Cisco nexus insights

Cisco nexus insights DEFAULT

 

Introduction

Troubleshooting, root-cause analysis, and remediation of network issues are common challenges for day to day operations. With the legacy networking operation tools, these tasks are manual, time consuming, and reactive.

They require network operators to have years of experience, extensive domain expertise, and the ability to correlate complex IT environments to prevent or fix issues while upholding the infrastructure uptime with minimum disruption. Cisco Nexus Insights, a  modern networking operation application, aims to simplify and automate these operation tasks. By ingesting real-time streamed network telemetries from all devices, it provides pervasive infrastructure visibility. With its powerful analytics and  engine, it can proactively detect different types of anomalies throughout the network, root cause the anomalies, and identify remediation methods. It is a tool to modernize the operation of networks, helping the network team to reduce troubleshooting efforts, increase operation efficiency, and proactively prevent network outages.

Background

Modern data centers are managed through controllers such as Cisco ACI™ or Cisco DCNM which capture the intents of network to deliver an automated, consistent policy framework across the data center. The same intent-based policies can be extended to multiple data center sites, branches, and the public cloud, to provide centralized control. Cisco Nexus Insights helps with Day 2 Operations of these fabrics to provide visibility, proactively detecting anomalies with correlated network and application view. This helps accelerate troubleshooting, thereafter remediating issues in these fabrics. Cisco Nexus Insights was designed with the following network characteristics and architecture in mind.

Inbuilt automation: The network configuration is centrally managed by a controller, therefore the network operators no longer need to manage the device configuration on a box-by-box basis. With the centralized controller method, it is easier to maintain feature and configuration consistency across the network.

Scalable architecture: Driven by different reasons, such as scale, disaster avoidance or disaster recovery, modern data centers often expand beyond a single site to multiple geographically dispersed locations, sometimes even to the public cloud. As data centers scale out, the complexity of collecting and analyzing data to understand the operation state of the networks increases. At the same time, with the increasingly distributed application workload, a data center infrastructure can be running anywhere between a few thousands to a few millions of flows at a time. In addition, at times there may be a few hundred messages or events being logged every second. Manually correlating these flows, logs, switch by switch in order to troubleshoot issues can be very challenging and time consuming.

Operations test: The challenge faced by operators is to comprehend and correlate the data collected from each switch in the fabric to a particular problem, such as slowness in a web application. This implies a stringent expectation that an operator has the required knowledge and expertise (which usually takes time to build) about most if not everything happening in the infrastructure.

Cisco Nexus Insights addresses these challenges to bring about the following benefits

●      Increase operation efficiency and network availability with proactive monitoring and alerts: Cisco Nexus Insights learns and analyzes the network behaviors to recognize anomalies before the end users do, then generates proactive alerts useful in preventing outages. Cisco Nexus Insights also proactively identifies vulnerability exposure of the networks to known defaults, PSIRTs or field notices and recommend the best course for proactive remediation.

●      Shorten time to resolution for troubleshooting: Cisco Nexus Insights minimizes critical troubleshooting time through automated root-cause analysis of data-plane anomalies, such as packet drops, latency, workload movements, routing issues, ACL drops, etc. Additionally, Cisco Nexus Insights provides assisted auditing and compliance checks using searchable historical data presented in time-series format.

●      Increase speed and agility for capacity planning: Cisco Nexus Insights detects and highlights components exceeding capacity thresholds through fabric-wide visibility of resource utilization and historical trends. The captured resource utilization shows time-series-based trends of capacity utilization so that the network operation team can plan for resizing, restructuring, and repurposing.

 

Cisco Nexus Insights Components

Cisco Nexus Insights is a micro-services-based modern application for network operation. It is hosted on Cisco Nexus Dashboard where Cisco ACI and Cisco DCNM* sites are onboarded and respective data from these sites is ingested and correlated by Cisco Nexus Insights.

*

 

Cisco Nexus Insights directs operators' attention to the significant matters that are relevant to the task at hand, such as troubleshooting, monitoring, auditing, planning, vulnerabilities, etc. All anomalies and analytics results in Cisco Nexus Insights can be accessed by an external system  via its REST-APIs, or exported using Kafka where users can subscribe to relevant topics. Users can also choose to receive email notifications on anomalies with the option to customize what anomaly types they want to see along with severity and cadence.

The sections below introduces the key components of Cisco Nexus Insights. These options (with sub categories) are available on the left panel of the application.

●      Cisco Nexus Insights Dashboard

Provides a view into site level issues that need attention, all which are calculated by Cisco Nexus Insights and rolled up into one place which is the Dashboard – an easy drill down into issues sorted by severity and categories, Top Nodes that are experiencing anomalies, Timeline view of issues based on the time range selected, Site health score, Advisories generated by the app, Node inventory by roles and corresponding health score of each node providing a single click option to Node 360 which gives all details on the nodes including trends of anomalies as observed.

Cisco Nexus Insights also allows user to create custom Dashboards for any charts as seen in the app

Graphical user interface, websiteDescription automatically generated

 

●      Topology

Provides a graphical representation of the fabric and how nodes are connected. Allows user to select filters based on switch role, score of the node, VRF,EPG,BD etc. to locate issues in a topological view.

Chart, radar chartDescription automatically generated

●      Alerts

Provides a view into Anomalies and Advisories generated by the app.

Anomalies

Consists of threshold violations and sudden rate of change for

◦    Resource utilization

◦    Environmental issues like power failure, memory leaks, process crashes, node reloads, CPU, memory spikes

◦    Interface and Routing protocol issues like CRC errors, DOM anomalies, interface drops, BGP issues like lost connectivity with an existing neighbor, PIM, IGMP flaps, LLDP flaps, CDP issues etc. Also provides a view into microbursts with offending and victim flows

◦    Flow drop with location and reason of drop, Abnormal latency spikes of flows using hardware Telemetry and direct hardware export. Flows impacted due to events in a switch like buffer, policer, forwarding drops, ACL drops, policer drops etc. using Flow Table Events (FTE) which is another form of hardware Telemetry

◦    Endpoint duplicates, rapid endpoint movement, rouge endpoints

◦    Application issues a calculated by AppDynamics and Cisco Nexus Insights (AppD Integration required)

Also consists of indication of being affected by known Cisco caveats and best practice violations at a node level.

Advisories

Consists of relevant impact due to Field Notice, EOL/EOS of Software and Hardware and PSIRTs at a node level.

●      Troubleshoot

Allows users to collect logs and run analysis at a flow level to find offending nodes in the fabric.

Log Collector

Allows user to collect tech-support logs per node. These logs can be downloaded locally and optionally uploaded to Cisco Cloud to make them available for Cisco Support when opening a Service Request (SR).

