SlideShare a Scribd company logo
Cisco Confidential 1© 2010 Cisco and/or its affiliates. All rights reserved.
Puppet Agent for Cisco
devices
Wojciech Dec – wdec@cisco.com
April 12, 2013
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
•  Puppet is client (node agent) – server (master) software & framework designed to
automate node configuration and reporting.
•  Puppet master stores target high level resource “intent” (manifest) for nodes.
Manifest is compiled into a node’s list of dependent resource into catalog at puppet
run time based on “facts” collected from the node
•  Puppet client downloads the “catalog”, and any Puppet code (plugin) from Master.
•  Puppet client uses local methods to realize catalog into config
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
•  onePK provides manageability
abstraction.
Avoids CLI scraping
Consistent across cisco OSes
Exposes dynamic device state +
device configuration
•  Linux Container
Runs distro on OS kernel
Fitted with cisco onepk libs
Isolates app failures from Network
Element
Superior flexibility for application
developers (compared to SDK
enforced walled garden)Device Components
Management
Agents
Manageability
Abstraction
Device
Management
Infrastructure
OS-specific
Management
Infrastructure
XOS and
Component APIs
Traditional
Management
Agents (CLI, syslog,
SNMP, XML)
Next Generation
Management
Agents (Puppet, ..)
onePK PL
Transport/Marshaling
onePK AL
OS Shim
LinuxContainerNXOS
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Master
Device
Proxy
Agent
SSH,
OnePK
Device Proxy AgentDevice Agent
Master
Agent
OnePK
Linux container(s) on NXOS
Agent
OnePK
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Master
Device
Proxy
Agent
SSH,
OnePK
Device Proxy AgentDevice Agent
Master
Agent
OnePK
Linux container(s) on NXOS
Agent
OnePK
Pros:
-  Each Agent maps directly to
managed device
-  machine’s characteristics (facts)
exposed as own
-  Easily extensible. Does not
require core puppet code
changes
-  Automated agent plugin code
download from master
-  Better Scale
Cons:
-  Requires LXC container +
OnePK capability on device
Pros:
-  No specific device requirements
-  One agent can proxy for
multiple machines
Cons:
-  CLI Scraping method
-  More complicated Puppet agent
(device proxy).
-  Requires extensions in puppet
core “device” mode code
-  Scale and authentication
management
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
(Demo) Sample Manifest
node ”cisco-switch" {
include onepk_module
onepk_vlan { "1000":
description => "Green_Vlan",
ensure => present
}
onepk_interface { "Ethernet 1/2":
mode => "access",
vlan => "1000",
ensure => present
}
$patch_f = "sysinfo_patch.tar.gz”
onepk_patch { ”sysinfo_patch":
patch => ” ${patch_f}",
server_type => ”bootflash",
ensure => present,
}
}
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Puppet Master
Infra
1
2
3
1.  Based on push or pull trigger, agent runs facter to obtain device configuration
information
2.  Agent sends facter data to master along with a catalog request + plugin (if needed)
3.  Master sends agent catalog response (subset of manifest based on agent’s facter
data)
4.  Agent processes catalog
- Provider applies necessary configuration changes
5.  After provider execution report sent to master
ProviderFacter
Puppet Agent
4
5
onePK API
Cisco plugin
Cisco plugin
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
•  Demo Flow:
•  Show on N7k device
•  A puppet agent run
Agent run triggered. Facts/Catalog exchanged with master
Agent uses OnePK to communicate with switch OS
Applies VLAN + switch port configuration
Downloads & applies NXOS patch
•  Show on N7k device
Note: A “bare-metal” version of this demonstration is also available for
virgin switch provisioning using PoAP + Puppet: Includes image and
container download & install.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9Cisco Confidential 9Cisco Confidential 9© 2010 Cisco and/or its affiliates. All rights reserved.
Thank you

More Related Content

PDF
How to Install & Configure Your Own Identity Manager GE
PPTX
Puppet for Production in WebEx - PuppetConf 2013
PDF
Présentation et démo ELK/SIEM/Wazuh
PPTX
Solving the Open Source Security Puzzle
PDF
Aws security with HIDS, OSSEC
PPTX
SCAP and NETCONF
 
PPTX
Enterprise Node - Securing Your Environment
PPTX
Ansible Automation - Enterprise Use Cases | Juncheng Anthony Lin
How to Install & Configure Your Own Identity Manager GE
Puppet for Production in WebEx - PuppetConf 2013
Présentation et démo ELK/SIEM/Wazuh
Solving the Open Source Security Puzzle
Aws security with HIDS, OSSEC
SCAP and NETCONF
 
