gNMI Streaming
You can use gRPC Network Management Interface (gNMI) to collect system metrics and export the data to a gNMI client.
Cumulus Linux supports:
- gNMI with NetQ, where the
netq-agent
package includes the gNMI agent that listens over port 9339. - gNMI with Cumulus Linux, where Cumulus Linux includes the gNMI agent that listens over port 9339.
To use both gNMI streaming with NetQ and gNMI streaming with Cumulus Linux, you must use different ports.
gNMI with NetQ
This section discusses how to configure and use gNMI with NetQ.
To configure and use gNMI with Cumulus Linux, see gNMI with Cumulus Linux.
Configure the gNMI Agent
The netq-agent
package includes the gNMI agent, which it disables by default. To enable the gNMI agent:
cumulus@switch:~$ sudo systemctl enable netq-agent.service
cumulus@switch:~$ sudo systemctl start netq-agent.service
cumulus@switch:~$ netq config add agent gnmi-enable true
The gNMI agent listens over port 9339. You can change the default port in case you use that port in another application. The /etc/netq/netq.yml
file stores the configuration.
Use the following commands to adjust the settings:
-
Disable the gNMI agent:
cumulus@switch:~$ netq config add agent gnmi-enable false
-
Change the default port over which the gNMI agent listens:
cumulus@switch:~$ netq config add agent gnmi-port <gnmi_port>
-
Restart the NetQ Agent to incorporate the configuration changes:
cumulus@switch:~$ netq config restart agent
The gNMI agent relies on the data it collects from the NVUE service. For complete data collection with gNMI, you must enable the NVUE service. To check the status of the nvued
service, run the sudo systemctl status nvued.service
command:
cumulus@switch:mgmt:~$ sudo systemctl status nvued.service
● nvued.service - NVIDIA User Experience Daemon
Loaded: loaded (/lib/systemd/system/nvued.service; enabled; vendor preset: enabled)
Active: active (running) since Thu 2023-03-09 20:00:17 UTC; 6 days ago
If necessary, enable and start the service:
cumulus@switch:mgmt:~$ sudo systemctl enable nvued.service
cumulus@switch:mgmt:~$ sudo systemctl start nvued.service
Use the gNMI Agent Only
NVIDIA recommends that you collect data with both the gNMI and NetQ agents. However, if you do not want to collect data with both agents or you are not streaming data to NetQ, you can disable the NetQ agent. Cumulus Linux then sents data only to the gNMI agent.
To disable the NetQ agent:
cumulus@switch:~$ netq config add agent opta-enable false
You cannot disable both the NetQ and gNMI agent. If you enable both agents on Cumulus Linux and a NetQ server is unreachable, the switch does not send the data to gNMI from the following models:
openconfig-interfaces
openconfig-if-ethernet
openconfig-if-ethernet-ext
openconfig-system
nvidia-if-ethernet-ext
WJH, openconfig-platform
, and openconfig-lldp
data continue streaming to gNMI in this state. If you are only using gNMI and a NetQ telemetry server does not exist, disable the NetQ agent by setting opta-enable
to false
.
Supported Subscription Modes
Cumulus Linux supports the following gNMI subscription modes:
POLL
modeONCE
modeSTREAM
mode, supported forON_CHANGE
subscriptions only
Supported Models
Cumulus Linux supports the following OpenConfig models:
Model | Supported Data |
---|---|
openconfig-interfaces | Name, Operstatus, AdminStatus, IfIndex, MTU, LoopbackMode, Enabled, Counters (InPkts, OutPkts, InOctets, InUnicastPkts, InDiscards, InMulticastPkts, InBroadcastPkts, InErrors, OutOctets, OutUnicastPkts, OutMulticastPkts, OutBroadcastPkts, OutDiscards, OutErrors) |
openconfig-if-ethernet | AutoNegotiate, PortSpeed, MacAddress, NegotiatedPortSpeed, Counters (InJabberFrames, InOversizeFrames, InUndersizeFrames) |
openconfig-if-ethernet-ext | Frame size counters (InFrames_64Octets, InFrames_65_127Octets, InFrames_128_255Octets, InFrames_256_511Octets, InFrames_512_1023Octets, InFrames_1024_1518Octets) |
openconfig-system | Memory, CPU |
openconfig-platform | Platform data (Name, Description, Version) |
openconfig-lldp | LLDP data (PortIdType, PortDescription, LastUpdate, SystemName, SystemDescription, ChassisId, Ttl, Age, ManagementAddress, ManagementAddressType, Capability) |
Model | Supported Data |
---|---|
nvidia-if-wjh-drop-aggregate | Aggregated WJH drops, including layer 1, layer 2, router, ACL, tunnel, and buffer drops |
nvidia-if-ethernet-ext | Extended Ethernet counters (AlignmentError, InAclDrops, InBufferDrops, InDot3FrameErrors, InDot3LengthErrors, InL3Drops, InPfc0Packets, InPfc1Packets, InPfc2Packets, InPfc3Packets, InPfc4Packets, InPfc5Packets, InPfc6Packets, InPfc7Packets, OutNonQDrops, OutPfc0Packets, OutPfc1Packets, OutPfc2Packets, OutPfc3Packets, OutPfc4Packets, OutPfc5Packets, OutPfc6Packets, OutPfc7Packets, OutQ0WredDrops, OutQ1WredDrops, OutQ2WredDrops, OutQ3WredDrops, OutQ4WredDrops, OutQ5WredDrops, OutQ6WredDrops, OutQ7WredDrops, OutQDrops, OutQLength, OutWredDrops, SymbolErrors, OutTxFifoFull) |
The client can use the following YANG models as a reference:
Collect WJH Data with gNMI
You can export What Just Happened (WJH) data from the NetQ agent to your own gNMI client. Refer to the nvidia-if-wjh-drop-aggregate
reference YANG model, above.