 

Graphical user interface, applicationDescription automatically generated

Connectivity Analysis

Allows user to run a quick or full analysis for a flow within a fabric or spanning multiple fabrics to -

◦    Trace all possible forwarding paths for a given flow across source to destination endpoints

◦    Identify the offending device with issue, resulting in the flow drop

◦    Help narrow down the root cause of the issue, including running forwarding path checks, software and hardware states programming consistencies through consistency-checkers, and further details related to packets walkthrough and lookup results through packet capture

Below screenshot shows an example of what are the possible paths a flow can traverse, while running thorough consistency checks with respective errors if any. These issues are time consuming to debug and connectivity analysis provides a quick analysis of these issues in a user driven way.

 

A picture containing graphical user interfaceDescription automatically generated

 

Graphical user interface, applicationDescription automatically generated

 

●      Browse

Browse options allow users to look at specific data sets ingested and correlated by Cisco Nexus Insights.

◦    Resources - Useful for capacity planning because it offers early detection of resources that are exceeding capacity thresholds

◦    Environmental - Identifies anomalies by observing parameters such as CPU, memory, temperature, power draw, fan speed, etc.

◦    Statistics – Provides a thorough view into interface counters such as utilization, CRC, stomped CRC, FCS errors and into protocols such as CDP, LACP, LLDP, BGP, PIM, IGMP and IGMP snoop

◦    Flow – Shows all flows as ingested and correlated by Cisco Nexus Insights. Helps identify, locate, and root-cause data path issues such as latency and packet drop for specific flows based on correlation done by the app

◦    Endpoints – Provides a list of all endpoints and how they are attached, history of endpoint moves, duplicate endpoints and uses this database to correlate how network issues affect endpoints in the fabric

◦    Applications – This enables AppDynamics integration with Cisco Nexus Insights allowing user to get a single pane of glass for apps and network issues and map an application link to a flow in the ACI and NXOS fabric thereby allowing quicker RCA of app slowness

◦    Events - This is Software telemetry that leverages audit logs and events and faults data from the Cisco ACI fabric

Browsing Cisco Nexus Insights

Let’s delve into the browse data available in Cisco Nexus Insights. All anomalies observed for any of the below data sets are rolled into the Dashboard view of the respective site to draw your attention.

Resources

It is tedious to keep track of software verified scale per release, per resource and what scale the hardware in your network supports. Moreover, keeping track of utilization of resources per node over time, setting static thresholds for these resources to be notified on violation does not scale for dynamically growing networks. To resolve for these, Cisco Nexus Insights baselines utilization of resources, monitors trends, and generates anomalies on abnormal usage of resources across nodes so as to help user plan for capacity in their networks.

Resource utilization shows time-series based trends of capacity utilization by correlating Software Telemetry data collected from nodes in each site. Persistent trends help identify burdened pieces of infrastructure and plan for resizing, restructuring, and repurposing.

Graphical user interface, applicationDescription automatically generated

Resource utilization categorizes capacity utilization as follows:

●      Operational resources: Displays the capacity of transient resources that are dynamic in nature and expected to change over short intervals. Examples are routes, MAC addresses, security TCAM, etc

●      Configuration resources: Displays the capacity utilization of resources that are dependent on configurations, such as the number of VRFs, bridge domains, VLANs, EPGs, etc

●      Hardware resources: Displays port and bandwidth-capacity utilization

 

TableDescription automatically generated

Drilling down on any device shows the details of processes that are high consumers of resources. Once. resource utilization crosses a 70 percent capacity threshold, it is color-coded yellow; beyond 80 percent, it is color-coded orange, beyond 90 percent, it is color-coded red. This proactively alerts the network operators about the specific resources that need their attention.

Graphical user interface, text, application, emailDescription automatically generated

This also helps predicts anomalies based on historical trends and rates of change and forecasts resource shortages; see the screenshot below for an example.

Graphical user interface, applicationDescription automatically generated

Environmental

Most often, environmental data is monitored using traditional applications like SNMP, CLI etc. Data from these applications are difficult to post process, is device specific, not historical in nature, and requires manual checks. Monitoring environmental anomalies hence becomes very reactive and cumbersome. Cisco Nexus Insights consumes environmental data using streaming Software Telemetry, baselines trends and generates anomalies every time the utilization exceeds pre-set thresholds. It enables the user to determine which process is consuming CPU, hogging memory, when storage is overfilled, process crashes or there are memory leaks – providing all this data over time with historical retention per node, to allow users to delve into specific anomalies while having full visibility.

Environmental provides anomaly-detection capabilities in hardware components such as CPU, memory, temperature, fan speed, temperature, power, storage etc. As in the other screens, it highlights components exceeding thresholds and requiring the operator’s attention.

Graphical user interface, application, table, ExcelDescription automatically generated

Screens with more details provide additional visibility into hardware component anomalies.

Graphical user interface, applicationDescription automatically generated

Statistics

Statistics is all about interfaces and routing protocols. Cisco Nexus Insights ingests data from each node in the fabric using streaming Software Telemetry. The data is then baselined to derive trends and identify when any of these data sets suddenly show a rapid decline (for example) in interface utilization or rapid increase in drops or CRC errors over time.

Dashboard view presents top nodes by interface utilization and errors thereby allowing user to quickly identify interfaces to look into for errors.

 

Graphical user interface, application, tableDescription automatically generated

Browse view helps deep dive into Interface and Protocol Statistics.

Interface statistics provide view into trend of utilization, errors like CRC,FCS,Stomped CRC.

 

Graphical user interface, tableDescription automatically generated

Protocol Statistics provide a view into what interfaces protocols like CDP, LLDP, LACP, BGP, PIM, IGMP, IGMP snoop are active on, protocol details like neighbors, incoming and OIFs for a (*,G), (S,G) entry along with trends of errors like a lost connection or neighbor, OIF flaps, invalid packet etc.

Example of BGP neighbors –

TableDescription automatically generated

Example of PIM Interfaces and groups –

Graphical user interface, application, tableDescription automatically generated

Statistical data is also used for correlation in Cisco Nexus Insights. For instance, if there is a CRC error, Cisco Nexus Insights will use other data sets to find out the estimated impact  (like impacted Endpoints) and provide a recommendation based on other anomalies seen at that time (like a DOM anomaly which could potentially be causing CRC errors).

