- play_arrow Overview
- play_arrow Junos Automation Scripts Overview
- play_arrow Junos XML Management Protocol and Junos XML API Overview
-
- play_arrow Automation Scripting Using XSLT
- play_arrow XSLT Overview
- play_arrow Standard XPath and XSLT Functions Used in Automation Scripts
- play_arrow Standard XSLT Elements and Attributes Used in Automation Scripts
-
- play_arrow Automation Scripting Using SLAX
- play_arrow SLAX Overview
- SLAX Overview
- SLAX Syntax Rules Overview
- SLAX Elements and Element Attributes Overview
- SLAX Elements as Function Arguments
- Understanding SLAX Default Namespaces
- XPath Expressions Overview for SLAX
- SLAX Templates Overview
- SLAX Functions Overview
- SLAX Parameters Overview
- SLAX Variables Overview
- SLAX Statements Overview
- XSLT Elements Without SLAX Equivalents
- SLAX Operators
- play_arrow SLAX Statements
- append
- apply-imports
- apply-templates
- attribute
- attribute-set
- call
- copy-node
- copy-of
- decimal-format
- element
- else
- else if
- expr
- fallback
- for
- for-each
- function
- if
- import
- key
- match
- message
- mode
- mvar
- number
- output-method
- param
- preserve-space
- priority
- processing-instruction
- result
- set
- sort
- strip-space
- template
- terminate
- trace
- uexpr
- use-attribute-sets
- var
- version
- while
- with
- play_arrow The libslax Distribution for Automation Scripting
- libslax Distribution Overview
- libslax Library and Extension Libraries Overview
- Download and Install the libslax Distribution
- libslax Default Extension Libraries: bit, curl, db, os, and xutil
- Understanding the SLAX Processor (slaxproc)
- How to Use the SLAX Processor (slaxproc)
- SLAX Debugger, Profiler, and callflow
-
- play_arrow Automation Scripting Using Python
- play_arrow Python Overview
- Understanding Python Automation Scripts for Junos Devices
- Requirements for Executing Python Automation Scripts on Junos Devices
- Overview of Python Modules on Junos Devices
- How to Use Python Interactive Mode on Devices Running Junos OS
- How to Use the psutil Module to Retrieve Process and System Information on Devices Running Junos OS
- How to Use the Requests Library for Python on Devices Running Junos OS
- IPv6 Support in Python Automation Scripts
- How to Specify the Routing Instance in Python 3 Applications on Devices Running Junos OS Evolved
-
- play_arrow Automation Script Input
- play_arrow Global Parameters in Automation Scripts
-
- play_arrow Extension Functions and Named Templates for Automation Scripts
- play_arrow Extension Functions for Automation Scripting
- play_arrow Extension Functions in the jcs and slax Namespaces
- base64-decode() Function (SLAX)
- base64-encode() Function (SLAX)
- break-lines() Function (SLAX and XSLT)
- close() Function (SLAX and XSLT)
- dampen() Function (Python, SLAX, and XSLT)
- document() Function (SLAX)
- emit_error() Function (Python)
- emit_snmp_attributes Function (Python)
- emit_warning() Function (Python)
- empty() Function (SLAX and XSLT)
- evaluate() Function (SLAX)
- execute() Function (SLAX and XSLT)
- first-of() Function (SLAX and XSLT)
- get-command() Function (SLAX)
- get-hello() Function (SLAX and XSLT)
- get-input() Function (SLAX and XSLT) and get_input() (Python)
- get-protocol() Function (SLAX and XSLT)
- get-secret() Function (SLAX and XSLT) and get_secret() (Python)
- get_snmp_action() Function (Python)
- get_snmp_oid() Function (Python)
- hostname() Function (Python, SLAX, and XSLT)
- invoke() Function (SLAX and XSLT)
- open() Function (SLAX and XSLT)
- output() Function (Python, SLAX, and XSLT)
- parse-ip() Function (SLAX and XSLT) and parse_ip() (Python)
- printf() Function (Python, SLAX, and XSLT)
- progress() Function (Python, SLAX, and XSLT)
- regex() Function (SLAX and XSLT)
- set_routing_instance() Function (Python)
- sleep() Function (SLAX and XSLT)
- split() Function (SLAX and XSLT)
- sysctl() Function (Python, SLAX, and XSLT)
- syslog() Function (Python, SLAX, and XSLT)
- trace() Function (Python, SLAX, and XSLT)
- play_arrow Named Templates for Automation Scripting
