CloudVision Config Guide
CloudVision Config Guide
Configuration Guide
Arista Networks
www.arista.com
© Copyright 2023 Arista Networks, Inc. All rights reserved. The information contained
herein is subject to change without notice. The trademarks, logos and service marks
("Marks") displayed in this documentation are the property of Arista Networks in the
United States and other countries. Use of the Marks are subject to Arista Network’s Term of
Use Policy, available at www.arista.com/en/terms-of-use. Use of marks belonging to other
parties is for informational purposes only.
Contents
iii
4.1.1 Software Requirements..................................................................................................... 57
4.1.2 Connectivity Requirements................................................................................................ 57
4.1.3 Authentication Requirements............................................................................................. 58
4.2 Onboarding Procedures...................................................................................................................59
4.2.1 Onboarding Authentication Providers................................................................................ 59
4.2.2 Onboarding Devices: Token-Based Authentication........................................................... 61
4.2.3 Subscribing to CloudVision as-a-Service updates.............................................................65
4.3 AAA Providers................................................................................................................................. 65
4.3.1 Requirements..................................................................................................................... 65
4.3.2 Setting up an OAuth and SAML Providers in CloudVision................................................ 66
4.3.3 Setting up CloudVision with Identity Provider....................................................................71
4.3.4 Logging in with a Provider.................................................................................................71
4.3.5 Adding Launchpad as a Provider...................................................................................... 71
iv
Contents
v
8.4 ARP Table..................................................................................................................................... 176
8.5 Comparing NDP Table.................................................................................................................. 177
8.6 MAC Address Table...................................................................................................................... 178
8.7 VXLAN Table................................................................................................................................. 180
8.8 Viewing Device IPv4 Routing Table..............................................................................................182
8.9 Viewing Device IPv6 Routing Table..............................................................................................183
8.10 Comparing IPv4 Multicast Table................................................................................................. 184
vi
Contents
vii
12.5.5 Updating Bundles...........................................................................................................289
12.5.6 Deleting Bundles............................................................................................................290
viii
Contents
ix
18.2 Standard Information in Snapshots............................................................................................. 433
18.3 How to Use Snapshots............................................................................................................... 434
18.4 Accessing Snapshots.................................................................................................................. 434
18.5 Accessing Snapshot Configurations............................................................................................435
18.6 Defining Custom Snapshot Templates........................................................................................435
18.7 Editing Custom Snapshot Templates.......................................................................................... 437
18.8 Viewing Snapshots Differences...................................................................................................437
x
Chapter 1
Introduction to CloudVision
CloudVision is a turnkey solution for network-wide workload orchestration and work flow automation. It was
specifically designed to complement SDN (virtualization) controller solutions that orchestrate virtual network
overlays, by focusing on work flow visibility, automation tasks, and initial or ongoing network provisioning
across the underlying physical network.
CloudVision components are packaged as a virtual appliance and operate as a highly available cluster with
role based privileges integrated into existing authentication tools (AAA, RADIUS, TACACS). For maximum
operational flexibility, CloudVision can be managed with the interactive CVP command line interface (CLI), the
open API for granular programmatic access, or a web-based portal interface.
The foundation of CloudVision is an infrastructure service, sharing, and aggregating working state of physical
switches running EOS to provide network visibility and central coordination. State from each participating
EOS node is registered to CloudVision using the same publish/subscribe architecture of the EOS system
database (SysDB). By communicating to each participating switch instance using a high performance binary
API, CloudVision will actively synchronize state relevant to network-wide operational tasks.
The CloudVision web-based portal combines the most common operational tasks into a dashboard view
decoupled from the underlying hardware. Workflow automation in CloudVision permits operators to execute
common deployment and configuration tasks from a single visual touch point. The portal includes a
turnkey solution for Arista's Zero Touch Provisioning (ZTP) and extends that from automating initial device
provisioning to also include automating ongoing change controls over the operational life cycle of the device.
Using CloudVision, operators can organize devices in logical hierarchies through the use of containers and
list of configlets for rapid categorization of devices by role, type, or other specification. Configurations can
be broken down into more manageable configlets that are built and stored directly on CloudVision, ready for
network-wide or group-specific provisioning. The CloudVision database also keeps historical data, including a
history of network state, configuration and software versions. This state can be used for taking a network-wide
snapshot for change control verification of the network, helping to simplify the change management process
and reduce maintenance window times.
For more information, see:
• CloudVision Portal (CVP) Overview
• CloudVision Portal (CVP) Setup
• Getting Started (CVP)
1
2
Chapter 2
3
2.1 CV-CUE
The CV-CUE service is available as a container on the Arista CloudVision platform. Once you activate the
CV-CUE service, you can configure, monitor, troubleshoot, and upgrade Arista WiFi access points using the
cognitive CV-CUE UI.
CV-CUE Architecture provides a conceptual overview of the Arista CV-CUE solution.
Figure 2: CV-CUE Architecture
CV-CUE is containerized within the CV whether it's CVA (CV on a CV appliance) or a standalone CV VM. The
CV-CUE service runs on both single-node CV and CV cluster. In case of a CV cluster, CV-CUE operates as a
single logical instance in High Availability mode (HA-mode).
• CV-CUE HA Mode Operation
• Key Features of CV-CUE on CV
• Capacity of CV-CUE on CV
4
CloudVision Portal (CVP) Overview
5
words, HBase creates two independent sets of metadata which can even frustrate manual reconciliation.
In essence, distributed infrastructure pieces must meet mandatory quorum requirements and which in turn
means we cannot survive more than a single node failure.
Another reason to not tolerate dual node failures in a three-node CVP cluster is that all nodes are not made
the same and total capacity of the cluster is more than what a single node can handle. Some services might
be configured to run only on two of the three nodes and will fail when attempted to run on another. The total
configured capacity of CVP cluster is 2 times that of a single node. That means in a three-node cluster, two
nodes will have the capacity to run everything but one node cannot. Hence in a cluster of three CVP nodes,
the cluster can survive only one CVP node failure.
Required Hardware
Lab Deployment (< 25 devices) Production Deployment
Single node instances of CVP are supported only A 3-node cluster must be used for production
in lab environments. The minimum hardware deployment. Each node must be configured to
requirements to use CVP in a lab environment are: meet the minimum system requirements. The
recommended hardware required per node to
• CPUs: 16 cores deploy CVP in a production environment (3-node
• RAM: 32 GB cluster) are:
• Disk: 1 TB GB (use RPM installer)
• CPUs: 28 cores
• Disk Throughput: 20 MB/s
• RAM: Recommended 52 GB
• Disk: 1 TB
• Disk Throughput: 40 MB/s
Note: For production deployments, information about device scale is available in the release specific
version of the product release notes. For more information on throughput, refer to Troubleshooting and
Health Checks.
Note: Deploying a single node instance in a production environment does not provide load sharing
or redundancy capabilities; which, in node failure scenarios could lead to data loss or data corruption.
Due to these reasons, single node deployments will no longer be supported starting CVP release
2022.1.0. Cloud service deployment model of CloudVision (CVaaS) is recommended for production
environments with smaller device scale.
6
CloudVision Portal (CVP) Overview
Latency Requirements
Note: CVP 2020.1.0 and future releases support host-to-host vmotion where the storage is shared
between ESXI hosts. Only one host can be in vMotion at a given time.
Related topics:
• Key CVP Terms
• CVP Virtual Appliance
7
Icon Term Definition
Device Devices managed by the
CloudVision Portal.
Related topics:
• CVP Virtual Appliance
• System Requirements
8
CloudVision Portal (CVP) Overview
The different deployment options will be discussed later on in this section, but for production deployments it is
recommended that the cluster option is chosen. The single VM instance is recommended for testing purposes
as it provides a simpler setup and requires less resources.
9
10
Chapter 3
11
3.1 Deploying CVP OVA on ESX
Deploying the CVP OVA file should be the first step in any setup. After the CVP OVA file is deployed, you can
choose between the two configuration methods for CloudVision Portal (CVP).
Note: Arista does not support VMware Snapshots on CloudVision virtual machines. For more
information, refer to VMware vMotion and Snapshot Support.
Pre-requisites:
Use of the Deploy OVF Template requires the VMware Client Integration plugin, which is not supported by the
Chrome browser after versions 42.
1. The OVA file can be deployed as a VM in a VMware environment by using the drop menu under the
Actions heading and selecting Deploy the OVF template.
Note: For multi-node setups, the following steps must be completed once for each VM, three times
to launch three VMs.
Figure 3: Deploy the OVF template
12
CloudVision Portal (CVP) Setup
2. Having selected the Deploy OVF Template option, VCenter will prompt for the location of the OVA file; this
can be either on a local hard disk, network share, or Internet URL. The location of the OVA file should be
entered or selected.
Figure 4: Location of the OVA file
13
6. Select the resource where you want the deployed template (OVA file) to be run.
Figure 6: Select the resource
14
CloudVision Portal (CVP) Setup
10. Select the storage location where you want the files for the deployed template to be stored.
Figure 8: Select the destination storage
Note:
It is recommended to select Thick provision lazy zeroed under the Select virtual disk format
dropdown menu.
11. Click Next to go to the next task.
12. Setup the networks that the deployed template should use.
Figure 9: Setup the networks
15
14. Review the configuration settings, and click Finish to accept and save the configuration.
Figure 10: Select the Finish button to accept these settings
VCenter begins to deploy the virtual appliance. Once the appliance is deployed, you can configure the
CVP application using either Shell-based Configuration or ISO-based Configuration.
16
CloudVision Portal (CVP) Setup
VMware Snapshots
Within the CloudVision infrastructure, data is constantly being written to Apache hadoop by all nodes. Disk
snapshots used by VMware have no hooks into the hbase quiesce states, meaning a snapshot of a disk state
would almost always be inconsistent and lead to database corruption during a restore process. This results in
a snapshot having no meaningful use as a restore point due to the nature of the database, which is typical for
database application performance using VMware Snapshots (VMware reference).
VMware Snapshots are very I/O intensive, leaving almost no I/O for the virtual machines during the snapshot
process. Impact on resources, such as disk, can lead to hbase and zookeeper failures. These symptoms
are evident in multiple cases where the support team has identified snapshots that were in progress before
failures.
VMware does not recommend using VM Snapshots as backups (https://kb.vmware.com/s/article/1025279),
therefore other backup mechanisms are recommended by Arista as outlined below.
Note: For these reasons, Arista does not support VMware Snapshots on CloudVision virtual
machines.
VMware vMotion
CloudVision supports VMware vMotion under specific configuration and operational criteria as follows:
• The virtual machine disks are shared between the source and target ESXi host
• Latency between ESXi hosts is less than 5ms
• Only one CloudVision node may be vMotioned at a time
Note: CVP 2020.1.0 and future releases support host-to-host vmotion where the storage is shared
between ESXI hosts. Only one host can be in vMotion at a given time.
17
There is a detailed explanation of this deployment model available on the Arista EOS Central site (link), which
would assist with the design and deployment of this HA solution.
3.2.1 Downloading and extracting the CVP KVM tarball (.tgz archive)
The first task in the deployment process involves downloading and extracting the CVP KVM tarball. The
tarball is a .tgz archive that contains:
• The CVP VM
• Disk images for the CVP application
• The files used to configure CVP VM.
You download the tarball to the host server that is configured for KVM. The files contained in the .tgz archive
include:
Filename Description
1 disk1.qcow2 VM disk image for the CVP
application.
2 disk2.qcow2 Data disk image for the CVP
application.
3 cvpTemplate.xml A template for creating the XML
file for libvirt domain specification.
4 generateXmlForKvm.py A script for generating the CVP
VM definition XML based on the
XML template.
5 createNwBridges.py A script for creating the network
interfaces for the CVP VM.
Complete the following steps to download and extract the CVP VM .tgz archive:
1. Go to the Arista software downloads webpage and download the CVP VM tarball (cvp-<version>-
kvm.tgz) to the host server set up for KVM.
2. Extract the tarball (cvp-<version>-kvm.tgz).
The following example shows extracting the CVP KVM .tgz archive.
18
CloudVision Portal (CVP) Setup
disk2.qcow2
generateXmlForKvm.py
3. (Optional) Use the brctl show command to verify that the bridges were successfully created.
4. (Optional) Use the ip address show command to verify that the IP addresses have been allocated. In
this example the one IP address for the br1 bridge.
The following output is an example of verifying bridge creation and IP address allocation. In this example,
a bridge br1 was created, and one IP address has been allocated for the bridge.
19
3.2.3 Generating the XML file that defines the CVP VM
The third task in deploying CVP for KVM involves generating the XML file that you use to define the CVP VM.
You use generateXmlForKvm.py script and the cvpTemplate.xml file you extracted previously to generate the
XML file you use to define the CVP VM.
The cvpTemplate.xml file is a template that defines wildcard values that are filled by the other parameters
that are specified when you execute the script.
Complete the following steps to generate the XML file:
1. (Optional) Use the python generateXmlForKvm.py -help command to view a list of all the
parameters available in the script.
2. Run the python generateXmlForKvm.py script using the XML template (cvpTemplate.xml) as one
of the inputs.
Generation of XML file used to define CVP VM shows an example of an XML being generated that can
be used to define a CVP VM named cvpTest. The generated XML file is named qemuout.xml.
Figure 12: Generation of XML file used to define CVP VM
20
CloudVision Portal (CVP) Setup
Defining and Launching the CVP VM shows an example of the use of the commands to define and
launch a CVP VM named cvpTest. The XML file used to define the CVP VM is named qemuout.xml.
Figure 13: Defining and Launching the CVP VM
You can now login as cvpadmin and complete the configuration of the CVP application. See Configuring a
Single-Node CVP Instance using CVP Shell for the steps used to complete the configuration.
Related topics:
• Shell-based Configuration
• ISO-based Configuration
• Deploying CVP OVA on ESX
21
3. Set the CV-CUE Enabled option to Yes.
4. Once the cursor is at the bottom of the configuration wizard, enter a to apply the configuration changes.
22
CloudVision Portal (CVP) Setup
Note: Whether CV-CUE Enabled is set to Yes or No, applying the configuration changes causes
the secondary and tertiary nodes to update their settings based on the primary node. This will start
the CV-CUE service on the primary and secondary nodes.
Common Configuration:
────────────────────────────────────────────
CloudVision Deployment Model [d]efault [w]ifi_analytics: d
23
DNS Server Addresses (IPv4 Only): 172.22.22.40
24
CloudVision Portal (CVP) Setup
Valid config.
[q]uit [p]rint [e]dit [v]erify [s]ave [a]pply [h]elp ve[r]bose
>v
Valid config format.
Applying proposed config for network verification.
saved config to /cvpi/cvp-config.yaml
Running : cvpConfig.py tool...
Stopping: network
Running : /bin/sudo /bin/systemctl stop network
Running : /bin/sudo /bin/systemctl is-active network
Running : /bin/sudo /bin/systemctl is-active network
Starting: network
Running : /bin/sudo /bin/systemctl start network
Warning: External interfaces, ['eth1'], are discovered under /etc/sysconfig/
network-scripts
These interfaces are not managed by CVP.
Please ensure that the configurations for these interfaces are correct.
Otherwise, actions from the CVP shell may fail.
Valid config.
>a
Valid config format.
saved config to /cvpi/cvp-config.yaml
Applying proposed config for network verification.
saved config to /cvpi/cvp-config.yaml
Running : cvpConfig.py tool...
Stopping: network
Running : /bin/sudo /bin/systemctl stop network
Running : /bin/sudo /bin/systemctl is-active network
Running : /bin/sudo /bin/systemctl is-active network
Starting: network
Running : /bin/sudo /bin/systemctl start network
Warning: External interfaces, ['eth1'], are discovered under /etc/sysconfig/
network-scripts
These interfaces are not managed by CVP.
Please ensure that the configurations for these interfaces are correct.
Otherwise, actions from the CVP shell may fail.
Valid config.
Running : cvpConfig.py tool...
Stopping: network
Running : /bin/sudo /bin/systemctl stop network
Running : /bin/sudo /bin/systemctl is-active network
Running : /bin/sudo /bin/systemctl is-active network
Starting: network
Running : /bin/sudo /bin/systemctl start network
Running : /bin/sudo /bin/systemctl is-active etcd
Internal error, unknown service 'etcd'
Running : /bin/sudo /bin/systemctl stop kube-cluster.path on 172.30.41.190
Running : /bin/sudo /bin/systemctl stop kube-cluster.service on
172.30.41.190
Checking if interface flannelbr0 is present
25
Run cmd: sudo -u cvp -- ssh 172.30.41.190 /usr/sbin/ip link show flannelbr0
0.18
Checking if interface flannel.1 is present
Run cmd: sudo -u cvp -- ssh 172.30.41.190 /usr/sbin/ip link show flannel.1
0.17
Running : /bin/sudo /bin/systemctl is-active zookeeper
Starting: systemd services
Running : cvpConfig.py tool...
Stopping: cvpi
Running : /bin/sudo /bin/systemctl stop cvpi
Running : /bin/sudo /bin/systemctl is-active cvpi
Running : /bin/sudo /bin/systemctl is-active cvpi
Stopping: cvpi-config
Running : /bin/sudo /bin/systemctl stop cvpi-config
Running : /bin/sudo /bin/systemctl is-active cvpi-config
Running : /bin/sudo /bin/systemctl is-active cvpi-config
Stopping: zookeeper
Running : /bin/sudo /bin/systemctl stop zookeeper
Running : /bin/sudo /bin/systemctl is-active zookeeper
Running : /bin/sudo /bin/systemctl is-active zookeeper
Stopping: cvpi-check
Running : /bin/sudo /bin/systemctl stop cvpi-check
Running : /bin/sudo /bin/systemctl is-active cvpi-check
Running : /bin/sudo /bin/systemctl is-active cvpi-check
Stopping: ntpd
Running : /bin/sudo /bin/systemctl stop ntpd
Running : /bin/sudo /bin/systemctl is-active ntpd
Running : /bin/sudo /bin/systemctl is-active ntpd
Starting: ntpd
Running : /bin/sudo /bin/systemctl start ntpd
Starting: cvpi-check
Running : /bin/sudo /bin/systemctl start cvpi-check
Starting: zookeeper
Running : /bin/sudo /bin/systemctl start zookeeper
Starting: cvpi-config
Running : /bin/sudo /bin/systemctl start cvpi-config
Starting: cvpi
Running : /bin/sudo /bin/systemctl start cvpi
Running : /bin/sudo /bin/systemctl start cvpi-watchdog.timer
Running : /bin/sudo /bin/systemctl enable cert-rotate.timer
Running : /bin/sudo /bin/systemctl start cert-rotate.timer
Running : /bin/sudo /bin/systemctl enable ambassador-cert-rotate.timer
Running : /bin/sudo /bin/systemctl start ambassador-cert-rotate.timer
Running : /bin/sudo /bin/systemctl enable ssl-cert-expiry.timer
Running : /bin/sudo /bin/systemctl start ssl-cert-expiry.timer
Running : /bin/sudo /bin/systemctl enable docker containerd
Running : /bin/sudo /bin/systemctl start docker containerd
Running : /bin/sudo /bin/systemctl enable kube-cluster.path on
172.30.41.190
Running : /bin/sudo /bin/systemctl start kube-cluster.path on 172.30.41.190
Waiting for all components to start. This may take few minutes.
Still waiting for flannel coredns descheduler fluent-bit mutating-webhook-
server mutating-webhook clickhouse namenode datanode nfs3 ... (total 217)
Still waiting for clickhouse hbasemaster regionserver hbase kafka dispatcher
apiserver nginx-init-V1 nginx-app apiserver-www ... (total 203)
Still waiting for dispatcher apiserver nginx-init-V1 nginx-app apiserver-www
local-provider radius-provider tacacs-provider aaa disk-usage-monitor ...
(total 198)
Still waiting for nginx-app apiserver-www local-provider radius-provid
er tacacs-provider aaa disk-usage-monitor ingest elasticsearch-server
elasticsearch-exporter ... (total 195)
Still waiting for nginx-app apiserver-www local-provider radius-provider
tacacs-provider aaa ingest elasticsearch-server elasticsearch-exporter
elasticsearch-dispatcher ... (total 194)
26
CloudVision Portal (CVP) Setup
27
• Root password (*)
• Default route (*)
• DNS (*)
• NTP (*)
• Telemetry Ingest Key
• Cluster interface name (*)
• Device interface name (*)
• Hostname (*)
• IP address (*)
• Netmask (*)
• Number of static routes
• Route for each static route
• Interface for static route
• TACACS server ip address
• TACACS server key/port
• IP address of primary (*) for secondary/tertiary only
Note: If there are separate cluster and device interfaces (the interfaces have different IP
addresses), make sure that you enter the hostname of the cluster interface. If the cluster and
device interface are the same (for example, they are eth0), make sure you enter the IP address of
eth0 for the hostname.
Note: The following is an example of the configuration information that requires verification. A
CVP cluster MUST be able to resolve A and PTR records in DNS for each cluster node. This
forward and reverse DNS lookup MUST be verified. Perform nslookup to verify the forward and
reverse lookup. This is an important step to CVP forming the cluster during initial setup. For more
information on how to use nslookup, refer to Connectivity Requirements.
Note: NTP synchronization is important for CVP cluster nodes, and for EOS streaming telemetry
to CVP. NTP service verified using a tool such as ntpdate. For more information on how to use
ntpdate, refer to Connectivity Requirements.
5. At the following prompt, type v to verify the configuration.
If the configuration is valid, the system shows a Valid config status message.
6. Type a to apply the configuration for the primary node and wait for the line Waiting for other nodes to send
their hostname and ip with spinning wheel.
The system automatically saves the configuration as a YAML document and shows the configuration
settings in pane 1 of the shell.)
7. When Waiting for other nodes to send their hostname and ip line is printed by the
primary node, go to the shell for the secondary node, and specify the configuration settings for the
secondary node (All options with an asterisk (*) are required, including primary node IP address)
8. At the following prompt, type v to verify the configuration.
If the configuration is valid, the system shows a Valid config status message.
9. Type a to apply the configuration for the primary node and wait for the line Waiting for other nodes to send
their hostname and IP.
The system automatically saves the configuration as a YAML document and displays the configuration
settings in pane 1 of the shell.
10. At the Primary's root password prompt, type (enter) the password for the primary node, and then press
Enter.
28
CloudVision Portal (CVP) Setup
11. Go to the shell for the tertiary node, and specify the configuration settings for the node. (All options with
an asterisk (*) are required.)
12. At the following prompt, type v to verify the configuration.
If the configuration is valid, the system shows a Valid config status message.
13. At the Primary IP prompt, type the IP address of the primary node.
14. At the Primarys root password prompt, press Enter.
The system automatically completes the CVP installation for all nodes (this is done by the primary node).
A message appears indicating that the other nodes are waiting for the primary node to complete the CVP
installation.
When the CVP installation is successfully completed for a particular node, a message appears in the
appropriate pane to indicate the installation was successful. (This message is repeated in each pane.)
15. Go to shell for the primary node, and type q to quit the installation.
16. At the cvp login prompt, login as root.
17. At the [root@cvplogin]# prompt, switch to the cvp user account by typing su cvp, and then press Enter.
18. Run the cvpi status all command, and press Enter.
The system automatically checks the status of the installation for each node and provides status
information in each pane for CVP. The information shown includes some of the configuration settings for
each node.
For more information about the process, see:
• Rules for the Number and Type of Nodes
• The Basic Steps in the Process
• The CVP Shell
• Examples
29
Note: To ensure the environment variables are generated, only apply configuration when the
following messages are displayed.
Only apply the secondary and tertiary nodes if the primary has finished its configuration and
displays: "Waiting for other nodes to send their hostname and ip."
The secondary and tertiary nodes will display the following message: "Please wait for primary to
show "Waiting for other nodes to send their hostname and ip" before applying."
If the configuration is applied before the message is displayed, the environment variables will not
be generated.
4. The previous step (verifying and applying the configuration) is repeated for the tertiary node. (The
automated processing of data described for the secondary node is also repeated for the tertiary node.)
Once the configuration for all nodes has been applied (steps 1 through 4 above), the system automatically
attempts to complete the CVP installation for all nodes (this is done by the primary node). A message
appears indicating that the other nodes are waiting for the primary node to complete the CVP installation.
5. You quit the installation, then login as root and check the status of CVP.
The system automatically checks the status and provides status information in each pane for the CVP
service.
3.4.2.4 Examples
30
CloudVision Portal (CVP) Setup
The following examples show the commands used to configure (set up) the primary, secondary, and tertiary
nodes, and apply the configurations to the nodes. Examples are also included of the system output shown as
CVP completes the installation for each of the nodes.
• Primary Node Configuration
• Secondary Node Configuration
• Tertiary Node Configuration
• Verifying the Primary Node Configuration and Applying it to the Node
• Verifying the Tertiary Node Configurations and Applying them to the Nodes
• Waiting for the Primary Node Installation to Finish
• Waiting for the Secondary and Tertiary Node Installation to Finish
Enter the configuration for CloudVision Portal and apply it when done.
Entries marked with '*' are required.
common configuration:
dns: 172.22.22.40, 172.22.22.10
DNS domains: sjc.aristanetworks.com, ire.aristanetworks.com
ntp: ntp.aristanetworks.com
Telemetry Ingest Key: arista
CV-CUE Enabled: no
CV-CUE HA cluster IP:
Cluster Interface name: eth0
Device Interface name: eth0
node configuration:
*hostname (fqdn): cvp57.sjc.aristanetworks.com
*default route: 172.31.0.1
Number of Static Routes:
TACACS server ip address:
*IP address of eth0: 172.31.0.186
*Netmask of eth0: 255.255.0.0
[q]uit [p]rint [e]dit [v]erify [s]ave [a]pply [h]elp ve[r]bose
>
31
Only apply the secondary and tertiary nodes if the primary has finished its configuration and displays:
"Waiting for other nodes to send their hostname and ip."
The secondary and tertiary nodes will display the following message: "Please wait for primary to show
"Waiting for other nodes to send their hostname and ip" before applying." S
If the configuration is applied before the message is displayed, the environment variables will not be
generated.
Enter the configuration for CloudVision Portal and apply it when done.
Entries marked with '*' are required.
common configuration:
dns: 172.22.22.40, 172.22.22.10
DNS domains: sjc.aristanetworks.com, ire.aristanetworks.com
ntp: ntp.aristanetworks.com
Telemetry Ingest Key: arista
CV-CUE Enabled: no
CV-CUE HA cluster IP:
Cluster Interface name: eth0
Device Interface name: eth0
*IP address of primary: 172.31.0.186
node configuration:
*hostname (fqdn): cvp65.sjc.aristanetworks.com
*default route: 172.31.0.1
Number of Static Routes:
TACACS server ip address:
*IP address of eth0: 172.31.0.153
*Netmask of eth0: 255.255.0.0
>
32
CloudVision Portal (CVP) Setup
If the configuration is applied before the message is displayed, the environment variables will not be
generated.
Enter the configuration for CloudVision Portal and apply it when done.
Entries marked with '*' are required.
common configuration:
dns: 172.22.22.40, 172.22.22.10
DNS domains: sjc.aristanetworks.com, ire.aristanetworks.com
ntp: ntp.aristanetworks.com
Telemetry Ingest Key: arista
Cluster Interface name: eth0
Device Interface name: eth0
*IP address of primary: 172.31.0.186
node configuration:
hostname (fqdn): cvp84.sjc.aristanetworks.com
*default route: 172.31.0.1
Number of Static Routes:
TACACS server ip address:
*IP address of eth0: 172.31.0.213
*Netmask of eth0: 255.255.0.0
[q]uit [p]rint [e]dit [v]erify [s]ave [a]pply [h]elp ve[r]bose
>
3.4.2.4.4 Verifying the Primary Node Configuration and Applying it to the Node
This example shows the commands used to verify the configuration of the primary node and apply the
configuration to the node.
33
[ 8624.027029] vmxnet3 0000:0b:00.0 eth0: intr type 3, mode 0, 9
vectors allocated
[ 8624.030254] vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps
[ 8624.032643] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[ 8624.238995] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 8638.294690] vmxnet3 0000:13:00.0 eth1: intr type 3, mode 0, 9
vectors allocated
[ 8638.297973] vmxnet3 0000:13:00.0 eth1: NIC Link is Up 10000 Mbps
[ 8638.300454] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[ 8638.302186] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[ 8638.489266] warning: `/bin/ping' has both setuid-root and effective
capabilities. Therefore not raising all capabilities.
Warning: External interfaces, ['eth1'], are discovered under /etc/
sysconfig/network-scripts
These interfaces are not managed by CVP.
Please ensure that the configurations for these interfaces are
correct.
Otherwise, actions from the CVP shell may fail.
Valid config.
[q]uit [p]rint [e]dit [v]erify [s]ave [a]pply [h]elp ve[r]bose
>
3.4.2.4.5 Verifying the Tertiary Node Configurations and Applying them to the Nodes
This example shows the commands used to verify the configurations of the tertiary nodes and apply the
configurations to the nodes.
34
CloudVision Portal (CVP) Setup
Valid config.
[q]uit [p]rint [e]dit [v]erify [s]ave [a]pply [h]elp ve[r]bose
>
Valid config.
Running : cvpConfig.py tool...
[15324.884887] vmxnet3 0000:0b:00.0 eth0: intr type 3, mode 0, 9 vectors
allocated
[15324.889169] vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps
[15324.893217] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[15324.981682] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
35
[15339.240237] vmxnet3 0000:13:00.0 eth1: intr type 3, mode 0, 9 vectors
allocated
[15339.243999] vmxnet3 0000:13:00.0 eth1: NIC Link is Up 10000 Mbps
[15339.247119] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[15339.249370] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Stopping: network
Running : /bin/sudo /sbin/service network stop
Running : /bin/sudo /bin/systemctl is-active network
Starting: network
Running : /bin/sudo /bin/systemctl start network.service
[15340.946583] vmxnet3 0000:0b:00.0 eth0: intr type 3, mode 0, 9 vectors
allocated
[15340.950891] vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps
[15340.953786] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[15341.251648] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[15355.225649] vmxnet3 0000:13:00.0 eth1: intr type 3, mode 0, 9 vectors
allocated
[15355.229400] vmxnet3 0000:13:00.0 eth1: NIC Link is Up 10000 Mbps
[15355.232674] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[15355.234725] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Waiting for other nodes to send their hostname and ip
\
• Waiting for the primary node installation to finish
36
CloudVision Portal (CVP) Setup
37
Stopping wifimanager
Running : su - cvp -c "cvpi stop wifimanager"
Stopping aware
Running : su - cvp -c "cvpi stop aware"
Disabling wifimanager
Running : su - cvp -c "cvpi disable wifimanager"
Disabling aware
Running 1 su - cvp -c "cvpi disable aware"
3.4.2.4.7 Waiting for the Secondary and Tertiary Node Installation to Finish
This example shows the system output displayed as CVP completes the installation for the secondary and
tertiary nodes.
Valid config.
Running : cvpConfig.py tool...
[15549.664989] vmxnet3 0000:0b:00.0 eth0: intr type 3, mode 0, 9
vectors allocated
[15549.667899] vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps
[15549.669783] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
[15550.046552] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
38
CloudVision Portal (CVP) Setup
39
Stopping: cvpi-check
Running : /bin/sudo /sbin/service cvpi-check stop
Running : /bin/sudo /bin/systemctl is-active cvpi-check
Stopping: ntpd
Running : /bin/sudo /sbin/service ntpd stop
Running : /bin/sudo /bin/systemctl is-active ntpd
Starting: ntpd
Running : /bin/sudo /bin/systemctl start ntpd.service
Starting: cvpi-check
Running : /bin/sudo /bin/systemctl start cvpi-check.service
Starting: zookeeper
Running : /bin/sudo /bin/systemctl start zookeeper.service
Running : /bin/sudo /bin/systemctl enable docker
Running : /bin/sudo /bin/systemctl start docker
Running : /bin/sudo /bin/systemctl enable kube-cluster.path
Running : /bin/sudo /bin/systemctl start kube-cluster.path
Running : /bin/sudo /bin/systemctl enable zookeeper
Running : /bin/sudo /bin/systemctl enable cvpi
Waiting for primary to finish configuring cvp.
-
Please wait for primary to complete cvp installation.
[q]uit [p]rint [e]dit [v]erify [s]ave [a]pply [h]elp ve[r]bose
>
Related concepts
Getting Started (CVP)
The login screen is displayed when you first connect to the application using a web browser.
40
CloudVision Portal (CVP) Setup
>v
Incomplete config - Missing
secondary:
- default route
tertiary:
- default route
41
3.5.2.3 Example of Primary Node Reconfiguration
Valid config.
[q]uit [p]rint [e]dit [v]erify [s]ave [a]pply [h]elp ve[r]bose
>a
Valid config format.
saved config to /cvpi/cvp-config.yaml
Using existing settings for new proposed network verification.
Warning: External interfaces, ['eth1'], are discovered under /etc/sysconfig/
network-scripts
These interfaces are not managed by CVP.
Please ensure that the configurations for these interfaces are correct.
Otherwise, actions from the CVP shell may fail.
Valid config.
Are you sure you want to replace config and restart? yes/no: no
3.5.2.4 Procedure
To change an existing multi-node configuration, do the following:
1. Follow the same steps you use for an initial multi-node, shell-based install (see Configuring Multi-node
CVP Instances Using the CVP Shell).
42
CloudVision Portal (CVP) Setup
2. When prompted with the message Are you sure you want to replace config and restart? yes/no: enter
yes, and then press Enter. (Make sure there are no configuration errors.)
Note: You will also be prompted for primary node ip address and root passwords during
reconfiguration.
Related concepts
Getting Started (CVP)
The login screen is displayed when you first connect to the application using a web browser.
>cat multinode.yaml
version: 2
common:
aeris_ingest_key: magickey
cluster_interface: eth0
default_route: 172.31.0.1
mode: multinode
device_interface: eth0
dns:
- 172.22.22.40
ntp:
- ntp.aristanetworks.com
node1:
hostname: cvp6.sjc.aristanetworks.com
interfaces:
eth0:
43
ip_address: 172.31.3.236
netmask: 255.255.0.0
vmname: cvp6
node2:
vmname: cvp9
hostname : cvp9.sjc.aristanetworks.com
interfaces:
eth0:
ip_address: 172.31.3.239
netmask: 255.255.0.0
eth1:
ip_address: 10.0.0.2
netmask: 255.255.255.0
node3:
vmname: cvp10
hostname: cvp10.sjc.aristanetworks.com
interfaces:
eth0:
ip_address: 172.31.3.240
netmask: 255.255.0.0
eth1:
ip_address: 10.0.0.3
netmask: 255.255.255.0
...<edit multinode.yaml>...
44
CloudVision Portal (CVP) Setup
Note: The script has to be run on one machine only. This generates three ISO images which
contains the same ssh keys, thus allowing the nodes to send files without a password. If
the script is run individually on each node, it result in images containing different ssh keys
and the deployment process fails, until the user manually adds the ssh keys in ~/.ssh/
authorized_keys.
On all hosts:
1. Create the folder where the ISO will be stored.
mkdir -p /data/ISO
2. Create the folder where the VM will be stored. (If this procedure is used to re-install a CVP cluster on CVA
appliances then make sure to remove old files from the /data/cvp folder)
mkdir -p /data/cvp
cd /data/cvp
3. Download the CVP image you want to deploy.
wget http://dist/release/cvp/2018.2.5/final/cvp-2018.2.5-kvm.tgz
4. Unarchive it.
wget http://dist/release/cvp/2018.2.5/final/cvp-tools-2018.2.5.tgz
6. Unarchive it.
On the primary:
45
1. Modify the multinode.yaml file extracted from cvp-tools. It should look something like:
common:
cluster_interface: eth0
device_interface: eth0
dns:
- 172.22.22.10
ntp:
- 172.22.22.50
node1:
default_route: 172.28.160.1
hostname: cvp-applicance-1.sjc.aristanetworks.com
interfaces:
eth0:
ip_address: 172.28.161.168
netmask: 255.255.252.0
vmname: cvp-appliance-1
node2:
default_route: 172.28.160.1
hostname: cvp-applicance-2.sjc.aristanetworks.com
interfaces:
eth0:
ip_address: 172.28.161.169
netmask: 255.255.252.0
vmname: cvp-appliance-2
node3:
default_route: 172.28.160.1
hostname: cvp-applicance-3.sjc.aristanetworks.com
interfaces:
eth0:
ip_address: 172.28.161.170
netmask: 255.255.252.0
vmname: cvp-appliance-3
version: 2
Note: The example above is from CVP 2018.2.5, more recent versions might have different key
value pairs so it is always best to log into an existing VM and check /cvpi/cvp-config.yaml.
2. Use the geniso.py script extracted from CVP-tools to generate the images for ISO based installation and
feed the yaml file into it:
mv node1-cvp-appliance-1.iso /data/ISO
scp node2-cvp-appliance-2.iso [email protected]://data/ISO/
scp node3-cvp-appliance-3.iso [email protected]://data/ISO/
4. On each node generate the xml file for KVM.
46
CloudVision Portal (CVP) Setup
Note: The above will generate the VM specs with 8 CPU and 22GB of RAM, for production use
please refer to our Release Notes.
To use both bridges (devicebr and clusterbr) the command would look like this:
The VM will be rebooted and configured automatically, so you just have to login and wait until the
components come up
cvp-applicance-1 login:
CentOS Linux 7 (Core)
Kernel 3.10.0-957.1.3.el7.x86_64 on an x86_64
cvp-applicance-1 login:
CentOS Linux 7 (Core)
Kernel 3.10.0-957.1.3.el7.x86_64 on an x86_64
47
c[cvp@cvp-applicance-1 root]$ cvpi status all
48
CloudVision Portal (CVP) Setup
49
2. Under the Cluster Management pane, enable Device authentication via certificates using the toggle
button.
Figure 15: Enable Device Authentication via Certificates
50
CloudVision Portal (CVP) Setup
The following procedure will enable certificate-based authentication for TerminAttr when there are devices
already devices provisioned.
51
1. Select Devices and the Device Registration tab. Within Device Onboarding select Onboard
Provisioned EOS Devices.
Figure 17: Devices - Device Registration
2. If you have a large list, the Auth Type column can be sorted by selecting the column header.
3. Select all the devices with“Auth Type as Ingest Key and then select Register n devices.
4. The Auth Type of the device will change to Certificates.
5. The device needs to be reconciled because it is out of compliance. Go to Provisioning and select
Network Provisioning. A topographical view of your device will be displayed.
6. Select the device that is out of compliance (yellow in color). Click on Manage and then Configlet.
7. Select SYS_TelemetryBuilderV4 and then click Generate to generate the configuration. When complete
click Validate. ( If VRF is used on the management interface then select VRF before generating the
configuration ).
8. Click Save. The configuration is applied and the device will be compliant now.
52
CloudVision Portal (CVP) Setup
2. Select Onboard Devices from the Add Device drop-down menu at the upper right corner of the
Inventory screen.
The system displays the Onboard Devices pop-up window.
3. Click the Existing Device Registration tab at the lower end of the Onboard Devices pop-up window.
Figure 19: Existing Device Registration Tab
Note: To view all devices, disable the Show only inactive devices option using the toggle button.
53
Perform the following steps to re-ZTP devices:
1. In CloudVision portal, click the Devices tab.
The system displays the Inventory screen.
2. Select Re-ZTP Devices from the Add Device drop-down menu at the upper right corner of the Inventory
screen.
The system displays the Re-ZTP Devices pop-up window.
Figure 20: Re-ZTP Devices Pop-Up Window
Note: To view all devices, disable the Show only inactive devices option using the toggle button.
node1:
default_route: 172.XX.XX.X
hostname: dummy.comNAT
interfaces:
eth0:
ip_address: 172.XX.XX.XXX
netmask: 255.XX.XX.XX
interfaces/eth0/nat_ip_address: 172.XX.XX.X (Public NAT IP)
node2:
default_route: 172.XX.XX.X
hostname: dummy.com
interfaces:
54
CloudVision Portal (CVP) Setup
eth0:
ip_address: 172.XX.XX.XXX
netmask: 255.XX.XX.XX
interfaces/eth0/nat_ip_address: 172.XX.XX.X
node3:
default_route: 172.XX.XX.X
hostname: dummy.com
interfaces:
eth0:
ip_address: 172.XX.XX.XXX
netmask: 255.XX.XX.XX
interfaces/eth0/nat_ip_address: 172.XX.XX.X
Common Configuration:
────────────────────────────────────────────
CloudVision Deployment Model [d]efault [w]ifi_analytics: d
DNS Server Addresses (IPv4 Only): 172.22.22.40
DNS Domain Search List: sjc.aristanetworks.com, ire.aristanetworks.com
Number of NTP Servers: 1
NTP Server Address (IPv4 or FQDN) #1: ntp.aristanetworks.com
Cluster Interface Name: eth0
Device Interface Name: eth0
CloudVision WiFi Enabled: no
*Enter a private IP range for the internal cluster network (overlay):
10.42.0.0/16
*FIPS mode: no
Node Configuration:
─────────────────────────────────────────────
*Hostname (FQDN): cvp80.sjc.aristanetworks.com
*IP Address of eth0: 172.31.0.168
*Netmask of eth0: 255.255.0.0
NAT IP Address of eth0:
*Default Gateway: 172.31.0.1
DNS Domain Search List:
Number of NTP Servers:
Number of static Routes:
TACACS Server IP Address:
55
Singlenode Configuration Menu
56
Chapter 4
CloudVision as-a-Service
CloudVision as-a-Service is an Arista-managed, multi-tenant cloud service deployed in tier one public cloud
providers. CloudVision as-a-Service features include secure state-streaming and analytics on top of an Arista
managed multi-tenant scale-out architecture. Customers are assigned to a unique organization (tenant)
in a specific region. All devices and users of that customer are part of this organization. Organizations are
isolated from each other and a user in one organization cannot access any data from other organizations.
Authentication is tied to the customer’s AAA provider. CloudVision as-a-Service provides device provisioning
workflows and state streaming.
Sections in this chapter include:
• Prerequisites
• Onboarding Procedures
• AAA Providers
4.1 Prerequisites
Verify the following requirements before installing CloudVision as-a-Service.
• Software Requirements
• Connectivity Requirements
• Authentication Requirements
Note: If this is unsuccessful please check your DNS server configuration. If no DNS servers are
available, add the ip name-server configuration as follows:
switch# bash
57
[admin@switch]$ curl apiserver.arista.io:443
curl: (52) Empty reply from server
switch# bash
[admin@switch]$ sudo ip netns exec ns-MGMT curl apiserver.arista.io:443
58
CloudVision as-a-Service
2. Navigate to Access Control and then Providers. To add a new authentication provider, click the 'Add
Provider' button.
Figure 22: Add Provider
59
3. Select a provider that your organization uses.
Figure 23: Shared Provider
Note that currently Google and Microsoft are supported as a Shared Providers. Shared Providers use an
Arista-provided set of credentials so no other information is required from the customer for the onboarding.
Other providers are currently supported as non-shared providers. Additional required form fields will
appear upon selecting these providers. These fields will need to be filled out with credentials specific to
your account with that provider.
Figure 24: Non-shared Provider
60
CloudVision as-a-Service
4. Saving the provider will send a registration request to the CloudVision Service backend along with the
related information.
5. Once the authentication provider is set up, make sure to add the admin email address and verify the login
process before the Invitation URL expires. To add a user account navigate to Users and then the Add
User screen.
Figure 25: Add User
1. To onboard the devices navigate to Devices and then Inventory and then Add Devices and then
Onboard Devices.
Figure 26: Onboarding Devices
2. Details on how to create a token, and using that token to onboard the devices are listed under the
Onboard Devices. Please follow the directions to create a token and onboard your devices to CloudVision
Service.
61
Note: You can use the same token to onboard multiple devices. CloudVision Service will use the
device serial number to identify a device.
Figure 27: Onboarding Devices
62
CloudVision as-a-Service
3. Once you successfully onboard the devices you should be able to see them under the Devices tab.
Figure 28: Device Inventory Screen
63
4. Click on the wrench icon (#) to provision the device. This will take you to the device-specific page. Select
the Device Overview tab and then select Provision Device to provision the device in CloudVision
Service.
Figure 29: Device Overview
Note: Prior to Provision Device make sure the user account exists in the EOS device. For
example:
Assuming [email protected] is the email address used for OAuth authentication you need to have
john.smith as a user (for Arista Demo you will need to use
[email protected]):
sw(config)#username john.smith privilege 15 <nopassword/secret>
If you have TACACS+ configured for authentication, in order for CloudVision as-a-Service to properly
provision the device, the exact user account should already exist in the TACACS+ Server.
If you have a Radius server for EOS authentication, you need to add the --disableaaa argument into
the TerminaAttr config.
For additional information on migrating an EOS device with a TACACS+/Radius authentication to the
CloudVision Service, please refer to Authentication Prerequisites.
64
CloudVision as-a-Service
4.3.1 Requirements
Pre-requisites:
• The device must have internet access.
• To create the OAuth or SAML provider, you must be registered with and have access to the Service
Provider (SP) credentials.
Perform the following steps to create and edit SAML Providers:
65
1. Click on the gear icon.
Figure 31: General Settings Screen
2. On the General Settings page, under Features, enable SAML Providers (Beta) using the toggle button.
66
CloudVision as-a-Service
2. Select the required OAuth provider from the Provider drop-down menu.
Figure 33: Add OAuth Provider Screen to Configure a Provider
3. In the Endpoint field, type the provider URL where the Client ID and Client Secret are used to authorize
the client.
4. In the Client ID field, type the unique public identifier the provider assigns to the client at the time of
registration.
5. In the Client Secret field, type the unique private identifier the provider assigns to the client at the time of
registration.
6. Click Add.
The system registers the new OAuth provider and lists it in the OAuth providers table.
67
• You can use the Custom SAML option if your provider is not listed under the Provider drop-down menu.
Perform the following steps to add an SAML provider:
1. Click the + Add SAML Provider tab.
The system opens the Add SAML Provider window.
Figure 34: Add SAML Provider Screen
2. Select the required SAML provider from the Provider drop-down menu.
Figure 35: Add SAML Provider Screen to Configure a Provider
3. In the Identity Provider Issuer field, type the Issuer or Entity ID.
Note: An Issuer or Entity ID is a URL that uniquely identifies a SAML identity provider.
68
CloudVision as-a-Service
4. In the Identity Provider Metadata URL field, type the URL to fetch identity provider metadata.
5. In the Email Attribute Name field, type the attribute name for the email ID in SAML.
6. In the Authorization Request Binding field, select the protocol binding used for the SAML authentication
request to the identity provider.
7. Click Add.
The system registers the new SAML provider and lists it in the SAML providers table.
69
The system opens the Confirm screen.
Figure 37: Remove OAuth Provider(s) Confirm Screen
70
CloudVision as-a-Service
71
To add launchpad as a shared provider for CVaas deployments, request the list of users to be created in
launchpad by emailing to wifi-cloudops-tickets@
Note:
• For cv-dev and cv-play, use the following information to configure Launchpad in Cloudvision:
Provider: launchpad Identity Provider Issuer: https://mojoonedemo.airtightnw.com/
idp/shibboleth Identity Provider Metadata URL: https://
mojoonedemo.airtightnw.com/idp/shibboleth Email Attribute Name: User.email
Authorization Request Binding: HTTP-Redirect SAML protocol binding
• For cv-staging and production, use the following information to configure Launchpad in Cloudvision:
Provider: launchpad Identity Provider Issuer: https://login.mojonetworks.com/idp/
shibboleth Identity Provider Metadata URL: https://login.wifi.arista.com/casui/
idp-metadata.xml Email Attribute Name: User.email Authorization Request Binding: HTTP-
Redirect SAML protocol binding
2. Email the metadata obtained in Step 1 to wifi-cloudops-tickets@ requesting to create the first user account
in Launchpad and to get Launchpad configured with the SAML metadata to trust this CloudVision cluster.
Note: Other accounts for this customer/org can be created by the first account created for this org
by the cloudops team.
3. Get the IdentityProvider Issuer URL, Identity Provider Metadata URL and the Email attribute name from
Launchpad.
72
CloudVision as-a-Service
6. In the Identity Provider Issuer field, type the Issuer or Entity ID.
Note: An Issuer or Entity ID is a URL that uniquely identifies a SAML identity provider.
7. In the Identity Provider Metadata URL field, type the URL to fetch identity provider metadata.
8. In the Email Attribute Name field, type the attribute name for the email ID in SAML.
9. In the Authorization Request Binding field, select the protocol binding used for the SAML authentication
request to the identity provider.
10. Click Add.
11. Under Access Control in the left pane, click Users.
The system opens the Users screen.
Figure 41: Users Screen
73
The system opens the Add User screen.
Figure 42: Add User Screen
74
Chapter 5
1. To access the login page, point your browser to the CloudVision Portal (http://HOSTNAME or https://
HOSTNAME).The system opens the CVP login page.
Figure 43: CVP Login Page
75
2. Enter login credentials in the CVP login section.
Figure 44: Login Section
Note:
The username and passwords required will depend on the authentication method and accounts
previously set up. Login using the username and password created when CVP was installed. If
you chose the local authentication and authorization options, login initially using cvpadmin for the
username and password.
3. Click Login. The system opens the CVP home page.
76
Getting Started (CVP)
5.3 Omnibox
The omnibox performs a search and displays results from all sections in CloudVision. You must select a result
for navigating to the corresponding CloudVision section.
Click the search icon at the upper-right corner of the CVP screen to access the omnibox.
Figure 46: Omnibox
Note:
• You can refine search results by adding more keywords to the query.
• Omnibox hotkeys are Command # + K in Mac; and Ctrl + K in Windows.
The Omnibox provides a variety of results classifying them by the section it belongs to, an associated device
or section name, and sometimes a description that explains what kind of result it is.The list of potential search
result modules are:
• Devices
• Matching devices
• Sections of matching devices
• Events
• Matching event types
• If a keyword matches a device hostname, it provides an option to view all events on that device
• Matching event configurations
• Metrics
• Matching metrics
• Matching metric dashboards
• Topology - Matching devices in topology
• Provisioning - Matching Provisioning sections
• Settings - Matching Settings sections
Note: Multiple results from the same section are grouped together.
77
CloudVision displays matching results from Devices and Topology sections when a search is
performed using the JPE keyword.
Figure 47: Omnibox Search with JPE Keyword
Note:
• If you select athens from the Devices section, CloudVision displays the Device
Overview screen of athens.
• If you select athens from the Topology section, CloudVision displays athens
node in the Topology view.
If a search is performed with the athens keyword, CloudVision displays results from Devices,
Event, Metrics, and Topology sections.
Figure 48: Omnibox Search with Athens Keyword
78
Getting Started (CVP)
Note: Note Any image you select for either the Home screen background or dashboard logo must not
exceed 200 KB for each image. In addition, the images must JPG, PNG, or GIF.
Complete the following steps to customize the visible and dashboard logo:
1. Login to CVP.
2. Click the gear icon at the upper right corner of the page.
79
5.5 Accessing CV-CUE
You can access the CV-CUE service via either the CLI Access or the UI Access.
CLI Access
To log in to the wifimanager container using CLI, run the /cvpi/apps/wifimanager/bin/
wifimanager.sh cli 2>/dev/null command on the primary or the secondary node.
Figure 50: CLI Access
You can now run wifimanager commands. See the Wifimanager CLI Commands for a list of wifimanager CLI
commands and their descriptions.
UI Access
The URL to access the wifimanager UI is http(s)://<CVP-IP>/wifi/wifimanager is where CVP-IP refers to the
actual CloudVision Portal (CVP) IP/domain name.
The URL to access the cognitive Wifi UI is http(s)://<CVP-IP>/wifi/aware where CVP-IP refers to either the
actual CVP IP or domain name.
For example, if the IP address of CVP is 10.12.3.4, then the URL to access the wifimanager UI is
https://10.2.3.4/wifi.wifimanager and the cognitive Wifi UI is https:////10.12.3.4/wifi/aware.
80
Getting Started (CVP)
You can access CV-CUE UI by clicking on the WiFi tab in the CVP UI, or you can access it directly using the
URLs of either wifimanager UI or Wifi UI.
Figure 51: UI Access
When you access the UI for the first time, you need to apply the CV-CUE service license.
Figure 52: CV-CUE Service License
Note:
• For the license file, please write an email to [email protected]
• Use the ifconfig command on the CV root shell to get the eth0 MAC addresses of the primary
and secondary CV servers (you need not access the wifimanager CLI for this). You need to include
both these MAC addresses when you email support to request a license. One license is generated
for the two (primary and secondary) MAC addresses.
Once you apply the license, you must log in to the CV-CUE UI using the following default credentials:
Username: admin
Password: admin
You can then change the password and add other users.
Note: You can now also connect Arista access points to the server.
81
5.6 Key CV-CUE Operations and Directories
CV-CUE is containerized as a service on CV. See the Wifimanager CLI Commands section for a list of CV-
CUE CLI commands and their descriptions.
For details on how to configure, monitor, and troubleshoot WiFi using CV-CUE, see the CV-CUE User Guide
on the Arista CV-CUE Support Portal at https://www.arista.com/support/customer-portal. You can access the
portal from the WiFi - Support Portal tile on your dashboard. For details and credentials to access the portal,
contact [email protected].
CVPI Commands for CV-CUE
The following table lists the operations you can perform on wifimanager and the corresponding CVPI
commands used.
Note: The backup restore fails if the user running the restore command does not have access to the
path where the backup file is stored.
The restart command restarts the wifimanager service, whereas the reset command resets wifimanager
settings and data to factory default values. The debug command generates a debug bundle containing log
files and configuration files that can be used to troubleshoot issues.
The following table lists the operations you can perform on aware and the corresponding CVPI commands
used.
82
Getting Started (CVP)
Directory on CV Contains
/data/wifimanager/log/glog Application logs
/data/wifimanager/data/conf Configuration files
/data/wifimanager/data/data System data files/directories
/data/wifimanager/data/instances Customer data files/directories
/data/wifimanager/data/pgsql_data Postgres data
/data/wifimanager/log/slog System logs
/data/wifimanager/backup On-demand backups
83
Table 9: Wifimanager CLI Commands
Command Description
db backup Backs up the database to the specified remote
server.
84
Getting Started (CVP)
Command Description
get msmcontroller certreq Generates a Certificate Signing Request for HP
Adapter.
get access address Shows access IP Address/Hostname of this server.
get server config Displays complete server configuration.
get server cert Uploads server certificate to a remote host.
get server check Runs a server consistency check and displays
results. If any fatal item fails, a failure result is
recorded.
get server tag Displays the custom tag set by the user.
get serverid Displays the server ID.
get sensor debug logs Uploads AP debug logs to the specified upload URL.
get sensor list Displays the list of APs.
get sensor reset button Displays the state of the AP's pinhole reset button.
get status Displays the status of server processes.
get ssh Displays the SSH server status.
get version Displays the version and build of all the server
components.
get packet capture Captures packets on Public and HA/Management
network interface(s).
set scan config Modify AP background scanning parameters.
set openconfig mode Enable/disable OpenConfig mode.
set cert Installs a signed SSL certificate.
set cors Enables or disables CORS support.
set dbserver Starts/stops database server.
set db backup info Sets scheduled DB backup information.
set device capability Updates the device capability information.
set device upgrade bundles Upload/delete device upgrade bundles in the local
repository.
set device repo config Sets configuration (Mode and Hostnames) for
repositories that store upgrade bundles and device
capability information.
set erase Configures the backspace key.
set ha dead time Changes the Dead Time of High Availability (HA)
service.
set ha link timeout Sets the timeout in seconds to signal Data Sync Link
failure.
set idle timeout <timeout-in-minutes> Sets the idle timeout for the command shell. A value
of 0 disables the idle timeout.
85
Command Description
set lldp Sets LLDP configuration.
set remote logging Sets remote logging configuration.
set log config Sets the configuration of the logger.
set log level gui Sets log levels of GUI modules.
set log level aruba Sets the log level of Aruba Mobility Controller
Adapter Module.
set log level wlc Sets log level of Cisco WLC Adapter Module.
set log level msmcontroller Sets log level of HP MSM Controller Integration.
set msmcontroller cert Installs a signed SSL certificate for HP Adapter.
set loginid case sensitivity Toggles login ID case sensitivity.
set server Starts/stops application server.
set server discovery Changes server discovery settings on given AP(s).
set server tag Configure a custom tag for files generated by this
server.
set access address Sets access IP Address/Hostname of the server.
set serverid Sets server ID.
set ssh Starts/stops SSH access to the server.
set communication passphrase Sets the communication passphrase used for
AP-server authentication and to encrypt the
communication between APs and the server.
set communication key Sets the communication key used for AP-server
authentication and to encrypt the communication
between APs and the server.
set communication key default Resets the communication key used for AP-server
authentication and to encrypt the communication
between APs and the server.
set sensor legacy authentication This allows/disallows APs running on versions lower
than 6.2 to connect to the server.
set sensor reset button Sets the state of the AP's pinhole reset button (select
AP models only).
set smart device oui Add, remove MAC OUI's for specific smart device
type IDs.
set webserver Starts/stops web server.
set wlc mapper Manage Cisco WLC Custom Mapper file.
exit Exits the config shell session.
ping <Hostname/IP Address> Ping a host.
reset locked gui Unlocks Graphical User Interface (GUI) account for
the "admin" user.
86
Getting Started (CVP)
Command Description
reset password gui Sets Graphical User Interface (GUI) password for the
"admin" user to factory default value.
upload db backup Uploads successful DB backup(s) to an external
server.
application signature update Updates app visibility signature.
87
88
Chapter 6
General Customizations
CloudVision Portal (CVP) enables you to customize the grid columns of CVP graphical user interface (GUI)
pages. You can customize the grid columns of all CVP GUI grids.
CVP also enables you to easily paginate (navigate) through the pages of the grids of the GUI. The pagination
controls are available in all grids.
• Column Customization
• Pagination Controls
89
2. Click the column customization icon.
Figure 54: Column Settings dialog
3. Use the arrow icons to rearrange the columns of the grid as needed.
4. Once you are done rearranging the grid columns, click OK to save the changes.
90
Chapter 7
Device Management
CloudVision Portal (CVP) provides a powerful, event-driven, streaming analytics platform that enables you to
monitor the state of all devices currently managed by CVP.
By configuring devices to stream device-state data to CVP, you can manage all of the devices in your current
inventory of devices to gain valuable insights into the state of your devices, including real-time updates about
changes in device state.
The device inventory is comprised of all devices that you have imported into CVP. After a device is imported
into CVP, it can be configured and monitored using the various CVP modules.
• Requirements
• Limitations
• Features
• Telemetry Platform Components
• Supplementary Services: Splunk
• Architecture
• Accessing the Telemetry Browser Screen
• Viewing Devices
• Viewing Device Details
• Viewing Connected Endpoints
• Connectivity Monitor and CloudTracer
• Managing Tags
• Accessing Dashboards
• Topology View
• Accessing Events
• Events App
• Troubleshooting
7.1 Requirements
Make sure you review the software and hardware requirements for deploying and using the Telemetry
platform before you begin deploying the platform.
System Requirements
Note: If you upgraded from a previous version of CVP, you must verify that all of the CVP node VMs
on which you want to enable Telemetry have the required resources to use Telemetry. See Resource
Checks for details on how to check CVP node VM resources and perform any modifications needed to
increase the current CVP node VM resources.
Verify the clocks on the switches are synchronized to an NTP server.
• If a clock on a device is not synched to an NTP server on the switches and the clock difference between
CVP and the device is larger than 300 seconds, onboarding will fail.
• Streaming latency which must be less than 500ms as per our system requirements. Streaming latency
is the time difference between the TerminAttr agent receiving the state change on a device and the
notification being processed by the CloudVision Analytics backend after storage in NetDB. Without NTP
the relative streaming latency between devices streaming to CVP can exceed limits and state changes
91
happening on different switches may appear to be incorrectly ordered within CVP. For more information
refer to: https://www.arista.com/en/cg-cv/cv-system-requirements
7.2 Limitations
The following table lists the current limitations of the Telemetry platform. Review the limitations to ensure you
do not inadvertently attempt configurations that exceed the limitations.
Limitations
Maximum number of devices This represents the total number of devices currently configured to stream
Telemetry data.
Device-state data Streaming of LANZ data is not enabled by default. You must enable it on
devices.
Secret configuration If "enable secret" or "enable password" is configured, the secret must be
the same as the Cloudvision user's password.
7.3 Features
The list the current supported and unsupported Telemetry platform features are provided in the following
topics:
• Supported Features
• Unsupported Features
92
Device Management
Supported Feature
Real-time monitoring of The Telemetry platform provides interfaces for viewing real-time updates
devices about changes in device state as well as events. You can also view
trends in device-state metrics and queries of historical device-state data.
Instant state change updates Changes in the state of a device are instantly streamed to CVP.