Graphical user interface, text, application, emailDescription automatically generated

Flows

Application problem or network problem? This is a frequently asked question in the data center world. If anything, it always begins with the network. The time to innocence and mean time to resolution become critical as we deal with business critical applications in the data center. The applications we have today often have very limited insights on data plane counters, flows, latency, and drops. The nature of this data and analysis of these is very complex to begin with.  Even if we get the flows from the nodes, who is to stitch them to get end to end flow path, latency? It is the user who has to do all of this which means a lot of man hours. With Cisco Nexus Insights, using Hardware Telemetry, the application consumes flow records and respective counters, correlates this data over time to provide end to end flow path and latency. Cisco Nexus Insights understands what is the “normal” latency of each flow. When the latency exceeds this normal, it alerts the users and shows the abnormal latency increase as anomaly on the dashboard.

Flow analytics dashboard attracts operator attention to key indicators of infrastructure data-plane health. Time-series data offer evidence of historical trends, specific patterns, and past issues and helps the operator build a case for audit, compliance, and capacity planning or infrastructure assessment. The flow analytics dashboard provides a time-series-based overview, as shown below, with the capability to drill down on specific functions by clicking on the graph.

●      Top Nodes by Average latency: Shows top nodes by highest average end to end latency. This   results in egress nodes with flows having maximum end to end latency.

Chart, line chartDescription automatically generated

Clicking on a node results in all flows with that node as an Egress node, thereby allowing user to drill into top flows having high latency passing through a particular egress node.

Chart, box and whisker chartDescription automatically generated

●      Top flows by Average Latency: Shows time-series-based latency statistics. Clicking on a particular flow drills down to detailed flow data, including latency numbers, the exact path of the flow in the fabric, and the end-to-end latency. This takes away trial-and-error and manual steps otherwise required to pinpoint latency hot spots in the infrastructure. This leads operators to focus on the root causes of the latency and remediate them. Historical trends help operators identify persistent problems and re-evaluate the infrastructure capacity.

A picture containing tableDescription automatically generated

Double-clicking on the flow shows the flow level details.

Details of the flow, such as burstiness, help identify and remediate bandwidth issues or apply appropriate Quality of Service (QoS) levels.

A picture containing chartDescription automatically generated

●      Top Flows by Packet drop indicator: Shows time-series-based packet drop statistics. Clicking on a particular flow drills down to detailed flow data, including at which exact point in the fabric the drop occurred and why they occurred, as shown in the two graphics below. This saves precious time during troubleshooting and helps operators quickly identify and locate the specific potential problem-points in the infrastructure.

Chart, line chartDescription automatically generated

 

Graphical user interface, text, application, emailDescription automatically generated

 

Graphical user interface, text, application, websiteDescription automatically generated

Endpoints

Shows time-series-based endpoint movement in the fabric, with endpoint details, and endpoints with duplicate IPs. In virtualized data center environments, this keeps track of virtual machine movement, which is extremely useful to identify its current location and its historical movements in the fabric. It provides proof points in establishing virtual-machine movements and thus aids constructively in problem solving while working with other IT teams. See the screenshot below.

Graphical user interface, applicationDescription automatically generated

 

Graphical user interface, applicationDescription automatically generated

Applications

With Cisco AppDynamics and Cisco Nexus Insights integration, users get a single pane of glass for application and network statistics and anomalies. Cisco Nexus Insights consumes data streamed from AppDynamics controller and in addition to showing Application, Tier, Node health and metrics, Cisco Nexus Insights derives baseline of Network Statistics of these applications like TCP loss, Round trip Time, Latency, Throughput, Performance Impacting Events (PIE) and generates anomalies on threshold violations. For any AppDynamics flows, Cisco Nexus Insights also provides an in-depth end of end path, latency, drops if any, and drop reasons to help users identify if app slowness or issues are resulting from network issues.

Application Dashboard showing all applications and respective statistics –

Chart, line chartDescription automatically generated

Delve deeper into an application to see health, respective Tiers and Nodes –

Graphical user interface, application, emailDescription automatically generated

A network link is communication between Tiers. Cisco Nexus Insights maps links to respective flows traversing the fabric thereby allowing users to see flow details and path with drops if any –

Graphical user interface, text, application, emailDescription automatically generated

Clicking on the above flow takes you to the detailed flow page to analyze abnormal latency or drops if existing.

Graphical user interface, application, tableDescription automatically generated

Event analytics

●      Event analytics is tuned for control-plane events in the infrastructure. It performs the following:

●      Data collection: configuration changes and control plane events and faults

●      Analytics: Artificial Intelligence (AI) and Machine-Learning (ML) algorithms determine the correlations between all changes, events, and faults

●      Anomaly detection: output of AI and ML algorithms (unexpected or downtime-causing events)

 

The event analytics dashboard displays faults, events, and audit logs in a time-series fashion. Clicking on any of these points in the history displays its historical state and detailed information. Further, all these are correlated together to identify if deletion of configuration led to a fault.

Graphical user interface, application, tableDescription automatically generated

●      Audit logs: Shows the creation, deletion, and modifications of any object in Cisco ACI; for example, subnet, IP address, next-hop, EPG, VRF, etc. This is useful for identifying recent changes that may be a potential reason for unexpected behavior. It can aid in reverting back changes to a stable state and help assign accountability. The facility of the filters makes it convenient to narrow focus to specific changes by severity, action, description, object, etc. Drilling down on the audit logs provides details for each log.

●      Events: Shows operational events in the infrastructure; for example, IP detach/attach, port attach/detach on a virtual switch, interface state changes, etc.

●      Faults: Are mutable, stateful and persistent managed objects and show issues in the infrastructure; for example, invalid configurations. This function speeds up operator action toward problem rectification, thus reducing the time lost in root-cause analysis and rectification, which usually requires multiple steps, expertise, correlation of symptoms, and perhaps a bit of trial and error.

Graphical user interface, application, TeamsDescription automatically generated

The zoom in and out function in the timeline bar helps to quickly contract or expand the timeline under investigation.

Diagnostics, Impact, Recommendation

Cisco Nexus Insights monitors different sets of data from all nodes in the fabric and baselines the data to identify the “normal” behavior. Any deviation from this normal is represented as an anomaly in the application dashboard. This helps the operator spend time on resolving the issue instead of finding where in the network the issue really arose from. With the correlation algorithms that Cisco Nexus Insights has in place, in addition to the anomaly, it can also point to an estimated impact of this anomaly helping the user identify what is the potential impact of a problem. With the impact, the application will also generate a recommendation depending on the nature of the anomaly reducing the Mean Time to Troubleshooting and Resolution.

For example, let’s look at this Microburst anomaly. Microbursts are complex to identify and cause myriad kind of network issues. For applications that require reliable and low-latency networks, Microbursts can pose serious issues. Since microbursts occur in the order of microseconds, looking at a graph of overall packets-per-second will make the overall transmission appear smooth. Cisco Nexus Insights detects these microbursts due to its rapid cadence of gathering data and details what flows could be impacted due to these bursts and even causing them. It makes it easier for the operator to not only detect that a burst occurred on a particular node, interface, and queue but also flows impacted with a recommendation on how to fix this anomaly.

