Ħej Habr!
Dan l-aħħar ħareġ artiklu hawn
Din mhix l-ewwel rota għal xogħol bħal dan. L-ewwel għażla ġiet implimentata diversi snin ilu lura fi ansibbli verżjoni 1.x.x. Ir-rota kienet rarament użata u għalhekk kontinwament sadid. Fis-sens li l-kompitu innifsu ma jqumx spiss daqskemm il-verżjonijiet jiġu aġġornati ansibbli. U kull darba li jkollok bżonn issuq, il-katina taqa 'jew ir-rota taqa'. Madankollu, l-ewwel parti, li tiġġenera konfigurazzjonijiet, dejjem taħdem b'mod ċar ħafna, fortunatament jinja2 Il-magna hija stabbilita għal żmien twil. Iżda t-tieni parti - rolling out configs - normalment ġabet sorpriżi. U peress li għandi nagħmel il-konfigurazzjoni mill-bogħod għal nofs mitt apparat, li wħud minnhom jinsabu eluf ta 'kilometri 'l bogħod, l-użu ta' din l-għodda kien ftit boring.
Hawnhekk irrid nammetti li l-inċertezza tiegħi x'aktarx tinsab fin-nuqqas ta 'familjarità tiegħi ma' ansibblimilli fin-nuqqasijiet tagħha. U dan, mill-mod, huwa punt importanti. ansibbli hija kompletament separata, qasam ta 'għarfien tagħha stess bid-DSL tagħha (Domain Specific Language), li għandha tinżamm f'livell kunfidenti. Ukoll, dak il-mument li ansibbli Qed jiżviluppa pjuttost malajr, u mingħajr attenzjoni speċjali għall-kompatibilità b'lura, ma jżidx kunfidenza.
Għalhekk, mhux daqstant ilu ġiet implimentata t-tieni verżjoni tar-rota. Din id-darba fuq python, jew aħjar fuq qafas miktub fih python u għal python taħt l-isem
Allura - Nornir huwa mikroqafas miktub fih python u għal python u ddisinjati għall-awtomazzjoni. L-istess bħal fil-każ ma ansibbli, biex issolvi l-problemi hawnhekk, hija meħtieġa preparazzjoni tad-dejta kompetenti, i.e. inventarju ta 'hosts u l-parametri tagħhom, iżda skripts huma miktuba mhux f'DSL separata, iżda fl-istess mhux antiki ħafna, iżda p[i|i]ton tajjeb ħafna.
Ejja nħarsu lejn dak li qed juża l-eżempju ħaj li ġej.
Għandi netwerk ta 'fergħat b'diversi għexieren ta' uffiċċji madwar il-pajjiż. Kull uffiċċju għandu router WAN li jtemm diversi kanali ta 'komunikazzjoni minn operaturi differenti. Il-protokoll tar-routing huwa BGP. Ir-routers WAN jiġu f'żewġ tipi: Cisco ISG jew Juniper SRX.
Issa l-kompitu: għandek bżonn tikkonfigura subnet dedikat għas-Sorveljanza tal-Vidjo fuq port separat fuq ir-routers WAN kollha tan-netwerk tal-fergħat - irreklama dan is-subnet f'BGP - kkonfigurat il-limitu tal-veloċità tal-port iddedikat.
L-ewwel, irridu nippreparaw ftit mudelli, li fuq il-bażi tagħhom il-konfigurazzjonijiet se jiġu ġġenerati separatament għal Cisco u Juniper. Huwa wkoll meħtieġ li titħejja data għal kull punt u parametri ta 'konnessjoni, i.e. jiġbru l-istess inventarju
Mudell lest għal Cisco:
$ cat templates/ios/base.j2
class-map match-all VIDEO_SURV
match access-group 111
policy-map VIDEO_SURV
class VIDEO_SURV
police 1500000 conform-action transmit exceed-action drop
interface {{ host.task_data.ifname }}
description VIDEOSURV
ip address 10.10.{{ host.task_data.ipsuffix }}.254 255.255.255.0
service-policy input VIDEO_SURV
router bgp {{ host.task_data.asn }}
network 10.40.{{ host.task_data.ipsuffix }}.0 mask 255.255.255.0
access-list 11 permit 10.10.{{ host.task_data.ipsuffix }}.0 0.0.0.255
access-list 111 permit ip 10.10.{{ host.task_data.ipsuffix }}.0 0.0.0.255 any
Mudell għal Ġnibru:
$ cat templates/junos/base.j2
set interfaces {{ host.task_data.ifname }} unit 0 description "Video surveillance"
set interfaces {{ host.task_data.ifname }} unit 0 family inet filter input limit-in
set interfaces {{ host.task_data.ifname }} unit 0 family inet address 10.10.{{ host.task_data.ipsuffix }}.254/24
set policy-options policy-statement export2bgp term 1 from route-filter 10.10.{{ host.task_data.ipsuffix }}.0/24 exact
set security zones security-zone WAN interfaces {{ host.task_data.ifname }}
set firewall policer policer-1m if-exceeding bandwidth-limit 1m
set firewall policer policer-1m if-exceeding burst-size-limit 187k
set firewall policer policer-1m then discard
set firewall policer policer-1.5m if-exceeding bandwidth-limit 1500000
set firewall policer policer-1.5m if-exceeding burst-size-limit 280k
set firewall policer policer-1.5m then discard
set firewall filter limit-in term 1 then policer policer-1.5m
set firewall filter limit-in term 1 then count limiter
Mudelli, ovvjament, ma joħorġux mill-arja. Dawn huma essenzjalment differenzi bejn il-konfigurazzjonijiet tax-xogħol li kienu u kienu wara li solvew il-kompitu fuq żewġ routers speċifiċi ta 'mudelli differenti.
