Run genie parsers directly.
Project description
BRANCH | STATUS |
---|---|
master | |
develop |
pyats-genie-command-parse
This is a library to be able to parse NOS command output using the available Genie parsers, it seperates out needing to create a testbed.yml, and allows you to just get the output, and parse the output with Genie parsers. You can find the Genie Parse Source here
Line 55 in pyats_genie_command_parse.py
supported_nos = {'aireos',
'apic',
'asa',
'bigip',
'cheetah',
'comware',
'dnac',
'gaia',
'ios',
'iosxe',
'iosxr',
'ironware',
'junos',
'linux',
'nxos',
'sros',
'viptela'}
Some options to get the data
-
You could use netmiko to get the command output from devices and then parse using the string parser.
-
You could use Cisco Network Services Orchestrator "NSO" to get the command output from devices and then parse using the string parser.
-
Use your imagination, as long as you can get the output data in a string format the string parser will work.
-
If you prefer you could store the data in a text file, and then using the file parser, you can also parse the output data.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for pyats-genie-command-parse-1.3.1.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | b2cbf461f173b84a3452cb13b7c0c1c927bc9d5fa2d9a669270906e2fbb3216d |
|
MD5 | 15fbc55ab367dd702862a99ab5804372 |
|
BLAKE2b-256 | c526e4bd763956c2e4ab4010a94e2c9b99f2039dae1222a9f65d0a90939f6762 |
Hashes for pyats_genie_command_parse-1.3.1-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 71e4dfb82bbdfa0aad6f1eef25517ec2142d62e35ccd7fa5b2f8f90967b5f8f8 |
|
MD5 | 18057d7d4693dd9ce4acf5a3a72c770f |
|
BLAKE2b-256 | 42b9b08c512b79af70089a1184e2316344d3c29b6c6d1b208de45b07374b1878 |