Example of a microburst anomaly –

Graphical user interface, application, tableDescription automatically generated

Example of what flows could be experiencing high latency due to the occurrence of microburst at this particular time span -

Graphical user interface, text, application, emailDescription automatically generated

 

Recommendations on how to remediate this anomaly along with mutual occurrences of other issues in that node as noted by Nexus Insight. It also displays Audit Logs, Events, Faults to keep all the information in one page to allow for quick troubleshooting.

Graphical user interface, text, applicationDescription automatically generated

Advisories

To maintain data center network availability and minimize the downtime, it is critical for network operators to ensure that their network infrastructure is built with up-to-date switch platforms, and is running the right versions of software. It requires periodic and thorough audits of the entire infrastructure, which is historically a manual and time-consuming task. Cisco Nexus Insights turns this task into an automated process, using digitized signatures to determine the vulnerability exposure of the network infrastructure at the click of a button.

Cisco Nexus Insights scans the entire network to collect the complete information on its hardware, software versions, and active configuration. It then runs analysis against the digitalized database of known defects, PSIRTs, field notices to identify the relevant ones that can potentially impact the particular network environment, matching on its hardware and software versions, features and topologies, etc. It then proactively alerts the network operators of the found vulnerabilities, and advises them on the right hardware and/or software versions for remediation. It also analyzes and advises on whether the network is running any out-of-date hardware or software based on Cisco product EoL (End of Life) or EoS (End-of-Sales) announcement and schedule. For any of the discovered issues, Cisco Nexus Insights lists the impacted devices, vulnerability details, and mitigation steps aka advisories. With the advisories, it recommends the best software version for the resolution, and the upgrade path, either a single-step upgrade or through intermediate software versions. It also reveals the impact of the upgrade, either disruptive or non-disruptive, so that the operators can proactively plan for the upgrade accordingly.

With the automated scanning, network-context-aware vulnerability analysis, and actionable recommendations, the advisory function in Cisco Nexus Insights makes it so much easier for the operation team to maintain an accurate audit of the entire network and avoid the downtime due to product detects or PSIRTS by getting proactively alerts and taking preventative remediation actions.

 

Example of an Advisory on Field Notice –

Graphical user interface, text, application, emailDescription automatically generated

Example of firmware upgrade recommended by Cisco Nexus Insights –

Graphical user interface, applicationDescription automatically generated

Example of Upgrade Analysis – list of intermittent upgrades to get to the destination software, upgrade impact, release notes for each release linked directly in Cisco Nexus Insights –

Graphical user interface, application, websiteDescription automatically generated

Installation Dependencies

Cisco introduced Cisco Nexus Dashboard as a central management console for all the onboarded data center sites and a central hosting platform for data center operation applications, such as Cisco Nexus Insights. It simplifies the operation and life cycle management of various applications, and reduces the infrastructure overhead to run the different applications by providing a common platform and application infrastructure. Additionally, it provides a central integration point for API-driven 3rd party applications with the applications that are hosted on Cisco Nexus Dashboard.

Cisco Nexus Insights is a micro-services-based application designed to be hosted on Cisco Nexus Dashboard. Nexus Dashboard provides a cluster of compute nodes which are horizontally scalable. As an application natively hosted on Cisco Nexus Dashboard, the sizing and number of compute nodes required for Cisco Nexus Insights depends on the number of fabrics, number of switches in each fabric and the flows/second that the users wants the application to support.

See Cisco Nexus Dashbooard Data Sheet and Cisco Nexus Dashboard FAQ.

Software and Hardware dependencies with Scale

The NI App is supported on Cisco ACI and Cisco DCNM. Please refer to Cisco Data Center Networking Applications Compatibility Matrix for the latest software compatibility information

Licensing

The Cisco Nexus Insights App license is included as part of the Cisco ACI or NX-OS Premier license. Customers that have a Cisco ACI or NXOS Essentials license, or Advantage license can purchase the add-on DCN Day2Ops include Cisco Nexus Insights and Assurance apps.

Both the above licenses are a subscription-only Smart license. For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide. The number of device licenses required is the total number of leaf switches in the Cisco ACI fabric and/or total number of nodes in Cisco DCNM based fabric.

Pricing and ordering

For ordering information, click here. Alternately, contact your Cisco Account team to learn future pricing and get additional details.

Conclusion

Cisco Nexus Insights provides actionable insights using predictive analytics, network assurance and AIOps. It uses a vast range of information, tracking data about the infrastructure, learning new events and determining their cause, and highlighting unexpected occurrences in the network while at the same time helping network operators plan ahead, comply with policies and audits, and keep track of infrastructure capacity and uptime. Cisco Nexus Insights attempts to be an extension of the operator’s brain to prevent failure in the network, or to focus attention on remedial steps to recover faster from failure when it does occur.

Sours: https://www.cisco.com/c/en/us/td/docs/dcn/whitepapers/cisco-nexus-insights-white-paper-501.html

 

 

 

 

 

 

 

 

 

 

Cisco Nexus Insights (NI) application consist of a pair of monitoring utilities that can be added to the Cisco Data Center Network Manager (DCNM).

This document describes the features, issues, and limitations for Cisco NI app on the Cisco DCNM.

For more information, see Related Content

Note: The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.

Date

Description

June 10, 2021

Release 5.1(0) patch (5.1.0.135) became available.

April 27, 2021

Release 5.1(0) (5.1.0.131) became available.

 

New Software Features

Feature

Description

Cisco Nexus Dashboard

Support

Cisco Nexus Insights app can be deployed as a service on Cisco Nexus Dashboard.

Multi Cisco DCNM sites support

Monitor DCNM multiple sites with single instance of Cisco Nexus Insights.

Multi-Site

Monitor multiple sites with single instance of Cisco Nexus Insights.

UI enhancements

Improved design with a streamlined tabbed layout, enhanced options for selecting a time range, centralized summary of sites with All Sites Dashboard, detect and indicate when features are not supported by a node.

Cisco NI app unification

Integrating Cisco NIR and Cisco NIA apps into Cisco NI app to get  anomalies, advisories, and functionalities such as scheduling log collection jobs, scheduling bug scan and compliance jobs, connectivity analysis jobs,  firmware upgrade impact and upgrade paths, recommendations for upgrade versions, and RPM updates. It also includes in-depth analysis work flows for advisories and anomalies.

Topology View

Visualize logical constructs such as Tenant, VRF, EPG and more on top of physical topology. Perform rapid troubleshooting using filters to focus on problematics nodes.

