Cisco Cloud Infrastructure... Data Center Architecture 2023
Cisco Cloud Infrastructure... Data Center Architecture 2023
ScoutAutomatedPrintCode
Library of Congress Cataloging-in-Publication Number: 2022920878
ISBN-13: 978-0-13-769012-1
ISBN-10: 0-13-769012-6
Special Sales
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover designs; and
content particular to your business, training goals, marketing focus, or branding
interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.
For government sales inquiries, please contact
[email protected].
For questions about sales outside the U.S., please contact [email protected].
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest
quality and value. Each book is crafted with care and precision, undergoing
rigorous development that involves the unique expertise of members from the
professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any
comments regarding how we could improve the quality of this book, or
otherwise alter it to better suit your needs, you can contact us through email at
[email protected]. Please make sure to include the book title and ISBN
in your message.
We greatly appreciate your assistance.
Editor-in-Chief
Mark Taub
Director, ITP Product Management
Brett Bartow
Executive Editor
James Manly
Managing Editor
Sandra Schroeder
Development Editor
Ellie C. Bru
Project Editor
Mandie Frank
Copy Editor
Bart Reed
Technical Editors
Manuel Velasco, Atul Khanna
Editorial Assistant
Cindy Teeters
Designer
Chuti Prasertsith
Composition
codeMantra
Indexer
Proofreader
Pearson’s Commitment to
Diversity, Equity, and
Inclusion
Pearson is dedicated to creating bias-free content that
reflects the diversity of all learners. We embrace the many
dimensions of diversity, including but not limited to race,
ethnicity, gender, socioeconomic status, ability, age, sexual
orientation, and religious or political beliefs.
Education is a powerful force for equity and change in our
world. It has the potential to deliver opportunities that
improve lives and enable economic mobility. As we work
with authors to create content for every product and
service, we acknowledge our responsibility to demonstrate
inclusivity and incorporate diverse scholarship so that
everyone can achieve their potential through learning. As
the world’s leading learning company, we have a duty to
help drive change and live up to our purpose to help more
people create a better life for themselves and to create a
better world.
Our ambition is to purposefully contribute to a world where
• Everyone has an equitable and lifelong opportunity to
succeed through learning
• Our educational products and services are inclusive and
represent the rich diversity of learners
• Our educational content accurately reflects the histories
and experiences of the learners we serve
• Our educational content prompts deeper discussions
with learners and motivates them to expand their own
learning (and worldview)
While we work hard to present unbiased content, we want to
hear from you about any concerns or needs with this
Pearson product so that we can investigate and address
them.
Please contact us with concerns about any potential bias at
https://www.pearson.com/report-bias.html.
About the Authors
Jalpa Patel (CCIE No. 42465), is multidisciplinary
technologist, passionate leader with strong track record of
successful engineering executions and game-changing
business achievements defining, building and growing new
products. Her domain knowledge of Data Center hardware
infrastructure is focused on Compute, Networking, Storage
and Accelerators. Patel holds an MS degree in
Telecommunication Networks from NYU, a BS degree from
Government Engineering College, Gujarat, India, and an
Advanced Program Management Certificate from Stanford.
Avinash Shukla (CCIE No. 28418), Senior Leader in Cisco’s
US Customer Experience (CX) Organization, has 14 years of
experience in Cisco CX roles spanning Professional and
Technical Services, and extensive expertise in collaboration
and datacenter technologies. He now leads a team of
engineers working on Cisco Data Center Technology (Cisco
Unified Computing Systems, Hyperconverged Infrastructure,
Virtualization, and Datacenter automation). He holds a
B.Tech in ECE from IIIT, Hyderabad and has won numerous
Cisco awards for customer focus, and has delivered many
technical trainings for Cisco partners and customers.
Himanshu Sardana (CCNP, VCP, CKA), is a Senior
Technical Consulting Engineer in Cisco’s Customer
Experience (CX) Org. He started his professional journey
with Cisco and now has 6 years of experience in Data
Center Compute and Storage space. His current area of
focus is on Cisco’s Hyperconverged business (Hyperflex)
and Intersight, helping with high escalations and creating
tools like Hypercheck to make customer interactions with
Cisco Products better. He holds a BS degree in Computer
Science from Chitkara University, Punjab, India.
