Skip to content

Add redis db alias for easy accessing redis db#25600

Merged
eddieruan-alibaba merged 19 commits intosonic-net:masterfrom
eddieruan-alibaba:eruan-alias
Mar 23, 2026
Merged

Add redis db alias for easy accessing redis db#25600
eddieruan-alibaba merged 19 commits intosonic-net:masterfrom
eddieruan-alibaba:eruan-alias

Conversation

@eddieruan-alibaba
Copy link
Collaborator

Why I did it

As we enable multi db in redis, it is not easy to use redis-cli to check redis for a targeted db. We need to check codes to get redis port number.

Create a set of aliases which would use swsscommon python script to receive db's port and id. This set of aliases would work for both cases.

Work item tracking
  • Microsoft ADO (number only):

How I did it

Use swsscommon python script to get used redis db port and id

How to verify it

admin@PE3:$ alias
alias ls='ls --color=auto'
alias redis-appdb='redis-cli -n 0 -p 6378'
alias redis-asicdb='redis-cli -n 1 -p 6377'
alias redis-configdb='redis-cli -n 4 -p 6379'
alias redis-counterdb='redis-cli -n 2 -p 6376'
alias redis-flexcounterdb='redis-cli -n 5 -p 6376'
alias redis-logleveldb='redis-cli -n 3 -p 6379'
alias redis-statedb='redis-cli -n 6 -p 6379'
alias redis-sysmondb='redis-cli -n 10 -p 6379'
admin@PE3:
$ redis-appdb
127.0.0.1:6378> exit
admin@PE3:$ redis-asicdb
127.0.0.1:6377[1]> exit
admin@PE3:
$ redis-configdb
127.0.0.1:6379[4]> exit
admin@PE3:$ redis-counterdb
127.0.0.1:6376[2]> exit
admin@PE3:
$ redis-flexcounterdb
127.0.0.1:6376[5]> exit
admin@PE3:~$ redis-logleveldb

127.0.0.1:6379[3]> exit
admin@PE3:$ redis-statedb
127.0.0.1:6379[6]> exit
admin@PE3:
$ redis-sysmondb
127.0.0.1:6379[10]> exit

Which release branch to backport (provide reason below if selected)

  • 202305
  • 202311
  • 202405
  • 202411
  • 202505
  • 202511

Tested branch (Please provide the tested image version)

Description for the changelog

Link to config_db schema for YANG module changes

A picture of a cute animal (not mandatory but encouraged)

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

Signed-off-by: Eddie Ruan <[email protected]>
@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

Signed-off-by: Eddie Ruan <[email protected]>
@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@yuezhoujk
Copy link

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@yuezhoujk
Copy link

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@eddieruan-alibaba
Copy link
Collaborator Author

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

eddieruan-alibaba and others added 2 commits March 18, 2026 21:51
What is the motivation for this PR
When --client_auth cert is configured on the gNMI server, UDS connections fail auth because TLS peer creds are unavailable, blocking local services (e.g., device-ops-agent) from using gNMI/gNOI over UDS.

How did you do it
Updated sonic-gnmi submodule to include sonic-net/sonic-gnmi#617, adding a UDS detection check in authenticate() to skip cert auth for UDS (secured by socket permissions).

How did you verify/test it
On a device with --client_auth cert configured:
$ sudo grpcurl -plaintext unix:///var/run/gnmi/gnmi.sock gnoi.system.System/Time
{time: 1773163799143468772}

Without sudo: permission denied at filesystem level.

Unique Signed-off-by
Signed-off-by: Dawei Huang <[email protected]>
Signed-off-by: Eddie Ruan <[email protected]>
@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

Signed-off-by: Eddie Ruan <[email protected]>
@mssonicbld
Copy link
Collaborator

/azp run Azure.sonic-buildimage

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@eddieruan-alibaba eddieruan-alibaba merged commit a246d1d into sonic-net:master Mar 23, 2026
21 checks passed
@eddieruan-alibaba eddieruan-alibaba deleted the eruan-alias branch March 23, 2026 02:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

10 participants