Cisco Nexus Insights Independence

Cisco NI app collects the node capabilities to determine and display the features supported and features not supported for each node on the site.

Micro-Burst detection

Expose and locate invisible microbursts. Know the congestion hot spots and protect application performance.

Flow Telemetry Events

Use flow table events to minimize troubleshooting time through automated root-cause analysis of data plane anomalies, such as routing issues, ACL drops, buffer drops and more.

Host flow overlay technologies support

Packet visibility and flow telemetry support for overlay technologies such as host flow overlay. The host flow overlay technologies include NSX-V flow monitoring.

Kafka messaging support

Share Cisco Nexus Insights enriched value-added output with application ecosystem. Build synergetic workflows with third party IT applications.

Email notification support

Get offline alerts about network health using email notification facility. Pick and choose which issues you need to be alerted about.

PSIRT notification and Defect notification

Detect vulnerability exposure with PSIRT scan. Detect exposure to known defects with defect scan.

Resources

Monitor capacity utilization changes and threshold violation with resource anomalies.

Statistics

View control plane, data plane statistics, detect control plane and data plane anomalies.

AppDynamics Integration

AppDynamics provides the required metrics for monitoring, identifying, and analyzing the applications that are instrumented with AppDynamics agents. Cisco NIR provides flow analytics, statistics analytics, and topology view on these metrics to identify anomalies.

Support for Cisco Nexus 9300-GX series switches

Monitor high performance, scalable data center with support for Cisco Nexus 9300-GX series 400 GE platform switches.

Note:      For Cisco NI Release 5.1(0), you must install the latest Cisco DCNM Release 11.5(2).

Note:      Starting with Cisco NI Release 5.1(0), Cisco NI is only supported on Cisco Nexus Dashboard. Cisco DCNM Release 11.5(2) does not support Cisco NI Release 5.1(0) on compute.

Open Issues

This section lists the open issues in this release. Click the bug ID to access the Bug Search tool and see additional information about the caveat. The “Exists In” column of the table specifies the releases in which the issue exists.

Bug ID                             

Description

Exists In

CSCvt77736

When there is no data coming from switches, topNodes API returns all nodes into the list as healthy with endpoint count as 0.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv47086

Retry to push configuration does not work if flow telemetry is in enabled state but software telemetry has failed.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv58470

Advisories are displayed for devices removed from the Site or Fabric.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv58497

In Cisco Nexus Insights app, log collection fails on some nodes.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv75635

fabricName is not mandatory in the add integrations API.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv98827

When fabric is disabled, corresponding collection from AppD is not disabled.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvw00525

Fabrics with HW flow telemetry in disabled failed is cannot be upgraded.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvw05118

After downgrading the switch to 7.0(3)I7(8) version from 9.3.5 or above, telemetry is only partially configured on the switch.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvw07745

In Cisco Nexus Insights only top 100 flows are displayed in the  flow events anomaly analyze page. You are unable to view the remaining flow events.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvw11350

MAC duplication endpoint anomaly does not get cleared.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvw12315

Cisco Nexus Insights generated flow anomalies on DCNM cannot be streamed to remote Kafka broker.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvt66683

When a switch is removed from a fabric, flows records originating from that switch is displayed in Nexus Insights unless analytics feature configurations are removed.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv75183

Flow resource type anomalies are not exported to external kafka server.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv82571

FTE events show up as anomaly when the switch with large network configuration is configured for telemetry with Cisco Nexus Insights.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvw12315

Cisco Nexus Insights generated flow anomalies on Cisco DCNM cannot be streamed to remote Kafka broker.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv96466

EP records shows incorrect status.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvw52303

When NX-OS version is upgraded, FTE configurations are not be pushed even if the upgraded NX-OS version supports FTE.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvx69082

Flow Telemetry configuration is not removed from FX3S switch if the switch was running NX-OS release 9.3.7  with Flow Telemetry enabled and then upgraded or downgraded to NX-OS release 10.1.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvx52514

When the Infrastructure  is down, the job termination action cannot be completed and results in some Bug Scan jobs to be in the "in-progress" state.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvx58005

When you start a bug Scan, the History table is not updated and the Scan Now button is not disabled.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvx79653

Metadata update task is not scheduled on app startup if the fabric is not enabled.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvx80000

When you onboard a new site to Nexus Dashboard, the site does not appear in Nexus Insights UI.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvx91483

ACI FN-72145 is displayed for switch running standalone NX-OS in DCNM fabric.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvy06700

Flow Telemetry status becomes disable-failed due to filter rule modify operation if a switch in the fabric has bad credentials or connectivity issues.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvy09409

Internal database system experienced out of memory . Streaming data will not be retrieved or saved after and during the time internal database component recovers completely and becomes stable.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

Resolved Issues

This section lists the resolved issues in this release. Click the bug ID to access the Bug Search tool and see additional information about the caveat. The “Exists In” column of the table specifies the releases in which the issue exists.

Bug ID                             

Description

Fixed In

CSCvw82970

It takes more than 10 mins for VRF updates to be reflected in the Cisco NI app.

5.1(0) (5.1.0.131)

CSCvv87562

Email notifications does not include compliance advisories.

5.1(0) (5.1.0.131)

CSCvw82970

It takes more than 10 mins for VRF updates to be reflected in the Cisco NI app.

5.1(0) (5.1.0.131)

CSCvx44548

Collection Status for flows and endpoints is reported as "Feature not supported" in the GUI.

5.1(0) patch (5.1.0.135)

CSCvy24601

Cisco NI 5.1 should not be allowed to be installed on Cisco DCNM 11.4(1) and 11.5(1).

5.1(0) patch (5.1.0.135)

CSCvy12530

When leaf switch becomes inactive because of unreachability both node reload and node inactive anomaly are raised though only node inactive anomaly is expected.

5.1(0) patch (5.1.0.135)

CSCvy21148

In the System Status page, when you use the filter, some options do not display the results acuurately.

5.1(0) patch (5.1.0.135)

CSCvy28882

AppD stdout / stderr logs are copied to /opt/telegraf/log/ in the telegraf container. and are not log rotated. As a result, over a period, storage space may run out in telegraf and AppD data collection process potentially gets stuck.

5.1(0) patch (5.1.0.135)

CSCvy22244

Even when the switches are streaming flow information, flows are not processed and no flows are visible in the UI.

5.1(0) patch (5.1.0.135)

CSCvy13665

Time Window sets incorrect date when the user modifies the date and time.

5.1(0) patch (5.1.0.135)

 

Known Issues

This section lists the known issues in this release. Click the bug ID to access the Bug Search tool and see additional information about the caveat. The "Exists" column of the table specifies whether the issue was resolved in the base release or a patch release.