The gNMI Agent supports Capabilities
and STREAM
subscribe requests for WJH events.
WJH Drop Reasons
The data that NetQ sends to the gNMI agent is in the form of WJH drop reasons. The SDK generates the drop reasons and Cumulus Linux stores them in the /usr/etc/wjh_lib_conf.xml
file. Use this file as a guide to filter for specific reason types (L1, ACL, and so on), reason IDs, or event severeties.
Layer 1 Drop Reasons
Reason ID | Reason | Description |
---|---|---|
10021 | Port admin down | Validate port configuration |
10022 | Auto-negotiation failure | Set port speed manually, disable auto-negotiation |
10023 | Logical mismatch with peer link | Check cable or transceiver |
10024 | Link training failure | Check cable or transceiver |
10025 | Peer is sending remote faults | Replace cable or transceiver |
10026 | Bad signal integrity | Replace cable or transceiver |
10027 | Cable or transceiver is not supported | Use supported cable or transceiver |
10028 | Cable or transceiver is unplugged | Plug cable or transceiver |
10029 | Calibration failure | Check cable or transceiver |
10030 | Cable or transceiver bad status | Check cable or transceiver |
10031 | Other reason | Other L1 drop reason |
Layer 2 Drop Reasons
Reason ID | Reason | Severity | Description |
---|---|---|---|
201 | MLAG port isolation | Notice | Expected behavior |
202 | Destination MAC is reserved (DMAC=01-80-C2-00-00-0x) | Error | Bad packet received from the peer |
203 | VLAN tagging mismatch | Error | Validate the VLAN tag configuration on both ends of the link |
204 | Ingress VLAN filtering | Error | Validate the VLAN membership configuration on both ends of the link |
205 | Ingress spanning tree filter | Notice | Expected behavior |
206 | Unicast MAC table action discard | Error | Validate MAC table for this destination MAC |
207 | Multicast egress port list is empty | Warning | Validate why IGMP join or multicast router port does not exist |
208 | Port loopback filter | Error | Validate MAC table for this destination MAC |
209 | Source MAC is multicast | Error | Bad packet received from peer |
210 | Source MAC equals destination MAC | Error | Bad packet received from peer |
Router Drop Reasons
Reason ID | Reason | Severity | Description |
---|---|---|---|
301 | Non-routable packet | Notice | Expected behavior |
302 | Blackhole route | Warning | Validate routing table for this destination IP |
303 | Unresolved neighbor or next hop | Warning | Validate ARP table for the neighbor or next hop |
304 | Blackhole ARP or neighbor | Warning | Validate ARP table for the next hop |
305 | IPv6 destination in multicast scope FFx0:/16 | Notice | Expected behavior - packet is not routable |
306 | IPv6 destination in multicast scope FFx1:/16 | Notice | Expected behavior - packet is not routable |
307 | Non-IP packet | Notice | Destination MAC is the router, packet is not routable |
308 | Unicast destination IP but multicast destination MAC | Error | Bad packet received from the peer |
309 | Destination IP is loopback address | Error | Bad packet received from the peer |
310 | Source IP is multicast | Error | Bad packet received from the peer |
311 | Source IP is in class E | Error | Bad packet received from the peer |
312 | Source IP is loopback address | Error | Bad packet received from the peer |
313 | Source IP is unspecified | Error | Bad packet received from the peer |
314 | Checksum or IPver or IPv4 IHL too short | Error | Bad cable or bad packet received from the peer |
315 | Multicast MAC mismatch | Error | Bad packet received from the peer |
316 | Source IP equals destination IP | Error | Bad packet received from the peer |
317 | IPv4 source IP is limited broadcast | Error | Bad packet received from the peer |
318 | IPv4 destination IP is local network (destination=0.0.0.0/8) | Error | Bad packet received from the peer |
320 | Ingress router interface is disabled | Warning | Validate your configuration |
321 | Egress router interface is disabled | Warning | Validate your configuration |
323 | IPv4 routing table (LPM) unicast miss | Warning | Validate routing table for this destination IP |
324 | IPv6 routing table (LPM) unicast miss | Warning | Validate routing table for this destination IP |
325 | Router interface loopback | Warning | Validate the interface configuration |
326 | Packet size is larger than router interface MTU | Warning | Validate the router interface MTU configuration |
327 | TTL value is too small | Warning | Actual path is longer than the TTL |
Tunnel Drop Reasons
Reason ID | Reason | Severity | Description |
---|---|---|---|
402 | Overlay switch - Source MAC is multicast | Error | The peer sent a bad packet |
403 | Overlay switch - Source MAC equals destination MAC | Error | The peer sent a bad packet |
404 | Decapsulation error | Error | The peer sent a bad packet |
ACL Drop Reasons
Reason ID | Reason | Severity | Description |
---|---|---|---|
601 | Ingress port ACL | Notice | Validate Access Control List configuration |
602 | Ingress router ACL | Notice | Validate Access Control List |
603 | Egress router ACL | Notice | Validate Access Control List |
604 | Egress port ACL | Notice | Validate Access Control List |
Buffer Drop Reasons
Reason ID | Reason | Severity | Description |
---|---|---|---|
503 | Tail drop | Warning | Monitor network congestion |
504 | WRED | Warning | Monitor network congestion |
505 | Port TC congestion threshold crossed | Notice | Monitor network congestion |
506 | Packet latency threshold crossed | Notice | Monitor network congestion |
gNMI Client Requests
You can use your gNMI client on a host to request capabilities and data to which the Agent subscribes. The examples below use the gNMIc client..