Mill-mudelli tagħna naraw li biex insolvu l-problema, għandna bżonn biss żewġ parametri għal Juniper u 3 parametri għal Cisco. hawn huma:
- ifname
- ipsuffiss
- asn
Issa għandna bżonn nissettjaw dawn il-parametri għal kull apparat, i.e. tagħmel l-istess ħaġa inventarju.
Għal inventarju Aħna se nsegwu b'mod strett id-dokumentazzjoni
jiġifieri, ejja noħolqu l-istess skeletru tal-fajl:
.
├── config.yaml
├── inventory
│ ├── defaults.yaml
│ ├── groups.yaml
│ └── hosts.yaml
Il-fajl config.yaml huwa l-fajl standard tal-konfigurazzjoni nornir
$ cat config.yaml
---
core:
num_workers: 10
inventory:
plugin: nornir.plugins.inventory.simple.SimpleInventory
options:
host_file: "inventory/hosts.yaml"
group_file: "inventory/groups.yaml"
defaults_file: "inventory/defaults.yaml"
Aħna se nindikaw il-parametri ewlenin fil-fajl hosts.yaml, grupp (fil-każ tiegħi dawn huma logins/passwords) fi gruppi.yaml, u ġewwa defaults.yaml Aħna mhux se nindikaw xejn, imma trid iddaħħal tliet minuses hemmhekk - li tindika li hu yaml il-fajl huwa vojt għalkemm.
Hekk jidher hosts.yaml:
---
srx-test:
hostname: srx-test
groups:
- juniper
data:
task_data:
ifname: fe-0/0/2
ipsuffix: 111
cisco-test:
hostname: cisco-test
groups:
- cisco
data:
task_data:
ifname: GigabitEthernet0/1/1
ipsuffix: 222
asn: 65111
U hawn groups.yaml:
---
cisco:
platform: ios
username: admin1
password: cisco1
juniper:
platform: junos
username: admin2
password: juniper2
Dan huwa dak li ġara inventarju għall-kompitu tagħna. Waqt l-inizjalizzazzjoni, il-parametri mill-fajls tal-inventarju huma mmappjati mal-mudell tal-oġġett InventarjuElement.
Taħt l-ispoiler hemm dijagramma tal-mudell InventoryElement
print(json.dumps(InventoryElement.schema(), indent=4))
{
"title": "InventoryElement",
"type": "object",
"properties": {
"hostname": {
"title": "Hostname",
"type": "string"
},
"port": {
"title": "Port",
"type": "integer"
},
"username": {
"title": "Username",
"type": "string"
},
"password": {
"title": "Password",
"type": "string"
},
"platform": {
"title": "Platform",
"type": "string"
},
"groups": {
"title": "Groups",
"default": [],
"type": "array",
"items": {
"type": "string"
}
},
"data": {
"title": "Data",
"default": {},
"type": "object"
},
"connection_options": {
"title": "Connection_Options",
"default": {},
"type": "object",
"additionalProperties": {
"$ref": "#/definitions/ConnectionOptions"
}
}
},
"definitions": {
"ConnectionOptions": {
"title": "ConnectionOptions",
"type": "object",
"properties": {
"hostname": {
"title": "Hostname",
"type": "string"
},
"port": {
"title": "Port",
"type": "integer"
},
"username": {
"title": "Username",
"type": "string"
},
"password": {
"title": "Password",
"type": "string"
},
"platform": {
"title": "Platform",
"type": "string"
},
"extras": {
"title": "Extras",
"type": "object"
}
}
}
}
}
Dan il-mudell jista 'jidher ftit konfuż, speċjalment għall-ewwel. Sabiex insemmu, il-mod interattiv fil python.
$ ipython3
Python 3.6.9 (default, Nov 7 2019, 10:44:02)
Type 'copyright', 'credits' or 'license' for more information
IPython 7.1.1 -- An enhanced Interactive Python. Type '?' for help.