Bug ID                             

Description

Exists In

CSCvu74237

Under scale condition, when some of the flow records are either dropped in the switch or dropped in processing, partial paths will be displayed.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvw31279

VRF that is associated with the NSX-V flow may not be the correct VRF the NSX-V flow is taking in the fabric.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvx56615

Devices may not be flagged as not running CRV (Current Recommended Version).

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvu69962

Logical fabrics may show up in Cisco Nexus Insights.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvu84489

Stopping a recurrent bug scan in log collection phase does not stop the job immediately.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvv89866

Endpoint data is displayed for unsupported devices.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

CSCvu74237

Under scale condition, when some of the flow records are either dropped in the switch or dropped in processing, partial paths will be displayed.

5.1(0) and 5.1(0) patch

(5.1.0.131 and 5.1.0.135)

Compatibility Information

For Cisco NI on Cisco DCNM compatibility with Day-2 Operations apps, see the Cisco Data Center Networking Applications Compatibility Matrix.

Software/Hardware

Release

Minimum Cisco NX-OS version required for Software Telemetry

7.0(3)I7(6), 7.0(3)I7(7), 8.4(2)

Minimum Cisco NX-OS version required for Software and Hardware Telemetry

9.3(2), 9.3(3), 9.3(4), 9.3(5), 9.3(6), 9.3(7), 10.1(1), 7.0(3)I7(8), 7.0(3)I7(9)

Minimum Cisco NX-OS version required for Host Flow Overlay

9.3(4), 7.0(3)I7(8)

Minimum Cisco NX-OS version required for Micro-Burst, Endpoint Analytics, and Multicast Protocols

9.3(4)

Minimum Cisco NX-OS version required for Modular Hardware Telemetry

9.3(4)

Minimum Intersight Device Connector version on Cisco Nexus Dashboard

1.0.9-737

Minimum Cisco NX-OS version required for Connectivity Analysis

9.3(3)

Cisco Device supported for Host Flow Overlay

Cisco Nexus 9000 -FX, -FX2, -FX3,and -GX platform switches

Cisco Devices supported for Flow Telemetry Events

Cisco Nexus 9000 -FX, -FX2, -FX3, and -GX platform switches and 9700 -FX and -EX line cards

Cisco Device supported for Flow Telemetry

Cisco Nexus 9300-EX, -FX, -FX2, -FX3, and -GX platform switches and 9500-EX and FX

Cisco Device supported for Software Telemetry

●      Cisco Cloud Scale ASIC devices

●      Cisco Nexus 7000 series switches: N77-C7710 or N77XX, N7K-C7009, N7K-C7010 or 70XX

●      Cisco Nexus 3000 series switches: Nexus 3100-XL series, Nexus 3100-V series, Nexus 3200 series, Nexus 3400 series, Nexus 3500-XL series

●      Cisco Nexus 9504 and 9508 with -R and -RX lines cards:

●      N9K-X96136YC-R, N9K-C9508-FM-R, N9K-C9504-FM-R, N9K-X9636C-R, N9K-X9636C-RX

●      Cisco Nexus 3600 platorm switches: N3K-C3636C-R, N3K-C36480LD-R2, N3K-C36180YC-R

●      Cisco Nexus 9300-GX,  9300-FX3 and platform switches

Cisco Device not supported for Software Telemetry

●      Cisco N3K-C3408-S, N3K-C3432D-S, N3K-C34200YC-SM, N3K-34180YC, and N3K-3464C  switches

●      Cisco N3K-C3464C, N3K-C34180YC, N3K-C3408S, N3K-C34200YC-SM, N3K-C3432D-I

Micro-Burst support

See Supported Platforms for details.

Arista EOS

4.21

Arista Device Supported

Arista 7050SX and 7280SR platform switches

Note:      Flow Telemetry data will consume 6MB for 10K IPv4 flows per node. Flow Telemetry data will consume 12MB for 10K IPv6 flows per node.

Verified Scalability Limits

Software/Hardware

Scale Limits

Number of flows supported for Hardware Telemetry

12000

Number of flows supported for Endpoints

120000

Maximum number of nodes supported in a fabric in managed mode

150

Maximum number of nodes supported across all fabrics

350

Maximum support for a 3-node Cisco Nexus Dashboard cluster

Fabric with 80 nodes, 60000 Endpoints, and 2000 Flows

Maximum support for a 6-node Cisco Nexus Dashboard cluster

Fabric with 350 nodes, 120000 Endpoints, and 12000 Flows

Note:      For fabrics greater than 150 nodes, monitored mode is recommended.

Usage Guidelines and Limitations

This section lists the usage guidelines and limitations for Cisco NI app:

●      The Cisco NI application installation on Cisco DCNM requires that the DNS server is valid and reachable.

●      Telemetry for hardware TCAM utilization, such as forwarding TCAM and ACL TCAM are not supported on Cisco Nexus C9504, C9508, and C9516 paltform switches.

●      Cisco NI app does not support software telemetry and flow telemetry data from switches to the flow collector running on Cisco DCNM compute nodes over IPv6.

●      Software Telemetry telemetry should be enabled before enabling Hardware Telemetry.

●      Cisco NI app checks for metadata update every hour. However, there may not be an update every time.

●      After metadata update you need to run manual bug scan to reflect PSIRTs.

●      The Hardware Resources tab in System Resource Utilization Dashboard is not supported for Cisco Nexus 7000 series switches. The hardware resources do not have a direct mapping to the objects that show in Cisco NI app. The command that shows hardware details does not provide the percentage of entries used and the maximum number of entries allocated  for a particular feature. The Cisco NI application does not raise the anomalies and details page for any resource in Hardware Resources tab for Cisco Nexus 7000 series switches.

●      The features supported on Cisco Nexus 7000 series switches includes Enviromental, Statistics, and Resources.

●      The features not supported on Cisco Nexus 7000 series switches includes Endpoint Analytics, Multicast, Microburst, CDP statistics protocol, and harware resource statistics such as COPP, HRT, LPM, QoS, and ACL.

●      The features supported on Cisco Nexus 3000 series switches includes Enviromental, Statistics, and Resources.

●      The features not supported on Cisco Nexus 3000 series includes Endpoint Analytics, Multicast, and Microburst.

●      The IGMP and IGMP Snoop multicast statistics protocols are supported only on Cisco Nexus 9000 series switches.

●      The IGMP and IGMP Snoop multicast statistics protocols are not supported for the following:

◦         Cisco Nexus 3000 and 7000 series switches.

◦         Cisco N9K-X9636C-R, N9K-X9636Q-R, N9K-X96136YC-R, and N3K-C3636C-R line cards.

