Overview of command sets
Use this information to acquire an understanding of command sets.
Command sets can be parameterized so that some values can be modified at run time. Command sets are defined on a specific VTMOS, and it is important to ensure that all commands included in the command set apply to the VTMOS chosen.
Command sets are applied as a unit of work (UOW), and therefore
can be scheduled and approved.
Note: When creating a modeled command
set, the list of VTMOS labels from which you can select has been filtered
to only display the labels for Smart Model drivers. Standard driver
VTMOS are excluded.
An example of the use of command sets is a network administrator
wanting to change the SNMP contact of all the Cisco 26xx routers on
the network to the same value, without having to create individual
configuration change UOWs for each resource.
About command sets
- Native command sets
- Native command sets allow you to send CLI commands to one or more network resource at a time. The information from these commands is shown in the UOW log.
- Realms and security
- In order to create and apply command sets, you must belong to a group with the appropriate access privileges. A command set can be created in any realm, and can then be applied to network resources in any other realm, as long as appropriate rights for each realm are allocated.
- Using command sets as default configurations
- Command sets are ideally suited for use as default configurations to seed new resources. For example, if there are many resources of the same VTMOS, a parameterized template could be created using a command set that would be applied to each resource, thus saving time on manually configuring each device.
- Wildcards
- For modeled command sets, wildcards are supported in command set elements, allowing a comparison to be made against any previous value, thus making command sets more general and reusable.
- Parameters
- Parameters allow the reuse of command sets, as each time the command set is applied, the value of the parameterized value can be defined. A default value may be used for any parameterized field. The user applying the command set is prompted to provide values for any parameterized fields.
- Failures
- A UOW task is considered a failure when a command set does not execute successfully against a resource. If there are multiple modifications within a command set, and one change in the command set fails, the application of the command set to that particular network resource is stopped.
- Multiple command sets
- Multiple command sets can be applied to a network resource at the same time.
Modeled command set processing
Use this
information to learn how a modeled command set is processed, from
submission to completed UOW.
Note: A device must be in synch before
applying a command set.
- Parameter substitution
- When a command set is submitted, XML representing the command set logic is added to the UOW. If any parameterized values existed in the command set, those parameters are replaced by their actual values (supplied by the user submitting/applying the command set).
- Device processing
- Before applying a command set to the configuration running on a resource, the command set is applied to a copy of the current configuration in the database. Each configuration change (add, delete, match/replace, and so forth) within the command set is examined to determine if the requested change can be made. If the command set results in any changes, the copy of the current configuration is saved as a draft configuration. If no changes would result from the application of the command set, the next work component is processed, or if that was the only work component, the UOW is shown as completed with a successful status.
- Work processing order
- When multiple command sets are applied against multiple network resources, there are two different ways in which the command sets can be applied to the device. These are 'Apply Device at a time', and 'Apply Command Set at a time'.
Note: Each work component represents a unique resource
change, in which the device is locked, the change is made, the old
’current becomes a versioned configuration, and a new current configuration
is created.