- play_arrow Named Templates in the jcs Namespace
-
- play_arrow Manage Automation Scripts
- play_arrow Store and Enable Scripts
- play_arrow Configure a Remote Source for Scripts
- play_arrow Configure the Session Protocol for Scripts
- play_arrow Control Execution of Scripts
- play_arrow Synchronize Scripts Between Routing Engines
- play_arrow Convert Scripts Between SLAX and XSLT
-
- play_arrow Op Scripts
- play_arrow Op Scripts Overview
- play_arrow Create and Execute Op Scripts
- Required Boilerplate for Op Scripts
- Map Operational Mode Commands and Output Fields to Junos XML Notation
- How to Use RPCs and Operational Mode Commands in Op Scripts
- Declare and Use Command-Line Arguments in Op Scripts
- Configure Help Text for Op Scripts
- Define Operational Mode Commands to Allow in an Op Script
- Enable an Op Script and Define a Script Alias
- Configure Checksum Hashes for an Op Script
- Execute an Op Script on the Local Device
- Execute an Op Script from a Remote Site
- Disable an Op Script
- play_arrow Op Script Examples
- Change the Configuration Using SLAX and XSLT Scripts
- Example: Change the Configuration Using SLAX and XSLT Op Scripts
- Example: Change the Configuration Using Python Op Scripts
- Example: Customize Output of the show interfaces terse Command Using an Op Script
- Example: Display DNS Hostname Information Using an Op Script
- Example: Find LSPs to Multiple Destinations Using an Op Script
- Example: Restart an FPC Using an Op Script
- Example: Export Files Using an Op Script
- Example: Import Files Using an Op Script
- Example: Search Files Using an Op Script
- play_arrow Provision Services Using Service Template Automation
- play_arrow Troubleshoot Op Scripts
-
- play_arrow Event Policies and Event Scripts
- play_arrow Event Policy Overview
- play_arrow Event Policy Triggers
- Use Correlated Events to Trigger an Event Policy
- Trigger an Event Policy Based on Event Count
- Example: Trigger an Event Policy Based on Event Count
- Use Regular Expressions to Refine the Set of Events That Trigger a Policy
- Example: Controlling Event Policy Using a Regular Expression
- Generate Internal Events to Trigger Event Policies
- Use Nonstandard System Log Messages to Trigger Event Policies
- Junos Logger Utility
- play_arrow Event Policy Actions
- Configure an Event Policy to Execute Operational Mode Commands
- Configure an Event Policy to Change the Configuration
- Example: Changing the Configuration Using an Event Policy
- Example: Changing the Interface Configuration in Response to an Event
- Execute Event Scripts in an Event Policy
- Change the Configuration Using an Event Script
- Configuring an Event Policy to Pass Arguments to an Event Script
- Configure Event Policies to Ignore an Event
- Example: Ignore Events Based on Receipt of Other Events
- Overview of Using Event Policies to Raise SNMP Traps
- Example: Raise an SNMP Trap in Response to an Event
- Understanding the Event System Log Priority in an Event Policy
- Example: Configuring the Event System Log Priority in an Event Policy
- Example: Limit Event Script Output Based on a Specific Event Type
- play_arrow Configure Event Policy File Archiving
- play_arrow Configure Event Policy Privileges
- play_arrow Event Scripts Overview
- play_arrow Create and Execute Event Scripts
- play_arrow Troubleshoot Event Policies and Event Scripts
-
- play_arrow SNMP Scripts
- play_arrow SNMP Scripts Overview
- play_arrow Create and Execute SNMP Scripts
- play_arrow SNMP Script Example
- play_arrow Troubleshoot SNMP Scripts
-
- play_arrow Configuration Statements and Operational Commands
Example: Control LDP Configuration
This commit script example generates a warning on LDP-enabled
devices for any interfaces that are configured at either the [edit protocols ospf]
or [edit protocols isis]
hierarchy
level but are not configured at the [edit protocols ldp]
hierarchy level. A second test ensures that all LDP-enabled interfaces
are configured for an interior gateway protocol (IGP). The example
also provides instructions for excluding a particular interface from
the commit script LDP test.