●       Cisco NI app does not support BGP PrefixSaved statistics on the following:

◦         Cisco Nexus 3000, 7000, and 9000 platform switches.

◦         Cisco N9K-X96136YC-R, N9K-X9636C-R, N9K-X9636Q-R, and N3K-C3636C-R line cards.

●      Classic fabric type is supported for host flow overlay monitoring. VXLAN fabric type is not supported for host overlay flow monitoring.

●      After enabling Cisco NI on a fabric and adding a group of switches together to the fabric, DCNM sends notification for the newly added switches. When NI tries to program the newly added switches, DCNM can be potentially finishing the switch discovery for these switches. In this case, the NI operation fails on the switches. The failed NI operations should be retried with retry facility in Cisco NI.

●      For virtual Nexus Dashboard (vND), you must provision the underlying HOST with Distributed Virtual Switch and not with a Standard Virtual Switch.

●      If you are deploying Multi-Site Orchestrator, Nexus Insights, and Network Assurance Engine in the same cluster, you must ensure that Nexus Insights and Network Assurance Engine are installed and enabled first before enabling the Multi-Site Orchestrator application.

●      Starting from Cisco NI release 5.1(0), flow telemetry is supported in -FX3 platform switches for the following NX-OS versions:

◦    9.3(8) and later

◦    10.1(2) and later

◦    Flow telemetry is not supported in -FX3 platform switches for NX-OS version 10.1(1).

 

Related Content

The Cisco NI documentation can be accessed from the following website:

https://www.cisco.com/c/en/us/support/data-center-analytics/nexus-insights/series.html

The documentation includes installation, upgrade, configuration, programming, and troubleshooting guides, technical references, and release notes, as well as other documentation.

Document

Description

Cisco Nexus Insights Release Notes for Cisco DCNM

This document.

Cisco Nexus Insights User Guide for Cisco DCNM

Describes how to download, install, and set up Cisco NI app.

 

Documentation Feedback

To provide technical feedback on this document, or to report an error or omission, send your comments to [email protected]

Legal Information

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

© 2021 Cisco Systems, Inc. All rights reserved.

Sours: https://www.cisco.com/c/en/us/td/docs/dcn/ni/5x/release-notes/dcnm/cisco-ni-dcnm-release-notes-511.html
  1. Tele notary
  2. Trackmax cam
  3. Poplar wood for drawers
  4. Sad cat gif

 

This document covers the ordering of the Cisco Day 2 Operations (Day2Ops) solutions. Components include:

1)     Cisco Nexus® Dashboard: Single console for full lifecycle data center automation where the applications, Cisco Nexus Insights, Cisco Network Assurance Engine, and the Cisco Multi-Site Orchestrator will operate. In the future, third-party ecosystem applications will also run on Cisco Nexus Dashboard.

2)     Cisco Nexus Insights: Automates troubleshooting, monitoring, auditing, planning and more, resulting in rapid troubleshooting, proactive detection of anomalies and early remediation. It is hosted on the Cisco Nexus Dashboard where Cisco ACI and DCNM sites are onboarded. Data from these sites is ingested and correlated by the Cisco Nexus Insights.

3)     Cisco Nexus Dashboard Platform (previous known as Applications Services Engine): Physical compute

Ordering is made easy through two simple steps

Step 1: Choose either a Cisco DCN Premier license or a Cisco DCN Day 2 Operations solution suite

Cisco DCN Premier license (for greenfield): Provides Cisco Nexus Dashboard, Cisco Nexus Insights (formerly Network Insights Resources and Network Insights Advisor) and Cisco Network Assurance Engine (NAE). Customers with an existing Essentials or Advantage subscription can transition to Premier and receive the Cisco Nexus Insights capabilities.

Cisco DCN Day 2 Operations or D2Ops solution suite (for brownfield): This is recommended for customers who already have a Cisco DCN Advantage or Essentials license. The bundle provides Cisco Nexus Dashboard and Cisco Nexus Insights and Network Assurance Engine.

Step 2: Cisco Nexus Dashboard Platform (previously known as the Cisco Application Services Engine)

Cisco Nexus Dashboard Platform (previously known as the Cisco Application Services Engine): The Cisco Nexus Dashboard Platform (SE-CL-L3) is a purpose-built appliance that is designed to run Cisco® applications seamlessly. Cisco Nexus Dashboard Platform offers high availability, lifecycle management, and network automation for the applications running on it. It is a cluster of three nodes and provides the necessary hardware performance and scale for applications such as Cisco Nexus Insights, Cisco Network Assurance Engine (NAE) and Cisco Multi-Site Orchestrator (MSO). More information.

Cisco DCN Premier and Day 2 Operations solution suite

Figure 1.            

Cisco DCN Premier and Day 2 Operations solution suite

Step 1: License per device

Option 1: Cisco DCN Premier License

Cisco DCN Premier license is available under “Subscription Licenses” when you order the appropriate hardware.

Cisco DCN Premier subscription license 3Y and 5Y as part of ordering hardware

Figure 2.            

Cisco DCN Premier subscription license 3Y and 5Y as part of ordering hardware

Option 2: Cisco Day 2 Operation Add-On License

This is available under C1-N9K-ADD-T top level PID

Day2Ops bundle: D2OPS-FXD for fixed switches, and D2OPS-MOD for modular switches

Figure 3.            

Day2Ops bundle: D2OPS-FXD for fixed switches, and D2OPS-MOD for modular switches

Step 2: Cisco Nexus Dashboard Platform

Cisco Nexus Dashboard Platform (SE-CL-L3)

Previously known as Cisco Application Services Engine, this is a purpose-built physical appliance that comes with 3 compute nodes and that is designed to run Cisco Multi-Site Orchestrator and Cisco Nexus Insights seamlessly. As customers’ needs increase, they have the flexibility to add additional nodes using SE-NODE-G2=. Please check the Cisco Nexus Insights scale information to determine the nodes required.

Cisco Nexus Dashboard Platform

Figure 4.            

Cisco Nexus Dashboard Platform

Other resources

●      Cisco Nexus Insights

●      Cisco Nexus Dashboard

●      Network Assurance Engine

●      DCN Software Subscriptions

 

 

 

Sours: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/nexus-dashboard/guide-c07-744361.html
What's New in Cisco Nexus Insights, Release 5.0

Cisco Nexus Insights

Cisco Nexus Insights

Cisco Nexus Insights

 

With the unprecedented increases in scale and complexity of networks, it is challenging to keep up with the demands of operating a large network without the aid of intelligent and adaptive tools. The Cisco Nexus Insights for the data center stands out as the first comprehensive technology solution in the industry developed by Cisco for network operators to manage day-2 operations in their networks.