Enterprise Node - Securing Your Environment
Ansible Automation - Enterprise Use Cases | Juncheng Anthony Lin

What's hot (20)

PPTX
Node.js wrapper for mbed Device Connector REST calls
PPTX
Equifax cyber attack contained by containers
PPTX
Intro to the FIWARE Lab
PDF
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
PPTX
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
PDF
Container Runtime Security with Falco
PDF
Ossec Lightning
PDF
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
ODP
OpenStack keystone identity service
PPTX
Advanced OSSEC Training: Integration Strategies for Open Source Security
PDF
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
PPTX
How to detect side channel attacks in cloud infrastructures
PPTX
Secure Keystone Deployment
PDF
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013
PDF
Using Kubernetes to make cellular data plans cheaper for 50M users
PDF
SecPod: A Framework for Virtualization-based Security Systems
PPTX
Hug #9 who's keeping your secrets
PDF
Chris Rutter: Avoiding The Security Brick
PPTX
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
PDF
Cisco Automation with Puppet and onePK - PuppetConf 2013
Node.js wrapper for mbed Device Connector REST calls
Equifax cyber attack contained by containers
Intro to the FIWARE Lab
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
Container Runtime Security with Falco
Ossec Lightning
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
OpenStack keystone identity service
Advanced OSSEC Training: Integration Strategies for Open Source Security
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
How to detect side channel attacks in cloud infrastructures
Secure Keystone Deployment
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013
Using Kubernetes to make cellular data plans cheaper for 50M users
SecPod: A Framework for Virtualization-based Security Systems
Hug #9 who's keeping your secrets
Chris Rutter: Avoiding The Security Brick
Exploring the Final Frontier of Data Center Orchestration: Network Elements -...
Cisco Automation with Puppet and onePK - PuppetConf 2013
Ad

Viewers also liked (13)

PDF
Reporte semanal de trámites ingresados en la VUD del 23 al 27 enero, 2017
PPT
Lesson 1
PPTX
Método Científico por Yolanda Pila
PDF
Foredi gresik
PPTX
Enterprise 2.0 and the project manager
PPTX
Principales puertos del mundo
PPS
PPTX
Problemas ambientales en
PDF
NLP TOP COACH, International Training & Coaching & Leadership Development
PPT
Ethical Decision-Making Models and Application
PPTX
El derecho y otras ciencias
PPT
社會回饋
Reporte semanal de trámites ingresados en la VUD del 23 al 27 enero, 2017
Lesson 1
Método Científico por Yolanda Pila
Foredi gresik
Enterprise 2.0 and the project manager
Principales puertos del mundo
Problemas ambientales en
NLP TOP COACH, International Training & Coaching & Leadership Development
Ethical Decision-Making Models and Application
El derecho y otras ciencias
社會回饋
Ad

Similar to Puppet day v1.1 (20)

PDF
Puppet devops wdec
PDF
citus™ iot ecosystem
PPTX
Stage 1 Tradecraft
PDF
Dan Norris: Exadata security
PPTX
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
PDF
Better Network Management Through Network Programmability
PPTX
20151222_Interoperability with ML2: LinuxBridge, OVS and SDN
PDF
FIWARE Wednesday Webinars - Short Term History within Smart Systems
DOCX
Study notes for CompTIA Certified Advanced Security Practitioner
PDF
Pluggable Infrastructure with CI/CD and Docker
PDF
DPDK & Cloud Native
PDF
26.1.7 lab snort and firewall rules
PDF
"Wie passen Serverless & Autonomous zusammen?"
PPTX
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
PPTX
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
PDF
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
PPTX
Container & kubernetes
PPTX
OpenStack with OpenDaylight
PPTX
BsidesSP: Pentesting in SDN - Owning the Controllers
PPTX
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...
Puppet devops wdec
citus™ iot ecosystem
Stage 1 Tradecraft
Dan Norris: Exadata security
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
Better Network Management Through Network Programmability
20151222_Interoperability with ML2: LinuxBridge, OVS and SDN
FIWARE Wednesday Webinars - Short Term History within Smart Systems
Study notes for CompTIA Certified Advanced Security Practitioner
Pluggable Infrastructure with CI/CD and Docker
DPDK & Cloud Native
26.1.7 lab snort and firewall rules
"Wie passen Serverless & Autonomous zusammen?"
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Container & kubernetes
OpenStack with OpenDaylight
BsidesSP: Pentesting in SDN - Owning the Controllers
#Interactive Session by Kirti Ranjan Satapathy and Nandini K, "Elements of Qu...