In [1]: from nornir import InitNornir
In [2]: nr = InitNornir(config_file="config.yaml", dry_run=True)
In [3]: nr.inventory.hosts
Out[3]:
{'srx-test': Host: srx-test, 'cisco-test': Host: cisco-test}
In [4]: nr.inventory.hosts['srx-test'].data
Out[4]: {'task_data': {'ifname': 'fe-0/0/2', 'ipsuffix': 111}}
In [5]: nr.inventory.hosts['srx-test']['task_data']
Out[5]: {'ifname': 'fe-0/0/2', 'ipsuffix': 111}
In [6]: nr.inventory.hosts['srx-test'].platform
Out[6]: 'junos'
U fl-aħħarnett, ejja ngħaddu għall-iskript innifsu. M'għandi xejn x'nkun partikolarment kburi hawn. I biss ħa eżempju lest minn
from nornir import InitNornir
from nornir.plugins.tasks import networking, text
from nornir.plugins.functions.text import print_title, print_result
def config_and_deploy(task):
# Transform inventory data to configuration via a template file
r = task.run(task=text.template_file,
name="Base Configuration",
template="base.j2",
path=f"templates/{task.host.platform}")
# Save the compiled configuration into a host variable
task.host["config"] = r.result
# Save the compiled configuration into a file
with open(f"configs/{task.host.hostname}", "w") as f:
f.write(r.result)
# Deploy that configuration to the device using NAPALM
task.run(task=networking.napalm_configure,
name="Loading Configuration on the device",
replace=False,
configuration=task.host["config"])
nr = InitNornir(config_file="config.yaml", dry_run=True) # set dry_run=False, cross your fingers and run again
# run tasks
result = nr.run(task=config_and_deploy)
print_result(result)
Oqgħod attent għall-parametru dry_run=Veru fil-linja initialization oġġett nr.
Hawnhekk l-istess bħal fi ansibbli ġiet implimentata test run li fiha ssir konnessjoni mar-router, titħejja konfigurazzjoni modifikata ġdida, li mbagħad tiġi vvalidata mill-apparat (iżda dan mhux ċert; jiddependi fuq l-appoġġ tal-apparat u l-implimentazzjoni tas-sewwieq f'NAPALM) , iżda l-konfigurazzjoni l-ġdida mhix applikata direttament. Għall-użu fil-ġlieda kontra, trid tneħħi l-parametru dry_run jew tibdel il-valur tagħha għal False.
Meta l-iskript jiġi esegwit, Nornir joħroġ zkuk dettaljati fuq il-console.
Taħt l-ispoiler hemm l-output ta 'ġirja ta' ġlieda fuq żewġ routers tat-test:
config_and_deploy***************************************************************
* cisco-test ** changed : True *******************************************
vvvv config_and_deploy ** changed : True vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv INFO
---- Base Configuration ** changed : True ------------------------------------- INFO
class-map match-all VIDEO_SURV
match access-group 111
policy-map VIDEO_SURV
class VIDEO_SURV
police 1500000 conform-action transmit exceed-action drop
interface GigabitEthernet0/1/1
description VIDEOSURV
ip address 10.10.222.254 255.255.255.0
service-policy input VIDEO_SURV
router bgp 65001
network 10.10.222.0 mask 255.255.255.0
access-list 11 permit 10.10.222.0 0.0.0.255
access-list 111 permit ip 10.10.222.0 0.0.0.255 any
---- Loading Configuration on the device ** changed : True --------------------- INFO
+class-map match-all VIDEO_SURV
+ match access-group 111
+policy-map VIDEO_SURV
+ class VIDEO_SURV
+interface GigabitEthernet0/1/1
+ description VIDEOSURV
+ ip address 10.10.222.254 255.255.255.0
+ service-policy input VIDEO_SURV
+router bgp 65001
+ network 10.10.222.0 mask 255.255.255.0
+access-list 11 permit 10.10.222.0 0.0.0.255
+access-list 111 permit ip 10.10.222.0 0.0.0.255 any
^^^^ END config_and_deploy ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
* srx-test ** changed : True *******************************************
vvvv config_and_deploy ** changed : True vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv INFO
---- Base Configuration ** changed : True ------------------------------------- INFO
set interfaces fe-0/0/2 unit 0 description "Video surveillance"
set interfaces fe-0/0/2 unit 0 family inet filter input limit-in
set interfaces fe-0/0/2 unit 0 family inet address 10.10.111.254/24
set policy-options policy-statement export2bgp term 1 from route-filter 10.10.111.0/24 exact
set security zones security-zone WAN interfaces fe-0/0/2