Full state change data All changes in device-state are captured and streamed to CVP for
viewing. Types of device-state include:
• All SysDB state (except state under /Sysdb/cell/*).
• All SMASH tables.
• Process and kernel data (for example, CPU and memory usage).
• System log messages
Analytics engine The Telemetry platform provides a robust analytics engine that
aggregates the streamed device-state data across devices, monitors
device state, and generates events to indicate issues. It also normalizes
data so it is easier for other applications to use.
Telemetry events Device-state and system environment event types are streamed to CVP:
• Informational (updates about changes in device state).
• Warning (for example, unsupported EOS version on a device)
• Errors (data discards or input errors on interfaces, and more).
• Critical (system environment issues such as overheating).
High performance database The Telemetry platform utilizes a high performance Hbase database to
store device-state data, including events. Data is stored in compressed
format without a loss of resolution.
• The data storage capacity is approximately:
• 43200 records worth of raw data per path
• 5 days of 10 second aggregated data
• 4 weeks of 60 second aggregated data
• 3 months worth of 15 minute aggregated data
Disk space protection To prevent telemetry data from consuming too much disk space in the
CVP cluster, the Telemetry platform automatically blocks the ingest
port for the entire cluster if disk usage exceeds 85% on any node of the
cluster.
Once the ingest port is blocked, it remains blocked until disk usage
drops below 80% on all nodes in the cluster.
Data management To ensure that the most relevant data is given priority, the Telemetry
platform provides automated data management, including:
• Maximum time limit on stored device-state data (1 month).
• Current and the most recent device-state updates are always stored
(given priority over older state updates).
Periodic clean-up jobs are executed weekly (Saturday at 11:00 P.M.).
Old device-state data is purged.
93
Command support Several commands are provided for:
• Checking status of the Telemetry components.
• Enabling and disabling of Telemetry platform components.
• Starting and stopping Telemetry components.
• Viewing the debug log for Telemetry components.
• Troubleshooting the Telemetry components, including checking to
see that logs are being created for the component.
• To display granular information on disk space usage of telemetry data
and delete telemetry data selectively.
Unsupported Feature
Streamed device-state data Flexroute is not supported.
94
Device Management
• Provides CloudVision Analytics Engine Viewer, which is referred to as the Aeris Browser. You use it to
directly view device-state data received from devices that have been configured to stream device-state
data. The Aeris Browser enables you to view raw device-state data.
• REST and Websocket based APIs are available to programatically get data from the CloudVision Analytics
Engine. Contact your Arista Sales Engineer for more information.
7.5.1 Requirement
EOS 4.15.2 or later is required.
7.5.2 Installation
You can access the Splunk Telemetry App directly from CVP by completing the following steps. From your
browser.
1. Copy the RPM to and install it on the switch.
show extensions
Name Version/Release Status RPMs
2. Install the Splunk Universal Forwarder RPM on EOS.
show extensions
Name Version/Release Status RPMs
------------------------------------------ ------------------------- ---
AristaAppForSplunk-<version>.swix <version>/1.fc14 A, I 3
splunkforwarder-6.1.4-233537.i386.rpm 6.1.4/233537 A, I 1
EosSdk-1.7.0-4.15.2F.i686.rpm 1.7.0/2692966.gaevanseoss A, I 1
A: available | NA: not available | I: installed | NI: not installed | F: f
95
7.5.3 Quick Start
1. Use the configuration to enable forwarding to the Splunk indexer. This assumes that a username/
password and eAPI have been configured for the AristaAppForSplunk extension previously.
daemon SplunkForwarder
exec /usr/bin/SplunkAgent
no shutdown
2. Configure and turn on the desired indexes for data collection. The credentials must match 'username
<name> secret <passphrase>' configured on the switch.
7.6 Architecture
Telemetry Platform Architecture shows the architecture of the Telemetry platform, including all of the platform
components and the data path of the streamed device-state data.
Figure 56: Telemetry Platform Architecture
96
Device Management
3. Click the gear icon at the upper right corner of the screen.
Figure 58: Gear Icon
97
The system opens the Telemetry Browser screen that allows exploring the raw data stored in CVP
telemetry.
Figure 59: CloudVision Telemetry Browser Screen
98
Device Management
99
The screen refreshes to show the device-state data streamed from the device to CVP.
Figure 62: Viewing Devices Details (Single Device)
Device details include the information on overview, system, compliance, environment, switching, routing, and
interfaces.
Related topics:
• Device Overview
• System Information
• Compliance
• Environment Details
• Switching Information
• Routing Information
• Status of Interfaces
100
Device Management
The Historical Comparison sub-section provides the information on EOS version, 5-minute CPU load average,
MLAG status, IPv4 attached routes, IPV4 learned routes, configured BGP, IPv6 attached routes, IPV6 learned
routes, and MAC addresses learned.
101
The system displays only Device Overview and System information for third-party devices.
Figure 64: Third-Party Device Overview
102
Device Management
Sub-sections provide information on processes, storage, log messages, hardware capacity, running config,
and snapshots.
7.9.3 Compliance
The Compliance section provides information on vulnerability to known bugs.
Figure 66: Compliance Section
103
7.9.4 Environment Details
The Environment section provides statistics on temperature, fan speeds, and output power.
Figure 67: Environment Section
Sub-sections provide switching data like ARP table, NDP table, bridging capability, MAC address table,
MLAG, and VXLAN.
104
Device Management
Sub-sections provide routing data like IPv4 and IPv6 routing tables, routing table changes, multicast data like
sparse mode PIM and static, and BGP information.
105
Accessing 802.1X Metrics
To access 802.1X Metrics From the Inventory screen in the Devices tab, select a device. In the scrolling
menu on the left side of the page, select 801.X. The 801.X Metrics page is displayed.
Figure 70: 802.1X Metrics
The graphs display the total number of interfaces and the status of each.
The table lists all of the endpoints with additional information. The columns show the following:
• Identity: the MAC address of the endpoint. The username, if provided, is displayed in parenthesis.
• IP Address: the IP address of the endpoint.
• Interface: which interface the endpoint is on. Selecting the interface will display a table showing all of the
endpoints on that specific interface.
• Host Mode: the host mode of the endpoint (Single-Host, Multi-Host, Multi-Host Authenticated) with an
optional Mac-Based VLAN Assignment. Place the cursor over Mac-Based VLAN Assignment to display the
full name.
• Auth Status: the authentication status of the endpoint.
• Auth Mode: how the endpoint is authenticated.
• VLAN: the VLAN the endpoint is on.
• VLAN Type: the type of VLAN being used.
106
Device Management
You can drill down into the details of global and device specific network flow activities using bar charts,
stacked time series graphs, and tables of usage statistics. See Accessing the Global Traffic Flows Screen
and Accessing the Device Specific Traffic Flows Screen.
Note: You can drill down the details of device specific network flow activities using heatmaps also.
To view the data on traffic flows, you must enable traffic flow tracking in devices to get data. See Enabling
Traffic Flow Tracking.
107
Run the following commands to enable sFlow sampling on a device:
sFlow monitors a random sample of packets at the configured sampling rate. Reported bandwidth and packet
measurements are scaled up using the sampling rate to provide estimates of actual bandwidth usage and
packet counts.
108
Device Management
Note: This screen may present multiple values reported by different devices for the same flow or flow
category.
Use the following search filters for customised presentation of the traffic flows data:
• Host filters
• Source Hosts
• Show autocomplete field - Provide hostnames, IP addresses, or subnets in CIDR notation of the
source host that needs to be displayed
• Hide autocomplete field - Provide hostnames, IP addresses, or subnets in CIDR notation of the
source host that needs to be concealed
• Destination Hosts
• Show autocomplete field - Provide hostnames, IP addresses, or subnets in CIDR notation of the
destination host that needs to be displayed
• Hide autocomplete field - Provide hostnames, IP addresses, or subnets in CIDR notation of the
destination host that needs to be concealed
• Bidirectional checkbox - Select the checkbox to view the traffic flows between specified hosts.
Note: When you select the Bidirectional checkbox, the Source Hosts and Destination Hosts
fields change to Hosts and To/From Hosts.
• Port filters
• Source Ports autocomplete field - Provide port numbers or service names of the source port
• Destination Ports autocomplete field - Provide port numbers or service names of the destination port
• Show/Hide dropdown - Select either Show or Hide to view or conceal the traffic flow data of specified
source and destination ports respectively.
• Bidirectional checkbox - Select the checkbox to view the traffic flows between specified ports.
Note: When you select the Bidirectional checkbox, the Source Ports and Destination Ports
fields change to Ports and To/From Ports.
• Protocol filter - Provide IP protocols of the required traffic flow data in the autocomplete field.
Select either Show or Hide to view or conceal the traffic flow data of specified protocols respectively.
• More filters
• Locality - Select Public and Private checkboxes to view traffic flows of corresponding networks
• Fragmentation checkbox - Selecting the checkbox displays only flows with fragmented packets
• Clear all filters - Clears all specified filters
• Top dropdown menu - As per your selection, the top n items are displayed for each break down.
• by dropdown menu - Select the required method to measure traffic.
The global traffic flows dashboard provides the following display types for analyzing the flow data in different
ways:
• Charts View
• Summary Table View
• Flow Records View
Note:
• Click the View in Topology link to see the data from the perspective of the topology flows view.
• The refresh icon provides countdown in seconds for refreshing the traffic flow data. The data in live
mode gets updated every 30 seconds.
109
Charts View
The Charts display option presents the summary of global traffic flows in charts. The traffic flow data is
arranged based on the breakdown selected from the dropdown list. See the figure below.
Figure 73: Global Traffic Flow Summary in Charts
Bar charts represent the device specific traffic flows over the selected time period. The bar length represents
the traffic flow of a device with highest usage.
Note:
• Click on a bar in the bar chart in the stacked graph to set the clicked-on item as a filter wherever it
is possible. For example, hosts or ports of source and destination.
• Hover the cursor on the dot in a bar to find the observing device.
110
Device Management
The traffic flow data is grouped based on the selected breakdowns. If multiple options are selected in the
Group By field, the table displays a summary of usage statistics that is broken down according to the
selected criteria. The summary can be sorted by bytes, packets, or flows in descending order.
Note: Click on a device name to view the traffic flows for the respective device.
Note: Click on a device name to view the traffic flows for the respective device.
111
This screen displays the summary of flows, bandwidth, packets, active hosts, and sampling rate. Provide the
following details to view custom information of traffic flows:
• Inband Telemetry Data
• Flow tracking (sFlow or IPFIX)
• Inband telemetry
• Host filters
• Source Hosts
• Show autocomplete field - Provide hostnames, IP addresses, or subnets in CIDR notation of the
source host that needs to be displayed
• Hide autocomplete field - Provide hostnames, IP addresses, or subnets in CIDR notation of the
source host that needs to be concealed
• Destination Hosts
• Show autocomplete field - Provide hostnames, IP addresses, or subnets in CIDR notation of the
destination host that needs to be displayed
• Hide autocomplete field - Provide hostnames, IP addresses, or subnets in CIDR notation of the
destination host that needs to be concealed
• Port filters
• Source Ports autocomplete field - Provide port numbers or service names of the source port
• Destination Ports autocomplete field - Provide port numbers or service names of the destination port
• Show/Hide dropdown - Select either Show or Hide to view or conceal the traffic flow data of specified
source and destination ports respectively.
• Protocol filter - Provide IP protocols of the required traffic flow data in the autocomplete field.
Select either Show or Hide to view or conceal the traffic flow data of specified protocols respectively
• Interface filters
• Show autocomplete field - Select the interfaces of which the traffic flow needs to be displayed
• Hide autocomplete field - Select the interfaces of which the traffic flow needs to be concealed
• More filters
• Locality - Select Public and Private checkboxes to view traffic flows of corresponding networks
• Fragmentation checkbox - Selecting the checkbox displays only flows with fragmented packets
• Clear all filters - Clears all specified filters
• Top dropdown menu - As per your selection, the top n items are displayed for each break down.
• by dropdown menu - Select the required method to measure traffic.
The device specific traffic flows dashboard provides the following display types for analyzing the flow data in
different ways:
• Figure 78: Device Specific Traffic Flow Summary in Charts
• Heatmap View
• Summary Table View
• Flow Records View
Note:
• Click the View in Topology link to see the data from the perspective of the topology flows view.
• The refresh icon provides countdown in seconds for refreshing the traffic flow data. The data in live
mode gets updated every 30 seconds.
112
Device Management
Charts View
The Charts display option presents the summary of device specific traffic flows in charts. The traffic flow data
is arranged based on the breakdown selected from the dropdown list. See the figure below.
Figure 77: Device Specific Traffic Flow Summary in Charts
113
Charts View
The Charts display option presents the summary of device specific traffic flows in charts. The traffic flow data
is arranged based on the breakdown selected from the dropdown list. See the figure below.
Figure 78: Device Specific Traffic Flow Summary in Charts
114
Device Management
Heatmap View
The Heatmap display option presents the summary of device specific traffic flows in a heatmap. See the
figure below.
Figure 79: Device Specific Traffic Flow Summary in Heatmap
The heatmap plots two breakdowns against each other. For example, the user selects top 20 source hosts
vs. top 20 destination hosts. The system displays the top 20 destination hosts that communicated with any of
those top 20 source hosts.
Each pairing of source host and destination host is shown as a cell in the grid. Cells are displayed in various
shades of green based on their usage. The higher the usage, the darker the green shade.
Note: The system displays an empty cell if there is no usage.
115
The traffic flow data is grouped based on the selected breakdowns. If multiple options are selected in the
Group By field, the table displays a summary of usage statistics that is broken down according to the
selected criteria. The summary can be sorted by bytes, packets, or flows in descending order.
Note: Filters and fields related to packet fragmentation, tunnelling, and user identity are not available
for inband telemetry data.
116
Device Management
Enter the search information and press Enter to view the search results.
Figure 83: Address Search Results
117
7.9.10 Status of Interfaces
The Interfaces section provides status of Ethernet interfaces, VLAN interfaces, IP interfaces, and port
channels.
Figure 84: Interfaces Section
Sub-sections provide detailed information on Ethernet interfaces, routed ports, port channels, traffic counters,
LLDP neighbors, and Power Over Ethernet.
118
Device Management
In CloudVision, the Power Over Ethernet screen provides a summary of all interfaces along with information
on each interface.
Figure 85: Power Over Ethernet Screen
119
7.10 Viewing Connected Endpoints
Connected Endpoints are identified by DHCP collector. By default, the DHCP collector is enabled in
TerminAttr. You must enable it on VLANs where you would like to identify connected endpoints. See Enabling
DHCP Collector.
Once it is enabled, the Connected Endpoints summary screen provides information on all connected
endpoints. See Accessing the Connected Endpoints Summary Screen.
Note: To reset to all endpoints, click the refresh icon (next to selected endpoint in breadcrumbs) that
is displayed after selecting a particular endpoint.
This screen provides the following functionalities:
• Classification drop-down menu - Click and select the required classification.
• Endpoints Counts by Type pane - This pane provides a summary of the selected classification through the
following groups:
120
Device Management
• Legend - Hover the cursor on Legend to view color classifications used for various categories.
• Sunburst graph - Provides the summarized view of all endpoints in various categories, hierarchies, and
counts.
Note: Clicking on a category sets the appropriate category as the new active classification.
• All selected classification Endpoints pane - This pane provides the specified information of each endpoint
in selected classification under the following categories:
• Device Type
• Device Name
• MAC Address
• Last Seen
121
7.11.1 Accessing the Connectivity Monitor and CloudTracer Screen
To view data metrics, open to the Connectivity Monitor and CloudTracer by selecting the Devices tab and
selcting Connectivity Monitor from the left-side menu bar.
Figure 87: CloudTracer Screen
122
Device Management
Note: Metrics are streamed whenever data is gathered on EOS switches. The default interval to
query metrics data is five seconds.
• Click on a metric to view detailed information.
• Double click on a metric to view a graph of a selected metric. From the graph you can select to view:
• Metric History
• Data Table
• Data Paths
• Statistics
• Related Metrics
123
Viewing Connectivity Monitor with VRF Support
To view Connectivity Monitor with VRF Support, select Connectivity Monitor from the Devices tab.
Figure 89: Viewing VRF Results in Connectivity Monitor
You can select individual host/VRF/interface combinations to view latency/jitter etc. information for just the
selection. Selection options include:
• Selecting the checkbox next to a VRF name will select all source interfaces on the VRF.
• Selecting the checkbox next to the name of the host will select all VRFs and all source interfaces within
each VRF.
• Selecting the checkbox next to the device name will select every host configuration available on the
device.
124
Device Management
125
The system opens the Assigned tags pane. See the figure below.
Figure 91: Create and Assign
Note:
• Optionally, use the search bar for searching required devices.
• To manage interface tags, click the Interface tab and perform required tasks.
3. Type the new tag in the search field under User Tags > Add or create tags > Type the label then the
value separated by a colon.
Note:
• Tags should be of the form <label>: <value>. For example, owner: Bill.
• The System Tags pane displays tags that are automatically created and assigned by the
system.
4. Click Create and Assign.
Note: If you had selected multiple devices, the new tag will be simultaneously assigned to all
selected devices.
The new tag is displayed under Manage assigned tags.
126
Device Management
The system displays all tags assiged to the selected device(s) under Manage assigned tags.
Figure 92: Associated with Selected Devices
Note:
• Optionally, use the search bar for searching required devices or tags.
• Hovering the cursor on the number next to the tag name, lists the devices to which the current
tag is assigned.
3. Click the tag that needs to be removed.
The system displays plus and minus signs when the tag is clicked.
4. Click the minus sign to delete the selected tag.
5. Click Save Edits.
127
Note: Hovering the cursor on the number next to the tag name, lists the devices to which the
current tag is assigned. See the figure below.
Figure 93: Tag Assigned to Multiple Devices
128
Device Management
The system pops up plus and minus signs beneath the tag. See the figure below.
Figure 94: Remove Tag from Multiple Devices
3. Click the minus sign to remove the tag from all selected devices.
4. Click Save edits.
129
7.12.5 Deleting Unassigned Tags
Perform the following steps to manage unassigned tags:
1. On CVP, click Provisioning > Tags.
The system displays the tags screen.
2. On the main pane of the tags screen, click Edit tags.
The system lists all unassigned tags.
3. Click the tag that needs to be removed.
The clicked tag turns to red.
Figure 95: Delete Unassigned Tags
4. Click Delete.
The system deletes the tag from CVP.
130
Device Management
Each dashboard on the grid provides the dashboard name, description, and an approximate layout of the
dashboard. To perform actions on any of the dashboards, select one or more dashboards by selecting the
checkbox associated with each dashboard.
131
Figure 97: Dashboard Actions Menu
Creating a Dashboard
Perform the following steps to create a dashboard.
1. Select New Dashboard from the Dashboard Manager page.
2. Select one or more widgets to display information.
Figure 98: Dashboard Widgets
3. Select the widget in the main screen to configure and label the widget.
4. Enter a title and description of the new dashboard.
5. Select Save Changes to save the new dashboard.
Editing a Dashboard
Perform the following steps to edit a dashboard. Dashboard widgets can be added, removed, or configured
while in editing mode.
1. Select a dashboard to display from the Dashboard Manager page.
132
Device Management
3. Select a currently displayed widget in the main screen to edit or configure as needed.
4. To add a new widget, select from widgets tab.
5. To change the inputs, select the Inputs tab to configure as needed.
6. Select the pencil icons to edit the dashboard title and description.
7. Select Save Changes to save the changes.
133
7.13.4 Dashboards with Custom Query Language widget
The AQL panel is a dashboard element that allows you to create custom data displays using the CloudVision
Advanced Query Language (AQL). This gives you complete control over what data the panel displays
and how it displays it. You define the inputs and write the AQL query that feeds data to the panel. Further
customization is available through creating a color mapping for the panel’s display, defining units, and decimal
places among other options. You can create custom dashboards with AQL panels that are acutely relevant to
your organization.
There are three elements:
• Inputs: These are used by the AQL query to feed data to the AQL panel AQL
• Panel: This is the display item within your dashboard and which uses the AQL query and any inputs to
render a display AQL
• Panel Visualization: The AQL panel has five ways to display the data fed to it (Table, Single Value, Bar
Graph, Line Graph, and Donut), which each requires that the AQL query be formatted in a particular way.
Each visualization can be further customized to change how it displays its data
The AQL panel is currently in beta and needs to be enabled as a setting. To enable the AQL panel, go to
General Settings and turn on the toggle Beta Widgets under Features.
The Arista Support page titled Dashboards with Custom Query Language widget provides detailed
configuration instructions and a tutorial about CloudVision Advanced Query Language (AQL).
7.14.1 Setup
You can customize the topology by completing the following steps.
1. Click the Topology tab to view your network.
2. To enter layout hints, click on a device in the topology view and then click on the layout tab.
134
Device Management
7.14.2 Overlays
You can superimpose link-level metrics overlay onto the network topology. Use the Layers Panel to view
these overlays and color-codes based on the severity of that metric. Following are the overlays supported in
this release.
The following table lists the Overlays supported in this release.
135
Table 13: Supported Overlays
Overlay Description
Bandwidth Utilization Shows the bitrate as a percentage of the speed of the link. It uses the
maximum bitrate in either direction on the link, averaged out over a one-
minute window. Light green indicates a small percent of the link is being used,
while darker greens indicate higher usage. Beyond 80% utilization, the links
show up in yellow or red.
Traffic Throughput Shows the bitrate of a link as an absolute number. Darker blues indicate
higher utilization.
Error Rates Show if either end of a link is registering input or output errors (for example,
CRC Errors). It uses a one-minute window, and displays severity in
increasingly dark reds.
Discard Rates Indicate that a link is dropping packets, likely due to congestion. Links
discarding more packets in a one-minute window are shown in darker red.
None Turns off all colors.
136
Device Management
1. To move a rack to a different pod use the Pod field. For example, the switch called cv-demo-sw3 is set to
be in a pod 1.
Figure 101: User Layout Hints
137
2. To setup the pod or rack names, apply a layout hint for switch with alternate name or pod hint for the spine
switch to rename the pod. Following example shows the top-of-rack switch cv-demo-sw3 default name
change via the rack layout hint.
Figure 102: Device Details in Layout
138
Device Management
Setting the Node Type layout hint gives the Topology view of the type of device selected. Selecting skip
auto-generating forces the auto tagger to ignore the device and not assign or modify any of the hints.
Figure 103: Changing Node Type
139
• Configuring Status
• Configuring Platforms
• Configuring Receivers
• Configuring Rules
140
Device Management
• The Summary Tables tab displays Most Active Devices and Most Active Event Types in tabular
formats. See the figure below.
Figure 105: Event Summary Screen - Summary Tables
Note: The severity levels include critical, error, warning, and info.
• The Time Range dropdown menu to select the time span of events.
• The Acknowledge button to acknowledges selected events.
• The Un-Acknowledge button to renounce selected events.
• A list of all events with selection checkboxes in a tabular format.
• Click the Export Table to CSV button to download the table in csv format to your local drive.
• Right Pane
• The Reset Filters button to clear all filtering options.
• The Current Time date picker to select the event start date.
• Search field based on Title or Description and dropdown menus based on Event Type, Device,
Acknowlegement State, and Active State.
• Buttons to perform a search based on severity levels (Info, Warning, Error, and Critical)
141
7.15.2 Event Details Screen
An event details screen displays appropriate event details, acknowledges the event, and configures event
generation. To view this screen, click one of the events listed on the Events screen.
Figure 106: Event Details Screen
This screen provides the following information and functionalities in the right pane:
• Left arrow to return to the events summary screen
• Click the Event Generation button to configure generating new events. Refer to Configuring Event
Generations.
• Click the Notifications button to configure notifications. Refer to Configuring Notifications
• Displays the event description
• Time when event details were captured
142
Device Management
• Hover the cursor on the event name. The system displays a popup window with event details.
Figure 107: Event Name Popup Window
143
• Hover the cursor on the event name. The system displays a popup window with device details in that
location.
Figure 109: Location Name Popup Window
144
Device Management
Note: Alternatively, you can go to an event details screen and click Configure Event Generation
to configure rules for generating events.
3. Click the required event in the left pane.
145
4. Click Add Rule in the lower end of right pane. A new Condition pane is displayed on the screen.
Figure 112: Add Rule Pane in Generation Configuration
5. In the Condition pane, click on the search field. The system displays the list of configured devices tags.
Figure 113: List of Configured Device Tags
Note: Alternatively, you can type the required device tag in the search field for a quick search.
146
Device Management
147
Figure 115: Anomaly Event View is a sample event view for one of these events between the device with
hostname `Oslo` and the cloudtracer host endpoint `www.bbc.co.uk`.
Figure 115: Anomaly Event View
Figure 116: Anomaly Event View Overlay explains various stages of this event.
Figure 116: Anomaly Event View Overlay
Prior to this event in Figure 116: Anomaly Event View Overlay, the latency metric (green line in upper graph)
is stable with minimal deviations. The historical bounds (blue shaded region) that determine when the metric
is in a normal state has a small range with both the upper and lower bounds near the historical mean (dark
blue line). The historical bounds are computed by adding and subtracting a fixed multiple of the current
latency standard deviation to the current mean.
The anomaly score starts to increase from zero when the latency value strays outside of the historical
bounds. The latency values that are outside the bounds are highlighted in red. The anomaly score is the total
number of standard deviations outside the historical bounds. The anomaly score is the positive cumulative
sum of the number of standard deviations outside of the historical bounds. For example, if the bounds
are set as 3 standard deviations outside of the mean and we get a value of the latency that is 5 times the
standard deviation away from the mean, the anomaly score will increase by 2. If the next latency value was
1.5 times the standard deviation outside of then mean then we would subtract 1.5 from the anomaly score.
148
Device Management
The anomaly score therefore keeps track of the cumulative deviation of the latency outside of the historical
bounds. It is bounded below by zero.
Figure 117: Anomaly Score Computation provides a detailed explanation on computing the anomaly score.
Figure 117: Anomaly Score Computation
The event is generated when the anomaly score exceeds a threshold for a set period of time.
Note: You can configure the threshold and time duration in the event configuration rules.
The anomaly score starts to decrease when the latency values are inside the historical bounds. The historical
bounds have increased based on recent deviations in latency which makes the system less sensitive than
prior to the event. The event ends when the anomaly score is below the threshold for a set period of time.
149
Figure 118: Decreasing of Anomaly Score provides a detailed explanation of the anomaly score decreasing
when an event ends.
Figure 118: Decreasing of Anomaly Score
At the end of the time range, historical bounds are narrowing as the latency has now returned to a stable
value with minimum deviations. The history needs approximately six hours to have negligible impact on the
statistics and bounds.
This screen also provides the following additional metrics of this event (see Figure 119: CloudTracer Event
Additional View):
• The other CloudTracer metrics are displayed for this device and host pair
• The latency metric between other devices and this host
• The latency metric between this device and other hosts
Figure 119: CloudTracer Event Additional View
150
Device Management
151
A new condition pane is displayed on the screen.
Figure 121: Conditions Pane for the Custom Syslog Event Rule
152
Device Management
• Mnemonic field - CVP creates a single instance event when the log message specified in this field
matches with a device syslog message.
• Log Message field - The log message to match against the device syslog message.
Note: You must mandatorily configure either a syslog ID or a log message.
• Mute Period field - CVP does not create another similar event using this rule on a given device until the
time period specified in this field expires for the ongoing event.
Note: This prevents a large number of events generated for the same device within a short period
of time due to a repetitive syslog message.
• Event Title field - Type the event title.
• Severity From Syslog checkbox - Select the checkbox if you prefer CVP to select the severity of the
generated event to be derived from the syslog message severity.
Note: CVP uses the following syslog message severities to event severities:
• [0, 1, 2] - Critical event
• [3] - Error event
• [4] - Warning event
• [5,6,7,...] - Info event
• Severity dropdown menu - Select the preferred severity of the generated event. Severity is configurable
only when Severity From Syslog checkbox is not selected.
• Event Description field - Provide the event description.
• Ignore subsequent rules for selected devices checkbox - Select the checkbox to suppress generating
events for a specific syslog or override upcoming configurations.
• Move Up / Move Down buttons - Use this button to manage the sequence of configured syslog event
rules.
• Delete button - Click to delete the corresponding rule.
Note: Syslogs with high severities like 0 (Emergency), 1 (Alert), 2 (Critical), and 3 (Error) generate
events by default unless they are ignored by user configured rules.
Provide the following information in specified fields to configure a time period event:
153
• Start Log Message field - CVP starts a time period event when the start log message specified in this
field matches with a device syslog message.
Note: The start log message must be a string without special characters.
• End Log Message field - CVP ends a time period event when the end log message specified in this field
matches with a device syslog message.
Note: The end log message must be a string without special characters.
• Parameter field - Type the variable that must be configured in log messages specified in the Start Log
Message and End Log Message fields.
• Value field - Type a variable for the specified parameter in either a simple string or a regular
expression.
• Add Value - Click to add another variable for the specified parameter.
Ethernet is a parameter with values as Ethernet1 and Ethernet2. See the figure below.
In this case, the specified log messages matches with Ethernet1 and Ethernet2 values for either starting or
ending an event.
Figure 123: Example1 of Parameter Variables
154
Device Management
• Raise Time field - After a start rule matches, the starting of an event is delayed for the duration specified
in this field.
Note: If the end event log message arrives before this delay elapses, the event is not generated.
This option is useful in situations where you wish to generate an event only when a syslog
condition has persisted for at least some set period of time.
• Clear Time field - After an end rule matches, the ending of the ongoing event is delayed for the duration
specified in this field.
Note: If the start event log message arrives before this delay elapses, the event is not ended and
will continue as an active event. This option is useful in situations where you wish to generate a
long single event which may encompass several start/end conditions being met during a set period
of time.
• Event Title field - Type the event title.
• Severity From Syslog checkbox - Select the checkbox if you prefer CVP to select the severity of the
generated event to be derived from the syslog message severity.
Note: CVP uses the following syslog message severities to event severities:
• [0, 1, 2] - Critical event
• [3] - Error event
• [4] - Warning event
• [5,6,7,...] - Info event
• Severity dropdown menu - Select the preferred severity of the generated event. Severity is configurable
only when Severity From Syslog checkbox is not selected.
• Event Description field - Provide the event description.
• Ignore subsequent rules for selected devices checkbox - Select the checkbox to suppress generating
events for a specific syslog or override upcoming configurations.
• Move Up / Move Down buttons - Use this button to manage the sequence of configured syslog event
rules.
• Delete button - Click to delete the corresponding rule.
Note: A configuration change in the current rule ends all ongoing events.
155
The system disables all events of the selected event type.
