to complete on lab-fw1. Attempt 1/3
HA synchronization complete on lab-fw1. Proceeding with upgrade.
๐ lab-fw1: Version comparison: older
๐ lab-fw1: Target device is on an older version
๐ lab-fw1: Suspending HA state of active
๐ง lab-fw1: Error received when suspending active target device HA state: argument of type 'NoneType' is not iterable
๐ lab-fw1: Current version: 10.1.3
๐ lab-fw1: Target version: 10.1.3-h3
โ
lab-fw1: Upgrade required from 10.1.3 to 10.1.3-h3
๐ง lab-fw1: Refreshing list of available software versions
โ
lab-fw1: version 10.1.3-h3 is available for download
โ
lab-fw1: Base image for 10.1.3-h3 is already downloaded
๐ lab-fw1: Performing test to see if 10.1.3-h3 is already downloaded.
โ
lab-fw1: version 10.1.3-h3 already on target device.
โ
lab-fw1: 10.1.3-h3 has been downloaded and sync'd to HA peer.
๐ lab-fw1: Performing snapshot of network state information.
๐ lab-fw1: Attempting to capture network state snapshot (Attempt 1 of 3).
โ
lab-fw1: Network snapshot created successfully on attempt 1.
๐พ lab-fw1: Network state snapshot collected and saved to assurance/snapshots/lab-fw1/pre/2024-02-25_04-33-26.json
๐ lab-fw1: Performing readiness checks of target firewall.
๐ lab-fw1: Performing readiness checks to determine if firewall is ready for upgrade.
โ
lab-fw1: Passed Readiness Check: Check if active support is available
๐จ lab-fw1: Skipped Readiness Check: Check if a given ARP entry is available in the ARP table
โ
lab-fw1: Passed Readiness Check: Check if there are pending changes on device
๐จ lab-fw1: Skipped Readiness Check: Check if the certificates' keys meet minimum size requirements
๐จ lab-fw1: Skipped Readiness Check: Running Latest Content Version
โ
lab-fw1: Passed Readiness Check: Check if any Dynamic Update job is scheduled to run within the specified time window
โ
lab-fw1: Passed Readiness Check: No Expired Licenses
๐จ lab-fw1: Skipped Readiness Check: Check if a there is enough space on the `/opt/panrepo` volume for downloading an PanOS image.
๐จ lab-fw1: Skipped Readiness Check: Checks HA pair status from the perspective of the current device
๐จ lab-fw1: Skipped Readiness Check: Check if a given IPsec tunnel is in active state
๐จ lab-fw1: Skipped Readiness Check: Check for any job with status different than FIN
๐จ lab-fw1: Skipped Readiness Check: Check if NTP is synchronized
โ
lab-fw1: Passed Readiness Check: Check if the clock is synchronized between dataplane and management plane
โ
lab-fw1: Passed Readiness Check: Check connectivity with the Panorama appliance
๐จ lab-fw1: Skipped Readiness Check: Check if a critical session is present in the sessions table
โ
lab-fw1: Readiness Checks completed
๐ lab-fw1: Checking if HA peer is in sync.
โ
lab-fw1: HA peer sync test has been completed.
๐ lab-fw1: Performing backup of configuration to local filesystem.
๐ lab-fw1: Not a dry run, continue with upgrade.
๐ lab-fw1: Performing upgrade to version 10.1.3-h3.
๐ lab-fw1: The install will take several minutes, check for status details within the GUI.
๐ lab-fw1: Attempting upgrade to version 10.1.3-h3 (Attempt 1 of 3).
Device 007054000654321 installing version: 10.1.3-h3
โ
lab-fw1: Upgrade completed successfully
๐ lab-fw1: Rebooting the target device.
๐ง lab-fw1: Retry attempt 1 due to error: 007054000654321 not connected
๐ง lab-fw1: Retry attempt 2 due to error: 007054000654321 not connected
๐ง lab-fw1: Retry attempt 3 due to error: 007054000654321 not connected
๐ง lab-fw1: Retry attempt 4 due to error: 007054000654321 not connected
๐ง lab-fw1: Retry attempt 5 due to error: 007054000654321 not connected
๐ง lab-fw1: Retry attempt 6 due to error: 007054000654321 not connected
๐ง lab-fw1: Retry attempt 7 due to error: 007054000654321 not connected
๐ lab-fw1: Current device version: 10.1.3-h3
โ
lab-fw1: Device rebooted to the target version successfully.
๐ lab-fw1: Performing backup of configuration to local filesystem.
๐ง lab-fw1: Waiting for the device to become ready for the post upgrade snapshot.
๐ lab-fw1: Performing snapshot of network state information.
๐ lab-fw1: Attempting to capture network state snapshot (Attempt 1 of 3).
โ
lab-fw1: Network snapshot created successfully on attempt 1.
๐พ lab-fw1: Network state snapshot collected and saved to assurance/snapshots/lab-fw1/post/2024-02-25_04-50-28.json
๐พ lab-fw1: Snapshot comparison PDF report saved to assurance/snapshots/lab-fw1/diff/2024-02-25_04-50-29_report.pdf
โ
panorama1.cdot.io: Completed revisiting firewalls
Here's an example of the PDF diff report that's generated:
Usage
There are two primary methods to utilize the pan-os-upgrade
tool: through a Python virtual environment or via a Docker container.
Please refer to the dedicated documentation website to understand how to use this tool.
Documentation Site: https://cdot65.github.io/pan-os-upgrade/
Contributing
Contributions are what make the open source community such an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.
If you have a suggestion that would make this better, please fork the repo and create a pull request or open an issue with the tag "enhancement". Don't forget to give the project a star! Thanks again!
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/AmazingFeature
) - Commit your Changes (
git commit -m 'Add some AmazingFeature'
) - Push to the Branch (
git push origin feature/AmazingFeature
) - Open a Pull Request
See Contributing Guidelines for detailed instructions.
License
This project is licensed under the Apache 2.0 License - see the LICENSE file for details.
Contact
Email Address - cremsburg.dev at gmail.com
Acknowledgments
This project is built upon the shoulders of two powerful Python libraries: pan-os-python
and panos-upgrade-assurance
. Both of these libraries are developed and maintained by Palo Alto Networks, providing an incredible amount of capabilities when automating PAN-OS and Panorama with Python.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file pan_os_upgrade-1.3.10.tar.gz
.
File metadata
- Download URL: pan_os_upgrade-1.3.10.tar.gz
- Upload date:
- Size: 72.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.7.1 CPython/3.11.7 Darwin/23.4.0
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3f5fb88e7dbd4343a4798465aea8d761a824adcb1209bd7a64ade0d6f317866a |
|
MD5 | bf0f0823d5106335f6f0aed4abfdd756 |
|
BLAKE2b-256 | 5f52bb125945a4c88e712d2dd4800456f8bea7523d53413fc56521403bb27038 |
File details
Details for the file pan_os_upgrade-1.3.10-py3-none-any.whl
.
File metadata
- Download URL: pan_os_upgrade-1.3.10-py3-none-any.whl
- Upload date:
- Size: 75.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.7.1 CPython/3.11.7 Darwin/23.4.0
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | ed2486ac8ac2ac8d7ded13799da3530a58a48dbb4fab280e5539cbec2fdf9b5b |
|
MD5 | bbffd71dbde42319a595a5b498eb5f3a |
|
BLAKE2b-256 | 57581605e379086b5705e38f7ddb00dda43cae7bbd92fc1f48419ab4d154f0da |