Targets#
Sometimes it is needed to perform an operation on multiple devices; be it getting the same leaf value from a given set of the network elements or setting a certain configuration element to some value.
For cases like that gnmic
offers support for multiple targets operations which a user can configure both via CLI flags as well as with the file-based configuration.
CLI configuration#
Specifying multiple targets in the CLI is as easy as repeating the --address
flag.
❯ gnmic -a router1.lab.net:57400 \
-a router2.lab.net:57400 \
get --path /configure/system/name
File-based configuration#
With the file-based configuration a user has two options to specify multiple targets:
- using
address
option - using
targets
option
address option#
With address
option the user must provide a list of addresses. In the YAML format that would look like that:
address:
- "router1.lab.net:57400"
- "router2.lab.net:57400"
The limitation this approach has is that it is impossible to set different credentials for the targets, they will essentially share the credentials specified in a file or via flags.
target option#
With the targets
option it is possible to set target specific options (such as credentials, subscriptions, TLS config, outputs), and thus this option is recommended to use:
targets:
router1.lab.net:
timeout: 2s
username: r1
password: gnmi_pass
router2.lab.net:57000:
username: r2
password: gnmi_pass
tls-key: /path/file1
tls-cert: /path/file2
The target address is defined as the key under the targets
section of the configuration file. The default port (57400) can be omitted as demonstrated with router1.lab.net
target address. Have a look at the file-based targets configuration example to get a glimpse of what it is capable of.
The target inherits the globally defined options if the matching options are not set on a target level. For example, if a target doesn't have a username defined, it will use the username value set on a global level.
secure/insecure connections#
gnmic
supports both secure and insecure gRPC connections to the target.
insecure connection#
Using the --insecure
flag it is possible to establish an insecure gRPC connection to the target.
gnmic -a router1:57400 \
--insecure \
get --path /configure/system/name
secure connection#
- A one way secure connection without target certificate verification can be established using the
--skip-verify
flag.
gnmic -a router1:57400 \
--skip-verify \
get --path /configure/system/name
- Adding target certificate verification can be done using the
--tls-ca
flag.
gnmic -a router1:57400 \
--tls-ca /path/to/ca/file \
get --path /configure/system/name
- A two way secure connection can be established using the
--tls-cert
--tls-key
flags.
gnmic -a router1:57400 \
--tls-cert /path/to/certificate/file \
--tls-key /path/to/certificate/file \
get --path /configure/system/name
- It is also possible to control the negotiated TLS version using the
--tls-min-version
,--tls-max-version
and--tls-version
(preferred TLS version) flags.
Controlling the advertised cipher suites#
It's possible to configure the advertised cipher suites gNMIc's gNMI client advertises to the target. This can be done by setting the tls-min-version
and tls-max-version
or by explicitly listing cipher suites to be advertised.
By default the below list is advertised:
Name | Key Exchange | Auth | Enc | MAC |
---|---|---|---|---|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | ECDHE | ECDSA | AES_128_GCM | SHA256 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | ECDHE | RSA | AES_128_GCM | SHA256 |
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 | ECDHE | ECDSA | AES_256_GCM | SHA384 |
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | ECDHE | RSA | AES_256_GCM | SHA384 |
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | ECDHE | ECDSA | CHACHA20_POLY1305 | SHA256 |
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 | ECDHE | RSA | CHACHA20_POLY1305 | SHA256 |
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA | ECDHE | ECDSA | AES_128_CBC | SHA |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | ECDHE | RSA | AES_128_CBC | SHA |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA | ECDHE | ECDSA | AES_256_CBC | SHA |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | ECDHE | RSA | AES_256_CBC | SHA |
TLS_RSA_WITH_AES_128_GCM_SHA256 | RSA | RSA | AES_128_GCM | SHA256 |
TLS_RSA_WITH_AES_256_GCM_SHA384 | RSA | RSA | AES_256_GCM | SHA384 |
TLS_RSA_WITH_AES_128_CBC_SHA | RSA | RSA | AES_128_CBC | SHA |
TLS_RSA_WITH_AES_256_CBC_SHA | RSA | RSA | AES_256_CBC | SHA |
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA | ECDHE | RSA | 3DES_EDE_CBC | SHA |
TLS_RSA_WITH_3DES_EDE_CBC_SHA | RSA | RSA | 3DES_EDE_CBC | SHA |
TLS_AES_128_GCM_SHA256 | (TLS 1.3) | (TLS 1.3) | AES_128_GCM | SHA256 |
TLS_AES_256_GCM_SHA384 | (TLS 1.3) | (TLS 1.3) | AES_256_GCM | SHA384 |