The following example shows a gNMIc STREAM
request for WJH data:
gnmic -a 10.209.37.121:9339 -u cumulus -p ****** --skip-verify subscribe --path "wjh/aggregate/l2/reasons/reason[id=209][severity=error]/state/drop" --mode stream --prefix "/interfaces/interface[name=swp8]/" --target netq
{
"source": "10.209.37.121:9339",
"subscription-name": "default-1677695197",
"timestamp": 1677695102858146800,
"time": "2023-03-01T18:25:02.8581468Z",
"prefix": "interfaces/interface[name=swp8]/wjh/aggregate/l2/reasons/reason[severity=error][id=209]",
"target": "netq",
"updates": [
{
"Path": "state/drop",
"values": {
"state/drop": "[{\"AggCount\":283,\"Dip\":\"0.0.0.0\",\"Dmac\":\"1c:34:da:17:93:7c\",\"Dport\":0,\"DropType\":\"L2\",\"EgressPort\":\"\",\"EndTimestamp\":1677695102,\"FirstTimestamp\":1677695072,\"Hostname\":\"neo-switch01\",\"IngressLag\":\"\",\"IngressPort\":\"swp8\",\"Proto\":0,\"Reason\":\"Source MAC is multicast\",\"ReasonId\":209,\"Severity\":\"Error\",\"Sip\":\"0.0.0.0\",\"Smac\":\"01:00:5e:00:00:01\",\"Sport\":0}]"
}
}
]
}
{
"source": "10.209.37.121:9339",
"subscription-name": "default-1677695197",
"timestamp": 1677695132988218890,
"time": "2023-03-01T18:25:32.98821889Z",
"prefix": "interfaces/interface[name=swp8]/wjh/aggregate/l2/reasons/reason[severity=error][id=209]",
"target": "netq",
"updates": [
{
"Path": "state/drop",
"values": {
"state/drop": "[{\"AggCount\":287,\"Dip\":\"0.0.0.0\",\"Dmac\":\"1c:34:da:17:93:7c\",\"Dport\":0,\"DropType\":\"L2\",\"EgressPort\":\"\",\"EndTimestamp\":1677695132,\"FirstTimestamp\":1677695102,\"Hostname\":\"neo-switch01\",\"IngressLag\":\"\",\"IngressPort\":\"swp8\",\"Proto\":0,\"Reason\":\"Source MAC is multicast\",\"ReasonId\":209,\"Severity\":\"Error\",\"Sip\":\"0.0.0.0\",\"Smac\":\"01:00:5e:00:00:01\",\"Sport\":0}]"
}
}
]
}
The following example shows a gNMIc ONCE
mode request for interface port speed:
gnmic -a 10.209.37.121:9339 -u cumulus -p ****** --skip-verify subscribe --path "ethernet/state/port-speed" --mode once --prefix "/interfaces/interface[name=swp1]/" --target netq
{
"source": "10.209.37.123:9339",
"subscription-name": "default-1677695151",
"timestamp": 1677256036962254134,
"time": "2023-02-24T16:27:16.962254134Z",
"target": "netq",
"updates": [
{
"Path": "interfaces/interface[name=swp1]/ethernet/state/port-speed",
"values": {
"interfaces/interface/ethernet/state/port-speed": "SPEED_1GB"
}
}
]
}
The following example shows a gNMIc POLL
mode request for interface status:
gnmic -a 10.209.37.121:9339 -u cumulus -p ****** --skip-verify subscribe --path "state/oper-status" --mode poll --prefix "/interfaces/interface[name=swp1]/" --target netq
{
"timestamp": 1677644403153198642,
"time": "2023-03-01T04:20:03.153198642Z",
"prefix": "interfaces/interface[name=swp1]",
"target": "netq",
"updates": [
{
"Path": "state/oper-status",
"values": {
"state/oper-status": "UP"
}
}
]
}
received sync response 'true' from '10.209.37.123:9339'
{
"timestamp": 1677644403153198642,
"time": "2023-03-01T04:20:03.153198642Z",
"prefix": "interfaces/interface[name=swp1]",
"target": "netq",
"updates": [
{
"Path": "state/oper-status",
"values": {
"state/oper-status": "UP"
}
}
]
}
gNMI with Cumulus Linux
This section discusses how to configure and use gNMI with Cumulus Linux.
