04-08-2018 11:05 PM - edited 03-08-2019 02:34 PM
Hi,
Is there any tool which we can use for Preventive Maintenance for gather show tech support from all the cisco devices rather than logging to each device for getting the same or gather the information and suggest for the IOS upgrades as well.
04-08-2018 11:34 PM
Hi there,
APIC-EM (https://www.cisco.com/c/en/us/products/cloud-systems-management/application-policy-infrastructure-controller-enterprise-module/index.html) when combined with the "image verification" application/ plugin, will provide you a software vulnerability report and provide suggested upgrades.
cheers,
Seb.
04-08-2018 11:48 PM
Hi,
as a System integrator we are doing Preventive Maintenance for multiple customer's. hence we looking for a tool which can be used from our laptop or installed so we can run the reports and gather the information.
04-12-2018 02:18 AM
Hi there,
I've tweaked a script of mine which previously required an APIC-EM instance to make REST calls against to create a device database.
I've changed it now so that you can feed it a CSV file of IP address of the. The CSV has the following format:
ip_address 10.1.1.1 10.1.1.2 10.1.1.3
The script can be found here:
https://github.com/sebrupik/srupik-apic-em-tools/blob/master/frozenPony/src/inventoryCollect2.py
Run the script with -c flag:
python3 inventoryCollect2.py -c /tmp/inventory.csv
It's a work in progress so currently doesn't like NX-OS, but does like IOS and IOS-XE. It should produce output similar to this:
Platforms: 3 Platform C5548UP has 1 models. N5K-C5548UP None used by 1 devices, dev-dist-sw-1 Platform X has 1 models. ASR1001-X 16.04.02 used by 1 devices, dev-PPP-ROUTER 16.03.04 used by 1 devices, dev-PPP-ROUTER Platform C3850 has 1 models. WS-C3850-48P 16.3.3 used by 1 devices, dev-ACCESS-02 Pickle the data!
All being well it will pickle the data (serialise it) and write it to a file 'data.dmp'
You then need to parse data.dmp with the second script:
https://github.com/sebrupik/srupik-apic-em-tools/blob/master/frozenPony/src/inventoryAnalyse.py
Run this script with the command:
python2.7 -W "ignore:Unverified HTTPS:::" inventoryAnalyse.py
(It has to be run in python 2.7 because the cisco openVlunQuery API it written in 2.7)
You will need to register for the openVuln API here: https://apiconsole.cisco.com/
This will produce output like:
C5548UP has 1 software versions in use None used by 1 devices dev-dist-sw-1 No advisories :) X has 2 software versions in use 16.04.02 used by 1 devices dev-PPP-ROUTER Number of advisories 19 16.03.04 used by 1 devices dev-PPP-ROUTER Number of advisories 18 C3850 has 1 software versions in use 16.3.3 used by 1 devices dev-ACCESS-02 No advisories :) Worst offenders - Top 2 Advisory count: 18 16.03.04 dev-PPP-ROUTER Advisory count: 19 16.04.02 dev-PPP-ROUTER
You can edit the script, line 188 and change it to:
print_dictionary(build_dictionary(ovq_client, platform_ibj_list), brief=False)
To get more verbose output, ie vulnerability ID and titles.
https://configif.wordpress.com/2017/07/19/apic-em-inventoryanalyse/
https://configif.wordpress.com/2017/07/14/apic-em-collectinventory/
cheers,
Seb.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide