Upload
others
View
48
Download
0
Embed Size (px)
Citation preview
Dirk Stoeckmann TSA EMEAR ACI Competence Center Juli 16
A Path to Digitization, Speed and Visibility in an Application-Centric World
Cisco Tetration Analytics
@DStoeckm
Cisco Tetration Analytics™ Youtube-Video
Application Insight
Policy Simulation and Impact Assessment
Automated Whitelist
Policy Generation
Forensics: Every Packet, Every Flow,
Every Speed
Policy Compliance
and Auditability
Cisco Tetration Analytics
Cisco Tetration Analytics Architecture Overview
Analytics Engine
Cisco Tetration Analytics™ Platform
Visualization and Reporting
Web GUI
REST API
Push Events
Data Collection
Host Sensors
Network Sensors
Third-Party Metadata Sources
Tetration Telemetry
Configuration Data
Cisco Nexus® 92160YC-X
Cisco Nexus 93180YC-EX
VM
Hardware Sensor and Software Sensor
Accumulated Flow Information (Volume…)
Software Sensor
Process mapping
Process ID
Process owner
Hardware Sensor
Tunnel endpoints
Buffer utilization
Burst detections
Packet drops
Flow details
Interpacket variations
Cisco Tetration Analytics Pervasive Sensor Framework
Provides correlation of data sources across entire application infrastructure
Enables identification of point events and provides insight into overall systems behavior
Monitors end-to-end lifecycle of application connectivity
Pervasive Visibility Flow Search and Forensics
Information about Consumer
– Provider and type of traffic
Detail information
about the flow
Datacenter Wide Traffic Flow Visibility
Visual Query with Flow Exploration Replay flow details like a DVR
Information mapped across 25 different dimensions
• Thick lines indicate common flows • Faint lines indicate uncommon flows
Outliers • Switch on Outlier view to highlight uncommon flows
• Outlier dimension is highlighted with purple circle
Internet
DB Proxy
What Is Really Running on My Network? Cisco Tetration Analytics Application Insight—Dependency Map
Use Cisco Tetration Analytics Outcome and Link it to Your Services and Application CMDB
Security
Dependencies
Application
Service Offering
Service
Service Category
(Service Owner)
Real-Time and Historical Policy Simulation
• Validating policy impact assessment in real time • Simulating policy changes over historic traffic
• View traffic “outliers” for quick intelligence • Audit becomes a function of continuous machine learning
Cisco Tetration Analytics™ Platform VM BM
VM VM
BM VM
VM VM
VM BM
VM VM
VM
What was seen on the network that was out of
Policy
Permitted Traffic Seen on the
network
Policy Compliance Verification & Simulation
Get To Zero-Trust Model
APIC Application Policy Recommendation
Import Policy using ACI Toolkit
Automatic creation of EPGs and Contracts
Real Time
Data Network Policy
App Policy Tetration Analytics
UCS
Cisco Nexus 9000 Series
UCS