To configure and use gNMI with NetQ, see gNMI with NetQ.
When you enable gNMI with Cumulus Linux, do not enable and use Open Telemetry.
Cumulus Linux supports both gNMI dial-in mode, where a collector can start a connection with the switch to collect available statistics, and gNMI dial-out mode, where the switch streams statistics and exports them to a collector.
Configure gNMI Dial-in Mode
In dial-in telemetry mode, the data collector initiates the gRPC connection, the Cumulus Linux switch assumes the role of the gRPC server and the receiver (collector) is the client. The switch pushes data to the collector.
To configure gNMI dial-in mode, you must:
- Specify the gNMI server listening address
- Enable the gNMI server.
To configure optional settings for gNMI dial-in mode:
- Specify the listening port. The default port is 9339.
- Enable a TLS certificate for validation.
- Cumulus Linux uses a self-signed certificate. You can generate your own TLS server certificate and bind it with the gNMI server application.
- If you need to use mTLS on the gNMI RPC, import the certificate of the CA that signed the gNMI client keys (or the client certificate itself) to the switch and configure the gNMI server to use the certificate. You can also apply a CRL.
The following example sets the gNMI server listening address to 10.10.10.1 and the port to 443, and enables the gNMI server:
cumulus@switch:~$ nv set system gnmi-server listening-address 10.10.10.1
cumulus@switch:~$ nv set system gnmi-server port 443
cumulus@switch:~$ nv set system gnmi-server state enabled
cumulus@switch:~$ nv config apply
The following example imports and enables the CA certificate CERT1
and the CRL crl.crt
for mTLS:
cumulus@switch:~$ nv action import system security ca-certificate CERT1 passphrase mypassphrase uri-bundle scp://user@pass:1.2.3.4:/opt/certs/cert.p12
cumulus@switch:~$ nv set system gnmi-server mtls ca-certificate CERT1
cumulus@switch:~$ nv action import system security scp:////user@pass:1.2.3.4:/path/to/your/crl.crt.
cumulus@switch:~$ nv set system gnmi-server mtls crl /etc/ssl/certs/crl.crt
cumulus@switch:~$ nv config apply
Configure gNMI Dial-Out Mode
In dial-out telemetry mode, the Cumulus Linux switch initiates the gRPC connection to the collector through a gRPC tunnel server and assumes the role of the gRPC client.
To configure gNMI dial-out mode, you must:
- Specify the listening address for each tunnel server to which you want to connect. Cumulus Linux supports a maximum of 10 tunnel servers.
- Enable the tunnel server.
To configure optional settings for each tunnel server:
- Specify the target name and target application you want to access. The default target application is GNMI-GNOI.
- Specify the retry interval. The default retry interval is 30 seconds.
- Import and enable a TLS or mTLS certificate for validation. You can also apply a CRL. For information about importing certificates and CRLs, refer to Security with Certificates and CRLs.
The following example sets the listening address for tunnel server SERVER1 to 10.1.1.10, and enables the tunnel server:
cumulus@switch:~$ nv set system grpc-tunnel server SERVER1 address 10.1.1.10
cumulus@switch:~$ nv set system grpc-tunnel server SERVER1 state enabled
cumulus@switch:~$ nv config apply
The following example sets the listening address for tunnel server SERVER1 to 10.1.1.10 and the port to 443, the target name to TARGET1, the retry interval to 40, the CA certificate to CACERT1, and enables the tunnel server:
cumulus@switch:~$ nv set system gnmi-server listening-address localhost
cumulus@switch:~$ nv set system grpc-tunnel server SERVER1 address 10.1.1.10
cumulus@switch:~$ nv set system grpc-tunnel server SERVER1 port 443
cumulus@switch:~$ nv set system grpc-tunnel server SERVER1 target-name TARGET1
cumulus@switch:~$ nv set system grpc-tunnel server SERVER1 retry-interval 40
cumulus@switch:~$ nv set system grpc-tunnel server SERVER1 ca-certificate CACERT1 uri scp://user@pass:1.2.3.4:/opt/certs/cert.p12
cumulus@switch:~$ nv set system grpc-tunnel server SERVER1 state enabled
cumulus@switch:~$ nv config apply
Show gNMI Configuration and Status Information
To show gNMI server configuration and connection information, such the number of active subscriptions, received and rejected subscription requests, and received capability requests, run the nv show system gnmi-server
command.