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
TLE Review Electricity (Electricity).pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
A Presentation on Touch Screen Technology
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Hybrid model detection and classification of lung cancer
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
A Presentation on Artificial Intelligence
PPTX
1. Introduction to Computer Programming.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
project resource management chapter-09.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Hindi spoken digit analysis for native and non-native speakers
Assigned Numbers - 2025 - Bluetooth® Document
Accuracy of neural networks in brain wave diagnosis of schizophrenia
TLE Review Electricity (Electricity).pptx
NewMind AI Weekly Chronicles - August'25-Week II
A Presentation on Touch Screen Technology
A comparative analysis of optical character recognition models for extracting...
Hybrid model detection and classification of lung cancer
Chapter 5: Probability Theory and Statistics
A Presentation on Artificial Intelligence
1. Introduction to Computer Programming.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A comparative study of natural language inference in Swahili using monolingua...
project resource management chapter-09.pdf
Programs and apps: productivity, graphics, security and other tools
A novel scalable deep ensemble learning framework for big data classification...
Hindi spoken digit analysis for native and non-native speakers

Puppet day v1.1

  • 1. Cisco Confidential 1© 2010 Cisco and/or its affiliates. All rights reserved. Puppet Agent for Cisco devices Wojciech Dec – wdec@cisco.com April 12, 2013
  • 2. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 •  Puppet is client (node agent) – server (master) software & framework designed to automate node configuration and reporting. •  Puppet master stores target high level resource “intent” (manifest) for nodes. Manifest is compiled into a node’s list of dependent resource into catalog at puppet run time based on “facts” collected from the node •  Puppet client downloads the “catalog”, and any Puppet code (plugin) from Master. •  Puppet client uses local methods to realize catalog into config
  • 3. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 •  onePK provides manageability abstraction. Avoids CLI scraping Consistent across cisco OSes Exposes dynamic device state + device configuration •  Linux Container Runs distro on OS kernel Fitted with cisco onepk libs Isolates app failures from Network Element Superior flexibility for application developers (compared to SDK enforced walled garden)Device Components Management Agents Manageability Abstraction Device Management Infrastructure OS-specific Management Infrastructure XOS and Component APIs Traditional Management Agents (CLI, syslog, SNMP, XML) Next Generation Management Agents (Puppet, ..) onePK PL Transport/Marshaling onePK AL OS Shim LinuxContainerNXOS
  • 4. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Master Device Proxy Agent SSH, OnePK Device Proxy AgentDevice Agent Master Agent OnePK Linux container(s) on NXOS Agent OnePK
  • 5. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Master Device Proxy Agent SSH, OnePK Device Proxy AgentDevice Agent Master Agent OnePK Linux container(s) on NXOS Agent OnePK Pros: -  Each Agent maps directly to managed device -  machine’s characteristics (facts) exposed as own -  Easily extensible. Does not require core puppet code changes -  Automated agent plugin code download from master -  Better Scale Cons: -  Requires LXC container + OnePK capability on device Pros: -  No specific device requirements -  One agent can proxy for multiple machines Cons: -  CLI Scraping method -  More complicated Puppet agent (device proxy). -  Requires extensions in puppet core “device” mode code -  Scale and authentication management
  • 6. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 (Demo) Sample Manifest node ”cisco-switch" { include onepk_module onepk_vlan { "1000": description => "Green_Vlan", ensure => present } onepk_interface { "Ethernet 1/2": mode => "access", vlan => "1000", ensure => present } $patch_f = "sysinfo_patch.tar.gz” onepk_patch { ”sysinfo_patch": patch => ” ${patch_f}", server_type => ”bootflash", ensure => present, } }
  • 7. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Puppet Master Infra 1 2 3 1.  Based on push or pull trigger, agent runs facter to obtain device configuration information 2.  Agent sends facter data to master along with a catalog request + plugin (if needed) 3.  Master sends agent catalog response (subset of manifest based on agent’s facter data) 4.  Agent processes catalog - Provider applies necessary configuration changes 5.  After provider execution report sent to master ProviderFacter Puppet Agent 4 5 onePK API Cisco plugin Cisco plugin
  • 8. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 •  Demo Flow: •  Show on N7k device •  A puppet agent run Agent run triggered. Facts/Catalog exchanged with master Agent uses OnePK to communicate with switch OS Applies VLAN + switch port configuration Downloads & applies NXOS patch •  Show on N7k device Note: A “bare-metal” version of this demonstration is also available for virgin switch provisioning using PoAP + Puppet: Includes image and container download & install.
  • 9. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9Cisco Confidential 9Cisco Confidential 9© 2010 Cisco and/or its affiliates. All rights reserved. Thank you