Figure 125: Disable All Events of the Selected Type
156
Device Management
Note: If you skip steps 5 and 6, the system applies default rules to all device tags except the ones
that are defined in rules 1 and 2.
Figure 126: Disable All Events of the Selected Type with Exception
The system disables all events of the selected type except the ones that are defined in rules 1 and 2.
4. (Optional) Type a note for other users explaining the reason for the acknowledgment.
5. Click Acknowledge n events where n represents the count of selected events.
157
Note: For acknowledged events, the system replaces the Acknowledge button with Un-
Acknowledge button. To undo the acknowledgment activity, Click Un-Acknowledge in the side
panel of the acknowledged event.
2. On the Test Alert Sender pane, provide the required criterion in Severity, Event type, and Device drop-
down menus.
3. If required, click Send Test Notification to verify current configuration.
158
Device Management
2. Configure any of the following platforms through which you prefer to receive notifications from CVP:
• Email
Provide the following information to receive email notifications:
• Type your SMTP servers hostname and port number separated by a colon in the SMTP Host field.
Note: Typically, the port numbers of SMTP and SMTP over TLS are 25 and 587.
• Select the Use TLS for SMTP checkbox if you prefer to encrypt notifications received from and sent
to the SMTP server.
• Type the email address that you prefer to display as a sender in the Email "From" Address field.
Note: We recommend an email address with the domain of your organization.
• Type the username of your SMTP account in the SMTP Username field.
• Type the password of your SMTP account in the SMTP Password field.
• Slack
Create a custom integration through the Incoming WebHooks Slack application and type the Webhook
URL in the Slack Webhook URL field.
• VictorOps
• In your VictorOps settings, add a new alert integration for Prometheus and type the Service API
Key in the VictorOps API Key field.
• If required, type a custom API URL in the VictorOps API URL field.
• PagerDuty
If required, type a custom API URL in the PagerDuty URL field.
• OpsGenie
• Create an API integration for your OpsGenie team and type the API key in the OpsGenie API Key
field.
• If required, type a custom API URL in the OpsGenie API URL field.
• Google Chat
159
In Google Chat the Alerter will send a message containing one or more alerts and related information.
Follow the steps in the Google Chat for Developers Guide to create a webhook, use the webhook URL
to configure the Google Chat platform on CloudVision.
• Microsoft Teams
In MS Teams the Alerter will send a message containing one or more alerts and related information.
Follow the steps in the Microsoft Teams - Create Incoming Webhooks - document to create a webhook,
use the webhook URL to configure the Microsoft Teams platform on CloudVision.
• Zoom
In Zoom the Alerter will send a message containing one or more alerts and related information. Add
webhooks and get configuration information using the guide Using Zoom's Incoming Webhook Chatbot,
once you have the URL and verification token you can enter them into the Zoom platforms settings on
CloudVision.
• Sendgrid
Sendgrid is also available as an alternative to email. On CVaaS, Sendgrid requires no configuration,
while for on-prem installations Sendgrid requires an API key and from address. It uses the same
content templates as Email.
• Syslog
The Alerter will send a syslog message for each CVP event. The syslog facility must be set in
the configuration. The syslog priority is mapped from the CVP severity and this mapping may be
customized in the configuration.
160
Device Management
161
Table 15: Configuration Options
Add VictorOps Configuration • Type a routing key in the Routing Key field.
• If required, select the Send alert when events are resolved
checkbox.
Add PagerDuty Configuration • Type a routing key in the Integration Key field.
• If required, select the Send alert when events are resolved
checkbox.
Add OpsGenie Configuration Select the Send alert when events are resolved checkbox.
Add Slack Configuration • Type a channel in the Channel field.
• If required, select the Send alert when events are resolved
checkbox.
Add Pushover Configuration • Type a recipient's user key in the Recipient User Key field.
• Type a pushover API token in the Application API Token field.
• If required, select the Send alert when events are resolved
checkbox.
Add Webhook Configuration • Type the URL where you prefer to post event alerts in the
Target URL field.
• If required, select the Send alert when events are resolved
checkbox
Note: Click the recycle bin icon at the right end of corresponding fields if you prefer to delete
that configuration. Click Delete Receiver next to Add Configuration if you prefer to delete the
corresponding receiver.
162
Device Management
2. Click Add Rules. A new Rules Conditions pane is displayed on the screen.
Figure 133: Rule Conditions Pane
3. Next to Add Conditions, click Severity, Event Type, Device, and Device Tags to provide the criteria that
are used for monitoring the health of the alerting system.
Note: Click Remove at the end of a field to delete that configuration.
163
Note: Rules are processed sequentially. The default rule is applied only when an event does not
match any other rules. Click Delete rule to delete the corresponding rule. Click Move down in
configured rules to move the corresponding rule down in the priority list.
Event Chart
The default summary view is the Events Chart. This chart displays the number of events that were created
in a time range, broken down by severity. Hovering over a colored section of a bar shows how many events
occurred with that given severity. A bar represents the events that were created within time range for that
164
Device Management
bar. . The amount of time represented by a bar is dependent on the selected time range. Larger time ranges
will group more events into a single bar.
Figure 135: Event Chart Summary
Summary Tables
The Summary Tables tab displays the events of the Events Chart in a table format. Results can be filtered by
severity value, device, or event-type.
Figure 136: Summary Tables
165
is derived from the chosen time range. The range picker has a minimum duration of one hour and a maximum
of one week.
Figure 137: Summary Time Picker
The newest 100 events are initially loaded. Subsequent events are fetched via automatic pagination. The
Ack(Acknowledgement) column only appears if the Show Acknowledged filter toggle is on. This allows other
columns to expand when acknowledgment information is not required.
166
Device Management
Severity
Selecting an event severity will display only the selected severity level.
Event Description
The Event Description filter allows events to be searched by arbitrary text in the event description field.
Event Type
When selected, the Event Types filter presents a list of all available event types. Selecting one or more
options filters the results to events of the selected types.
Device
When Selected, the Device filter presents a list of all streaming devices. Selecting one or more devices will
display events that occurred on the selected devices.
Show Acknowledged
Select Show Acknowledged to view events which have been previously acknowledged.
Resetting Filters
Select the Reset Filters button to place all Event filters to their default values.
7.17 Packaging
The Packaging feature is used to export custom change control actions from one CloudVision cluster and
install them in another. Package IDs and version numbers can be used to update existing packages with
version control.
167
Accessing Packaging
The Packaging feature is available under Settings tab in the navigation bar.
Figure 139: Accessing Packaging
From the Packaging screen, you can create, install, and review packages. There are two main sections when
managing packages: Managed Packages and Created Packages.
Managed Packages have been imported from another CloudVision cluster and installed. Hover over the
package to review the description. The only available function is to unistall the selected package.
Created Packages are editable and available for export to another CloudVision cluster.
Note: Packages can only be edited and exported from,the cluster where they were created.
168
Device Management
5. Click Add Component and use the dropdown to select actions to include in the package. Selected actions
will appear under Contents
Note: Actions may be executed at different speeds. Limit the number of components in a package
to those that are related and likely to change together, such as a pair of actions that run before and
after a process.
6. (Optional) Click Edit below any component name to create a unique Component ID.
7. Click Create Package. The package will appear under Created Packages.
8. Click Export on the package to download the .tar package file.
9. Save the file to the appropriate repository so that it can easily be located for import and installation in
another CloudVision cluster.
169
Note: Check the version number and Package ID before installation to avoid overwriting an
existing package.
Figure 141: Installing Packages
3. Select Upload.
7.18 Troubleshooting
A number of commands are provided with the Telemetry platform that you can use to troubleshoot the
Telemetry platform components. The types of troubleshooting you can perform using the Telemetry platform
commands are:
• General Troubleshooting
• Troubleshooting the NetDB State Streaming Agent
• Checking the Status of the Ingest Port
170
Device Management
switch> enable
switch# config
switch (config)# daemon TerminAttr
switch (config-daemon-TerminAttr)# show active
171
daemon TerminAttr
exec /usr/bin/TerminAttr -ingestgrpcurl=172.28.131.84:9910 -ingestauth=k
ey,ab27cf35f73543d2afe3b4c15c12e6a3 -taillogs
no shutdown
172
Chapter 8
173
4. Click Comparison.
Figure 142: Start page for comparison of devices
For a particular device with two chosen times, select the Two times option.
Figure 143: Comparison of device at two chosen times
Comparing two devices at two chosen times, select the Advanced option:
Figure 144: Comparison of device advanced
174
Device Comparison Application
• Supported Snapshots
175
8.3 Snapshots
On the CloudVision portal, navigate to Devices > Comparison to Snapshots to view the snapshot for the
device.
Figure 147: Comparing snapshots
176
Device Comparison Application
You can compare the status at the current time against the following times:
• 30 minutes
• 1 hour
• 2 hours
• 12 hours and
• 24 hours ago.
Figure 150: Comparing same device for NDP table for different times
177
8.6 MAC Address Table
On the Cloud Vision portal, navigate to Devices > Comparison to MAC AddressTable to view the information
about MAC addresses for the devices. Arista's device comparison platform for MAC Address table compares
data between two devices at the same time and at different time settings.
The components of the comparison are as follows:
• VLAN
• Device's MAC Address
• Type of the VLAN
• Port
• Number of moves on the Port
• Timing for last movement
Figure 151: Comparing MAC Address table for current time for two devices
Figure 152: Comparing MAC Address table for different times for two devices
You can compare the status at the current time against the following times:
• 30 minutes
• 1 hour
• 2 hours
• 12 hours and
• 24 hours ago.
178
Device Comparison Application
179
8.7 VXLAN Table
On the Cloud Vision portal, navigate to Devices > Comparison to VXLAN Table to view the information
about MAC addresses for the devices.
The components of the comparison are as follows:
• VLAN VNIs
• VXLAN MAC Address
Figure 155: Comparing VXLAN table for current time for two devices
Figure 156: Comparing VXLAN table for different times for two devices
You can compare the status at the current time against the following times:
• 30 minutes
• 1 hour
• 2 hours
• 12 hours and
• 24 hours ago.
180
Device Comparison Application
181
8.8 Viewing Device IPv4 Routing Table
From the Comparison screen, you can quickly drill down to view details about IPv4 Routing from different
devices. In tabular view, click the device names to compare the corresponding device details.
Figure 159: Comparing IPv4 routing table for different devices
The screen refreshes to show the status, IP address and functions it does for Nexthop. Status is generally
shown by Static, Martian, Connected, Receive and Receive Broadcast.
Figure 160: Comparing IPv4 Routing table for different times for two devices
You can compare the status at the current time against the following times:
• 30 minutes
• 1 hour
• 2 hours
• 12 hours and
• 24 hours ago.
182
Device Comparison Application
The screen refreshes to show the status, IP address and functions it does for Nexthop. Status is generally
shown by Static, Martian, Connected, Receive and Receive Broadcast.
Figure 163: Comparing IPv6 Routing table for different times for two devices
You can compare the status at the current time against the following times:
• 30 minutes
• 1 hour
• 2 hours
• 12 hours and
• 24 hours ago.
183
Status is shown by added, removed and modified entries.
Figure 164: Comparing same device for different times and status
You can compare the status at the current time against the following times:
• 30 minutes
• 1 hour
• 2 hours
• 12 hours and
184
Device Comparison Application
• 24 hours ago.
Figure 166: Comparing same device for IPv4 Multicast table for different times
185
186
Chapter 9
CloudVision continuously computes image and configuration compliances. If a device is either configuration,
image, or extension non-compliant, CVP automatically generates a non-compliant event on the Compliance
dashboard and flags the device as non-compliant on the Inventory screen.
Note: The event layout displays the running and designed configuration, related information about the
device compliance, and the device bug/security advisory exposure.
A device configuration compliance is triggered in the following circumstances:
• A configlet is assigned to either a device or Container
• Configlet content changes affect all devices to which the configlet has been mapped
• A device restarts streaming after you make the changes mentioned above
• A device is edited
Figure 167: Device Out of Config Compliance Event
Compliance statuses of image and switch configuration are computed when the following entities are edited:
• Running or designed configurations
• Extensions or EOS versions
Note: The compliance status of device and parent container icons update automatically.
187
• EOS image version changes due to an image upgrade or downgrade
Figure 168: Device Out of Image Compliance Event
The Compliance Overview dashboard from the Devices tab presents the number of devices and their
compliance status in the following categories:
• Bug Exposure
• Security Advisories
• Configuration Compliance
• Image Compliance
Sections in this chapter include:
• Device Compliance
• Notifications for Container-level Compliance Checks and Reconciles
• Compliance Dashboard
• Print Compliance Dashboard
• Setup for Automatic Sync of Compliance Bug Database
188
Network Compliance (CVP)
189
9.1.1.2 Representation Under Show All Devices
The image below shows the representation of device compliance status information for devices that are only
visible by accessing Show all devices. The statuses shown are the same as those shown using device icons
in the topology view.
Figure 170: Show All Devices display of device compliance status
190
Network Compliance (CVP)
Icon Description
Gray
The compliance status is normal (no compliance alert).
See Representation Under Show All Devices for how this status is shown when using the Show All Devices
option.
191
• A device within the container has a configuration mismatch, and there is a task associated with the device
to resolve the mismatch.
Figure 173: Container showing alert color
Icon Description
Red
The device is unreachable (CVP cannot connect to the device).
Like device compliance status alerts, CVP also uses color codes for container icons to indicate that a device
within the container is unreachable. If a device within a container has an access alert, the container inherits
the alert color of the device (red).
This feature enables you to easily see if a device within a container has an alert, even if the device is not
visible. It also prevents you from having to open a container to see if a device within it has an alert.
Note: Containers only inherit the alert color of a device if the device is directly underneath the
container in the hierarchy. If the device is not directly underneath the container in the hierarchy, the
container does not show the alert notification color of the device.
192
Network Compliance (CVP)
Note: To view notifications for the previous CVP session, click the bell icon and choose View
History.
For information on container-level compliance checks and reconciles, see:
• Device Compliance Checks
193
9.3 Compliance Dashboard
When you edit running and designed configurations of provisioned devices, CloudVision automatically
computes the difference and updates the compliance status in response to changes in the network.
The Compliance dashboard displays the real-time summary view of image, configuration, and security
compliances for all managed devices. You can filter devices using All Devices, EOS Devices, and Wireless/
AP Devices dropdown options available next to breadcrumbs. See the figure below:
Figure 176: Compliance Dashboard - Managed Devices
The assessment uses bug details published on https://www.arista.com and leverages the network wide
database to compute the exposure based on hardware and software versions. The CVP 2020.2.0 release
comes packaged with a file named AlertBase.json which contains information about software defects and
security vulnerabilities.
The compliance dashboard table consists of Bugs and CVEs, Device Configuration, and End Of Life tabs.
Note: You can filter bug alerts using All Alerts, Unacknowleged Alerts, and Acknowledged Alerts
dropdown options available next to the tab title.
The donuts display the count of devices exposed to bugs and security and advisories where green signifies
secured devices and red signifies exposed devices. Hover the cursor on the donut ring to view the count of
devices exposed, total count of devices, and the percentile of exposed devices.
194
Network Compliance (CVP)
• Type: Identifies the type of bug. Security vulnerabilities are tracked by type CVE. Software defects are
tracked by type Bug. This field can be used to filter on either of these types.
• Summary: Provides a description of the software defect/security vulnerability.
• Severity: Calls out the severity of the software defect.
• Device Count: Lists the number of devices impacted by the tracked issue.
Note:
• If a device is acknowledged in tracked issues, this count is decreased by one.
• If the bug is acknowledged, CVP displays zero.
• Unacknowledged actions undo these results.
• Exposed Devices: Lists the names of devices impacted by the software defect or security vulnerability.
Note:
• If a device is acknowledged in tracked issues, CVP does not list its name.
• If a bug is acknowledged, CVP displays None.
• Unacknowledged actions undo these results.
• CVP generates events for CVE bugs that are exposed on device(s). These events last until the
bug either is resolved on the device or is acknowledged.
Click the listed bug alert to view more details from the corresponding Bug Alert - Identifier ID pop-window.
See the figure below.
Figure 178: Bug Alert Pop-Up Window
You can fix listed bugs through one of the following ways:
• Upgrading your device to versions mentioned under Version(s) Fixed
195
• Installing the hotfix available at https://www.arista.com/en/support/advisories-notices as either a part of an
image bundle or directly using the EOS CLI.
Note: You can search for hotfixes via identifier IDs.
Click the Acknowledge Bug on n Device(s) and Close button to hide the corresponding bug from bug info
in selected devices.
Note:
• n presents the count of selected devices.
• (Optional) Provide reasons for acknowledgement in the text box.
• To undo the acknowledgement, reopen the bug to select acknowledged devices and click the
Unacknowledge Bug on n Device(s) and Close button.
To acknowledge a bug for all current and future devices, select Always acknowledge instances of this
alert checkbox and click Save and Close button.
Note:
• (Optional) Provide reasons for acknowledgement in the text box.
• To undo the acknowledgement, reopen the bug, unselect the checkbox, and click Save and Close.
Device Configuration
The Device Configuration tab displays graphical and tabular presentation of image and configuration
compliances. See the image below:
Figure 179: Compliance Dashboard - Device Configuration
The donuts display the total count of devices available for image and configuration compliances where green
signifies compliant devices and red signifies non-compliant devices. Hover the cursor on the donut ring to
view the count of non-compliant devices, total count of devices, and the percentile of non-compliant devices..
The table displays the following information:
• Device - Lists the hostnames of devices.
Note: Clicking on a device name opens the Running Configuration screen.
196
Network Compliance (CVP)
• Last Compliance Check - Displays the timestamp of the last compliance check.
End of Life
The End of Life tab displays graphical and tabular presentation of End Of Life (EOL) of devices . See the
image below:
Figure 180: Compliance Dashboard - End of Life
The donuts display the total count of devices where green signifies the percentile of devices with more than
6 months of life, amber signifies the percentile of devices that are approaching EOL, and red signifies the
percentile of devices that reached EOL. Hover the cursor on the donut ring to view the count and percentile of
devices with more than six months of life.
The table displays the following information:
• Device: Lists the hostnames of devices.
Note: Clicking on a device name displays the hardware inventory details of child devices.
197
9.4 Print Compliance Dashboard
Perform the following steps to print the Compliance dashboard:
1. Select Print from the browser menu.
CVP displays the Print pop-up window. See the figure below.
Figure 181: Print Pop-Up Window
2. Select your printer from the Destination dropdown menu to print the screen.
Note: To save a print-friendly version of the screen, select Save as PDF from the Destination
dropdown menu. This PDF contains all rows of the compliance table.
3. Click Save.
198
Network Compliance (CVP)
The Compliance screen has a compliance section that accepts the following information:
• An authentication token generated by www.arista.com to enable CVP to keep its bug database up-to-date.
• Proxy URL to reach the update server at www.arista.com.
This token is generated per user and can be obtained from the user profile screen under the Portal Access
section on www.arista.com.
Figure 183: Compliance Portal Access
When this token is provided in the Compliance settings screen, it allows CVP to download the latest version
of the https://www.arista.com/en/login file that is available on the Software downloads page.
Note: To leverage automatic updates of the compliance bug database, connectivity to
www.arista.com should be ensured from the CVP VM.
199
The version and release date of the compliance bug database in use can be viewed in the Settings
screen under Telemetry Browser > analytics > BugAlerts > update.
Figure 184: Telemetry Browser Screen
200
Chapter 10
201
10.1 Network Provisioning View
The topology view of the Network Provisioning screen is a tree structure that consists of containers and
devices. This view represents the current groupings of devices (devices grouped by container) as well
individual devices.
By default, two types of containers are available in the topology view.
• Tenant: Top-most container.
• Undefined: Container for all devices that have registered themselves with the CloudVision Portal using
Zero Touch Provisioning (ZTP) and are awaiting configuration. Undefined containers are shown in the
view in a different color than defined containers.
The example shown below includes:
• One tenant container (there is always only one tenant container).
• Three containers under the tenant container (one of the three is an undefined container).
• Seven devices (one is under the undefined container, and 6are grouped under the container named
Vantage-DC (6)).
Figure 185: Network provisioning view showing tree structure
Note: Different color icons are used to indicate that devices have compliance alerts or access alerts.
202
Network Provisioning (CVP)
• Configlet Management Lists the configlets associated with the selected container or if a switch is
selected all of the configlets applied to it both directly and inherited.
• Image Management Lists the EOS or vEOS software image associated with a container or switch.
Switches below the container selected will be loaded with this image.
• Label Management Lists the system or custom labels associated with the selected container or switch.
• Refresh and Listview Refresh the current screen to show any updates or changes to the switches or
devices. Listview changes the display from Topology View and displays the switches in a list.
• Containers Containers are the basic logical construct of the topology view. They are used to used group
devices and to apply configurations and deploy images to the device groups.
Container Right Click Options:
• Show From Here Changes the display to show only the containers and switches below the selected
container.
• Expand / Collapse toggles between shrinking or growing the tree topology below the selected container.
• Show All Devices Lists the switches that are associated with that specific container. The container turns
blue if it contains more than five switches and will only display 25 of the total number of switches in the
topology structure.
• Container: Add / Delete Create or remove a container that from the selected container.
• Device: Add / Manage Add a device to the selected container or manage the switches already
associated with the container. The manage option displays a list of switches which can be selected by
enabling the tick box on the left-hand side. The selected switches can then be moved to another container,
reset (returned to a ZTP boot state and associated with the undefined container), or removed from CVP
completely.
• Manage: Configlet / Image Bundle Allocate or remove a configlet or Image to or from a switch or
container.
• View Config View the configuration created from the combined configlets. At the container level this
shows the combined configlet configuration associated with that container.
• Check Compliance - To initiate a compliance check on all devices under the container.
• Reconcile - To initiate configuration reconcile on all devices under the container.
Device Right Click Options:
• Manage: Configlet / Image Bundle Allocate or remove a configlet or Image to or from a switch or
container.
• Labels Lists / assigns the user created labels associated with the selected switch.
• View Config View the configuration created from the combined configlets. At the switch level the entire
configuration that will be applied to the switch is shown.
• Check Compliance Compares the current running configuration on the switch against the designed
configuration in CVP. If they are out of sync the device change to an orange color.
• Move Allows a user to move a switch from one container to another.
• Factory Reset Erases the configuration on the switch then ZTP boots it. This will return it to the
undefined container on the provisioning screen.
• Remove Removes the switch from CVP. This stops CVP making changes to it and tracking its
configuration. The switch is left running with its current configuration on it.
• Replace - To perform a Zero Touch Replacement (ZTR) of the selected device.
Related topics:
• Changing Between Network Provisioning View and List View
• Container Level Actions
• Device-level Actions
• Viewing Containers and Devices
203
10.1.2 Changing Between Network Provisioning View and List View
Click the icons to toggle between the topology view and the list view of the Network Provisioning screen.
Changing to List View
Click the List icon for a list view.
Figure 186: Changing to List View
Related topics:
• Network Provisioning Screen Options
• Container Level Actions
• Device-level Actions
• Viewing Containers and Devices
204
Network Provisioning (CVP)
1. Select a parent container (the container to which you want to add a new container).
2. Right-click the container and choose Add > Container. The New Container dialog appears:
Figure 188: New Container Dialog
3. Enter the name of the new container and select OK to create the container.
4. Click Save to apply the changes.
205
10.2.3 Renaming a Container
To rename a container in a topology:
1. Double-click the name field of the container to open the name field editor.
2. Enter a new, unique name for the container and click Enter to rename the container.
Figure 189: Rename Container
206
Network Provisioning (CVP)
Option 2:
1. Locate the parent container.
207
2. Right-click the container and choose Show All Devices. This will list all the devices under the container.
Figure 191: Showing all devices during factory reset (option 2)
Option 3:
1. Locate the parent container.
2. Right-click the container and choose Manage > Device. This will load the inventory of all the child devices
under the container.
208
Network Provisioning (CVP)
3. Select the checkbox of the device to be reset, and click the reset icon.
Figure 193: Selecting the device and resetting it (option 3)
On saving the session, a task will be spawned to reset the selected device.
209
10.4.2 Deploying vEOS Routers
CVP deploys and provisions vEOS routers from cloud and datacenter to Amazon Web Services (AWS) and
Microsoft Azure. Based on the requirement in vEOS deployment, configlets are assigned for push EOS
configuration along with deployment parameters such as AWS Virtual Private Cloud (VPC), subnets, and
security groups.
Note: When CVP is deployed behind NAT devices, the vEOS telemetry configuration needs to be
updated. You can view telemetry data coming from the deployed device when you configure the public
IP address of CVP.
Related Topics:
• Prerequisites
• Adding IPsec and vEOS Licenses
• Adding AWS to Public Cloud Accounts
• Deploying the vEOS Router to AWS
• Adding Microsoft Azure to Public Cloud Accounts
• Deploying a vEOS Router to Microsoft Azure
10.4.2.1 Prerequisites
The prerequisites to deploy vEOS routers within a cloud are:
• vEOS version 4.21.1.1F or later
• CVP 2018.2.0
• vEOS license
• Cloud (AWS/Microsoft Azure) credentials
• vEOS deployment parameters including VPC within which the vEOS has to be deployed, subnets and
security groups associated with vEOS
• IP connectivity from deployed vEOS to CVP
210
Network Provisioning (CVP)
3. Click Add License in the right pane. The system displays the Add License window.
Figure 196: Add License Window
4. Click Select license file. The system displays the Windows Explorer.
5. Navigate to the required location and select the license.
6. Click Open.
7. Select the required option from the License type drop-down menu.
8. Click Upload. The system lists uploaded licenses in the EOS Feature Licenses screen.
Figure 197: Licenses Listed in EOS Feature Licenses Screen
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"ec2:DescribeRegions",
"ec2:DescribeVpcs",
"ec2:DescribeImages",
211
"ec2:DescribeAddresses",
"ec2:DescribeKeyPairs",
"ec2:DescribeAvailabilityZones",
"ec2:DescribeSubnets",
"ec2:DescribeSecurityGroups",
"ec2:DescribeNetworkInterfaces",
"ec2:CreateNetworkInterface",
"ec2:ModifyNetworkInterfaceAttribute",
"ec2:DetachNetworkInterface",
"ec2:DeleteNetworkInterface",
"ec2:AllocateAddress",
"ec2:AssociateAddress",
"ec2:DisassociateAddress",
"ec2:ReleaseAddress",
"ec2:RunInstances",
"ec2:TerminateInstances"
],
"Resource": "*"
}
]
}
Note: You receive the STS token after the IAM role is created.
Perform the following steps to add a AWS account to public cloud accounts:
1. Click Provisioning. The system displays the Network Provisioning screen.
2. Click Public Cloud Accounts in the left pane. The system displays the Public Cloud Accounts screen.
Figure 198: Public Cloud Accounts Screen
3. Click Add Credentials in the upper right corner of the right pane. The system displays the Add
Credentials window.
212
Network Provisioning (CVP)
5. On the Provider Details pane, provide the access key, secret key, and token details in the corresponding
fields.
6. Click Save. The system displays the configured AWS account in the Public Cloud Accounts screen.
Figure 200: AWS Configured in Public Cloud Accounts
213
10.4.2.4 Deploying the vEOS Router to AWS
Perform the following steps to deploy the vEOS router to AWS:
1. Click Devices. The system displays the Inventory screen.
2. Click the Add Devices drop-down menu at the upper right corner of the right pane.
3. Select Deploy vEOS Router. The system displays the Deploy vEOS Router window.
Figure 201: Deploy vEOS Router Window
214
Network Provisioning (CVP)
215
7. Click Create VM with vEOS. The system displays the status of vEOS deployment under the Progress
column on the Status pane.
Figure 203: Status of vEOS Deployment to AWS
You can also check the VM deployment process on your AWS Portal. Hover the mouse over the
corresponding information icon to view detailed information about the vEOS router deployment. After the
successful deployment of the vEOS router to AWS, you can use your AWS SSH Privacy Enhanced Mail
(PEM) key to login to vEOS.
Note: To make CVP manage vEOS routers, register this device using the instructions in
Registering Devices. Ensure that the AWS security group associated with vEOS router VM has
an ingress rule of allowing TCP port 9910 from CVP's IP address. You must configure AWS for
the vEOS router to function as a VPC gateway using the instructions in Using vEOS Router on the
AWS Platform.
216
Network Provisioning (CVP)
You can also check the VM deployment process on your Microsoft Azure Portal. Hover the mouse over
the corresponding information icon to view detailed information about the vEOS router's deployment. It
contains the initial login credentials you can use to login to vEOS router, you can change the credentials
after logging into the device.
Note: To make CVP manage vEOS routers, register this device using the instructions in
Registering Devices. Ensure that the Azure network security group associated with vEOS router
VM has an ingress rule of allowing TCP port 9910 from CVP's IP address. You must configure
Microsoft Azure for the vEOS router to function as VNET gateway using the instructions in Using
the vEOS Router on Microsoft Azure.
217
3. Click Add Credentials in the upper right corner of the right pane. The system displays the Add
Credentials window.
Figure 206: Add Credentials Window for Microsoft Azure
218
Network Provisioning (CVP)
2. Click the Add Device drop-down menu and select Register Existing Device. The Device Registration
pop-up window appears.
Figure 208: Add Device for Registration
3. Enter the host name or IPv4 addresses of the device(s) to be registered; and click Register.
Figure 209: Selecting Device for Registering
219
The following figures show the device registration status through the registration process.
Figure 210: Registration Status
220
Network Provisioning (CVP)
The newly registered devices are shown in the undefined container in the Network Provisioning view.
Figure 213: Registered Devices in the Network Provisioning View
10.4.4.1 Option 1
221
2. Right-click the device and choose Move.
Figure 214: Selecting the device to be moved (option 1)
10.4.4.2 Option 2
1. Locate the container that has the device you want to move.
2. Right-click the container and choose Show All Devices. This will load the inventory of all the devices
under the container.
3. Locate the device to be moved.
4. Right-click the device and choose Move. After moving there will be a "T" icon to indicate the move has
been tasked. (The task won't automatically be executed.)
Figure 215: Device with pending move task (option 2)
5. Go to Tasks and explicitly execute the move task. After the task has been executed, the "T" icon is
removed.
10.4.4.3 Option 3
222
Network Provisioning (CVP)
1. Locate the container that has the device you want to move.
2. Right-click the container and choose Manage > Device. This will load the inventory of all the devices
under the container.
3. Select the device to be moved and click <–> to choose the destination container.
4. From the popup menu, select the destination container and click OK. This will provision a move for the
device
10.4.5.1 Option 1
1. Locate the device.
2. Right-click the device and choose Remove.
Figure 216: Removing a device (option 1)
10.4.5.2 Option 2
This option is available only for topology views.