cumulus@switch:~$ nv show system gnmi-server
operational applied
-------------------------------- ----------- -----------
state disabled enabled
certificate self-signed self-signed
port 9339 9339
[listening-address] 10.1.1.100 10.1.1.100
version
status
total-active-subscriptions 0
received-subscription-requests 0
rejected-subscriptions 0
received-capabilities-requests 0
[client]
To show the listening address of the gNMI server, run the nv show system gnmi-server listening-address
command:
cumulus@switch:~$ nv show system gnmi-server listening-address
----------
10.1.1.100
To show gNMI server mTLS information, run the nv show system gnmi-server mtls
command:
cumulus@switch:~$ nv show system gnmi-server mtls
operational applied pending
-------------- ----------- ------- ----------------
ca-certificate CACERT1 CACERT1 CACERT
crl abcdefghijklmnop
To show only gNMI server connection information, run the nv show system gnmi-server status
command:
cumulus@switch:~$ nv show system gnmi-server status
operational
------------------------------ -----------
total-active-subscriptions 0
received-subscription-requests 0
rejected-subscriptions 0
received-capabilities-requests 0
To show gRPC tunnel server configuration and connection information, run the nv show system grpc-tunnel server <server>
command:
cumulus@switch:~$ nv show system grpc-tunnel server SERVER1
nv show system grpc-tunnel server SERVER1
operational applied
--------------- -------------------- ---------
state disabled enabled
target-name TARGET1 TARGET1
address 10.1.1.10 10.1.1.10
port 443 443
target-type gnmi-gnoi gnmi-gnoi
retry-interval 40 40
status
local-port 0
remote-port 0
connection
established 1970-01-01T00:00:00Z
register no
tunnel no
To show the local and remote port, and connection information, run the nv show system grpc-tunnel server SERVER1 status
command:
cumulus@switch:~$ nv show system grpc-tunnel server SERVER1 status
operational
------------- --------------------
local-port 0
remote-port 0
connection
established 1970-01-01T00:00:00Z
register no
tunnel no
To show only connection information, run the nv show system grpc-tunnel server SERVER1 status connection
command:
cumulus@switch:~$ nv show system grpc-tunnel server SERVER1 status connection
operational
----------- --------------------
established 1970-01-01T00:00:00Z
register no
tunnel no
RPC Methods
Cumulus Linux supports the following RPC methods:
- Capabilities
- Subscription types and options:
- STREAM (sample_interval, updates_only, suppress_redundant, and heartbeat_interval)
- ON_CHANGE (updates_only and heartbeat_interval)
- Notification and update types:
- sync_response
- update
- delete
Cumulus Linux does not support GET or SET RPC events.
Encoding Types
Cumulus Linux supports the Protobuf and JSON data formats.
Wildcard Support
Cumulus Linux supports wildcard matching of keys. For example:
qos/interfaces/interface[interface-id=*]/output/queues/queue[name=*]/state/transmit-octets
You can use a combination of wildcard and specific keys; for example, to collect a metric for all queues on a specific interface:
/qos/interfaces/interface[interface-id=<name>]/output/queues/queue[*]/state/transmit-octets.
Regex for specific keys (such as “interface-id=swp*”
) is not supported.
Metrics
Cumulus Linux supports the following metrics:
Name | Description |
---|---|
/interfaces/interface/state/admin-status |
Admin state of an interface. |
/interfaces/interface/state/counters/in-broadcast-pkts |
Total number of broadcast packets received on an interface. |
/interfaces/interface/state/counters/in-multicast-pkts |
Total number of multicast packets received on an interface. |
/interfaces/interface/state/counters/in-octets |
Total number of octets received on an interface, including framing characters. |
/interfaces/interface/ethernet/state/counters/in-fcs-errors |
Total number of frames received on an interface that are an integral number of octets in length but do not pass the FCS check. This count does not include frames received with frame-too-long or frame-too-short error. |
/interfaces/interface/ethernet/state/counters/in-oversize-frames |
Total number of packets received longer than 1518 octets (excluding framing bits, but including FCS octets). |
/interfaces/interface/ethernet/state/counters/in-distribution/in-frames-1024-1518-octets |
Total number of packets (including bad packets) received between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets). |
/interfaces/interface/ethernet/state/counters/in-distribution/ in-frames-128-255-octets |
Total number of packets (including bad packets) received between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets). |
/interfaces/interface/ethernet/state/counters/in-distribution/in-frames-256-511-octets |
Total number of packets (including bad packets) received between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets). |
/interfaces/interface/ethernet/state/counters/in-distribution/in-frames-512-1023-octets |
Total number of packets (including bad packets) received between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets). |
/interfaces/interface/ethernet/state/counters/in-distribution/in-frames-64-octets |
Total number of packets (including bad packets) received that are 64 octets in length (excluding framing bits but including FCS octets). |
/interfaces/interface/ethernet/state/counters/in-distribution/in-frames-65-127-octets |
Total number of packets (including bad packets) received between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets). |
/interfaces/interface/state/counters/out-broadcast-pkts |
Total number of broadcast packets transmitted out of an interface. |
/interfaces/interface/state/counters/out-octets |
Total number of octets transmitted out of an interface, including framing characters. |