Overview and Commit Script
If you want to enable LDP on an interface, you must configure
the interface at both the [edit protocols routing-protocol-name]
and [edit protocols ldp]
hierarchy levels. This
example shows how to use commit scripts to ensure that the interface
is configured at both levels.
This example tests for interfaces that are configured at either
the [edit protocols ospf]
or [edit protocols isis]
hierarchy level but not at the [edit protocols ldp]
hierarchy level. If LDP is not enabled on the device, there is no
problem. Otherwise, a warning is generated with the message that the
interface does not have LDP enabled.
In case you want some interfaces to be exempt from the LDP test,
this script allows you to tag those interfaces as not requiring LDP
by including the apply-macro no-ldp
statement at the [edit protocols isis interface interface-name]
or [edit protocols ospf area area-id interface interface-name]
hierarchy level.
For example:
[edit] protocols { isis { interface so-0/1/2.0 { apply-macro no-ldp; } } }
If the apply-macro no-ldp
statement is included,
the warning is not generated.
A second test ensures that all LDP-enabled interfaces are configured
for an interior gateway protocol (IGP). As for LDP, you can exempt
some interfaces from the test by including the apply-macro no-igp
statement at the [edit protocols ldp interface interface-name]
hierarchy level. If that statement is not included and no
IGP is configured, a warning is generated.
The example script is shown in both XSLT and SLAX syntax:
XSLT Syntax
<?xml version="1.0" standalone="yes"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:junos="http://xml.juniper.net/junos/*/junos" xmlns:xnm="http://xml.juniper.net/xnm/1.1/xnm" xmlns:jcs="http://xml.juniper.net/junos/commit-scripts/1.0"> <xsl:import href="../import/junos.xsl"/> <xsl:template match="configuration"> <xsl:variable name="ldp" select="protocols/ldp"/> <xsl:variable name="isis" select="protocols/isis"/> <xsl:variable name="ospf" select="protocols/ospf"/> <xsl:if test="$ldp"> <xsl:for-each select="$isis/interface/name | $ospf/area/interface/name"> <xsl:variable name="ifname" select="."/> <xsl:if test="not(../apply-macro[name = 'no-ldp']) and not($ldp/interface[name = $ifname])"> <xnm:warning> <xsl:call-template name="jcs:edit-path"/> <xsl:call-template name="jcs:statement"/> <message>ldp not enabled for this interface</message> </xnm:warning> </xsl:if> </xsl:for-each> <xsl:for-each select="protocols/ldp/interface/name"> <xsl:variable name="ifname" select="."/> <xsl:if test="not(apply-macro[name = 'no-igp']) and not($isis/interface[name = $ifname]) and not($ospf/area/interface[name = $ifname])"> <xnm:warning> <xsl:call-template name="jcs:edit-path"/> <xsl:call-template name="jcs:statement"/> <message> <xsl:text>ldp-enabled interface does not have </xsl:text> <xsl:text>an IGP configured</xsl:text> </message> </xnm:warning> </xsl:if> </xsl:for-each> </xsl:if> </xsl:template> </xsl:stylesheet>
SLAX Syntax