1. Locate the parent container.
223
2. Right-click the container and choose Show All Devices. All the devices under the container are listed.
Figure 217: Selecting the device to be removed (option 2)
224
Network Provisioning (CVP)
4. Right-click the device and choose Remove. The device is removed from the Network Provisioning view.
Figure 218: Removing the device (option 2)
10.4.5.3 Option 3
This option is available only for the list view of the Network Provisioning screen.
3. Select the device you want to remove and then click Remove. On saving the session, a task will be
spawned to reset the selected device.
225
10.4.6 Device Factory Reset
When resetting a device:
• The device will be removed from the parent container.
• The running configuration of the device will be flushed.
• Device will reboot with ZTP mode enabled.
• Device will be identified under undefined container.
There are three options you can use to move devices. They are:
• Option 1
• Option 2
• Option 3
10.4.6.1 Option 1
10.4.6.2 Option 2
1. Locate the parent container.
226
Network Provisioning (CVP)
2. Right-click the container and choose Show All Devices. This will list all the devices under the container.
Figure 221: Showing all devices during factory reset (option 2)
10.4.6.3 Option 3
227
3. Select the checkbox of the device to be reset, and click the reset icon. On saving the session, a task will
be spawned to reset the selected device.
Figure 223: Selecting the device and resetting it (option 3)
228
Network Provisioning (CVP)
2. Right-click on the old switch, and select Replace. This initiates ZTR, and opens the Undefined Device
screen.
Figure 224: Selecting the switch to be replaced
3. Select the new switch by checking the checkbox next to the Serial No. column, and then click Replace.
Figure 225: Selecting the new device and replacing the old device
229
4. In the Network Provisioning screen, click Save. A task icon T shows on the old switch, indicating that a
task to replace it has been scheduled. Also, an R icon shows on the new switch, indicating that it is the
replacement switch for a scheduled ZTR task.
Figure 226: Topology view showing device with pending replace task
230
Network Provisioning (CVP)
231
Note: When you update a device configuration using configlets, CVP replaces the entire device
configuration with the Designed Configuration for the device. For new devices with pre-existing
configurations added into CVP, you must explicitly perform a one-time reconciliation to save the
desired device-specific running configuration in CVP. If you do not, that configuration may be lost, or
the configuration update task may fail (see Reconciling Device Configurations at the Device Level).
Adding Configlets
1. Select the device and choose Manage > Configlets.
This loads the configlet inventory screen.
2. Select the configlets.
You are required to validate the configuration.
3. To validate the configurations, select Validate.
The validation screen will be loaded.
4. Select Save to propose a Config Assign action.
When saving the session, this will spawn a Config Assign task.
232
Network Provisioning (CVP)
233
10.9 Reconciling Configuration Differences
CloudVision enables you to reconcile differences between the designed (managed) configuration and running
configuration on devices so that CVP is maintaining the full configuration of each device.
Related topics:
• Key Terms
• Reconciling Device Configurations at the Device Level
• Reconciling Device Configuration Differences at the Container Level
Reconcilable Configuration differences between the designed configuration and the running
differences configuration, which do not conflict with the configuration in any configlets, other
than the reconcile configlet.
Reconcile configlet A specially marked device configlet that is system generated and used to store
reconcilable differences in order for the designed configuration to match the
running configuration.
Reconciling device configuration differences does not require a task, because there is no configuration to be
pushed out to the device. Reconcilable differences are only adjusted in the reconcile configlet, to match the
running configuration. Because of this, there is no task pushed to change the running configuration.
When you reconcile device configuration differences, you add the reconcilable differences found in the
running configuration to the reconcile configlet of the designed configuration.
For details on reconciling device configuration differences, see:
• Reconciling Device Configurations at the Device Level
• Reconciling Device Configuration Differences at the Container Level
Complete the following steps to reconcile device configuration differences for a container:
1. Go to the Network Provisioning screen.
234
Network Provisioning (CVP)
2. Locate the container in the topology where you want to reconcile the configurations of all devices under
that container hierarchy.
3. Right-click the container, hover the cursor on Reconcile, and click either Reconcile All or Reconcile New.
Figure 231: Device configuration reconciliation at the container level
The Reconcile New option reconciles only the configuration lines that exist on the device, but not in the
designed configuration.
The Reconcile All option reconciles new lines and also lines that differ in designed and running
configurations. This usually brings the device into compliance because the resulting designed
configuration will be identical to running configuration. However, there can be cases where in spite of
reconciling device configuration lines, the designed configuration may not end up identical to running
configuration. In these cases, no changes are made to the reconcile configlet. Arista recommends to go
through the device-level reconcile process (See Reconciling Device Configurations at the Device Level),
and select the desired lines.
Note: The bell icon in the upper right corner turns yellow to indicate unread notifications.
235
4. (Optional) To view the notification for the reconciliation, click the bell icon. The notification list appears
showing the container-level configuration reconciliation, and any other unread notifications.
Figure 232: List of unread notifications
236
Network Provisioning (CVP)
2. Click the blue Reconcile button to add the reconcilable configuration in the running configuration to the
reconcile configlet of the designed configuration.
Figure 233: Configuration validation screen showing device-level configuration differences
3. (Optional) Click Edit next to the configlet name to edit or rename the reconciled configlet.
4. (Optional) Click the reconcile disk icon next to the configlet name to save the reconciled configlet with the
extra commands present in the running configuration.
Figure 234: Reconcile Disk icon
Note: CVP will not execute pushing a configuration that causes CVP to lose connectivity with the
device if the management interface or IP is missing in the configuration. When the task is executed,
it will fail.
5. Click Save.
237
10.10.1 Applying an Image Bundle to a Container
An image bundle can be added to, or removed from a container.
1. Select the container and choose Manage > Image Bundle. This will load image bundle inventory in
topology.
Figure 235: Image bundle inventory
238
Network Provisioning (CVP)
• If the image bundle is assigned directly to the device, there is no Container icon in front of the image
bundle name.
Figure 236: Viewing the Image Bundle assigned to a device
239
Note: To help you select the desired rollback destination day and time, you can compare the image
and running configuration differences between current and rollback times of all effected devices. The
potential destination rollback date and time in the comparison is based on the destination rollback date
and time you select.
3. Using the Rollback Type: options near the top of the screen, select the type of rollback. The options are:
• Configuration & Image Rollback (both the configuration and EOS image are rolled back)
• Configuration Rollback (only the configuration is rolled back)
• Image Rollback (only the EOS image is rolled back)
4. Either drag the vertical slider on the timeline to the desired date and select the time for rollback; or use
the Rollback to menu for selecting rollback date and time (directly above the configuration pane on the left
side).
5. Click the telemetry icon (directly above the configuration pane on the right side) for viewing the running
configuration differences between current and rollback times.
6. If required, change the destination date and time for the rollback.
7. Click Create CC to create a Change Control (CC) record for the network rollback. CloudVision
automatically creates a rollback task for each device in the rollback; and makes them part of CC.
Note: Rollback Change Controls are automatically assigned a unique name. You can rename the
Change Control record by editing the Change Control record. Once the Change Control is created,
it can be executed like any other Change Control.
240
Network Provisioning (CVP)
2. Right-click on the device you want to rollback, and then choose Manage > Rollback.
Figure 238: Device Rollback Screen
3. Using the Rollback Type: options near the top of the screen, select the type of rollback. The options are:
• Configuration & Image Rollback (both the configuration and EOS image are rolled back)
• Configuration Rollback (only the configuration is rolled back)
• Image Rollback (only the EOS image is rolled back)
4. Either drag the vertical slider on the timeline to the desired date and select the time for rollback; or use the
Rollback to menu for selecting rollback date and time (directly above the configuration pane on the left
side).
5. Click the telemetry icon (directly above the configuration pane on the right side) for viewing the running
configuration differences between current and rollback times.
Figure 239: Differences in Running Configuration
The Unified tab displays running configuration differences in a single window with differences highlighted.
The Split tab displays running configurations in different windows with differences highlighted.
6. If required, change the destination date and time for the rollback.
241
7. Click Save to create a task for the device rollback.
242
Network Provisioning (CVP)
The Assign Label pop-up menu appears, showing the available device labels.
3. Select the label to be applied and click Save.
Figure 241: Assign Label
243
2. Right-click the device and choose Labels.
Figure 242: Choose Labels
The Assign Label pop-up menu appears, showing the available device labels.
3. In the pop-up menu, click on CREATE LABEL.
Figure 243: Create label Pop-up
244
Network Provisioning (CVP)
4. Type the new, custom label for the device, then click Save.
Figure 244: Create Label
245
• Show From Here (see Show From Here).
• Show Full Topology (see Show Full Topology).
CloudVision Portal uses color coded icons to indicate compliance or access issues with devices.
1. Select a container.
2. Right-click it and select the Expand/Collapse option.
246
Network Provisioning (CVP)
247
10.14.4 Search in Other Grids
During a grid search, the user will not be provided with an auto suggest option. Only the records matching the
specified data entered will be filtered and displayed in the grid.
Figure 249: Grid searches
10.14.5.2 OR Operation
Lists all the devices which has either one of the labels present on it in the hierarchy.
248
Network Provisioning (CVP)
249
10.15 Management IP
The CloudVision Portal tracks the Management IP of each device to use in connecting to it. When this IP
address changes, the device becomes unreachable by the portal. You can manually change the IP address
used by the portal to communicate with a given device.
250
Network Provisioning (CVP)
If you do not set the Proposed Management IP, you cannot save the configuration as not setting Proposed
Management IP.
Figure 255: Setting the Proposed Management IP
251
10.15.3 Changing Current Management IP
1. Go to the Network Provisioning screen.
2. Select a device from topology/list view.
3. Right-click the device and choose Manage > IP Address
Figure 256: Change Management IP
252
Network Provisioning (CVP)
253
254
Chapter 11
255
11.1 Creating Configlets
CloudVision Portal (CVP) enables you to create Configlets using two different methods. You can create
Configlets using the CVP Configlet Builder feature, or you can create them manually. You should use the
method that is best suited to your intended use of the Configlet.
Note: The Configlet Builder feature is designed to help you create Configlets dynamically based on
variables.
For more information, see:
• About the Configlet Builder Feature
• Creating Configlets Using the Configlet Builder
• Using the Provided Configlet Builder Examples
• Python Execution Environment
• Creating Configlets Manually
256
Configlet Management (CVP)
257
• Password – Use to specify a single line of text (characters are hidden as they are entered).
3. Write a Python script that reads the inputs you entered in the previous step and then generates the
Configlet.
Note: The figures listed in this table show examples of the steps involved in writing a script,
including an example of use of standard Python syntax to build components of the Configlet.
258
Configlet Management (CVP)
Figure 262: Example (Showing Specification of Field IDs Defined in the Form Builder)
259
Note: Complete steps 4 and 5 to test the script to make sure it can generate Configlet content.
5. Click Generate.
The Configlet content is generated and shows in the Built Configlet pane.
260
Configlet Management (CVP)
Note: If it is necessary to select a device to generate the Configlet, then select a device from the
list of devices under Form Design.
Figure 266: Selecting a Device from the List of Devices Under Form Design
6. Validate the generated Configlet on the device by clicking the Tick icon at the upper-right of the page.
The Validate Device dialog appears.
261
7. In the Validate Device pop-up dialog, click Validate.
Figure 268: Example Script (Validating Device)
If the device cannot be validated, the error (or errors) are listed in the Validate Device dialog.
8. (If needed) Correct any errors and repeat step 7 to validate the device.
The Validate Device dialog shows a message to indicate a successful validation.
Figure 269: Example Script (Re-Validating Device after Correction)
262
Configlet Management (CVP)
263
b. Right-click the container and choose Device > Add.
Figure 272: Adding Devices to the Container
The Configlet page appears showing the Configlet you selected to apply to the container.
13. To assign the Configlet Builder to the container you selected, select (click) the Configlet Builder.
Figure 274: Selecting the Configlet to Assign to the Container
264
Configlet Management (CVP)
14. Complete (fill in) the form and then click Generate.
The Configlet Builder creates the new, device-specific Configlet, and the Configlet is shown in the Built
Configlet pane.
Figure 276: Configlet Page Showing New, Device-Specific Configlet
265
11.1.3 Using the Provided Configlet Builder Examples
CloudVision Portal (CVP) provides some Configlet Builder examples to help you get started using this feature.
You can load the examples to your CVP instance using the following commands:
• Log into the primary node's Linux shell as root user.
• Change directory to /cvpi/tools and import the example Configlets using the cvptool.
266
Configlet Management (CVP)
Note: No UI widgets are associated with the Configlet Builder in this example.
267
Note: No UI widgets are associated with the Configlet Builder in this example.
268
Configlet Management (CVP)
Supported GlobalVariableNames:
CVP_USERNAME - Username of the current user
CVP_PASSWORD - Password of the current user
CVP_IP - IP address of the current device
CVP_MAC - MAC of the current device
CVP_SERIAL - Serial number of the current device
CVP_SESSION_ID - Session id of current cvp user
ZTP_STATE - ZTP state of the device (true/false)
ZTP_USERNAME - Default username to login to ztp enabled device
ZTP_PASSWORD - Password to login to ztp enabled device
CVP_ALL_LABELS - Labels associated to current device
CVP_CUSTOM_LABELS - Custom labels associated to current device
CVP_SYSTEM_LABELS - System/Auto generated labels associated to current
device
If no certificates are installed on the server, then add the following lines to ignore ssl warnings:
import ssl
ssl._create_default_https_context = ssl._create_unverified_contex
269
11.1.5 Creating Configlets Manually
CloudVision Portal (CVP) enables you to create Configlet manually. This method should be used to create
Configlets that are relatively static.
Note: If you need to create Configlets that require less user input, you may want to use the Configlet
Builder feature.
Complete these steps to manually create Configlets:
1. Select the “+” icon in the grid.
2. The Create Configlet page appears.
Figure 282: Create Configlet Page
270
Configlet Management (CVP)
5. Select Validate.
On successful validation, the message Successfully Validated is displayed.
Figure 285: Validate-Success
Related topics:
• Configlet Information Page
• Editing Configlets
• Deleting Configlets
• Importing and Exporting Configlets
271
• Summary Tab
• Logs Tab
• Change History Tab
• Applied Containers Tab
• Applied Devices Tab
272
Configlet Management (CVP)
273
11.2.1.4 Applied Containers Tab
This tab gives the details on the containers to which the Configlet is assigned. This also shows the name of
the user who made the assignment (Figure 292: Applied Container Page).
Figure 292: Applied Container Page
When a Configlet is removed from any device through the Network Provisioning module, the device will be
removed from the list.
Related topics:
• Editing Configlets
• Deleting Configlets
• Importing and Exporting Configlets
• Creating Configlets
274
Configlet Management (CVP)
275
• Click Save As to save the edited configlet as a new Configlet (the name Configlet).
Related topics:
• Deleting Configlets
• Importing and Exporting Configlets
• Creating Configlets
• Configlet Information Page
```
interface et1-49
profile test
!
interface profile test
command description test
```
Note: If the profile is created first and then applied to the interfaces, the config validation and commit
can take several minutes as opposed to just a few seconds if the profile is first applied and then
created.
276
Configlet Management (CVP)
A dialog appears that you use to select the file that contains the Configlets or Configlet Builders you want
to import.
Figure 297: Selecting Configlets or Configlet Builders to be Imported
277
3. Select the file that contains the items you want to import.
4. Click Open.
The Configlets or Configlet Builders in the file you selected are imported into CVP.
3. Click the Export icon (located in the upper right of the page).
A single file (.zip archive) that contains all of the items you selected is automatically downloaded to your
desktop.
4. (Optional) You can rename the downloaded file and make a copy of it before sharing it.
5. Share the file with one or more system users.
Note: The items you share can be imported only on systems that support the import of Configlets
and Configlet Builders (the Import icon on the Configlets page indicates support for this feature).
Related topics:
• Creating Configlets
• Configlet Information Page
• Editing Configlets
• Deleting Configlets
278
Chapter 12
Related topics:
• Validating Images
• Upgrading Extensible Operating System (EOS) Images
• Creating Image Bundles
• The Bundle Information Page
279
12.2 Validating Images
CloudVision Portal (CVP) provides automatic EOS image validation. This automated validation process helps
to ensure that all devices in your CVP environment have EOS images that are supported by CVP.
The automatic validation of EOS images takes place whenever you:
• Upload images to CVP or add images to images bundles.
• Add devices to your CVP environment.
The automatic image validation ensures that images that are available to be included in image bundles and
assigned to devices are supported by CVP.
Note: EOS images that are not supported cannot be added to an image bundle, or assigned to
devices.
If you attempt to add a device to CVP that has an unsupported EOS image, the Status column of the
Inventory page indicates that an upgrade is required.
The Network Provisioning page also indicate that the device is running an unsupported image (this alert
shows only when placing your cursor over the device icon).
Related topics:
• Upgrading Extensible Operating System (EOS) Images
• Creating Image Bundles
• The Bundle Information Page
• Image Management Page
280
Image Management (CVP)
Based on the rules for image association inheritance, the Demo-Lab container could have selected the
4.18.8M device EOS image.
Figure 302: Example of image Association (Example 1)
281
The CVX container could override that image selection (4.18.8M image) for its devices by selecting the
4.20.7M image. As a result, all of the devices under CVX are assigned the 4.20.7M image, and the devices
under Host-TOR1, Leaf, Spine and TOR2 inherit the 4.18.8M image from the Demo-Lab container.
Figure 303: Example of Image Association (Example 2)
If an image association is changed at any level, and the change is saved in the Network Provisioning page,
the following occurs:
• The change impacts all devices under that level.
• A task is automatically created to upgrade the impacted devices.
For example, if the image selection was removed at the CVX level, the following would occur:
• All of the devices under the CVX level would inherit the Demo-Lab image.
• A task would be scheduled for every device in CVX to use the Demo-Lab image.
Related topics:
• Tip for Handling Multiple Image Association Tasks
• Creating Image Bundles
• The Bundle Information Page
• Image Management Page
• Validating Images
282
Image Management (CVP)
If the search results returns multiple pages of tasks, then click the checkbox at the top of each page to
select the tasks so they can be executed.
Figure 304: Selecting Multiple Tasks to be Executed
3. Click the Play icon to execute the selected tasks all at once.
Related topics:
• Creating Image Bundles
• The Bundle Information Page
• Image Management Page
• Validating Images
• Example of Image Association
283
12.4 Creating Image Bundles
Creating image bundles is a key image management task. You create image bundles so that you have
supported image versions available to be assigned to devices in your CVP environment.
Note: An image bundle must have one .swi file. Extensions are optional (not required for image
bundles), but you can add one or more extensions to an image bundle.
Pre-requisite: To ensure that you include valid (supported) EOS images in the bundles you create, make
sure you validate the images you want to include in the bundle (see Validating Images).
Complete the following steps to create an image bundle:
1. Go to the Image Management page.
2. Click the “+” icon in the grid.
This loads the Create Image Bundle page.
Figure 305: Create Image Bundle page
284
Image Management (CVP)
1. This opens the Images dialog, which lists all of the available images.
Figure 306: Images dialog
285
This opens a dialog to search and upload .swi files from system.
3. Navigate to the desired .swi file and upload it to CVP.
The upload bar on the page shows the progress of the upload.
Figure 308: Uploading .swi files to CVP (upload in progress)
286
Image Management (CVP)
The upload bar on the page shows the progress of the upload. The extensions you uploaded are shown in
the Create Image Bundle page
Figure 309: Create Image Bundle showing uploaded extensions
4. Select Reboot Required check-boxes for all extensions that require a reboot.
5. Click Save. The extensions are added to the image bundle.
Once the image bundle is assigned to a device, a reboot task will be generated. The newly added
extensions are installed on the device when the reboot task is executed. Any extensions that were
previously installed but are not part of the current bundle are removed from the device.
The Bundle Information page appears, showing information for the selected image bundle. Use the following
tabs to view specific information about the selected image bundle.
287
• Summary Tab
• Logs Tab
• Applied Containers Tab
• Applied Devices Tab
For details on the steps used to edit image bundles and delete image bundles, see:
• Updating Bundles
• Deleting Bundles
288
Image Management (CVP)
Related topics:
• Summary Tab
• Logs Tab
• Applied Containers Tab
289
The system displays the Summary tab.
Figure 315: Summary page showing bundle selected for edit
290
Image Management (CVP)
3. Click the trash icon to delete the selected bundle from the inventory.
The system prompts to confirm the deletion.
4. Click Yes to confirm deletion.
5. Click Save.
Note: The association can be removed only if a new bundle is assigned to device or container.
Note: When an image bundle is assigned to a container, no task will be spawned to the
subordinate devices.
Related topics:
• Updating Bundles
291
292
Chapter 13
The partial configuration management feature specifies parts of configuration that should be managed by
CVP. Each line in the configuration is classified in the following three categories:
• Managed - These configuration lines must be managed only by CVP.
Note: Managed configuration lines are considered config compliant only when they synchronize
with the designed and running configuration. In other words, updating managed configuration lines
via non-CV sources will mark the device as non-compliant and cannot be reconciled by default.
Only the user can reconcile these lines.
• Unmanaged - These configuration lines can't be managed by CVP.
Note: Unmanaged configuration lines can be added to the running configuration via non-CVP
sources without marking the device as non-compliant. These lines are ignored by CV during
computation of configuration compliance and can never be reconciled.
• Unspecified - These configuration lines are by default managed and reconciled by CVP. They are not
marked as managed or unmanaged by CVP.
293
13.1 Filters for Categorizing Sections in the Configuration
You can filter commands by using regular expressions. Filter highlights required configuration lines
accordingly based on the following parameters:
• Filter Pattern
• Filter Type
Note: Level of a command represents the hierarchy of the configuration command.
transceiver*
transceiver qsfp default-mode
$ 4x10G
load-balance policies
load-balance sand
profile Orange
no fields mac
no fields mpls
fields symmetric-hash
transceiver *
load-balance policies
load-balance policies load-balance sand
profile Orange
no fields mac
no fields mpls
fields symmetric-hash
The order of the patterns at the same level is irrelevant. Hence the following filters are equivalent.
294
Partial Configuration Management
Note: $ should be the last character in a configuration block. That is, adding
commands after $ inside the block triggers an error.
295
13.1.2 Filter Type
A filter can be either managed or unmanaged.
transceiver* transceiver*
$ load-balance*
Here, Filter 1 has only 1 level of command in the pattern whereas Filter 2 has 2 levels of
command.
Note: $ is a special character and is not counted as a command. In other words,
Filter 2 matches a more specific set of lines as shown below.
Configuration
load-balance policies
load-balance sand profile Orange
no fields mac
296
Partial Configuration Management
Note: CVP highlights the managed lines in yellow and unmanaged lines in grey. In the example
below, the bold text represents managed lines and the italic text represents unmanaged lines.
load-balance
policies
load-balance
sand profile
Orange
no fields
mac
These filters have conflicting patterns load* and load-balance*. CVP displays an error when
conflicting filters are assigned to devices. If conflicting filters are assigned to a device, you must
correct all filters for applying them correctly to the device.
2. Under Features, enable Partial Configuration Management (Beta) using the toggle button.
297
13.3 Filter Management
The Filter Management screen lists all existing filters with all the fields associated with a filter. See the figure
below.
Figure 318: Filter Management Screen
298
Partial Configuration Management
Click Confirm when CVP opens the Confirm dialog box prompting to confirm the deletion.
Figure 319: Delete Filter Confirmation Dialog Box
• Click Export to CSV for downloading the table contents to your local drive.
299
Note:
•
If the Apply to all devices checkbox is selected, the current filter (filter being added/
edited) and all other active filters are validated against the running configuration of the
selected device. This verifies if there are any conflicting filters.
• If the Apply to all devices checkbox is not selected, only the current filter (filter being
added/edited) is validated against the running configuration of the selected device.
• Designed Pattern pane - Provide the tailored pattern for this filter.
Note: Applying the filter can change the managed configuration in designed configuration
which results in non-compliance until it is pushed to the running configuration.
• Running Config pane - Displays the current configuration and provides the option to select the
required device.
Note:
• Managed lines are highlighted in yellow and unmanaged lines are highlighted in grey color.
• If an unmanaged configuration line being added matches with an assigned configlet of the
selected device (including reconcile configlet) or if an added configuration line results in
conflict with a configuration line in the existing configlets assigned to the device, the device
will be marked out of compliance
• Device dropdown menu - This drop down lists all available devices against which the filter can be
validated.
4. Click Save Filter.
Configuration Compliance
Filter modification can change managed/unmanaged portions of designed and running configuration due to
which configuration compliance status of some devices may get updated. In context of partial configuration
management, the following logics determine the configuration compliance status of the device:
• Managed configuration lines and Unspecified configuration lines have the same compliance implications
and they have to be in sync in the designed and running configuration for configuration compliance to be
true. Which means changing such configuration lines outside CVP will mark the device out of compliance.
Similarly modifying the designed configuration with addition/deletion of such configuration lines will result
in out of compliance until they are pushed to the running configuration.
• Unmanaged configuration lines in the designed configuration will always result in configuration out of
compliance. On the other hand, such configuration lines can be added to the running configuration outside
CVP without causing the device to go out of compliance.
• Conflicting filters matching device’s designed or running configuration will mark the device out of
compliance.
300
Partial Configuration Management
Provisioning
• Configlet management at device level -- Applied filters of `unmanaged` type can restrict CVP to modify
corresponding unmanaged configuration lines. Configlets containing unmanaged configuration lines
cannot be applied to a device. Validation of such proposed configuration will result in an error.
• Configlet management at container level -- Since this flow is not associated with a configuration validation
process, it can result in making some unmanaged configuration lines part of the designed configuration.
Hence, applying configlets containing unmanaged lines at container level will mark the underlying devices
out of compliance. This can even create configuration push tasks, but they would fail later at the time of
execution.
Task Execution
Tasks with unmanaged configuration lines in the designed configuration will fail on execution. While viewing a
task diff, inline errors will indicate the problematic lines and the relevant filters associated with the error.
Reconcile
• Reconcile at device level -- Unmanaged configuration lines from running configuration cannot be
reconciled (tick boxes will not appear against those lines ). Whereas managed lines from running
configuration are not reconciled by default (tick boxes will be there, but not marked by default), but if the
user wants, they can be reconciled explicitly by marking the tick boxes manually.
• Reconcile at container level -- Reconcile process at container level will never reconcile managed or
unmanaged configuration lines from running configuration. Thus, it will only add unspecified lines from the
running configuration to reconcile configlets. It can also delete existing managed lines from the reconciled
configlet and thereby affect the configuration compliance status of the device. Hence it is recommended
to have dedicated configlets for the managed configuration lines and not to keep them as part of the
reconciled configlets.
Config 1
router multicast
ipv4
routing
route 232.1.1.1 192.168.0.1 iif Ethernet6 oif Ethernet20
!
301
vrf test
ipv4
routing
route 238.1.1.1 2.2.2.2 iif Ethernet4 oif Ethernet41
route 239.1.1.1 2.2.2.2 iif Ethernet4 oif Ethernet41
route 239.3.3.3 3.3.3.3 iif Ethernet4 oif Ethernet5
route 239.4.4.4 1.1.1.1 iif Ethernet42 oif Ethernet45
Filters Result
302
Partial Configuration Management
Config 2
Filters Result
303
304
Chapter 14
Change Control
Task Management is an inventory of all the tasks generated in CloudVision. You can create a Change Control
or cancel a task in task management.
Sections in this chapter include:
• Basic Options for Handling Tasks
• Using the Tasks Module
• Using the Change Control Module
• Non-Author Change Control Review
• Change Control Template
305
4. Save the topology to generate the task.
Note: If the hierarchy of the container has images or configlets, the created task will also include
image push and configuration push tasks.
To access the Tasks Summary screen, go to the Provisioning screen and click Tasks in the left menu.
The Tasks Summary screen consists of the following entities:
• + Create Change Control button - Click this button to create a Change Control
• Cancel Task(s) button - Click this button to cancel selected assignable tasks
• Assignable Tasks Table - Lists assignable tasks with the following information:
• Task ID - Displays the task ID.
Click the Task ID go to the appropriate task details screen.
• Device - Displays the device name on which this task is performed.
306
Change Control
Click the device name to open the appropriate Device Overview screen.
• Created By - Displays who created the task.
• Type - Displays the task type.
• Last Updated - Displays when the task was last updated.
• Status - Displays the task status.
• Assigned Tasks Table - Lists assigned tasks with the following information:
• Task ID - Displays the task ID.
Click the task ID go to the appropriate task details screen.
• Device - Displays the device name on which this task is performed.
Click the device name to open the appropriate Device Overview screen.
• Created By - Displays who created the task.
• Type - Displays the task type.
• Last Updated - Displays when the task was last updated.
• Status - Displays the task status.
• Change Control - Displays the Change Control name.
Click the Change Control name to go to the appropriate Change Control Details screen.
3. Click + Create Change Control with n tasks where n is the count of selected tasks.
Figure 322: Create Change Control Button
307
14.2.3 Creating Change Controls from the Change Controls Summary Screen
The first step involved in using the Change Control module to manage tasks is to create a Change Control.
While creating a Change Control, you add tasks with pending or failed status to the Change Control. By
default, all tasks in the same Change Control are added in parallel. If you want to change the execution order,
you can drag and drop the action cards on the Change Control Details screen. You can execute grouped
tasks after a Change Control is created, reviewed, and approved.
Note: If you do not add any tasks, the system creates a Change Control without tasks.
Complete the following steps to create a Change Control from the Change Control Summary screen:
1. On the CloudVision Portal, click Provisioning > Change Control.
The system displays the Change Control Summary screen.
Figure 323: Change Control Summary Screen
308
Change Control
3. Select tasks you want to include in the Change Control by selecting appropriate checkboxes.
Note: If you do not select any tasks, the system creates a Change Control without tasks.
4. Click + Create Change Control with n tasks where n is the count of selected tasks.
Figure 325: Assignable Tasks Dialog Box with Tasks Selected
309
14.2.4 Accessing the Tasks Details Screen
The Tasks details screen provides detailed information for any given task. To access the Tasks details
screen, click the task ID under the Task ID column in the Tasks summary screen.
Figure 326: Task Details Screen
The Tasks Details screen provides the specified information in following tabs:
• Pending tasks icon - Displays the count of pending tasks
• Notifications - Displays the count of unread notifications.
• Logs tab - Displays logs of the appropriate task.
Note: This tab is displayed only for completed tasks.