/interfaces/interface/state/counters/out-unicast-pkts |
Total number of unicast packets transmitted out of an interface. |
/interfaces/interface/ethernet/state/port-speed |
An estimate of the interface current bandwidth in units of 1,000,000 bits per second. |
/interfaces/interface/state/counters/in-bits-rate |
Inbound bits per second on an interface. |
/interfaces/interface/state/ifindex |
A unique value, greater than zero, for each interface. |
/interfaces/interface/state/counters/in-discards |
Number of inbound packets discarded even though no errors are detected to prevent them from being deliverable to a higher-layer protocol. |
/interfaces/interface/state/counters/in-errors |
For packet-oriented interfaces, the number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. |
/interfaces/interface/state/counters/in-pkts |
Number of packets discarded from the egress queue of an interface. |
/interfaces/interface/state/counters/in-pkts-rate |
Inbound packets per second on an interface. |
/interfaces/interface/ethernet/state/counters/in-crc-errors |
Total number of frames received with a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). |
/interfaces/interface/ethernet/state/negotiated-duplex-mode |
When auto-negotiate is set to TRUE, and the interface has completed auto-negotiation with the remote peer, this value shows the negotiated duplex mode. |
/interfaces/interface/state/counters/in-acl-drops |
Number of inbound packets dropped because of an Access Control List (ACL). |
/interfaces/interface/ethernet/state/counters/in-mac-pause-frames |
Inbound MAC pause frames on an interface. |
/interfaces/interface/state/mtu |
Size of the largest packet that can be sent or received on the interface, specified in octets. For interfaces used for transmitting network datagrams, this is the size of the largest network datagram that the interface can send. |
/interfaces/interface/state/oper-status |
Current operational state of an interface. |
/interfaces/interface/state/counters/out-bits-rate |
Outbound bits per second on an interface. |
/interfaces/interface/state/counters/out-discards |
Number of outbound packets discarded even though no errors are detected to prevent them from being transmitted. |
/interfaces/interface/state/counters/out-errors |
For packet-oriented interfaces, the number of outbound packets not transmitted because of errors. For character-oriented or fixed-length interfaces, the number of outbound transmission units not transmitted because of errors. |
/interfaces/interface/state/counters/out-pkts |
Total number of packets transmitted out of the interface, including all unicast, multicast, broadcast, and bad packets. |
/interfaces/interface/state/counters/out-pkts-rate |
Outbound packets per second on an interface. |
/interfaces/interface/state/counters/out-multicast-pkts |
Total number of packets that higher-level protocols requested be transmitted, and which were addressed to a multicast address at this sub-layer, including those that were discarded or not sent. For a MAC layer protocol, this includes both Group and Functional addresses. |
/interfaces/interface/ethernet/state/counters/carrier-transitions |
Number of times since system boot that ifOperStatus changed. |
/interfaces/interface/ethernet/phy/state/rs-fec-uncorrectable-blocks |
Number of RS FEC uncorrectable blocks of an interface. |
/interfaces/interface/ethernet/phy/state/rs-fec-single-error-blocks |
Number of RS FEC uncorrectable blocks of an interface. |
/interfaces/interface/ethernet/phy/state/rs-fec-no-error-blocks |
Number of RS FEC no errors blocks of an interface. |
/interfaces/interface/ethernet/phy/state/lane/fc-fec-corrected-blocks |
Number FC FEC corrected blocks for a given lane of an interface. |
/interfaces/interface/ethernet/phy/state/lane/fc-fec-uncorrected-blocks |
Number of FC FEC uncorrectable blocks for a given lane of an interface. |
/interfaces/interface/ethernet/phy/state/lane/rs-fec-corrected-symbols |
Number of RS FEC corrected symbols for a given lane of an interface. |
/interfaces/interface/ethernet/phy/state/corrected-bits |
Number of phy corrected bits of an interface by the FEC engine. |
/interfaces/interface/ethernet/phy/state/effective-errors |
Number of phy effective errors of an interface. |
/interfaces/interface/ethernet/phy/state/effective-ber |
Phy effective BER of an interface. |
/interfaces/interface/ethernet/phy/state/lane/raw-errors |
Number of phy error bits identified for a given lane of an interface. |
/interfaces/interface/ethernet/phy/state/received-bits |
Number of phy total bits received for an interface. |
/interfaces/interface/ethernet/phy/state/symbol-errors |
Number of phy symbol errors for an interface. |
/interfaces/interface/ethernet/phy/state/symbol-ber |
Phy symbol BER for an interface. |
/interfaces/interface/ethernet/phy/state/lane/raw-ber |
Number of phy bit error rates for a given lane of an interface. |
/interfaces/interface/ethernet/phy/state/fec-time-since-last-clear |
Time after last clear of FEC stats(phy layer). |
/interfaces/interface/ethernet/phy/state/ber-time-since-last-clear |
Time after last clear of BER stats(phy layer). |
Name | Description |
---|---|
/lldp/state/chassis-id |
The chassis component of the endpoint identifier associated with the transmitting LLDP agent. |
/lldp/state/chassis-id-type |
The format and source of the chassis identifier string. |
/lldp/state/system-description |
Description of the network entity including the full name and version identification of the system’s hardware type, software operating system, and networking software. |
/lldp/state/system-name |
Administratively assigned name for the system. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/age |
LLDP neighbor age after discovery. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/management-address/type |
