Download your Cisco Network Device Configuration from Cisco DNA Center (REST API).
Then store them on Object Storage (S3 compatible), hosted in Public Cloud/Private Cloud/On-Prem
version 1.1
version 1.0

(running with docker + docker-compose + aws s3)
Download or clone this repository
git clone https://github.com/robertcsapo/cisco-dnac-network-devices-cfg-backup-s3Setup
docker-compose.yaml for your Environments settings/credentials.version: '3'
services:
  collector:
    image: robertcsapo/cisco-dnac-network-devices-cfg-backup-s3
    environment:
     - DNAC_HOST=dnac.example.tld
     - DNAC_USER=exampleUsername
     - DNAC_PASS=examplePassword
     - DNAC_SSL_VERIFY=False
     - STORAGE=AWS
     - S3BUCKET=cisco-dnac-network-devices-cfg-backup-s3
     - AWS_ACCESS_KEY=XXXXACCESS_KEY
     - AWS_SECRET_KEY=YYYYSECRET_KEY
    network_mode: bridge
docker-compose-<provider>.yaml file instead.docker-compose-aws.yaml
docker-compose-do.yaml
docker-compose-gcp.yaml
docker-compose-minio.yaml
Run service
docker-compose -f docker-compose.yaml updocker-compose -f docker-compose-<provider>.yaml upRemove service
docker-compose -f docker-compose.yaml downdocker-compose -f docker-compose-<provider>.yaml downUse this settings if not using Environment or want to override
    -h, --help            show this help message and exit
    --dnac DNAC_HOST DNAC_USER DNAC_PASS
                          Cisco DNA Center Hostname
                          Cisco DNA Center Username
                          Cisco DNA Center Password
                          Cisco DNA Center SSL Verify
    --aws S3BUCKET AWS_ACCESS_KEY AWS_SECRET_KEY
                          AWS S3 Bucket S3BUCKET Name
                          AWS S3 AWS_ACCESS_KEY
                          AWS S3 AWS_SECRET_KEY
    --gcp S3BUCKET AWS_ACCESS_KEY AWS_SECRET_KEY
                          Google Cloud Storage S3BUCKET Bucket Name
                          Google Cloud Storage ACCESS_KEY
                          Google Cloud Storage SECRET_KEY
    --do S3BUCKET AWS_ACCESS_KEY AWS_SECRET_KEY ENDPOINT_URL
                          DigitalOcean Spaces S3BUCKET Bucket Name
                          DigitalOcean Spaces ACCESS_KEY
                          DigitalOcean Spaces SECRET_KEY
                          DigitalOcean Spaces Bucket ENDPOINT_URL
    --minio S3BUCKET AWS_ACCESS_KEY AWS_SECRET_KEY ENDPOINT_URL
                          MinIO Inc. S3BUCKET Bucket Name
                          MinIO Inc. ACCESS_KEY
                          MinIO Inc. SECRET_KEY
                          MinIO Inc. Server ENDPOINT_URL
    --insecure            Disables SSL/TLS verification
    --api API             Cisco DNA Center Platform Version (default: 2.1)
    --version             show program's version number and exit
docker run robertcsapo/cisco-dnac-network-devices-cfg-backup-s3 --dnac dnac.example.tld exampleUsername examplePassword --aws cisco-dnac-network-devices-cfg-backup-s3 XXXXACCESS_KEY YYYYSECRET_KEYdocker run robertcsapo/cisco-dnac-network-devices-cfg-backup-s3 -e DNAC_HOST <value> -e DNAC_USER <value> -e DNAC_PASS <value> -e S3BUCKET <value> -e AWS_ACCESS_KEY <value> -e AWS_SECRET_KEY <value> -e STORAGE=AWS DNAC_HOST=dnac.example.tldDNAC_USER=exampleUsernameDNAC_PASS=examplePasswordSTORAGE=AWS (or GCP, DO, MINIO)S3BUCKET=bucketAWS_ACCESS_KEY=keyAWS_SECRET_KEY=keyCisco Products & Services:
Third-Party Products & Services:
docker run -p 9000:9000 minio/minio server /dataTools & Frameworks:
This project is licensed to you under the terms of the Cisco Sample
Code License.
Owner
Contributors
Categories
Products
Catalyst CenterIOS XEProgramming Languages
PythonLicense
Code Exchange Community
Get help, share code, and collaborate with other developers in the Code Exchange community.View Community