310
Change Control
• View Config tab - Displays provisioned, designed, and running configuration changes.
Figure 328: View Config Tab
14.2.5.1 Pending
Any new task is generated with a 'Pending' status. This means that the task has been generated but not
executed. You can execute a pending task at any time. Once the task is successfully executed (completed
without failure), the status of the task changes to Completed.
14.2.5.2 In-Progress
A task being executed moves to “In-progress” state.
• Config assign, pushes the configuration on the device.
• Image assign, copies the image from CLOUDVISION to the device.
• In-Progress tasks can be canceled.
Various statuses during the Change Control execution are:
• Execution In Progress
• Device Reboot In Progress
• Task Update In Progress
• Configlet Push In Progress
• Image Push In Progress
• Rollback Config Push In Progress
• Rollback Image Push In Progress
311
• Cancel In Progress
• ZTR Replacement In Progress
14.2.5.3 Completed
A task that has been completed. Upon completion, the status changes to Completed. Tasks with Completed
status can't be executed or canceled.
14.2.5.4 Failed
A task moves to failed state due to multiple reasons such as:
• Device not reachable
• Wrong configuration
• Application problem
14.2.5.5 Canceled
A task that is removed from the queue of pending tasks. Tasks with the status of Completed or tasks that
have already been canceled, cannot be canceled. Tasks with any status other than Canceled or Completed
can be selected and canceled.
312
Change Control
To access the Change Control screen, go to the Provisioning screen, and click Change Control in the left
menu.
The Change Control screen consists of the following entities:
• Open Change Controls and Executed Change Controls tables - Lists corresponding Change Controls
with the following information:
• Name - Displays the Change Control name
Click the Change Control name to go to the appropriate Change Control details screen.
• Devices - Displays devices used in the Change Control
Click the device name to go to the appropriate Device Overview screen.
• Action - Displays types of actions to be executed by the Change Control
• Last Updated - Displays when the Change Control was last updated
• Status - Displays the Change Control status
Note:
• Under the Status column of the Open Change Controls table, a pending Change Controls
is represented with a doc-edit icon and an approved Change Controls is represented with a
user-check icon.
• Under the Status column of the Open Change Controls table, a failed Change Control is
represented with a cross mark and a completed Change Control is represented with a tick
mark.
• Hover the cursor on the status icon in Open Change Controls table to view how long ago
the current approval status was updated. When you hover the cursor on the status icon in
Executed Change Controls table, it also displays the approver's name.
• In the Open Change Controls table, click Delete to delete the appropriate Change Control.
Note: After you delete an open Change Control, the system returns any tasks used by the deleted
Change Control to the assignable tasks pool for reallocation.
• Recent Activity pane - Lists most recent activities like updated, executed, and deleted Change Controls.
Note: Click on the Change Control name to go to the appropriate Change Control details screen.
313
• Export to CSV - Exports the summary data to a CSV file.
Header Panel
This primary panel provides the following basic information on the Change Control:
• Edit icon to update the Change Control name
• Change Control information -
• The open Change Control details screen displays the status, scheduled date, last editor, count of
affected devices, and Universally Unique Identifier (UUID).
Note:
• Click the Scheduled for field and select the date to run the Change Control.
• Hover the mouse cursor over the clock icon to view the last time of action.
314
Change Control
• Hover the cursor on the count of affected devices to view their list. Clicking on an affected
device opens the corresponding Device Overview screen.
• Clicking the copy icon next to the UUID copies the UUID to the clipboard.
• The executed Change Control details screen displays the status, approver, time of start, last editor, and
count of affected devices.
Note:
• Click Review next to the status for details on review and approve process.
• Review and Approve - Click Review and Approve in open Change Controls for assessing Change
Control updates. These updates include configuration differences, and image bundle changes when
appropriate.
Figure 331: Review and Approve Pop-Up Window
• On the approved Change Control details screen, click Unapprove to revert the approval status and
Execute Change Control to run approved Change Controls.
Figure 332: Approved Change Control
315
• On the failed Change Control details screen, click Rerun to repeat the execution of a completed but failed
Change Control. This creates a new Change Control that must be approved again.
Figure 333: Rerun Change Control
Note: Click Remove when CVP prompts you with Remove all actions for devices that have no
failures? for skipping the rerun of completed actions.
• Click Rollback in executed Change Controls to open the Rollback Change Control pop-up window. To
create a rollback after evaluating the executed Change Control, select tasks to rollback from the table and
click Create Rollback Change Control.
Figure 334: Rollback Pop-Up Window
Note: CVP rolls back only completed configuration updates and image upgrade tasks.
Main Panel
This main panel consists of the following entities:
• Search bar - Enter a string to perform a search in the Change Control tree.
• Expand icon - Click to expand all stages.
• Collapse icon - Click to collapse all stages.
• Information icon - Click to get help on Change Control.
• Change Control tree - Change Controls are composed of actions and stages. Action types include tasks,
CLI snapshots, health checks, custom scripts, enter BGP maintenance mode, and exit BGP maintenance
mode, and other custom actions.
Note: Different icons represent various task types like adding a new device, updating configuration
on a device, and updating software image bundle on a device. Actions are represented with a bolt
symbol.
Actions are grouped and nested within stages via drag and drop.
Note:
316
Change Control
• Tasks being executed in parallel do not block subsequent actions in that branch.
• In a series execution, the Change Control execution starts from the first item and works its way
from top to bottom. The next action starts only when the previous action completed successfully.
• You can toggle the option by clicking the stage type dropdown menu in the edit panel.
Edit Panel
This panel edits stages and actions.
• Edit a stage - Click the required stage in the main panel. The edit panel provides the following options:
• Show details icon - Click to view associated configuration differences, image bundle changes, and
action details.
• Remove icon - Click to delete the stage.
Note: Select multiple tasks to view details and delete multiple tasks simultaneously. Use
command-click or Ctrl-click to select multiple items. To select a range of items, click the first
item and then Shift-click the last item.
• Group icon - Select multiple tasks to group them into sub-stages.
• Edit icon - Click to edit the stage name.
• Change Control stage type dropdown menu - Click to select the Change Control stage type.
Note: By default, all tasks and actions execute in series.
• Add actions - Adds actions to open Change Control. Select the required action and placement from
corresponding dropdown menus; and click Add to change control to update selected changes.
Figure 335: Add Actions to Change Control
317
• Logs - Displays logs of each update in the executed Change Control process.
Figure 336: Change Control Logs
Note:
• Use the search logs bar for filtering logs based on a string.
• Click the download icon to download logs to your local drive.
14.3.3 Creating Change Controls from the Change Controls Summary Screen
The first step involved in using the Change Control module to manage tasks is to create a Change Control.
While creating a Change Control, you add tasks with pending or failed status to the Change Control. By
default, all tasks in the same Change Control are added in parallel. If you want to change the execution order,
you can drag and drop the action cards on the Change Control Details screen. You can execute grouped
tasks after a Change Control is created, reviewed, and approved.
Note: If you do not add any tasks, the system creates a Change Control without tasks.
Complete the following steps to create a Change Control from the Change Control Summary screen:
1. On the CloudVision Portal, click Provisioning > Change Control.
318
Change Control
3. Select tasks you want to include in the Change Control by selecting appropriate checkboxes.
Note: If you do not select any tasks, the system creates a Change Control without tasks.
319
4. Click + Create Change Control with n tasks where n is the count of selected tasks.
Figure 339: Assignable Tasks Dialog Box with Tasks Selected
320
Change Control
Header Panel
This primary panel provides the following basic information on the Change Control:
• Edit icon to update the Change Control name
• Change Control information -
• The open Change Control details screen displays the status, scheduled date, last editor, count of
affected devices, and Universally Unique Identifier (UUID).
Note:
• Click the Scheduled for field and select the date to run the Change Control.
• Hover the mouse cursor over the clock icon to view the last time of action.
• Hover the cursor on the count of affected devices to view their list. Clicking on an affected
device opens the corresponding Device Overview screen.
• Clicking the copy icon next to the UUID copies the UUID to the clipboard.
• The executed Change Control details screen displays the status, approver, time of start, last editor, and
count of affected devices.
Note:
• Click Review next to the status for details on review and approve process.
321
• Review and Approve - Click Review and Approve in open Change Controls for assessing Change
Control updates. These updates include configuration differences, and image bundle changes when
appropriate.
Figure 341: Review and Approve Pop-Up Window
• On the approved Change Control details screen, click Unapprove to revert the approval status and
Execute Change Control to run approved Change Controls.
Figure 342: Approved Change Control
322
Change Control
• On the failed Change Control details screen, click Rerun to repeat the execution of a completed but failed
Change Control. This creates a new Change Control that must be approved again.
Figure 343: Rerun Change Control
Note: Click Remove when CVP prompts you with Remove all actions for devices that have no
failures? for skipping the rerun of completed actions.
• Click Rollback in executed Change Controls to open the Rollback Change Control pop-up window. To
create a rollback after evaluating the executed Change Control, select tasks to rollback from the table and
click Create Rollback Change Control.
Figure 344: Rollback Pop-Up Window
Note: CVP rolls back only completed configuration updates and image upgrade tasks.
Main Panel
This main panel consists of the following entities:
• Search bar - Enter a string to perform a search in the Change Control tree.
• Expand icon - Click to expand all stages.
• Collapse icon - Click to collapse all stages.
• Information icon - Click to get help on Change Control.
• Change Control tree - Change Controls are composed of actions and stages. Action types include tasks,
CLI snapshots, health checks, custom scripts, enter BGP maintenance mode, and exit BGP maintenance
mode, and other custom actions.
Note: Different icons represent various task types like adding a new device, updating configuration
on a device, and updating software image bundle on a device. Actions are represented with a bolt
symbol.
Actions are grouped and nested within stages via drag and drop.
Note:
323
• Tasks being executed in parallel do not block subsequent actions in that branch.
• In a series execution, the Change Control execution starts from the first item and works its way
from top to bottom. The next action starts only when the previous action completed successfully.
• You can toggle the option by clicking the stage type dropdown menu in the edit panel.
Edit Panel
This panel edits stages and actions.
• Edit a stage - Click the required stage in the main panel. The edit panel provides the following options:
• Show details icon - Click to view associated configuration differences, image bundle changes, and
action details.
• Remove icon - Click to delete the stage.
Note: Select multiple tasks to view details and delete multiple tasks simultaneously. Use
command-click or Ctrl-click to select multiple items. To select a range of items, click the first
item and then Shift-click the last item.
• Group icon - Select multiple tasks to group them into sub-stages.
• Edit icon - Click to edit the stage name.
• Change Control stage type dropdown menu - Click to select the Change Control stage type.
Note: By default, all tasks and actions execute in series.
• Add actions - Adds actions to open Change Control. Select the required action and placement from
corresponding dropdown menus; and click Add to change control to update selected changes.
Figure 345: Add Actions to Change Control
324
Change Control
• Logs - Displays logs of each update in the executed Change Control process.
Figure 346: Change Control Logs
Note:
• Use the search logs bar for filtering logs based on a string.
• Click the download icon to download logs to your local drive.
325
• For open Change Controls, the system displays the actions window to edit the appropriate leaf.
Figure 347: Info Tab in Edit Actions
Note: For completed Change Controls, the system displays the actions window to view the
appropriate leaf.
This window consists of the following entities:
• Info tab - This tab lists the actions to be run, edits actions, and displays action details.
Click the edit icon to reorder and edit actions.
Figure 348: Reorder and Edit Actions Screen
• Click the select action drop-down menu and select the required action.
Note: The system displays selected actions beneath the select action drop-down menu.
326
Change Control
Note: This option is available only for a card with multiple actions. The main action in a card
is not available to clear.
• Click the check-mark to save changes.
Note: Here, actions comprise of provisioning, Border Gateway Protocol (BGP) maintenance,
health checks, and snapshots.
• Configuration Changes tab - For tasks, this tab displays any configuration or image differences that
will be applied as part of the task.
Figure 349: Configuration Changes Tab in Edit Actions
• Logs tab - This tab displays log information of completed Change Controls.
Figure 350: Logs Tab in Edit Actions
• Remove from Change Control button - Click Remove from Change Control to remove this task from the
stage.
Note: Click Remove on the Confirm pop-up dialog box to confirm the deletion.
327
14.3.4.3 Review and Approve
Click the Review and Approve button at the upper right corner of the Change Control screen to review and
approve the Change Control. This button displays the Review and Approve dialog box for the selected
Change Control.
Figure 351: Review and Approve Dialog Box
This window consists of a device search field and a list of changes by Change Control stages.
Type the device name in the search field and if available, the system displays the list of changes for the
specified device.
The expanded Change Control stage list displays details of the actions to be executed in each stage, grouped
by a device.
If you are happy with configuration changes, click the Approve button at the lower right corner of the dialog
box to approve the Change Control.
328
Change Control
Click the Execute Change Control button to execute the Change Control.
Note: A Change Control is executed until all actions are either completed or there is a failure in one or
more of the actions.
Click the Stop Change Control button to stop the execution of Change Control.
Note: Clicking the Stop Change Control button returns failed and incomplete tasks to the assignable
tasks pool for reallocation.
If a Change Control has revertible actions, the system replaces the Stop Change Control button with the
Rollback Change button after the execution of all actions.
Figure 354: Rollback Change Button
Click the Rollback Change button to rollback the execution of Change Control.
329
Note: This feature can only be enabled from the Cluster Management role.
From the General Settings menu, select the Non-author Change Control review toggle to enable the
feature.
Figure 355: Enabling Non-Author Change Control Review
Pending and approved changes are displayed in the Change Control screen located in the Provisioning tab.
When the feature is enabled, the user making the change (author) will not be allowed to modify the approval
status (approve/disapprove) of their own changes.
330
Change Control
Stage Rules
A Template is defined by a list of Stage Rules. Stage Rules can be executed in Series or Parallel at the root
of the change control. Each Stage Rule is linked to one Action Bundle, which supplies the content for that
stage.
Action Bundles
An Action Bundle is a specific sequence of actions that contain up to one task action and a limitless number
of non-task actions. Action Bundles are reusable across multiple Templates and allow you to construct a
specific sequence of actions without defining the tasks or devices that they will be applied to.
Workflow
Creating and implementing a change control event with a Template, requires five basic steps:
1. Create or select one or more Action Bundles.
2. Assign each Action Bundle to a Stage Rule.
3. Configure the Stage Rules of the Template.
4. Save the Template.
5. Apply the Template in Change Control.
Once the Template has been saved, it will be available to apply repeatedly. For future change control
operations with the same actions and sequence, you will only need to follow Step 5.
331
You can manage Action Bundles by selecting Provisioning in the navigation bar and then selecting Action
Bundles.
Figure 356: Action Bundles
332
Change Control
Note: Every action except for Execute Task is a non-task action. You can only add one task action
for each Action Bundle.
4. Depending on the action type selected, you may have some additional options for what devices you can
assign the action to.
Note: The task action will always have its device assigned in the Stage Rule of the Template that
the Action Bundle is applied to. For more information on these options, see Device Placeholders
and Static Arguments.
5. Select the actions of this Action Bundle to be executed in series or parallel.
6. Review the list of actions, and click Save. The Action Bundle will now be available to be assigned in the
Stages Rules of Templates.
2. From the side panel, add new actions, modify the order of existing actions, or delete existing actions.
3. Click Save to update the Action Bundle.
1. Select Delete.
Figure 359: Deleting an Action Bundle
333
When creating or editing the actions of an Action Bundle, you can assign device placeholders instead of
specific devices to the action. These placeholders are then defined when the Action Bundle is added to
the Stage Rule of a Template. This gives you the flexibility to assign the same Action Bundle to multiple
Templates.
The following is a complete list of device placeholders, along with a sample list of devices you can statically
apply the action to:
Figure 360: Device Placeholders
The placeholders available to you vary based upon the combination of action types that you have already
selected. Consequently, additional placeholders may become available for an action after you have added
more actions to the Action Bundle. Specifically, ‘Match task device’ and ‘MLAG peer of selected task’ only
appear when the Action Bundle contains a task.
334
Change Control
335
14.5.2 Templates
Action Bundles will be assigned to a Template. With the Template you will bundle and sequence specific
actions and group those action bundles into stages to define the upgrade sequence.
Note: Applying a Template to a change control is a single operation. The Template is not permanently
linked to the change control; therefore, making changes to a Template after it has been applied to a
change control will have no effect on the existing change control.
• A Template can be applied multiple times. Each time the existing structure will be completely
overwritten, and only the tasks will remain as the sole input to the Template.
• This feature cannot be used to craft arbitrarily complex change controls, and advanced users may
want to leverage the Change Control API to construct custom layouts.
Accessing Templates
Select Provisioning and select Templates. The following screen will be displayed.
Figure 364: Accessing Templates
3. Once you have assigned an Action Bundle, complete any additional fields associated with the specific
Action Bundle.
Note: If the Action Bundle contains device placeholders, a Device Filter will appear. This is used to
define which devices will be applied to this Action Bundle.
336
Change Control
4. A sub-stage will be created for every populated Action Bundle. Arrange the sub-stages in Series or
Parallel.
Figure 366: Stage Rule
5. You can repeat Steps 2-4 to create a Stage Rule for each Action Bundle to be added to the Template, and
then arrange the order of the Stage Rules.
Figure 367: Order Stage Rules
Note: The same Action Bundle can be applied to multiple stages, each with a unique Device Filter.
337
6. Set the Stage Rules to execute in Series or Parallel.
Figure 368: Set Stage Rule
2. Edit any of the details by amending the fields, using the up and down arrows, or deleting Stage Rules.
3. Click Save Template when done.
338
Change Control
Note: Deleting a template will not affect change controls that were previously generated using that
template.
4. From the menu, select a Template and select Create Change Control.
5. The Change Control screen will be displayed. Revise to the change control format, review and approve the
proposed changes as needed. When done execute the network changes.
339
Note: Applying a Template to a change control operation is a single operation. Any changes made
to the Template will not be automatically applied to the change control.
340
Chapter 15
Note: If AAA is enabled and you attempt to perform image bundle upgrades without having these
required access rights, the upgrade will fail and the following error occurs:
341
15.2 Managing AAA Servers
The system uses the following functionalities to manage AAA servers:
• Adding AAA Servers
• Modifying AAA Servers
• Removing AAA Servers
342
Authentication & Authorization (CVP)
6. Enter your credentials when the Test Server pop-up prompts for it.
Figure 374: Test Server Pop-Up Window
343
4. Modify the required information.
5. If required, click Test to verify latest changes.
6. Click Save.
Note: To apply external authentication, there should be at least one enabled server listed in the
page.
15.2.2.1.1 RADIUS
Arista Vendor Specific Code: add it to the RADIUS dictionary.
15.2.2.1.2 TACACS+
For TACACS+ there is no vendor specific code, just different strings.
Note: CloudVision support for TACACS+ servers can be affected with the setting of the “service”
parameter. Some TACACS servers may require "service = shell" instead of "service = exec" in the
TACACS+ configuration (tacacs.conf).
This example configures user “bob” in the admin group and specifies certain attributes. It specifies a "cvp-
roles" attribute for the CloudVision role name (it can also be a list of roles).
A. tacacs.conf
group = admingroup {
default service = deny
service = exec {
default attribute = permit
priv-lvl = 15
cvp-roles = network-admin
}
enable = nopassword
}
user = bob {
login = cleartext "secret"
member = admingroup
}
B. CVP AAA settings
C. Switch AAA configlet
344
Authentication & Authorization (CVP)
6. Check to make sure that under the “Common Tasks Attributes” table, “Assigned Privilege Level” and “Max
Privilege Level” are added by default with and the specified value is 15. Also, verify that requirement is set
“Mandatory.”
6. Make sure that “Service Selection Rules” (under the “Access Policies” section), is using the policy named
“Default Device Admin”. The policy should be listed in the “Results” column of “Service Selection Policy”
table, and the “status” column should be green, indicating that the policy is enabled.
The shell profile should be automatically applied to all users under the ground named <user-group>.
345
• default
• double-quote-values
• message
• optional
• protocol
• return
• script
• set
201503290942/DES
5.3.0.40
Related topics:
• Access to the Access Control Page
• Adding AAA Servers
• Removing AAA Servers
5. Click Delete.
The system deletes selected AAA servers.
346
Authentication & Authorization (CVP)
Related Topics:
• Access to the Access Control Page
• Adding AAA Servers
• Modifying AAA Servers
347
15.3 About Users and Roles
Account management is based on users and roles. In the CloudVision Portal, users and roles have specific
meaning.
348
Authentication & Authorization (CVP)
Note: The read and write permissions cannot be changed for the default roles. But, custom roles can
be created where read and write permissions can be modified.
For more information, see Managing User Accounts.
349
The Users page lists all current users.
Figure 377: Users Page
3. Click + New User at the upper right corner of the Users page.
The system pops-up the New User window.
Note: The New User pop-up window creates users only with the ‘Local’ authentication type.
350
Authentication & Authorization (CVP)
351
The system prompts to confirm deletion.
Figure 380: Remove User Account
5. Click Delete.
The system deletes selected user accounts.
Related Topics:
• Adding New User Accounts
• Modifying User Accounts
• Viewing Activity Logs
352
Authentication & Authorization (CVP)
3. Click + New Role at the upper right corner of the Roles page.
The system pops-up the New Role window.
Figure 382: New Role Pop-Up Window
353
The new role is saved to the CVP database and is available to be assigned to users.
Note: The roles created can be assigned to locally created users or by the external AAA server to
its known users.
Related topics:
• Adding New User Roles
• Modifying User Roles
• Viewing Activity Logs
354
Authentication & Authorization (CVP)
5. Click Delete.
The system deletes selected user roles.
Note: A role assigned to user(s) cannot be deleted.
Related topics:
• Adding New User Roles
• Modifying User Roles
• Viewing Activity Logs
355
To access the Service Accounts screen, navigate to the Settings screen (Click the gear icon at the upper right
corner of the screen) > Access Control > Service Accounts.
The Service Accounts screen provides brief information of all service accounts in a tabular format. See the
figure below.
Figure 385: Service Accounts Screen
Note: The red exclamation mark on service accounts indicates expired tokens. Hovering the cursor
on the red exclamation mark displays the count of expired tokens.
You can perform the following tasks from this screen:
• Adding Service Accounts
• Editing Service Accounts
• Adding Tokens to Service Accounts
• Deleting Service Account Tokens
356
Authentication & Authorization (CVP)
Note:
• Enabled service accounts must have one or more roles assigned to it.
• Disabled service accounts may not have any roles assigned to it.
4. Click Save.
Note: If the Service Accounts screen does not display the new service account, Click Refresh.
Note: Alternatively, select the checkbox of required service account and click + Add Token to
Service Account.
2. Update required changes in the Description field, Roles dropdown and Status dropdown.
Note:
• Enabled service accounts must have one or more roles assigned to it.
• Disabled service accounts may not have any roles assigned to it.
3. Click Save.
357
See the figure below.
Figure 388: Generate Service Account Token
4. Click Generate.
Note: If the table under Current Service Account Tokens does not display the new token, click
Refresh. The new token gets access to APIs based on roles selected for the service account.
358
Authentication & Authorization (CVP)
5. Click Save.
Note:
• If the table continues to display deleted token(s), click Refresh.
359
• To simultaneously delete all expired tokens across all service accounts, click Remove all
Expired tokens (n) on the Service Accounts screen where n stands for the number of expired
tokens.
360
Authentication & Authorization (CVP)
• Ensure that the eAPI unix domain socket is enabled with management api http-commands and
protocol unix-socket configurations in devices running EOS releases prior to 4.20
To enable MFA and One-Time Passwords authentication, enable Advanced login options for device
provisioning using the toggle button under Cluster Management on the Settings page. See the figure
below.
Figure 392: Advanced Login Options for Device Provisioning Toggle Button
361
The system displays the Servers section when either RADIUS or TACACS is selected as Authentication
source.
Figure 395: AAA Access Control Page
Authentication Authorization
Local Local
RADIUS Local
RADIUS
TACACS Local
TACACS
Related topics:
• Managing AAA Servers
• Managing User Accounts
• Managing User Roles
• Access Requirements for Image Bundle Upgrades
362
Chapter 16
CloudVision Topology
The CloudVision Topology screen provides an explicit visual representation of the connectivity of your
network, allowing you to understand your network's structure and performance more easily. It provides the
following benefits:
• Easily understand parts of your network by collapsing or filtering out irrelevant parts
• Explore the historical state and performance of your network or watch it update live
• Support for both datacenter and campus style network connectivity
CloudVision topology provides Virtual Extensible LAN (VXLAN), Internet Protocol Security (IPsec), Distributed
Path Selection (DPS), and Link Layer Discovery Protocol (LLDP) network links between endpoints.
Note:
• Information and Statistics for each member link is accessed from the side panel. See Topology
Overview.
• If this screen does not display any devices, refer to the CVP release notes at https://
www.arista.com/en/support/software-download for compatibility issues.
To view the Topology screen, click the Topology tab on the CloudVision Portal.
Figure 396: Topology Screen
This screen is divided into main and side panels. The main panel displays the main topology visualization.
Devices are drawn with paths to connect them if they share at least one network connection. They are
grouped into containers that can be expanded or collapsed to control which portions of the network are
displayed in detail. See Main Panel of the Topology Screen .
The side panel provides the following panes to perform the specified functionalities:
• To customize the network view:
• Topology Overview
• Topology Layout Pane
363
• Topology Options Pane
• To view the component information:
• Container Details Pane
• Device Details Pane
• Link Details Panel
• Flow Visibility
Rack Spine
364
CloudVision Topology
• Download icon - Click to open the Export Preview pop-up window. Click Export for downloading the
current topology image to your local drive in either PNG or SVG formats with selected image resolution.
365
Note: We recommend to select higher resolutions for readable device labels in bigger topologies.
366
CloudVision Topology
Note: The right panel displays selected VLAN(s) distinguished with various colors.
• Link Overlay drop-down menu - Select an overlay to color each link based on selected metric type.
Options include:
• Active Events
• Bandwidth Utilization
• Discard Rate
• Error Rate
• Traffic Throughput
• VLANs
• None
• Devices
• Search field - Type the device name, MAC address, or model to perform a quick search.
• List of devices - Click on a device to view the detailed information of corresponding device. See Device
Details Pane.
367
16.3 Topology Layout Pane
On the Topology Overview pane, click Layout and select a container component from the topology on the
right panel to edit layout hints of multiple device(s) in the Topology Layout pane.
Figure 401: Topology Layout Pane
Topology automatically tries to guess a layout with specified containers and roles for your devices based on
their connectivity and advertised LLDP capabilities. However, you might sometimes find that the automatic
categorization is incorrect, or you simply want a custom layout different from what was originally envisioned.
The Layout pane lets you override the automatic categorizations and control the layout more directly.
The layout works on the basis of hints that describe the role of a device, whether it exists within a datacenter
or campus network, and where it should go in that network. Devices with similar roles and positions in the
hierarchy are grouped together. Parallel hierarchies like network pods or racks are created if different names
are used.
Examples
• A device named athens is a datacenter leaf switch, but it has no rack server connections yet
and is miscategorized as an edge switch. You can click on athens and then select Node type
as leaf to force it to take on a leaf role. It moves into the leaf position inside its datacenter
hierarchy.
• To partition your network into New York and San Francisco datacenters, multi-select the
devices or containers that must go in the New York datacenter, type New York in the
Datacenter field, and confirm it. Repeat the same process for San Francisco. Now, your
network is divided between these two datacenters, and you can expand or collapse New York
and San Francisco datacenters independently to view only one datacenter at a time.
368
CloudVision Topology
• Building drop-down menu - Select the building name that the selected device preferred to be
placed into.
• Floor drop-down menu - Select the preferred floor number in the selected building.
• Devices drop-down menu (Optional) - Set a name to be used to group devices in the selected floor.
• Datacenter - Aspine-and-leaf type layout is used and devices are arranged into pods and racks. It
provides the following options:
• Node Type drop-down menu - Select the preferred device type or roles.
• Pod drop-down menu - Select the pod name that the selected device preferred to be placed into.
Note: Devices in different pods of the same datacenter appear in different pod containers
that can be expanded and collapsed independently.
• Rack drop-down menu - Select the name of a rack similar to pod.
• Show Advanced - Click to view the Skip Auto-Generated Classifications drop-down menu.
Note: Click Hide Advanced to hide the Skip Auto-Generated Classifications drop-down menu.
If the Skip Auto-Generated Classifications option is enabled, CVP does not automatically
identifies the device(s). Only manually-provided layout hints affect the layout of the selected
device(s).
• Set all to Auto - Use the automatic layout classification exclusively; all manually-specified layout hints are
removed from selected devices.
• Save button - Click to save latest changes.
369
• Use device images: toggle button - Enable this option to view photorealistic device images for identified
devices. If this option is disabled, icons are used instead. See Figure 403: Network Hierarchy Tree with
Images.
Figure 403: Network Hierarchy Tree with Images
• Auto-detect management devices: - If this option is disabled, CVP will not attempt to automatically
identify management devices. Devices are considered management devices if they are known to have a
relatively high number of connections over a management interface.
• Auto tagger hints pane - Influences the way devices are arranged. If a device’s hostname matches
the provided text string or regular expression, it will automatically be tagged with the given role. Options
include:
• Spine Hint: - Type a text string that is used to identify matching spine devices.
• Leaf Hint: - Type a text string that is used to identify matching leaf devices.
• Save button - Click to save latest changes.
370
CloudVision Topology
371
16.6 Device Details Pane
To get a device pane, click on a device (switch, wireless access point, server, or telephone) on the right
panel. See Figure 405: Device Details Pane.
Figure 405: Device Details Pane
372
CloudVision Topology
Links represent connections between devices or clusters of devices. If two devices or clusters have at least
one network connection, a link is drawn to connect them. If they have many network connections, they
still have a single link in the topology view and information provided for the link is aggregated over those
connections. Expanding and collapsing containers expand and collapse links; you may sometimes want to
expand containers to see links in greater detail.
This screen provides the following information of the selected connectivity link:
• Click on a device name to view the corresponding device panel.
• Metrics - Displays statistics of traffic throughput, bandwidth utilization, discard rate, and error rate.
Note: Hover the cursor on the metrics to view metrics at the corresponding time.
• Events - Displays events of the selected connectivity link. Click on an event link to view the corresponding
Event Details screen.
Note: This option is available only when the Show active events option is enabled in the
Topology Options panel. See Topology Options Pane.
373
16.8 Flow Visibility
On the Topology Overview pane, click Flows to open the Topology Flows panel. This screen displays traffic
flows detected by EOS devices on the network.