Enumerated value for the network address type identified in this TLV. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/chassis-id |
Chassis component of the endpoint identifier associated with the transmitting LLDP agent. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/chassis-id-type |
Format and source of the chassis identifier string. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/system-name |
Administratively assigned name of the system associated with the transmitting LLDP agent. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/system-description |
Description of the network entity associated with the transmitting LLDP agent. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/port-id |
Port component of the endpoint identifier associated with the transmitting LLDP agent. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/port-description |
Binary string containing the actual port identifier for the port from which this LLDP PDU was transmitted. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/port-id-type |
Format and source of the remote port ID string. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/state/ttl |
Indicates how long information from the neighbor is considered valid. |
/lldp/interfaces/interface[name=<name>]/neighbors/neighbor[id=<id>]/capabilities/capability[name=<capability>]/state/enabled |
If the corresponding system capability is enabled on the neighbor. |
Name | Description |
---|---|
/components/component[name='PSU1']/state/name |
PSU Name. |
/components/component[name='PSU1']/state/oper-status |
PSU Status. |
/components/component[name='PSU1']/state/description |
PSU description. |
/components/component[name='PSU1']/power-supply/state/capacity |
PSU capacity in watts. |
/components/component[name='PSU1']/power-supply/state/output-current |
PSU current in amperes. |
/components/component[name='PSU1']/power-supply/state/output-voltage |
PSU voltage in volts. |
/components/component[name='PSU1']/power-supply/state/output-power |
PSU power in watts. |
/components/component[name='fan0']/state/name |
Fan name. |
/components/component[name='fan0']/state/oper-status |
Fan Status. |
/components/component[name='fan0']/state/description |
Fan Description. |
/components/component[name='fan0']/fan/state/speed |
Current (instantaneous) fan speed. |
/components/component[name='temp-sensor0']/state/name |
Temperature sensor name. |
/components/component[name='temp-sensor0'']/state/oper-status |
Temperature sensor operational status. |
/components/component[name='temp-sensor0'']/state/description |
Temperature sensor description. |
/components/component[name='temp-sensor0']/state/temperature/instant |
Instant temperature. |
/components/component[name='temp-sensor0']/state/temperature/alarm-status |
Temperature sensor alarm status. |
/components/component[name='transceiver+panelport#']/transceiver/physical-channels/channel[no]/state/input-power/instant |
Input optical power of a physical channel in units of 0.01dBm, which may be associated with individual physical channels or an aggregate of multiple physical channels. |
/components/component[name='transceiver+panelport#']/transceiver/physical-channels/channel[no]/state/laser-bias-current/instant |
Current applied by the system to the transmit laser to achieve the output power. The current is expressed in mA with up to two decimal precision. |
/components/component[name='transceiver+panelport']/transceiver/physical-channels/channel[no]/state/output-power/instant |
Output optical power of a physical channel in units of 0.01dBm, which might be associated with individual physical channels or an aggregate of multiple physical channels. |
Name | Description |
---|---|
/qos/interfaces/interface/state/switch-priority/counters/out-pause-pkts |
Number of pause packets for the priority class in the egress queue. |
/qos/interfaces/interface/state/priority-group/counters/watermark-max |
High watermark of cells used in a priority group since last time watermarks were reset. |
/qos/interfaces/interface/output/queues/queue/state/watermark-max |
High watermark of cells used in a queue since last time watermarks were reset. |
qos/interfaces/interface/output/queues/queue/state/ecn-marked-pkts |
Number of ECN marked packets from this egress queue. If the ECN counter is not enabled, the counter value is 0. |
qos/interfaces/interface/output/queues/queue/state/transmit-octets |
Number of transmitted bytes in the egress queue of an interface. |
qos/interfaces/interface/output/queues/queue/state/transmit-pkts |
Number of transmitted packets in the egress queue of an interface. |
/qos/interfaces/interface/output/queues/queue/state/wred-dropped-pkts |
Number of packets discarded from this egress queue of an interface. |
/qos/interfaces/interface/output/queues/queue/state/no-buffer-uc-dropped-pkts |
Number of packets discarded from this egress queue when there is no buffer left in the interface. |
/qos/interfaces/interface[interface-id]/output/queues/queue[name]/state/time-since-last-clear |
Time since last clear of watermarks in a queue. |
/qos/interfaces/interface[interface-id]/state/priority-group[priority_group]/counters/time-since-last-clear |
Time since last clear of watermarks in a priority group. |
Name | Description |
---|---|
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/state/session-state |
Operational state of the BGP peer. |
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/state/established-transitions |
Number of transitions to the established state for the neighbor session. |
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/state/messages/sent/UPDATE |
Number of BGP UPDATE messages announcing, withdrawing, or modifying paths exchanged. |
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/messages/received/UPDATE |