TLS_CHACHA20_POLY1305_SHA256 | (TLS 1.3) | (TLS 1.3) | CHACHA20_POLY1305 | SHA256 |
If the tls-max-version
is set to "1.2", the TLS1.3 cipher suites will not be included:
Name | Key Exchange | Auth | Enc | MAC |
---|---|---|---|---|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | ECDHE | ECDSA | AES_128_GCM | SHA256 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | ECDHE | RSA | AES_128_GCM | SHA256 |
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 | ECDHE | ECDSA | AES_256_GCM | SHA384 |
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | ECDHE | RSA | AES_256_GCM | SHA384 |
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | ECDHE | ECDSA | CHACHA20_POLY1305 | SHA256 |
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 | ECDHE | RSA | CHACHA20_POLY1305 | SHA256 |
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA | ECDHE | ECDSA | AES_128_CBC | SHA |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | ECDHE | RSA | AES_128_CBC | SHA |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA | ECDHE | ECDSA | AES_256_CBC | SHA |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | ECDHE | RSA | AES_256_CBC | SHA |
TLS_RSA_WITH_AES_128_GCM_SHA256 | RSA | RSA | AES_128_GCM | SHA256 |
TLS_RSA_WITH_AES_256_GCM_SHA384 | RSA | RSA | AES_256_GCM | SHA384 |
TLS_RSA_WITH_AES_128_CBC_SHA | RSA | RSA | AES_128_CBC | SHA |
TLS_RSA_WITH_AES_256_CBC_SHA | RSA | RSA | AES_256_CBC | SHA |
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA | ECDHE | RSA | 3DES_EDE_CBC | SHA |
TLS_RSA_WITH_3DES_EDE_CBC_SHA | RSA | RSA | 3DES_EDE_CBC | SHA |
If the tls-max-version
and tls-min-version
are set to "1.1", the below list of cipher suites is advertised:
Name | Key Exchange | Auth | Enc | MAC |
---|---|---|---|---|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA | ECDHE | ECDSA | AES_128_CBC | SHA |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | ECDHE | RSA | AES_128_CBC | SHA |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA | ECDHE | ECDSA | AES_256_CBC | SHA |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | ECDHE | RSA | AES_256_CBC | SHA |
TLS_RSA_WITH_AES_128_CBC_SHA | RSA | RSA | AES_128_CBC | SHA |
TLS_RSA_WITH_AES_256_CBC_SHA | RSA | RSA | AES_256_CBC | SHA |
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA | ECDHE | RSA | 3DES_EDE_CBC | SHA |
TLS_RSA_WITH_3DES_EDE_CBC_SHA | RSA | RSA | 3DES_EDE_CBC | SHA |
If you want to control which cipher suites are sent and in what order of preference, you can set the cipher-suites
field under the target:
targets:
target1:
# other fields
cipher-suites:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_AES_128_GCM_SHA256
The full list of supported cipher suites is:
Name | Key Exchange | Auth | Enc | MAC |
---|---|---|---|---|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | ECDHE | ECDSA | AES_128_GCM | SHA256 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | ECDHE | RSA | AES_128_GCM | SHA256 |
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 | ECDHE | ECDSA | AES_256_GCM | SHA384 |
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | ECDHE | RSA | AES_256_GCM | SHA384 |
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | ECDHE | ECDSA | CHACHA20_POLY1305 | SHA256 |
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 | ECDHE | RSA | CHACHA20_POLY1305 | SHA256 |
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA | ECDHE | ECDSA | AES_128_CBC | SHA |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | ECDHE | RSA | AES_128_CBC | SHA |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA | ECDHE | ECDSA | AES_256_CBC | SHA |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | ECDHE | RSA | AES_256_CBC | SHA |
TLS_RSA_WITH_AES_128_GCM_SHA256 | RSA | RSA | AES_128_GCM | SHA256 |
TLS_RSA_WITH_AES_256_GCM_SHA384 | RSA | RSA | AES_256_GCM | SHA384 |
TLS_RSA_WITH_AES_128_CBC_SHA | RSA | RSA | AES_128_CBC | SHA |
TLS_RSA_WITH_AES_256_CBC_SHA | RSA | RSA | AES_256_CBC | SHA |
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA | ECDHE | RSA | 3DES_EDE_CBC | SHA |
TLS_RSA_WITH_3DES_EDE_CBC_SHA | RSA | RSA | 3DES_EDE_CBC | SHA |
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 | ECDHE | ECDSA | AES_128_CBC | SHA256 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 | ECDHE | RSA | AES_128_CBC | SHA256 |
TLS_RSA_WITH_AES_128_CBC_SHA256 | RSA | RSA | AES_128_CBC | SHA256 |
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA | ECDHE | ECDSA | RC4_128 | SHA |
TLS_ECDHE_RSA_WITH_RC4_128_SHA | ECDHE | RSA | RC4_128 | SHA |
TLS_RSA_WITH_RC4_128_SHA | RSA | RSA | RC4_128 | SHA |
TLS_AES_128_GCM_SHA256 | (TLS 1.3) | (TLS 1.3) | AES_128_GCM | SHA256 |
TLS_AES_256_GCM_SHA384 | (TLS 1.3) | (TLS 1.3) | AES_256_GCM | SHA384 |
TLS_CHACHA20_POLY1305_SHA256 | (TLS 1.3) | (TLS 1.3) | CHACHA20_POLY1305 | SHA256 |
target configuration options#
Target supported options:
targets:
# target name or an address (IP or DNS name).
# if an address is set it can include a port number or not,
# if a port is not included, the default gRPC port will be added.
target_key:
# target name, will default to the target_key if not specified
name: target_key
# target address, if missing the target_key is used as an address.
# supports comma separated addresses.
# if any of the addresses is missing a port, the default gRPC port will be added.
# if multiple addresses are set, all of them will be tried simultaneously,
# the first established gRPC connection will be used, the other attempts will be canceled.
address:
# target username
username:
# target password
password:
# authentication token,
# applied only in the case of a secure gRPC connection.
token:
# target RPC timeout
timeout:
# establish an insecure connection
insecure:
# path to tls ca file
tls-ca:
# path to tls certificate
tls-cert:
# path to tls key
tls-key:
# max tls version to use during negotiation
tls-max-version:
# min tls version to use during negotiation
tls-min-version:
# preferred tls version to use during negotiation
# this value overwrites both tls-min-version and
# tls-max-version
tls-version:
# enable logging of a pre-master TLS secret
log-tls-secret:
# do not verify the target certificate when using tls
skip-verify:
# server name used to verify the hostname on the returned
# certificates unless skip-verify is true.
tls-server-name:
# list of subscription names to establish for this target.
# if empty it defaults to all subscriptions defined under
# the main level `subscriptions` field
subscriptions:
# string, case insensitive, defines the gNMI encoding to be used for
# the subscriptions to be established for this target.
# This encoding value applies only if the subscription configuration does
# NOT explicitly define an encoding.
encoding:
# list of output names to which the gnmi data will be written.
# if empty if defaults to all outputs defined under
# the main level `outputs` field
outputs:
# number of subscribe responses to keep in buffer before writing
# the target outputs
buffer-size:
# target retry period
retry:
# list of tags, relevant when clustering is enabled.
tags:
# a mapping of static tags to add to all events from this target.
# each key/value pair in this mapping will be added to metadata
# on all events
event-tags:
# list of proto file names to decode protoBytes values
proto-files:
# list of directories to look for the proto files
proto-dirs:
# enable grpc gzip compression
gzip:
# proxy type and address, only SOCKS5 is supported currently
# example: socks5://<address>:<port>
proxy:
# list of custom TLS cipher suites to advertise to the target
# during the TLS handshake.
cipher-suites:
# a duration, sets the TCP keepalive time and keepalive interval.
# The number of keepalive probes to send before sending a TCP RST
# is not configurable, it inherits its value from the linux kernel
# net.ipv4.tcp_keepalive_probes which usually has a default value of 9.
# When empty or set to 0s, the Golang default (15s) applies.
# Disabled if set to a negative value.
tcp-keepalive: 0s
# sets gRPC keepalive parameters according to:
# https://github.com/grpc/proposal/blob/master/A8-client-side-keepalive.md
grpc-keepalive:
# After a duration of this time if the client doesn't see any activity
# it pings the server to see if the transport is still alive.
# If set below 10s, a minimum value of 10s will be used instead.
time:
# After having pinged for keepalive check, the client waits
# for a duration of Timeout and if no activity is seen even
# after that the connection is closed.
timeout:
# If true, client sends keepalive pings even with no active RPCs.
# If false, when there are no active RPCs,
# Time and Timeout will be ignored and no keepalive pings will be sent.
permit-without-stream: false
Example#
Whatever configuration option you choose, the multi-targeted operations will uniformly work across the commands that support them.
Consider the get
command acting on two routers getting their names:
❯ gnmic -a router1.lab.net:57400 \
-a router2.lab.net:57400 \
get --path /configure/system/name
[router1.lab.net:57400] {
[router1.lab.net:57400] "source": "router1.lab.net:57400",
[router1.lab.net:57400] "timestamp": 1593009759618786781,
[router1.lab.net:57400] "time": "2020-06-24T16:42:39.618786781+02:00",
[router1.lab.net:57400] "updates": [
[router1.lab.net:57400] {
[router1.lab.net:57400] "Path": "configure/system/name",
[router1.lab.net:57400] "values": {
[router1.lab.net:57400] "configure/system/name": "gnmic_r1"
[router1.lab.net:57400] }
[router1.lab.net:57400] }
[router1.lab.net:57400] ]
[router1.lab.net:57400] }
[router2.lab.net:57400] {
[router2.lab.net:57400] "source": "router2.lab.net:57400",
[router2.lab.net:57400] "timestamp": 1593009759748265232,
[router2.lab.net:57400] "time": "2020-06-24T16:42:39.748265232+02:00",
[router2.lab.net:57400] "updates": [
[router2.lab.net:57400] {
[router2.lab.net:57400] "Path": "configure/system/name",
[router2.lab.net:57400] "values": {
[router2.lab.net:57400] "configure/system/name": "gnmic_r2"
[router2.lab.net:57400] }
[router2.lab.net:57400] }
[router2.lab.net:57400] ]
[router2.lab.net:57400] }
Notice how in the output the different gNMI targets are prefixed with the target address to make the output easy to read. If those prefixes are not needed, you can make them disappear with --no-prefix
global flag.