Figure 407: Topology Flow Search
Note:
• CVP displays traffic flows only when SFLOW or IPFIX are configured on EOS devices.
• For complete flow visibility, flow collectors are required on all devices along the traffic flow path.
The Topology Flows panel provides search filters.
Search for traffic flows the following filters:
• Data source (Flow Tracking (sFlow or IPFIX) or Inband telemetry
• IP address
• Host
• Port
• Protocol
• VRF
• Latency
• Locality
Use the Color links with total bytes in flows toggle button to view aggregated bytes or packets of a traffic
flow on a single link.
Note:
• The color of the link depends on the corresponding flow metric as displayed on the color chart.
• Hover the cursor on a topology flow to view the flow metric of the corresponding link.
You can limit the count of displayed flows via the options available in the Top menu. Traffic flows sorted
by the selected metric (Bytes, Packets, Mean Latency, Max Latency, and Min Latency from the results
sorted by menu are displayed on the top of the list.
374
CloudVision Topology
The listed traffic flows in the side panel displays the five-tuple information. The arrow indicates the direction of
traffic flow.
In this example, TCP protocol is used in the traffic flowing from p4-
proxy101.sjc.aristanetworks.com via 1666 port to bs332.sjc.aristanetworks.com via 37150 port.
36.6GB of data is flown over the given time window.
Flows are displayed based on the timeline selected at the bottom of the Window. To search previous flows,
select an earlier time by either using the timeline's time selector, or by dragging the displayed time window to
a different position.
Note: Live view updates the data every 60 seconds.
Flow Highlight
Clicking on a listed traffic flow result highlights the nodes and edges in the graph where the flow has been
seen. Animated dots indicate the direction of the traffic flow.
Figure 409: Highlighted Traffic Flow
Note:
• In environments that capture flow data through sFlow, devices may not capture short-lived or small
flows, especially if the selected time window is small.
• This highlight does not guarantee to capture the exact path; it just displays all the devices and links
where that flow was seen in the given time window.
The Devices Reporting Matching Flows section displays the five-tuple information and lists devices that
reported the flow. Each device entry includes the ingress and egress port-channels, ingress and egress
interface, packets, bytes and the timestamp when this flow was seen given the time window.
375
Click on the following entities to view the corresponding specified information:
• Eye icon to magnify the device on the main panel
• Device hostname to view the Device Overview page
• Interface to view the Interface Overview page
• Explore button to view this flow on the Traffic Flows section
Flow Animation
To view traffic flow animation, click Settings on the Topology Overview panel and enable it using the
Enable traffic flows animation toggle button.
Figure 410: Enabling Traffic Flow Animation in Settings
Note: Few browsers consume high amounts of CPU to render traffic flow animations.
If traffic flow animation is disabled, animated dots are replaced with static arrows indicating the direction of
flow.
Figure 411: Topology with Disabled Traffic Flow Animation
376
CloudVision Topology
Links Panel
The Links panel is accessible via clicking the Links tab and displays the topology connections where the top
traffic flows have been seen.
Figure 412: Links Panel
377
378
Chapter 17
CloudVision Studios
CloudVision Studios is a powerful tool for managing the configuration of network features. The intuitive
interface is fully customizable, meaning that you can create and edit your own network features for
configuration. This gives you complete control over the configuration of your network.
Requirements
To use Studios, the following requirements must be installed:
• CloudVision minimum version: 2021.2.0
Features
The following features are available:
• Out-of-the-box support for common workflow configurations
• Unified Day-1 and Day-2 workflows
• Customizable Studios for bespoke workflow configuration
• In-depth and accessible change control
• Simultaneous configuration and management of separate network features
• First-class gRPC + REST APIs that easily integrate third-party resources
Known Limitations
The following is a list of known limitations in the beta-version of CloudVision Studios:
• Configuration-reconciliation: this is handled by the Network Provisioning UI
• CloudVision Studios cannot be applied to devices in an undefined container
• Studios rollback: once a Workspace and its configuration have been submitted, a user will need to undo
those changes by creating and submitting a new Workspace
• Studio input actions: scripts that automatically complete Studio inputs on a user's behalf (e.g. integrating
with an IPAM) are not yet supported
• Per-Studio or per-device RBAC: Phase 1 will include per-user roles and permission management that let
users read and write Studio data, but do not limit user roles to specific Studios
• Users should only have one Workspace open at a time. If users have two open Workspaces that contain
conflicts with one another and submit one of those Workspaces, the other may not be able to build
correctly. Consequently, that second Workspace may need to be abandoned or reconfigured
• Workspaces should not be created on CloudVision clusters that manage more than 100 devices
379
17.1 Getting Started with Studios
Before using Studios, it is important to understand the two main elements: the Studios and Workspaces. You
will use the two of these together to make changes to the mainline configuration of your network.
Studio
A Studio is an input template for a particular aspect or feature of a network. It defines the attributes of any
devices belonging to that feature. All your Studios are visible on the Studios home screen.
When you visit Studios for the first time, you will see that there are already several built-in Studios. These
cover some common network features, and each is explained separately in the section Built-In Studios. You
can create your own custom-built Studios so that you can determine a new network feature for configuration.
Workspace
A Workspace is what you use to create, configure, or edit a Studio’s inputs, and to tag the devices that
a Studio affects. It can be used to configure one or more Studios, which means that you can implement
configuration changes across multiple network features at the same time.
There are three states a Workspace can have:
• Submitted: A Workspace that has configured one or more Studios and been submitted for approval in
Change Control
• Open: A Workspace that has been created but not yet submitted
• Abandoned: A Workspace that has been discarded before submission
Note: Give any Workspace or Studio you create a relevant name and description, describing how it
relates to the configuration of your network.
380
CloudVision Studios
381
3. Select Studios on the sidebar.
Figure 415: Selecting Studios from the sidebar
4.
The Studios home screen is displayed. This is where you will initiate all your configurations. You can view
your Workspaces and see their statuses by selecting on Workspaces under Studios.
Role Permissions
On a per-studio basis, the permissions have the following effect:
382
CloudVision Studios
Users may encounter on-screen errors when configuring roles if the permissions set for Management and
Input Configuration do not result in a valid combination. A summary of the valid combinations is available
here:
Related Topics:
• Enabling and Accessing Per-Studio Permissions
• Configuring Permissions for Studios Role Based Access Control
• Updating Workspace Permissions
383
Accessing Per-Studio Permissions
Once Studios Role Based Access Control (RBAC) is enabled, any existing roles can be edited with per-studio
permissions or new roles can be created with those permissions and assigned to users.
The permissions can be accessed through Roles in Access Control when editing or creating a role. Scroll
down to Studios, which can be expanded to show the Per-Studio Permissions.
Figure 418: General Settings - Access Control - Roles
Each studio available in Studios can be added and permissions assigned to the role for that studio. Any studio
that is not added to the list will have the global permissions defined above.
384
CloudVision Studios
3. Configure the default settings for Studios, which apply to all studios.
Note: The default permissions will be overridden by any per-studio permissions you assign for a
selected studio.
Figure 422: Studios Default Permissions
385
4. Open the Per-Studio Permissions section of the menu.
Figure 423: Per-Studio Permissions
386
CloudVision Studios
Note: Once a Workspace has been submitted, it cannot be used again. If you wish to make further
changes to a Studio, you’ll need to create a new Workspace or select an open Workspace.
387
17.3.2 Creating a Workspace
1. Click Create Workspace, which will bring up the Create New Workspace modal.
Figure 425: Create a Workspace
2. Give your new Workspace a name and a description, and then click Create.
Figure 426: Name and Describe the Workspace
The Workplace you have created can now be used to manage the configuration of one or more Studios. It
will be available for use in the Workspace dropdown menu.
388
CloudVision Studios
1. Create a Workspace or click the Workspace dropdown menu and select the open Workspace that you
want to configure the Studio inputs with.
Figure 427: Selecting a Workspace
389
5. Once all the changes have been made, you can click Review Workspace.
Figure 429: Review Workspace
You will now be brought to the Build Screen that forms part of the Workspace submission process.
Note: If you want to make changes to multiple Studios with the same Workspace, do not click
Review Workspace at Step 4. Return to the Studios home screen and repeat Steps 1-3, selecting
the same Workspace for each Studio you want to configure.
390
CloudVision Studios
3. The Edit screen is displayed. You must enter a name and description for the new Studio.
4. After providing the Studio a name and description, you can configure the data that the Studio will collect as
inputs. First click Schema then click Add Root Input.
Figure 432: Add Root Input
391
5. Select one of the inputs to configure a variable of the Studio from the section labelled Add New Input. For
an explanation of schema inputs, see Input Types.
Figure 433: Add New Input
Note: You can configure the Schema input as a CLI configuration by using the Template function
once you have created the new input with Schema.
6. Once all the changes have been made, click Review Workspace to begin the build process. Once that is
completed, the Studio will appear in your Studio Suite.
2. The Workspace will be automatically built for submission, which includes input validation, compiling the
configuration, and the validation of the configuration. On the Build screen, you will be able to review the
proposed configuration changes.
Note: The Workspace is automatically built only for the first time that you click Review
Workspace. Any subsequent changes made after that will require that you re-build the Workspace
by clicking Build.
392
CloudVision Studios
4. You will be presented with a modal that will bring you to Change Control.
Figure 436: Workspace Submitted
The relevant user will then be able to approve the Workspace, and its configuration will then become part
of the mainline configuration of your network.
393
There are several elements in the screen.
Figure 437: Reviewing a Workspace
By clicking View Build Details, you can see each of these components for the individual devices that the
configuration affects.
This shows you the build progress for each device, and it helps you identify the devices the build progress
has failed on.
394
CloudVision Studios
The Workspace Summary table provides a brief overview of the type of modifications that a Workspace will
make.
Figure 439: Workspace Summary
On the left-hand side, you can see each of the Studios that the configuration affects. On the right is displayed
the type of change that has been made with the Workspace. By clicking on the type of configuration change,
you will be brought to the screen in which that change was implemented.
Click View All Modification Details, to view all the configuration changes displayed together in the manner
of Schema inputs.
This is shown for each individual device, and clicking on the device name will show you its proposed
configuration.
Figure 441: Proposed Configuration - Compare
On the left are your proposed changes and on the right is the existing configuration. It is color-coded for easy
reference:
395
• Green = additions
• Blue = modifications
• Red = deletion
17.4.2 Tags
A tag is a value-label pair that you apply to a device or an interface. User Tags allows you to group devices or
interfaces that share a common characteristic under a tag. By way of example, you could have:
Role: Spine or DC: New York
With Studios, you can then use these User Tags to create a separate configuration for different groups of
devices. For instance, if you wish to separately configure the spines and leafs of a data center fabric, you can
do so by tagging the relevant devices as spines or leafs.
Note: User Tags are not just for Studios, they have already been implemented for use with Event
Customization, Event Notification, and Dashboard Configuration.
396
CloudVision Studios
2. Click on Tags.
Figure 443: Tags
3. Click Create Workspace or select an open Workspace from the dropdown menu.
Figure 444: Create Workspace
4. Select one or more devices or interfaces, and then enter a value under Add or Create Tags.
Figure 445: Add or Create Tags
5. Click Create and Assign to give the tag to the selected device or devices.
397
You will use User Tags in two places in Studios: as the field data for a resolver input, and when assigning a
Studio to devices.
Resolver Input
Resolver Input is a Container Type that allows you to apply the input variables associated with it to a selection
of devices. The following is an example of a resolver input, which, in this case, allows you to select tagged
devices that you will assign to an NTP server.
Figure 446: Resolver Input
You will use Tag Assignment to specify the devices that any given Studio configuration affects. All of the
tagged devices you select must already have been commissioned for use in Studios with the Inventory and
Topology Studio. In order to assign devices, click Assign Tags and then enter a device tag query.
Figure 448: Tag Assignment
398
CloudVision Studios
You can edit these tagged devices at any point with a Workspace by clicking the pencil icon to the right of the
last tag.
You can use tags to apply an entire Studio to a selected group of devices. For example, you may want the
configuration of a Studio to relate only to devices in a particular data center. All devices in that data center
can be tagged under a label, and you can assign that Studio to that tag label.
17.4.3 Schema
Schema are the input variables of a Studio and are used to collect data from a CloudVision User. They are
defined when either Creating a New Studio or editing an existing Studio. You do this by selecting an input
type in the Studio Edit screen and then completing a form.
Figure 449: Schema
To edit a custom Studio Schema, create a new Workspace or select an open Workspace and then click the
Edit button within a Studio.
Figure 450: Editing a Studio Schema
At the Studio Edit screen, you can select Schema and the process will be the same as creating a new Studio.
399
Note: While you cannot edit built-in Studios, you can export and then import the Studio as a clone
that you can edit.
17.4.4 Template
Once you have defined an the variables for an input under Schema, you can use Template to convert the
input into a CLI configuration. You can click on the input you want to configure, and then click Template.
Figure 451: Template
400
CloudVision Studios
Both Mako and Jinja2 have a lightweight syntax that allows you to leverage the underlying Python of Studios
to create an effective Template.
You can find a primer on Mako syntax here and for Jinja2 here. There is also a short guide for using Mako for
Template in Appendix 1: Mako Syntax.
Importing
1. Click Create Workspace or select an open Workspace from the dropdown menu.
2. Click Import.
Figure 452: Import
3. On the Import Studio modal, select the Studio file and then click Import.
The imported Studio will now be part of your Studio Suite.
Exporting
1. From your Studio Suite, select the Studio you wish to export.
2. Within the Studio screen, click Export.
Figure 453: Export
3. A pop-up box will appear, which will ask you the details for downloading the file. Enter the details and click
Download or Save.
401
When using any Studio, except for Inventory and Topology, it is important to remember that you need to
assign User Tags to the Studio. These tags relate to devices commissioned with the Inventory and Topology
Studio. Only devices tagged to a Studio will be affected by any proposed configuration.
When you open up any Studio, other than Inventory and Topology, you will see the tag assignment option.
Click Assign Tags and enter the User Tags for the devices you want the Studio to affect.
Figure 454: Tag Assignment
From the Inventory and Topology page you can add devices and then configure their interfaces. Any device
added here will be made available for use in other Studios. Once the information for each device has been
402
CloudVision Studios
entered, click View. This will display the Devices page, which shows the interfaces on a selected device.
From this page you can add device interfaces and configure their connections to other device interfaces
Figure 456: Inventory and Topology - Device Interfaces
Note: All connections are bidirectional. It is not possible to create unidirectional connections.
All updates and their type will be listed here, and you can choose to accept these updates or ignore them.
Accepting adds devices and their interfaces for use in Studios and updates any configuration in Studios the
device relates to. Ignoring the updates will omit them from being configured in any Studio.
Note: In the beta-version, clicking Ignore for Now will result in updates remaining in the Review
Updates list.
403
With Connectivity Monitor, you can set up or update the hosts and set which hosts should be monitored.
Select the Connectivity Monitor Studio to display the following screen.
Figure 458: Connectivity Monitor
From the Connectivity Monitor screen, the hosts that the probes will monitor can be defined. Enter a name for
the device followed by the IP address and a description for the host. Enter an optional HTTP URL, which will
configure the EOS to measure the HTTP response time for that URL.
Groups of devices can be defined for monitoring by an EOS probe using Host Monitoring. Use device tags to
define the host groups.
Figure 459: Host Monitoring
After one or more device tags have been defined, click on the arrow to the right. This will allow you to add
hosts to the tagged group for monitoring. These hosts must already have been defined in the previous Hosts
section.
Figure 460: Host Monitoring - Monitored Hosts
404
CloudVision Studios
After the Studio has been configured, review the Workspace and submit to Change Control. Once it has been
approved, the results of the configured monitoring can be viewed by selecting the Connectivity Monitor under
Devices.
Figure 461: Devices - Connectivity Monitor
405
Time zones are ordered alphabetically. If the desired time zone is not in the list, select Other and enter a
name for that time zone in the Other Time Zone field.
Figure 462: Setting a Device Time Zone
Once you have assigned time zones to devices and optionally set the default time zone, review and submit
the Workspace. Once it is approved and executed in Change Control, the new settings will come into effect
on your network.
Add NTP servers for these tagged devices by clicking Add NTP Server. Multiple servers can be added for
the selected device tag, but only one server should be set as preferred. You can also enable iburst, which
406
CloudVision Studios
will send eight packets to the NTP server on start-up instead of a single packet. This will allow for faster
synchronization.
Figure 464: Configuring Additional NTP Settings
When you have assigned NTP servers to all the device tags, review and submit the Workspace. Once it is
approved and executed in Change Control, the NTP settings will come into effect on your network.
You can either configure an interface belonging to an individual device, or you can configure an interface
profile.
407
17.5.4.1 Configure a Device
All devices that have been commissioned for Studios using Inventory and Topology Studio will be listed under
Device. Select the device to configure one or more interfaces for by clicking the arrow on the right.
Figure 466: Configure a device
The list of interfaces that can be configured on this device and the available options are displayed. Scroll to
the right to see all of the available options.
There is also a profile option, which can be used to assign a profile to the device. If you assign a profile, you
do not need to enter a value for any other inputs; any values that you do enter for other inputs will override the
values of the profile.
Note: If a device you want to configure is not available for selection, add it using the Inventory and
Topology Studio.
408
CloudVision Studios
On the homescreen of Interface Configuration, click Add Profile. Enter a profile name and click the arrow on
the right. The following screen is displayed.
Figure 467: Configuring a Profile
From the Profile screen, the speed, the switchport mode, the VLAN access, or tagged VLANs can be set.
The mode selected for the interface may present you with more input options. When entering a description for
the profile, enter “$1” which will pull the individual interface’s description into the description when applied to
a device. For instance, you could give the profile description “Floor 3 phone ports: $1”; when you apply this
profile to a device interface with the description “Office 1”, the full description of the interface will then be read
elsewhere as: “Floor 3 Phone Ports: Office 1”.
When the profile has been configured, apply it to device interfaces by selecting a device to configure. The
profile can be applied to multiple interfaces across multiple devices. If you enter any individual interface
parameters with a profile selected, the individual parameters will override those of the profile.
409
When you open the Studio, the following screen will be displayed.
Figure 468: Streaming Telemetry Agent
17.5.5.1 Authentication
The first input determines how device streaming should be authenticated. There are two ways for the CVP
server to authenticate the device sending the telemetry information:
• Certificate
• Ingest key
If you select No, the ingest key will be used, which is a shared cleartext key. This key is defined as part of the
CloudVision set up process.
By selecting Yes, certificates are used for streaming authentication. CloudVision generates a JSON Web
Token (JWT) that is then saved to a temporary location (e.g. /tmp/token). This token is used by TerminAttr
for the initial secure authentication, and once authentication is successful, TerminAttr generates a certificate
signing request (CSR) and sends it to the CloudVision server, which then signs the CSR with its own CA
certificate and provides the generated client certificate to TerminAttr and stores it in the certificate partition
on EOS. After this, TerminAttr will switch to using the client certificate and key, and renames the token by
appending .backup to the filename and will not use it anymore.
410
CloudVision Studios
Once you have selected the mode for authenticating the data, the VRF assignment can be selected. Here you
will select devices with a tag query and then assign them to a VRF.
Figure 469: VRF Assignment
When disabling AAA, you are disabling authorization and accounting for eAPI commands sent by CloudVision
to TerminAttr only when the Advanced Login setting is used. This does not affect AAA for other transports,
such as SSH or eAPI over HTTPS.
The Advanced Login setting has been the default login method since version 2021.2.0. It can use multi-
factor authentication and one-time passcodes to authenticate all CloudVision managed devices when you
authenticate with CloudVision. When you select Yes, all eAPI requests are sent over the gRPC session
established by TerminAttr instead of eAPI over HTTPS.
Disabling AAA is required in situations when the Advanced login setting is enabled and users are
authenticated with certain RADIUS servers, where the server does not support authorization requests that do
not have a preceding authentication request.
411
The Studio supports two common campus fabric designs. These designs are illustrated below, with support in
beta-version for the L2 MLAG fabric.
Figure 471: Campus Fabric
To create a new campus, click Add Campus and enter a name for the campus network. When done, click the
arrow on the right.
The main configuration screen for the campus will be displayed.
Figure 473: Tag Assignment
To assign devices that belong to this campus, cick the dropdown arrow beside Tag Assignment and click
Assign Tags. You can now add devices with a tag query to this campus network. If a desired device is not
present, add it using the Inventory and Topology Studio or, if the tag is not present, create a new User Tag.
412
CloudVision Studios
Next, configure the parameters and aspects of the L2 MLAG fabric. These parameters are used throughout
the campus network when an MLAG pair exists. Configure the VLANs that will be defined for the campus
network. A special management network may be defined when in-band management of the switches is
required. The SVI virtual address is used as the anycast gateway across the campus Spline switches, as well
as an IP helper address for DHCP relay functionality.
Central to the configuration of a campus network is assigning the roles to the selected devices in its fabric.
They can be either campus Spline devices or leaf devices within a pod.
Figure 474: Assigning Roles
A campus Spline device may be used for both connecting downstream campus leaf switches, as well as
connecting hosts. The campus Spline device will often have links toward networks external to the campus
fabric.
A pod is a collection of leaf devices that connect to a campus Spline pair of switches. Each pod consists of
one or more switches and may be used to form an MLAG stack. Some examples of campus pods are shown
below:
Figure 475: Examples of Campus Pods
The selection of devices available to assign either as campus Splines or as members of a pod are those that
you defined earlier on this screen as belonging to the campus.
The connections between devices are configured in the Inventory and Topology Studio. If the devices are
already wired-up in your network, they will be shown there. If not, the intended connections can be specified
in that Studio, and configuration for those interfaces will be generated.
413
To build a campus network, you’ll need the following connections:
• Between campus Splines: all interfaces connecting to the two Splines will be configured as an MLAG peer-
link port channel.
• Between Splines and campus pod primary and secondary: these connections are referred to as “uplinks”
and “downlinks”. They should be arranged according to the L2 MLAG design shown above. Configure
these connections as multi-chassis link aggregation (MLAG) port channels.
• Between the campus pod primary and secondary: all interfaces of the two leaf switches will be configured
as an MLAG peer link port channel.
• Between pod primary and secondary and pod members: the connections between these devices are
configured as multi-chassis link aggregation (MLAG) port channels
Once the configurations of your campus fabric have been set, submit the Workspace and your campus
network will be available for review and approval in Change Control.
Note: In order to build this design, you’ll first need to use the Inventory and Topology Studio to either
accept the LLDP derived topology connections or manually add devices and interface connections.
414
CloudVision Studios
415
The tag placement is illustrated in the following diagram:
Figure 477: Layer 3 Leaf-Spine - Required Tags
416
CloudVision Studios
After a data center is in place, then create and configure its pods. Each pod is a leaf-spine module inside the
data center fabric. Use the DC-Pod tag to assign devices to a pod.
Figure 479: Configuring the Fabric - Pods
Next, you will be presented with pre-filled values for the fabric of this pod, along with sections that allow you to
add leaf and spine devices. Change the fabric configuration for the pod as needed.
Figure 480: Configuring the Fabric - Pod Configuration
417
You can add spine and leaf devices by using the Role tag. When adding a leaf device, you can further specify
an ASN that will override the ASN number set at the pod level. You’ll also be able to see on this screen a
summary of all the devices in this domain.
Figure 481: Configuring the Fabric - Summary
Once you have configured all the data centers, pods, and their devices, review and submit the Workspace.
A change control containing the configuration updates associated with the changes from the Workspace
will be created. Review, approve, and execute the change control for the fabric configuration defined in the
Workspace to take effect in the network.
Note: You can then stretch VLANs and VRFs across the newly deployed pods by using the EVPN
Services Studio.
418
CloudVision Studios
Note: If you do not want to use the L3 Leaf-Spine Fabric Studio, then you will need to create these
tags before configuring the EVPN Services Studio.
419
17.5.8.2 Configuring EVPN Services
When you open EVPN Services, the following screen will be displayed. From this screen, tenants are created
and the default VRF and MAC-VRF attributes for all tenants are created.
Figure 482: Configuring EVPN Services
420
CloudVision Studios
When creating a tenant or selecting an existing tenant to configure, you can create VRFs and VLANs for use
within this tenant. You will also determine the base number used to generate VNIs.
Figure 483: Configuring EVPN Tenants
17.5.8.3 VRFs
421
When configuring a VRF, always specify a VNI. The remaining fields are all optional and their use depends
upon how you are configuring your network.
Figure 484: VRFs
The iBGP Detail fields are necessary when a VTEP is composed of a pair of leaf switches that have a host
(or hosts) connected to only one switch in an MLAG pair. If incoming traffic arrives at the leaf switch in the
pair that the host is not connected to, the leaf switch will drop that packet. By configuring a VLAN and SVI to
establish an IBGP peering on for this VRF, both switches in an MLAG pair are aware of all host connections
including those connected to only one switch.
NAT Source Details are used to configure a virtual source NAT address for the VRF. It is used mainly for
troubleshooting, because all VTEPs share the same IP address and MAC address for each SVI. This means
that pings to workloads behind remote VTEPs or local workloads (e.g. MLAG VTEPs) may not be successful
because the reply cannot be returned. When the destination host responds to either an ARP request or
ICMP echo request, the reply is processed by the first VTEP it arrives at, which is because all VTEPs have
the same IP and MAC address. In order for each VTEP to successfully ping a workload, configuring a NAT
source address enables a dedicated loopback interface that can be used as the source address for pings
within a VRF.
The Override VRF Attributes section allows you to override the default VRF attributes associated with this
VRF.
17.5.8.4 VLANs
422
CloudVision Studios
A name must be provided for each VLAN that is created. Then select whether it is applied to a routed or
bridged setting.
Figure 485: VLANs
By default, the toggle is set to routed. You can also provide details of a DHCP server and provide a default
gateway by entering a Switched Virtual Interface (SVI) virtual IP address, which are options only available
with a routed VLAN.
The last two options, Devices and Override Attributes, are shared with a bridged VLAN, where devices can be
assigned to this VLAN and override the default values generated for configuration elements associated with
this VLAN.
Note: When assigning devices to a VLAN, make sure to toggle the value for the Apply column to Yes
to configure that VLAN.
423
You can bundle VLANs that have already been created within a tenant into VLAN aware bundles. Each
bundle consists of a range of VLANs that share the same MAC-VRF attributes, which you can define by
overriding the default MAC-VRF attributes shared across tenants.
Figure 486: VLAN Aware Bundles
424
CloudVision Studios
To create a segmentation domain, click Add Domain and enter a device tag query. A segmentation domain
is identified by device tags, which gives you the ability to select a group of switches that form the domain. All
devices in the same domain will be configured with identical segmentation policies.
Figure 488: Segment Security - Add Domain
Once you have created the domain, click the arrow on the right, and the Policies screen will be displayed.
Figure 489: Segment Security - Policies
Enter a segment a name and identify its members. The segment membership is based upon either IPv4 or
IPv6 prefixes, or both.
Next, set the security policies between segments. These policies apply to a single VRF. Configure segment
policies for the VRF by clicking View underneath the Policies heading. Determine the relationship between
pairs of segments inside the domain and the forwarding behavior of traffic between them.
425
• Arista MSS-G uses the terms “group” and “segment” interchangeably.
• The segments defined in the Forescout console under Tools > Segment Manager are static ranges
designed to indicate areas of the network managed by Forescout and are unrelated to Arista MSS-G
segments.
• The groups defined in the Forescout console Policy Manager are for organizing host/user/device
taxonomy. Although it is possible through the Forescout Policy Manager to map each Forescout Group
to an Arista MSS-G group, it is neither automatic nor required. In the majority of use cases, Forescout
Groups will be hierarchical and not map directly to Arista MSS-G groups; instead, Arista MSS-G groups
will be defined by Forescout Policies that may consider hosts/users/devices across several Forescout
Groups.
Requirements
To configure MSS-G with Dynamic Configuration from Forescout the system must meet the following
requirements:
On the Arista side:
• EOS 4.27.1F+
• TerminAttr 1.22+
• CloudVision 2022.1.1+.
• On the Forescout side it’s GA for Continuum 8.4.0, eyeSegment 5.18.0 (recommend 5.19.0), and the
Forescout Arista MSS-G 1.0.0 module.
On the Forescout side:
• Continuum 8.4.0
• eyeSegment 5.18.0 (recommend 5.19.0)
• Forescout Arista MSS-G 1.0.0 module.
Limitations
Note the following limitations before configuring MSS-G with Dynamic Configuration from Forescout.
• Port matching: Policies are enforced based on IP address, and at this time there is no support for port or
protocol matching.
• 60-segment limit: Arista CloudVision and EOS switches support a maximum of 60 segments.
• Single segmentation domain: All EOS switches participating in MSS-G receive all host-to-segment
assignments transmitted from Forescout eyeSight to Arista CloudVision.
• Single VRF: The integration supports just a single Virtual Routing and Forwarding instance, or VRF. That
VRF is configurable, but by default it uses the default VRF.
• Initial sync time: The initial transmission of host-to-segment assignments from CounterACT to CloudVision
could take up to an hour, depending on the number of hosts, the number of CounterACT appliances,
and the latency between CounterACT and CloudVision. It can be made much faster by enabling dynamic
configuration on participating switches after CloudVision has received all initial segmentation configuration.
• Host scale: The integration supports up to 25,000 hosts in its initial phase. Enforcement point scale: The
integration supports up to 100 enforcement points. Note that not all switches must be used as enforcement
points. As long as traffic flows through an MSS-G capable enforcement point, policies will be enforced.
• Supported actions: Currently, the supported actions are forward and drop.
• IPv6: IPv6 is not currently supported in this integration.
• Wifi endpoints: To make the integration work with wireless clients, access points must be configured to
forward traffic in the clear to an enforcement point.
426
CloudVision Studios
• Default forwarding behavior: Policies are enforced based on destination address. There are three cases.
• The source and destination address each belong to a segment, and there is a segment-policy defined
that determines the forwarding behavior for the packet. In this case, participating switches will enforce
the configured segment policy.
• The destination address does not belong to any segment. In this case, there is no MSS-G configuration
to enforce, and the switch’s actions will reflect whatever non-MSS-G configuration exists on the switch.
• The destination address belongs to a segment, but either the source address does not or there is
no segment policy to determine what action the switch should take. In this case the switch uses
an “unspecified policy action” default, which could be DROP or FORWARD. This can be set in the
eyeSegment MSS-G plugin.
• One segment per host: A host IP address can exist in only one Arista segment (e.g., an IT admin user
cannot be in both a “user” and an “admin” segment simultaneously).