 

The Nexus Insights for the data center is supported on Cisco ACI® and Cisco NX-OS/DCNM–based deployments. Cisco Insight benefits from following advantages:

 

  • Multi-fabric support
  • Time-series database
  • Flow analytics
  • Microburst detection
  • AppDynamics
  • Multicast control plane
  • Anomaly analysis
  • Resource utilization
  • Customizable dashboards
  • Endpoint analytics
  • Topology view
  • Advisories
  • PSIRTs/bugs
  • Kafka-messaging support
  • Cisco ACI Multi-tier support
  • Product-usage telemetry

 

These features are supported in most Cisco Nexus families such as Cisco Nexus 9300/9500/9700 EX/FX/FX2/GX series switches and Nexus 7000 and Nexus 3000. Check the Cisco.com for differences.

 

 

Cisco Intersight Nexus Dashboard Base

 

Cisco Intersight Nexus Dashboard Base to view all your data center networking inventory directly from Intersight. It offers customers basic data center network asset, inventory, and status information in the Intersight portal.

 

 

Cisco Nexus Insights Cloud Connector

 

Nexus Insights also provides a license-free version of the application, called Nexus Insights Cloud Connector, that will benefit operators by collecting valuable information about the status and capabilities of Cisco data-center platforms. Nexus Insights Cloud Connector application is included in the Cisco APIC and Cisco DCNM software OS as a license-free offering.

 

 

Cisco Nexus Insight 5.0

Cisco Insight License

Cisco Nexus Insights 5.0 application is the first application that unifies nexus insights resources (NIR) and the network insights advisor (NIA). It includes revamped user interface for the unified system dashboard that is designed to keep operators in mind to quickly bubble up anomalies and advisories that show the impact as well as the recommendations based on the co-relations calculated by network insights 5.0. It also supports onboarding an ACI (Application Centric Infrastructure) site directly on nexus dashboard and enables network insights for sites directly from nexus dashboard. Plus, you can use these sites for all applications running in your cluster without the need for each application to manage the sites separately. In addition to the already supported platforms, it now supports additional platforms including the Cisco Nexus 9000 GX platforms for NX-OS. It is also introducing a new feature that’s called flow table events or FTE, which is a mechanism for hardware telemetry. it’s similar to FT which is a direct hardware export. however, it’s an always-on type of mechanism that’s used to track events in the switch like forwarding, buffer, policy, policing, IDS drops or TCPD transmissions.

Every time some events are triggered NI is notified and will let you know about these critical events, as well as based on the correlations show which flows were impacted. Thereby allowing users to observe the events but also drill down into the details right from the dashboard. It is also included app dynamics integration which is already shipping with ACI but now it supports for NX-OS as well. Micro burst detection has been available in NX-OS but now it’s been added to ACI microburst as we all know is highly intense traffic that appears in short bursts and is therefore very difficult to detect. Microbursts are triggered whenever the queue size occupancy rises above up threshold and falls below down threshold which is configurable from NIUI. The thresholds can be set by the user directly from the NI app where the sensitivity of the burst can be set the enabling needs to be done explicitly. You can set low, medium and high and for each of these there are different upper and lower thresholds.

An anomaly for microbursts would be raised at an interface level when the number of microbursts per interface is greater than 100 when the anomalies are raised the user will know the fabric node interface and queue where this happened. Plus, it identifies which flows were impacted due to these burst.  Also for the very first time it supports the export of data via kafka. NI would be the producer of important events like advisories, anomalies, audit logs, events, faults, statistical data like interface routing protocols, environment and etc. The user can input a kafka broker and then all of the data is written as a topic. NI can also notify users via email. it also supports for tier 2 leaf in ACI fabric. So if there’s a tier 2 leaf between the host and the leaf NI is now able to gather flow table records from the tier 2 leaf and stitch these together to show an end to end path including tier 2 leaf in place.

cisco nexus insights user guide

 

Cisco Insights License

 

Cisco Nexus Insights application licenses are included as part of the Cisco Data Center Networking (DCN) Premier license and these license are available in subscription mode only.

Cisco Nexus Dashboard - nexus insights installation guide

Sours: https://ciscolicense.com/blog/cisco-nexus-insights/

Insights cisco nexus

Nexus Dashboard

Cisco Nexus Dashboard (ND) provides an unified operations view of your infrastructures across all of your Data Centers. ND delivers best-in-class ease of use by incorporating multiple data center operational tools delivering automation and insights from a single pane of glass to manage, monitor, and troubleshoot the network. ND includes services such as Cisco Nexus Insights (NI), Cisco Network Assurance Engine (NAE), Cisco Multi-Site Orchestrator (MSO), and third-party ecosystem applications, the operator now has a single landing page and a consistent user experience for the administrator and operator to manage the lifecycle of the infrastructure.

Step 1 - Launch Nexus Dashboard

https://nd-sim.ecatsrtpdmz.cisco.com/

Username = admin

Password = C!sco12345

Nexus Insights

The Cisco Nexus Insights (Cisco NI) application monitors a data center network and pinpoints issues that can be addressed to maintain availability and reduce surprise outages. Cisco NI’s understanding of your network allows it to provide proactive advice with a focus on maintaining availability and alerting customers about potential issues that can impact up-time.

Step 2 - Launch Nexus Insights - Cesar

Launch NI:

  1. On the left menu click Service Catalog
  2. Click Open on the Nexus Insights

Step 3 - Explore Nexus Insights


  • Site Overview: The main dashboard for the Cisco NI application provides immediate access to site dashboard with advisories, anomalies, alerts, timeline, and top nodes by anomaly score, and topology view.

  • Dashboard: The custom dashboard lets you create a unique dashboard and add views on to the dashboard.

  • Devices: The detailed view of the nodes with a graphical representation of top nodes and top resources.

  • Analyze Alerts: Access to total advisories, notices, PSIRTs, displays hardware, software, and hardening check advisories applicable to your network.

  • Troubleshoot:Collect logs for specified devices that can be attached to service requests using the Cisco Intersight Cloud. Also provides access to configure and schedule compliance check jobs that run for a specific fabric.

  • Browse: Resources, environmental, statistics information for interfaces and protocols, flow analytics for viewing average latency, flow move indicator, and packet drops, event analytics, and endpoint analytics for viewing audit logs, events, and faults.

  • Integrations: AppDynamics integration allows Cisco NI application to provide Cisco Nexus Insights for the data received from the AppDynamics metrics using the AppDynamics controller.

Sours: https://aci-lab.ciscolive.com/lab/pod1/aci/aci-nir
Nexus Insights 5.0: Microburst Detection

.

You will also like:

.



760 761 762 763 764