Number of BGP UPDATE messages announcing, withdrawing, or modifying paths exchanged. |
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/state/queues/input |
Number of messages received from the peer currently queued. |
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/state/queues/output |
Number of messages queued to be sent to the peer. |
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/afi-safis/afi-safi[afi-safi-name=<afi-safi-name>]/state/prefixes/received |
Number of prefixes received from the neighbor after applying policies (the number of prefixes present in the post-policy Adj-RIB-In for the neighbor). |
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/afi-safis/afi-safi[afi-safi-name=<afi-safi-name>]/state/prefixes/sent |
Number of prefixes advertised to the neighbor after applying policies (the number of prefixes present in the post-policy Adj-RIB-Out for the neighbor). |
/network-instances/network-instance[name=<vrf>]/protocols/protocol[identifier=BGP][name=BGP]/bgp/neighbors/neighbor[neighbor-address=<address>]/afi-safis/afi-safi[afi-safi-name=<afi-safi-name>]/state/prefixes/installed |
Number of prefixes received from the neighbor that are installed in the network instance RIB and actively used for forwarding. |
Name | Description |
---|---|
/system/state/hostname |
System hostname. |
/system/state/software-version |
System software version. |
/system/state/boot-time |
System boot time. |
/system/state/current-datetime |
Current system date and time. |
/system/control-plane-traffic/ingress/ipv4/counters/ /system/control-plane-traffic/ingress/ipv6/counters/ |
Number of input IP datagrams discarded in software including those received in error. |
/system/cpus/cpu[name=<cpu_id>]/state/user/seconds |
CPU user Seconds |
/system/cpus/cpu[name=<cpu_id>]/state/kernel/seconds |
CPU kernel seconds. |
/system/cpus/cpu[name=<cpu_id>]/state/nice/seconds |
CPU Nice seconds. |
/system/cpus/cpu[name=<cpu_id>]/state/idle/seconds |
CPU idle seconds. |
/system/cpus/cpu[name=<cpu_id>]/state/wait/seconds |
CPU wait seconds. |
/system/cpus/cpu[name=<cpu_id>]/state/hardware-interrupt/seconds |
CPU hardware interrupt seconds. |
/system/cpus/cpu[name=<cpu_id>]/state/software-interrupt/seconds |
CPU software interrupt seconds. |
/system/memory/state/free |
Free memory. |
/system/memory/state/physical |
Physical memory. |
/system/memory/state/reserved |
Memory reserved for system use. |
/system/mount-points/mount-point[name='filesystem0']/state/name |
Mount point name. |
/system/mount-points/mount-point[name='filesystem0']/state/storage-component |
A reference to the hosting component within the hierarchy. |
/system/mount-points/mount-point[name='filesystem0']/state/size |
Total size of the initialized filesystem. |
/system/mount-points/mount-point[name='filesystem0']/state/available |
Amount of unused space on the filesystem. |
/system/mount-points/mount-point[name='filesystem0']/state/type |
Filesystem type used for storage such flash, hard disk, tmpfsor or ramdisk, or remote or network based storage. |
User Credentials and Authentication
User authentication is enabled by default. gNMI subscription requests must include an HTTP Basic Authentication header according to RFC7617 containing the username and password of a user with NVUE API access permissions. You can enable this setting in the standard gNMI client (gNMIc) by setting the auth-scheme
parameter to basic. Refer to https://gnmic.openconfig.net/global_flags/ - auth-scheme.
Cumulus Linux ignores credentials in RPC metadata.
gNMI Client Requests
You can use your gNMI client on a host to request capabilities and data to which the Agent subscribes. The examples below use the gNMIc client.
Dial-in Mode Example
The following example shows a Dial-in Mode Subscribe request with TLS:
gnmic subscribe --mode stream --path "/qos/interfaces/interface[interface-id=swp1]/output/queues/queue[name=1]/state/transmit-octets" -i 10s --tls-cert gnmi_client.crt --tls-key gnmi_client.key -u cumulus -p ******* --auth-scheme Basic --skip-verify -a 10.188.52.108:9339
The following example shows a Dial-in Mode Subscribe request without TLS:
NVIDIA recommends using TLS. To test without TLS, you must also edit the NGINX configuration file on the switch.
gnmic subscribe --mode stream --path "/qos/interfaces/interface[interface-id=swp1]/output/queues/queue[name=1]/state/transmit-octets" -i 10s --insecure -u cumulus -p ******* --auth-scheme Basic -a 10.188.52.108:9339
Subscription Example
The following example shows a subscription response:
{
"sync-response": true
}
{
"source": "10.188.52.108:9339",
"subscription-name": "default-1737725382",
"timestamp": 1737725390247535267,
"time": "2025-01-24T13:29:50.247535267Z",
"updates": [
{
"Path": "qos/interfaces/interface[interface-id=swp1]/output/queues/queue[name=1]/state/transmit-octets",
"values": {
"qos/interfaces/interface/output/queues/queue/state/transmit-octets": 0
}
}
]
}
...
Capabilities Example
The following example shows a capabilities request:
gnmic capabilities --tls-cert gnmic-cert.pem --tls-key gnmic-key.pem -u cumulus -p ****** --auth-scheme Basic --skip-verify -a 10.188.52.108:9339
The following example shows the expected response to a capabilities request:
gNMI version: 0.10.0
supported models:
- openconfig-ospf-types, OpenConfig working group, 0.1.3
...
- openconfig-platform-fabric, OpenConfig working group, 0.1.0
- openconfig-platform-healthz, OpenConfig working group, 0.1.1
supported encodings:
- JSON
- JSON_IETF
- PROTO
Considerations
When using gNMI with Cumulus Linux:
- The minimum sampling interval is 1 second. If you configure a shorter sampling interval, the switch might not behave as expected.
- ModelData, Origin, and Extensions fields are ignored in requests and not set in responses.