• Flat segment-policy hierarchy: eyeSegment policies destined for export to Arista CloudVision must not
contain exceptions or make use of the “Any” group, eyeSegment virtual zones (e.g., Internal), or deleted
zones. Improperly formed policies won’t be exported.
• Bidirectional segment policies: Users should typically construct policies to forward or drop traffic in
mirrored fashion (e.g., Zone A to Zone B Allow All and Zone B to Zone A Allow All). It is not strictly
necessary to define rules both ways, but given the probability of bidirectional traffic, users will usually want
to configure policies bidirectionally.
• Export to CloudVision: The export to CloudVision is disabled by default until eyeSegment version 5.19, but
can be enabled via the fstool command. Starting with version 5.19 it is enabled by default.
• Resynchronization: Users must configure resynchronization per host-to-segment assignment policy or else
CounterACT will never transmit host-to-segment assignments for hosts it learns while its connection to
CloudVision is down. All deployments should use resync. Instructions for setting up resync can be found in
the policy template.
• Policy export flap: Exporting policies from eyeSegment to MSS-G may result in a brief period of forwarding
disruption as switches remove and then re-apply policies.
• Switch forwarding table partition: The EOS switches must have forwarding table partitions in place that
allow for the desired host scale.
• A CloudVision certificate should be imported into Forescout Continuum’s trusted certificates in order to
secure the connection between Forescout Continuum and CloudVision.
• On 4GB switches there may not be sufficient memory to run dynamic MSS-G and sFlow.
427
Once installed, double-click on the Arista MSS-G module from the list and enter the CloudVision information:
Figure 491: Forescout - Arista MSS-G Plug-in
428
CloudVision Studios
Select Export to Arista MSS-G to export eyeSegment policies into CloudVision. Check that the appropriate
segment-policies show up in CloudVision’s network-wide Network Segmentation view. All Forescout
429
eyeSegment policies must be exported at the same time. If a subset of policies is exported, previously
exported eyeSegment policies not currently selected will be removed.
>en
#conf
(config)#management api gnmi
(config-mgmt-api-gnmi)#transport grpc default
(config-gnmi-transport-default)#no shutdown
(config)#daemon TerminAttr
(config-daemon-TerminAttr)#exec /usr/bin/TerminAttr -ingestgrpcurl=<address>:<
port> -cvcompression=gzip -ingestauth=token,/tmp/token … -cvconfig=true
(config-daemon-TerminAttr)#no shut
17.7.1 Prerequisites
The integration requires a few configurations in Cisco ISE. Refer to Cisco ISE documentation for configuration
information.
• A pxGrid compatible license is necessary.
• The pxGrid service must be enabled.
• The ERS service must be enabled.
• There must be a user with ERS access permission.
• ISE certificates must contain Subject Alternative Name (SAN). Common Name based certificates will be
rejected.
430
CloudVision Studios
Known Limitations
• Both ERS and pxGrid are needed.
• Dynamic IP prefix updates and rule changes may take up to 30 seconds to be updated in CloudVision.
• Layer-4 policies are not supported. Policies must be either accept-all or deny-all. ACL rules are limited to
only permit ip and deny ip.
• Hostnames are not supported, i.e., static ISE configuration that is specified using hostnames will not be
applied to CloudVision or to the switches and may cause issues to the integration.
• Setting up the ISE collector will clear all existing segmentation configuration in CloudVision.
• ISE SGT Mapping Groups are not supported.
• The MONITOR egress cell option is not supported.
• Only one Matrix configuration is supported.
Generating a Certificate
For information and instructions to generate certificates, refer to the official Cisco ISE documentation.
Onboarding ISE
Complete the form and select Onboard.
• Cisco ISE URL (including protocol): https://ise-host.com
Note: Use the fully qualified hostname. Include the protocol, such as https://.
431
• Cisco ISE Key File: Upload the file client.key (decrypted)
• Cisco ISE CA File: Upload chain.cer
Note: If deployment fails due to errors in validating the certificate, it may be because the Cisco ISE
certificates do not specify the Subject Alternative Name option, which is required.
• pxGrid Port: Leave the default value (8910) or provide the port configured in ISE.
• pxGrid User: arista-ise-integration
• ERS Username: user_with_ers_permission
• ERS Password: password_for_user_above
Upon successful onboarding, the collector client will appear in the Cisco ISE user interface.
1. From Administration navigate to pxGrid Services and select All Clients.
2. Find the username in the table.
3. Check the relevant row.
4. Click Approve at the top of the table.
5. Allow up to one minute for the collector to notice the approval.
6. Data will start streaming to CloudVision. This may be checked in the telemetry browser in CloudVision:
Dataset: analytics
Path: /yang/arista/segmentation/config/domain
7. Devices onboarded to CloudVision with OpenConfig and MSS-G enabled will receive and apply the
configurations.
432
Chapter 18
433
18.3 How to Use Snapshots
In CloudVision, snapshot service schedules and periodically captures the outputs of commands that are
specified in the template. The frequency of capturing command outputs is based on the scheduling frequency
mentioned in the snapshot template. The information recorded in snapshots can provide you with insights on
the configuration, EOS image, and other aspects of the device. Snapshots are captured for individual devices
(single switches) only.
The main uses of snapshots are:
• Viewing snapshots to understand the state of a device at a given time, or over time.
• Comparing snapshots to see the change in state of a device between two points in time.
• Comparing snapshots to see the state of a device before and after a change control.
You can navigate to the Snapshots page through one of the following paths:
• Inventory > Device_ID > Snapshots
• Network Provisioning > Right-click on the required device > Snapshot.
434
Using Snapshots to Monitor Devices
You can navigate to the Snapshot Configuration page through one of the following paths:
• Inventory > Device_ID > Snapshots > Snapshot Configuration
• Network Provisioning > Right-click on the required device > Snapshot > Snapshot Configuration.
435
The Snapshot Configuration page displays the Add Snapshot Configuration section.
Figure 496: Add Snapshot Configuration Section
3. In the Name field, type the name of the custom snapshot template.
4. In the Commands field, enter the EOS CLI commands to be executed by the snapshot.
5. If necessary, click the Devices drop-down and select required devices.
6. Under Interval, Specify the frequency for capturing snapshots in either minutes, hours, or days.
7. Click Save.
The Snapshot Configuration page immediately displays the latest configuration along with the list of
current configurations.
Note: A snapshot configuration that is created without a device is saved and marked as
unscheduled. Snapshot templates with bash commands are marked as invalid. However, these
unscheduled and invalid templates can still be selected while creating a Change Control to capture
pre and post change control snapshots.
436
Using Snapshots to Monitor Devices
437
3. Right-click on the device icon, then click Snapshot.
Figure 498: Initiate Viewing Snapshot
438
Using Snapshots to Monitor Devices
5. Click the date and time breadcrumb for viewing all snapshots of the corresponding template.
Figure 500: View All Snapshots
7. Click Compare against a previous time for viewing corresponding snapshot differences.
439
8. The page displays corresponding snapshot differences.
Figure 502: Compare Snapshots
Note: Snapshot differences are displayed in color codes to quickly identify significant changes in
the state of the device over time. Click the Split tab for viewing snapshot differences in different
windows.
440
Chapter 19
The current CVP release does not support restoring backups taken from previous CVP releases. If you
would like to restore a backup from a previous CVP release, install the previous release, restore the backup,
and then upgrade to the current release. After you have successfully upgraded to the current release, take
another backup so that you can directly restore that into current main release in the future.
For more information, see:
• Requirements for Multi-node Installations
• Using CVPI Commands to Backup and Restore CV-CUE Data
• Using CVPI Commands to Backup and Restore CVP Provisioning Data
441
19.1.2.1 Restore CV-CUE Data
You can restore wifimanager from a backup using the cvpi restore wifimanager </path/to/
backup/file> command.
Figure 503: Restore CV-CUE Data
Note: For a CV cluster, you can run this command only on the primary node. If no backup was carried
out before the upgrade, you can use a scheduled backup under the /data/wifimanager/data/
data/backup directory to restore wifimanager.
19.1.2.2 RMA
For RMA or recovery issues, contact [email protected].
Note: Back up wifimanager on any node before submitting it for an RMA. When the node is re-
deployed post-RMA, you can restore earlier wifimanager data from a backup that you have stored
elsewhere.
19.1.3 Using CVPI Commands to Backup and Restore CVP Provisioning Data
Backup and restore are CVPI functionalities of CVPI components.
Note:
The default directory to save and restore backup data files is /data/cvpbackup.
The default directory for backup/restore log files is /cvpi/logs/cvpbackup.
The default directory for temporary files during backup/restore is /data/tmp/cvpbackup.
The following commands are used to backup and then restore the containers, devices, configlets, images,
and configlet or image assignments that are defined in CVP.
Note: When restoring devices, use the username and password that can access the devices being
registered.
Note: To check the progress of the backup, read the latest backup_cvp.*.log file in /cvpi/
logs/cvpbackup.
442
Backup & Restore, Upgrades, DNS NTP Server Migration
This command creates the backup files for the CVP component.
The cvp.<timestamp>.tgz parameter contains provisioning data from the DataBase (DB) of the CVP
application. The cvp.eosimages.<timestamp>.tgz parameter contains EOS images and extensions
stored in the DataBase (DB) of the CVP application.
Note: To check the progress of the restore, read the latest restore_cvp.*.log file in /
cvpi/logs/cvpbackup.
Note:
To check the progress of the backup, tail -f/cvpi/logs/cvpbackup/
backup_cvp.20190606020011.log.
CVP backup creates two backup files in the /data/cvpbackup directory for restoration. The
eosimages.tgz is generated only when it differs from the currently available copy of the
eosimages.tgz, and is an optional parameter for restore if the CVP system already contains the
same EOS image.
The cvpi backup command can be run anytime and does not disrupt the cvp application. However,
the cvpi restore command will stop the cvp application and disrupt the service for the duration of
the restore. If the restore is from a backup on a different CVP system to a new CVP system, it may
also be required to on-board the EOS devices or restart the Terminattr daemons on the EOS devices
after the restore.
443
Verifying the Ownership of cvpbackup Directory
Use one of the following commands to verify the ownership of cvpbackup directory:
• ls
This example verifies the ownership of cvpbackup directory using the ls command.
The cvp.<timestamp>.tgz parameter contains provisioning data from the DataBase (DB) of the CVP
application. The cvp.eosimages.<timestamp>.tgz parameter contains EOS images and extensions
stored in the DataBase (DB) of the CVP application.
This example changes the ownership of all cvpbackup directory files.
444
Backup & Restore, Upgrades, DNS NTP Server Migration
3. For devices running EOS releases prior to 4.20, ensure that the eAPI unix domain socket is enabled with
the following configuration:
19.2.1 Upgrades
Upgrades do not require that the VMs be redeployed, and do not result in the loss of logs. .
The CVP cluster must be functional and running to successfully complete an upgrade. As a precaution
against the loss of CVP data, it is recommended that you backup the CVP data before performing an
upgrade. To upgrade CVP to the current release, you must first upgrade CVP to the supported release that
supports an upgrade to the current release. For more information, refer the CVP release notes at Arista
Software Download page.
Note: Centos updates (yum update commands) outside of CVP upgrades are not supported.
445
19.2.1.2 Upgrading from version 2018.1.2 (or later)
Use this procedure to complete the fast upgrade of CVP to the current version of CVP.
Pre-requisites:
Before you begin the upgrade procedure, make sure that you have:
• Verified the health of your CVP installation (see Verifying the health of CVP before performing upgrades.
• Verified that you are running version 2018.1.2 or later.
Complete the following steps to perform the upgrade.
1. SSH as root into the primary node.
2. Run these commands:
a. rm -rf /tmp/upgrade (to remove data from old upgrades if already present)
b. mkdir /data/upgrade
c. ln -s /data/upgrade /tmp/upgrade
d. scp/wget cvp-upgrade-<version>.tgz to the /data/upgrade directory.
3. Run the su cvpadmin command to trigger the shell.
4. Select the upgrade option from the shell.
Note: On a multi-node cluster, upgrade can be performed only on the primary node. Upgrading to
the current version may take up to 30 minutes.
Note: If an issue occurs during an upgrade, you will be prompted to continue the upgrade once the
issue is resolved.
Note: Upgrade to 2021.1.0 and newer requires the configuration of a kubernetes cluster network.
You will be prompted during the upgrade to enter the private IP range for the kubernetes cluster
network. For this reason, a separate, unused network addressing should be provided when
configuring CVP.
Users will see this prompt while running the upgrade:
The cvpi env command will show kubernetes cluster related parameters. KUBE_POD_NETWORK
and KUBE_SERVICE_NETWORK are the two subnetworks derived from KUBE_CLUSTER_NETWORK.
KUBE_CLUSTER_DNS is the second IP address from KUBE_SERVICE_NETWORK.
Note: KUBE_CLUSTER_NETWORK is the kubernetes private IP range and this should not
conflict with CVP nodes, device interface IPs, cluster interface IPs, or switch IPs. In addition, do
not use link-local or the subnet reserved for loopback purposes or any multicast IP addresses. The
subnet length for KUBE_CLUSTER_NETWORK needs to be less than or equal to 20.
446
Backup & Restore, Upgrades, DNS NTP Server Migration
Note: It is recommended that you save the CVP cluster configuration to a temporary file, or
write down the configuration on a worksheet. The configuration can be found in /cvpi/cvp-
config.yaml.
1. Power off the node you want to replace (primary, secondary, or tertiary).
2. Remove the node to be replaced.
3. Allow all components of the remaining nodes to recover.
The remaining nodes need to be up and settled before continuing to step 4.
4. Use the cvpi status all command to ensure that remaining nodes are healthy. You will see some
services are reported as “NOT RUNNING” due to not all pods for those services being online. This is
expected while a node is offline.
Action Output
-------------
447
flannel status secondary NOT
RUNNING Only 2/3 pod(s) ready
448
Backup & Restore, Upgrades, DNS NTP Server Migration
>r
Please enter minimum configuration to connect to the other peers
*Ethernet interface for the cluster network: eth0
*IP address of eth0: 172.31.0.216
*Netmask of eth0: 255.255.0.0
*Default route: 172.31.0.1
*IP address of one of the two active cluster nodes: 172.31.0.161
Root password of 172.31.0.161:
8. Wait for the RMA process to complete. No action is required.
449
Running : /bin/sudo /bin/systemctl is-active cvpi-check
Starting: cvpi-check
Running : /bin/sudo /bin/systemctl start cvpi-check.service
9. Continue waiting for the RMA process to complete. No action is required.
Action Output
-------------
COMPONENT ACTION NODE STATUS
ERROR
hadoop cluster tertiary (E) DONE
Action Output
-------------
COMPONENT ACTION NODE STATUS
ERROR
aerisdiskmonitor config primary (E) DONE
450
Backup & Restore, Upgrades, DNS NTP Server Migration
451
Copying: /data/journalnode/mycluster/current/last-writer-epoch from
secondary
rsync -rtvp 172.31.0.161:/data/journalnode/mycluster/current/last-writer-
epoch /data/journalnode/mycluster/current
Copying: /cvpi/tls/certs/kube-cert.pem from secondary
Copying: /cvpi/tls/certs/server.crt from secondary
rsync -rtvp 172.31.0.161:/cvpi/tls/certs/server.crt /cvpi/tls/certs
Copying: /data/journalnode/mycluster/current/VERSION from secondary
rsync -rtvp 172.31.0.161:/data/journalnode/mycluster/current/VERSION /data/
journalnode/mycluster/current
Copying: /data/journalnode/mycluster/current/paxos from secondary
rsync -rtvp 172.31.0.161:/data/journalnode/mycluster/current/paxos /data/
journalnode/mycluster/current
Copying: /data/journalnode/mycluster/current/last-promised-epoch from
secondary
rsync -rtvp 172.31.0.161:/data/journalnode/mycluster/current/last-promised-
epoch /data/journalnode/mycluster/current
rsync -rtvp 172.31.0.161:/cvpi/tls/certs/kube-cert.pem /cvpi/tls/certs
Starting: cvpi-config
Running : /bin/sudo /bin/systemctl start cvpi-config.service
Starting: cvpi
Running : /bin/sudo /bin/systemctl start cvpi.service
Running : /bin/sudo /bin/systemctl start cvpi-watchdog.timer
Running : /bin/sudo /bin/systemctl enable docker
Running : /bin/sudo /bin/systemctl start docker
Running : /bin/sudo /bin/systemctl enable kube-cluster.path
10. Enter "q" to quit the process after the RMA process is complete! message is displayed.
Waiting for all components to start. This may take few minutes.
[ 560.918749] FS-Cache: Loaded
[ 560.978183] FS-Cache: Netfs 'nfs' registered for caching
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 48.20
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.73
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 7.77
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.55
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.23
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.64
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.59
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.07
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.70
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.51
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.57
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.40
Run cmd: su - cvp -c '/cvpi/bin/cvpi status all --cluster' 2.24
Waiting for all components to start. This may take few minutes.
Run cmd: su - cvp -c '/cvpi/bin/cvpi -v=3 status all' 9.68
RMA process is complete!
[q]uit [p]rint [e]dit [v]erify [s]ave [a]pply [h]elp ve[r]bose
>q
11. Use the cvpi status all command to ensure that the cluster is healthy.
452
Backup & Restore, Upgrades, DNS NTP Server Migration
When a node is RMA'd, the other nodes will replicate their state via HDFS to the new node. We can track
this in real time by issuing the following command:
Once the count of "Under replicated" blocks hits 0, data synchronization to the new node is complete.
The disk usage on the new node will also grow as the blocks are replicated and the RMA'd node will have
a similar disk space utilization as the other nodes once the operation has finished successfully.
453
• Migrating the DNS and NTP Server
Note: Following the DNS / NTP Server Migration procedure may cause the CVP server to be
unavailable for some time after using the commands.
454
Chapter 20
Supplementary Services
This document provides configurations steps and examples for supplementary setup procedures for
CloudVision Portal (CVP).
• HTTPS Certificates Setup
• Customizing TLS and SSH Ciphers
• DHCP Service for Zero Touch Provisioning (ZTP) Setup
• RADIUS or TACACS Authentication Setup
• Background Tasks
• Resetting cvpadmin Password System Recovery
• Optional SAN IP field in CVP Certificate
455
20.1 HTTPS Certificates Setup
CVP uses nginx to front and terminate all HTTPS connections. To support HTTPS, the server must be
configured with a certificate. A self-signed certificate is generated at first bootup.
The guidelines to import a certificate are:
• Correctly fill the Subject Alternate Name (SAN) IP and DNS fields in both signed and self-signed
certificates:
• The SAN IP field must contain the IP addresses of all CVP cluster nodes; and the IP address of any IP
load balancer used in front of CVP.
• The SAN DNS field must contain the Fully Qualified Domain Name (FQDN) of the following elements:
• All CVP cluster nodes
• Any Canonical Names (CNAMES) and round-robin DNS names
• Any IP load balancer used in front of CVP
Note: Zerotouch Provisioning (ZTP) and REST API calls can fail if signed certificates are uploaded
without appropriate data in SAN fields.
• When importing a CVP certificate signed by an internal Certificate Authority (CA), the uploaded file
must sequentially contain the full trust chain of PEM-encoded certificates like a server certificate, all
intermediate certificates (if available), and a root certificate.
• Leave an empty line between every two certificates when importing multiple certificates into a single file.
Note: Do not leave an empty line at the end of the file.
• If the server certificate is self-signed then the server and root certificates are one-and-the-same, so only
that single certificate is required.
• CVP does not support wildcard certificates.
To install an HTTPS certificate, navigate to the Settings page (Click on the gear icon) > Certificates (See the
figure below).
Figure 504: Certificates Page
456
Supplementary Services
457
20.1.1 Generating and Installing Self-Signed Certificate
Perform the following steps to generate and install a self-signed certificate:
1. On the Certificates page, click + Add.
CVP opens the Add CVP Certificate pop-up window. See the figure below.
Figure 505: Add CVP Certificate Pop-Up Window
2. Select Self Signed Certificate from the Certificate Type drop-down menu.
3. Provide the required information.
4. Click Add.
CVP opens the Confirm pop-up window informing that the existing certificate will be replaced. See the
figure below.
Figure 506: Confirm Pop-Up Window
5. Click OK.
CVP replaces the certificate and restarts the nginx service.
458
Supplementary Services
Note: When CVP is restarted, add an exception in the browser for the new certificate.
459
See the figure below.
Figure 508: Add CVP Certificate Dialogbox for CSR
460
Supplementary Services
CVP opens the Add CVP Certificate dialog box displaying the complete CSR information. See the figure
below.
Figure 509: Add CVP Certificate Dialogbox with CSR Details
[alt_names]
DNS.1 = cvp100.nh.aristanetworks.com
DNS.2 = cvp100.nh
DNS.3 = cvp11.nh.aristanetworks.com
DNS.4 = cvp11.nh
DNS.5 = cvp12.nh.aristanetworks.com
DNS.6 = cvp12.nh
DNS.7 = cvp13.nh.aristanetworks.com
DNS.8 = cvp13.nh
IP.1 = 10.81.45.243
IP.2 = 10.81.45.247
IP.3 = 10.81.45.251
461
7. Run the following command to generate a signed certificate from the downloaded CSR file.
Example:
openssl x509 -req -in CSR.csr -CA myCA.pem -CAkey myCA.key -CAcreateseri
al -out cvp100.nh.aristanetworks.com.gui2.crt -days 365 -sha256 -extfile
cvp100.nh.aristanetworks.com.ext
8. Edit the new certificate file to add the root certificate at the end of the file.
Example:
-----BEGIN CERTIFICATE-----
MIID6zCCAtOgAwIBAgIJANW5kelAXMzhMA0GCSqGSIb3DQEBCwUAMIGLMQswCQYD
[snip]
2QoyIITDLQor1I/2z+RDHWCx8wEiYrsYkyzZDm/7NeGqfygXjnVJwfJBjtjpB8Y=
-----END CERTIFICATE-----
bash-4.2#
Note: In case of intermediate certificates, add them between the new certificate and the root
certificate.
9. In the CVP, click on the gear icon > Certificates.
10. Click Import.
462
Supplementary Services
11. Select Bind with CSR in the Import type dropdown menu.
12. In the Public Certificate section, click Select files.
13. Navigate and select the edited crt file.
14. Click Import.
The Certificate Authority (CA) in the on-premise CVP can be renewed with the following steps:
1. SSH into the primary.
2. Reset the Certificate Authority (CA) and stop apiserver and ingest with the following commands.
463
20.2 Customizing TLS and SSH Ciphers
CVP uses nginx to front and terminate all HTTPS connections. To support HTTPS, the server must be
configured with a certificate. A selfsigned certificate is generated at first bootup.
• Configuring Custom TLS Ciphers
• Configuring Custom SSH Ciphers
/usr/sbin/nginx -t -c /etc/nginx/conf.d/cvpi-server.conf
or
/usr/sbin/nginx -t -c /etc/nginx/conf.d/servers/cvpi-server.conf
3. Run the following command to reload nginx with the updated configuration.
sshd -t -f /etc/cvpi/sshd_config
3. Run the following command to reload sshd with the updated configuration.
464
Supplementary Services
# CVP
client 172.31.0.0/16 {
secret = cvpsecret
2. To add more, enter the following.
# Arista Networks
client 172.17.0.0/16 {
secret = cvpsecret
}
465
client 172.18.0.0/16 {
secret = cvpsecret
}
client 172.20.0.0/16 {
secret = cvpsecret
}
client 172.22.0.0/16 {
secret = cvpsecret
}
The default clients.conf file will have a section for local host. The user should either delete the whole
section or comment it out. If CVP will be connecting to RADIUS on local host. You have to add a client entry
for 127.0.0.0/16 (same as above).
1. Edit the users file /etc/raddb/users by adding the following:
# CVP
cvpuser Cleartext-Password := "cvpuser"
Service-Type = NAS-Prompt-User
RADIUS will now run on the terminal with verbose output. This will let you know if RADIUS is receiving auth
requests and what failure is being hit for the request. After you are done debugging, Control-C the process
and start radiusd as a service.
Note: You may have to either disable iptables or firewall.serviced depending on the OS version. You
could also configure it to allow traffic on ports 1812 and 1813 on the Radius server.
Related topics:
• Background Tasks
• Resetting cvpadmin Password
• HTTPS Certificates Setup
• DHCP Service for Zero Touch Provisioning (ZTP) Setup
cvpi/tools/compliance.py –h
cvpi/tools/backup.py –h
466
Supplementary Services
Related topics:
• Resetting cvpadmin Password
• HTTPS Certificates Setup
• DHCP Service for Zero Touch Provisioning (ZTP) Setup
• RADIUS or TACACS Authentication Setup
crontab -e
Note: When inserting commands to schedule cronjobs, you only need to do this on one node of the
cluster.
Example
To schedule a periodic compliance check and snapshot to be performed hourly on the tenant container, and a
backup to be performed daily at 2:00 am, insert the following lines into the crontab file on the primary node if
not already present. In this example, the user is named “me” and the password is “pwd”.
crontab –l
To view the console outputs of the cronjobs tail, view (open) the following log file:
tail –f /var/log/cron
Related topics:
• Resetting cvpadmin Password
• HTTPS Certificates Setup
• DHCP Service for Zero Touch Provisioning (ZTP) Setup
• RADIUS or TACACS Authentication Setup
Related topics:
• HTTPS Certificates Setup
467
• DHCP Service for Zero Touch Provisioning (ZTP) Setup
• RADIUS or TACACS Authentication Setup
• Background Tasks
468
Chapter 21
If you encounter an issue when using CloudVision appliance, check to see if there are troubleshooting
steps for the issue.
• System Recovery
• VM Redeployment
• Health Checks
• Resource Checks
CVP configuration not backed up, please use cvpShell to setup the cluster
469
2. Re-configure using the procedure in Shell-based Configuration. Log into the Linux shell of each node as
cvpadmin or su cvpadmin.
Figure 511: cvp-shell-login
3. Issue a cvpi status all command to ensure all components are running.
Figure 512: Example output of cvpi status all command
470
Troubleshooting and Health Checks
21.2 VM Redeployment
Complete the following steps:
1. Delete all the CVP VMs.
2. Redeploy the VMs using the procedures in CloudVision Portal (CVP) Setup.
3. Issue a cvpi status all command to ensure all components are running.
4. Login to the CVP GUI as cvpadmin/cvpadmin to set the cvpadmin password.
5. From the Backup & Restore tab on the Setting page, restore from the backup.
471
• Running Health Checks
This example shows output of the cvpi resources command. In this example, the disk
bandwidth status is healthy (above the 20MBs threshold).
Figure 513: Example output of cvpi resources command
Related topics
• Resource Checks
472
Troubleshooting and Health Checks
473
21.4.2 Increasing Disk Size of VMs Upgraded to CVP Version 2017.2.0
If you already upgraded any CVP node VMs running an older version of CVP to version 2017.2.0, you may
need to increase the size of the data disk of the VMs so that the data disks have the 1TB disk image that is
used on current CVP node VMs
CVP node VM data disks that you upgraded to version 2017.2.0 may still have the original disk image (120GB
data image), because the standard upgrade procedure did not upgrade the data disk image. The standard
upgrade procedure updated only the root disk, which contains the Centos image along with rpms for CVPI,
CVP, and Telemetry.
Note: It is recommended that each CVP node have 1TB of disk space reserved for enabling CVP
Telemetry. If the CVP nodes in your current environment do not have the recommended reserved disk
space of 1TB, complete the procedure below for increasing the disk size of CVP node VMs.
Pre-requisites
Before you begin the procedure, make sure that you:
• Have upgraded to version 2017.2.0. You cannot increase the data disk size until you have completed the
upgrade to version 2017.2.0 (see How to Modify the DNS and NTP Configuration ).
• Have performed the resource check to verify that the CVP node VMs have the data disk size image of
previous CVP versions (approximately 120GB or less). See Running CVP node VM Resource Checks.
Procedure
Complete the following steps to increase the data disk size.
1. Turn off cvpi service by executing the systemctl stop cvpi command on all nodes in the cluster. (For
a single-node installation, run this command on the node.)
2. Run the cvpi -v=3 stop all on the primary node.
3. Perform a graceful power-off of all VMs.
Note: You do not need to unregister and re-register VMs from vSphere Client or undefine and
redefine VMs from kvm hypervisor.
4. Do the following to increase the size of the data disk to 1TB using the hypervisor:
• ESX: Using vSphere client, do the following:
a. Select the Virtual Hardware tab, and then select hard disk 2.
b. Change the setting from 120GB to 1TB.
c. Click OK.
474
Troubleshooting and Health Checks
• KVM: Use the qemu-img resize command to resize the data disk from 120GB to 1TB. Be sure to
select disk2.qcow2.
Figure 515: Using vSphere to increase data disk size
5. Power on all CVP node VMs, and wait for all services to start.
6. Use the cvpi status all command to verify that all the cvpi services are running.
7. Run the /cvpi/tools/diskResize.py command on the primary node. (Do not run this command on
the secondary and tertiary nodes.)
8. Run the df -h /data command on all nodes to verify that the /data is increased to approximately 1TB.
9. Wait for all services to start.
10. Use the cvpi -v=3 status all command to verify the status of services.
11. Use the systemctl status cvpi to ensure that cvpi service is running.
475
Before you begin the procedure, make sure that you:
• Have performed the resource check to verify that the CVP node VMs have the default RAM memory
allocation of 16GB (see Running CVP node VM Resource Checks).
• Make sure that you perform a GUI-based backup of the CVP system and copy the backup to a safe
location (a location off of the CVP node VMs). The CVP GUI enables you to create a backup you can use
to restore CVP data.
Procedure
Complete the following steps to increase the RAM memory allocation of the CVP node VMs.
1. Login to a CVP node of the cluster as cvp user.
2. Using the cvpi status cvp shell command, make sure that all nodes in the cluster are operational.
Figure 516: cvpi status cvp shell command
3. Using vSphere client, shutdown one CVP node VM by selecting the node in the left pane, and then click
the Power off the virtual machine option.
Figure 517: Power off the virtual machine
476
Troubleshooting and Health Checks
5. On the CVP node VM, increase the memory allocation to 32GB by right-clicking the node icon, and then
choose Edit Settings.
Figure 519: Edit Settings
477
The Edit Resource Settings dialog appears.
Figure 520: Edit Resources Settings
6. Do the following to increase the memory allocation for the CVP node VM:
• Using the Memory option, click the up arrow to increase the size to 32GB.
• Click the OK button.
The memory allocation for the CVP node VM is changed to 32GB. The page refreshes, showing options to
power on the VM or continue making edits to the VM properties.
478
Troubleshooting and Health Checks
479
480