version 1.0; ns junos = "http://xml.juniper.net/junos/*/junos"; ns xnm = "http://xml.juniper.net/xnm/1.1/xnm"; ns jcs = "http://xml.juniper.net/junos/commit-scripts/1.0"; import "../import/junos.xsl"; apply-macro no-ldp; match configuration { var $ldp = protocols/ldp; var $isis = protocols/isis; var $ospf = protocols/ospf; if ($ldp) { for-each ($isis/interface/name | $ospf/area/interface/name) { var $ifname = .; if (not(../apply-macro[name = 'no-ldp']) and not($ldp/interface[name = $ifname])) { <xnm:warning> { call jcs:edit-path(); call jcs:statement(); <message> "ldp not enabled for this interface"; } } } for-each (protocols/ldp/interface/name) { var $ifname = .; if (not(apply-macro[name = 'no-igp']) and not($isis/interface[name = $ifname]) and not($ospf/area/interface[name = $ifname])) { <xnm:warning> { call jcs:edit-path(); call jcs:statement(); <message> { expr "ldp-enabled interface does not have "; expr "an IGP configured"; } } } } } }
Configuration
Procedure
Step-by-Step Procedure
To download, enable, and test the script:
Copy the script into a text file, name the file ldp.xsl or ldp.slax as appropriate, and copy it to the /var/db/scripts/commit/ directory on the device.
Select the following test configuration stanzas, and press Ctrl+c to copy them to the clipboard.
If you are using the SLAX version of the script, change the filename at the
[edit system scripts commit file]
hierarchy level to ldp.slax.content_copy zoom_out_mapsystem { scripts { commit { file ldp.xsl; } } } protocols { isis { interface so-1/2/2.0 { apply-macro no-ldp; } interface so-1/2/3.0; } ospf { area 10.4.0.0 { interface ge-3/2/1.0; interface ge-2/2/1.0; } } ldp { interface ge-1/2/1.0; interface ge-2/2/1.0; } }
In configuration mode, issue the
load merge terminal
command to merge the stanzas into your device configuration.content_copy zoom_out_map[edit] user@host# load merge terminal [Type ^D at a new line to end input] ... Paste the contents of the clipboard here ...
At the prompt, paste the contents of the clipboard by using the mouse and the paste icon.
Press Enter.
Press Ctrl+d.
Commit the configuration.
content_copy zoom_out_mapuser@host# commit
Verification
Verifying the Script Execution
Purpose
Verify that the script behaves as expected.
Action
Review the output of the commit
command. The
sample configuration stanzas enable LDP on the device and configure
the so-1/2/2 and so-1/2/3 interfaces at the [edit protocols isis]
hierarchy level and the ge-3/2/1 and ge-2/2/1 interfaces at the [edit protocols ospf]
hierarchy level.
Because ge-2/2/1 is also configured at the [edit protocols
ldp]
hierarchy level, the script does not issue a warning message
for this interface during the commit operation. The configuration
includes the apply-macro no-ldp
statement under the so-1/2/2
interface, so the script does not test this interface or issue a warning
message for it, even though it is not configured at the [edit
protocols ldp]
hierarchy.
Neither so-1/2/3 nor ge-3/2/1 is configured at the [edit
protocols ldp]
hierarchy level as required by the commit script,
so a warning is issued for both interfaces. The ge-1/2/1 interface
is configured at the [edit protocols ldp]
hierarchy. However,
it is not configured for an IGP, so the commit script also issues
a warning for the ge-1/2/1 interface.
[edit] user@host# commit
[edit protocols ospf area 10.4.0.0 interface so-1/2/3.0] 'interface so-1/2/3.0;' warning: LDP not enabled for this interface [edit protocols ospf area 10.4.0.0 interface ge-3/2/1.0] 'interface ge-3/2/1.0;' warning: LDP not enabled for this interface [edit protocols ldp interface ge-1/2/1.0] 'interface ge-1/2/1.0;' warning: LDP-enabled interface does not have an IGP configured commit complete