set firewall policer policer-1m if-exceeding bandwidth-limit 1m
set firewall policer policer-1m if-exceeding burst-size-limit 187k
set firewall policer policer-1m then discard
set firewall policer policer-1.5m if-exceeding bandwidth-limit 1500000
set firewall policer policer-1.5m if-exceeding burst-size-limit 280k
set firewall policer policer-1.5m then discard
set firewall filter limit-in term 1 then policer policer-1.5m
set firewall filter limit-in term 1 then count limiter
---- Loading Configuration on the device ** changed : True --------------------- INFO
[edit interfaces]
+ fe-0/0/2 {
+ unit 0 {
+ description "Video surveillance";
+ family inet {
+ filter {
+ input limit-in;
+ }
+ address 10.10.111.254/24;
+ }
+ }
+ }
[edit]
+ policy-options {
+ policy-statement export2bgp {
+ term 1 {
+ from {
+ route-filter 10.10.111.0/24 exact;
+ }
+ }
+ }
+ }
[edit security zones]
security-zone test-vpn { ... }
+ security-zone WAN {
+ interfaces {
+ fe-0/0/2.0;
+ }
+ }
[edit]
+ firewall {
+ policer policer-1m {
+ if-exceeding {
+ bandwidth-limit 1m;
+ burst-size-limit 187k;
+ }
+ then discard;
+ }
+ policer policer-1.5m {
+ if-exceeding {
+ bandwidth-limit 1500000;
+ burst-size-limit 280k;
+ }
+ then discard;
+ }
+ filter limit-in {
+ term 1 {
+ then {
+ policer policer-1.5m;
+ count limiter;
+ }
+ }
+ }
+ }
^^^^ END config_and_deploy ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Ħabi tal-passwords f'ansible_vault
Fil-bidu tal-artiklu mort ftit il-baħar ansibbli, imma mhux daqshekk ħażin. Inħobbhom ħafna kaxxa-forti simili, li hija mfassla biex taħbi informazzjoni sensittiva barra mill-vista. U probabbilment ħafna nnotaw li għandna l-logins/passwords kollha għar-routers tal-ġlieda kontra kollha frizzanti f'forma miftuħa f'fajl gorups.yaml. Mhuwiex sabiħ, ovvjament. Ejja nipproteġu din id-data bi kaxxa-forti.
Ejja nittrasferixxu l-parametri minn groups.yaml għal creds.yaml, u nikkriptawha b'AES256 b'password ta '20 ċifra:
$ cd inventory
$ cat creds.yaml
---
cisco:
username: admin1
password: cisco1
juniper:
username: admin2
password: juniper2
$ pwgen 20 -N 1 > vault.passwd
ansible-vault encrypt creds.yaml --vault-password-file vault.passwd
Encryption successful
$ cat creds.yaml
$ANSIBLE_VAULT;1.1;AES256
39656463353437333337356361633737383464383231366233386636333965306662323534626131
3964396534396333363939373539393662623164373539620a346565373439646436356438653965
39643266333639356564663961303535353364383163633232366138643132313530346661316533
6236306435613132610a656163653065633866626639613537326233653765353661613337393839
62376662303061353963383330323164633162386336643832376263343634356230613562643533
30363436343465306638653932366166306562393061323636636163373164613630643965636361
34343936323066393763323633336366366566393236613737326530346234393735306261363239
35663430623934323632616161636330353134393435396632663530373932383532316161353963
31393434653165613432326636616636383665316465623036376631313162646435
Huwa daqshekk sempliċi. Jibqa 'jgħallmu tagħna Nornir-kitba biex tirkupra u tapplika din id-dejta.
Biex tagħmel dan, fl-iskrittura tagħna wara l-linja ta 'inizjalizzazzjoni nr = InitNornir(config_file=... żid il-kodiċi li ġej:
...
nr = InitNornir(config_file="config.yaml", dry_run=True) # set dry_run=False, cross your fingers and run again
# enrich Inventory with the encrypted vault data
from ansible_vault import Vault
vault_password_file="inventory/vault.passwd"
vault_file="inventory/creds.yaml"
with open(vault_password_file, "r") as fp:
password = fp.readline().strip()
vault = Vault(password)
vaultdata = vault.load(open(vault_file).read())
for a in nr.inventory.hosts.keys():
item = nr.inventory.hosts[a]
item.username = vaultdata[item.groups[0]]['username']
item.password = vaultdata[item.groups[0]]['password']
#print("hostname={}, username={}, password={}n".format(item.hostname, item.username, item.password))
# run tasks
...
Naturalment, vault.passwd m'għandux ikun jinsab ħdejn creds.yaml bħal fl-eżempju tiegħi. Imma tajjeb għal-logħob.
Dak kollu għalissa. Hemm ftit artikli oħra dwar Cisco + Zabbix li ġejjin, iżda dan mhux ftit dwar l-awtomazzjoni. U fil-futur qarib nippjana li nikteb dwar RESTCONF f'Cisco.
Sors: www.habr.com