Komal Panzade is a Senior Technical Consulting Engineer
in Cisco’s Customer Experience (CX) organization and has 6
years of experience working on different Data Center
Technologies like Compute, Storage and Virtualization. She
currently works in the Hyperconverged Infrastructure (HCI)
domain focusing on Distributed Systems and Automation.
She is a Certified Kubernetes Administrator and helps Cisco
customers with efficient management of their infrastructure
using Cisco’s SAAS platform called Intersight. Komal holds a
Bachelor of Technology degree in Information Technology
from Amity University, Noida, India.
About the Technical
Reviewers
Manuel Velasco (CCIE No. 49401) is a Customer Success
Specialist, in the Customer Experience group at Cisco
Systems. In his previous role, he worked as TAC engineer at
Cisco supporting multiple datacenter technologies, including
Cisco Unified Computing System and Virtualization, Cisco
Application Centric Infrastructure (ACI) and Cisco Hyperflex.
He has over 11 years of experience in the data center
technologies. Manuel Holds a B.S. degree in Computer
Engineering from CalPoly San Luis Obispo.
Atul Khanna (CCIE No. 35540) is a data center networking
manager with Cisco Customer Experience Centers Americas.
He has extensive experience in directing and leading
strategies to provide optimal technical services to Cisco
customers. He has more than 10 years of experience at
Cisco in enterprise support, network operations,
manage/cloud services, data center networking, compute,
and virtualization. Atul was a senior technical consulting
engineer supporting HyperFlex solutions in Richardson,
Texas. He facilitated Advanced Services (AS) team members
for successful new customer deployments and upgrades,
and he cultivated relationships with Cisco partners and
customers to meet organizational demands. He also
presented a technical webinar for Cloud Services Platform
2100. He attended Cisco Live in 2015 and 2018, interacting
with Cisco customers and partners at the TAC booth. Atul
lives with his wife in Milpitas, California.
Dedications
Jalpa Patel: I would like to dedicate this book to my
parents, Minaxi and Babubhai Patel, for their blessings and
faith on me; and to Jigisha, Falguni and Harish, for their
guidance and encouragement. I also would like to dedicate
this book to my brother, Hardik, and his wife, Dharmistha,
who have been a great support for me throughout the
complete process of writing of this book. Finally, thank you
to Raj and Samaira for their love and inspiration.
Avinash Shukla: I would like to dedicate this book to my lil’
baby girl Avira who was born during the time of writing the
book, my son Aryav, my nieces Riddhi & Siddhi, my lovely
wife Neelima, my sister Anubha, and my parents Kanak and
Anil, for their unconditional love and support. Without their
support, none of this would have been possible. I would also
like to dedicate this book to one of my earliest inspirations
while growing up, my beloved Bade Papa, Aravind Kumar
Shukla (RIP). Lastly, I would like to thank everyone in my big
extended family for their motivation and encouragement. All
of you have inspired me in many ways and helped me in my
professional endeavors.
Acknowledgments
We would like to thank and acknowledge several people who
have helped us directly or indirectly with the necessary
skills that enabled us to write this book.
This book couldn’t have been possible without the support
of many people in the CiscoPress team. A thank you goes to
James Manly, Eleanor Bru, and everybody else at CiscoPress
for believing in us and supporting throughout this journey.
Also, much research for this book was done through sifting
through heaps of design guides, specifications and videos so
many thanks to all of the technology professionals.
Finally, we would like to thank our technical reviewers
Manuel Velasco, Vibhor Amrodia and Atul Khanna, for their
patience, commitment, and support in the adventure of
writing this book.
Contents at a Glance
Part 1: Cisco Datacenter Networking and Infrastructure
Chapter 1: Cisco Data Center Orchestration
Chapter 2: Cisco Data Center Analytics and Insights
Chapter 3: Cisco Data Center Solutions for Hybrid
Cloud
Part 2: Cisco Applications and Workload Management
Chapter 4: Application, Analytics, and Workload
Performance Management with AppDynamics
Chapter 5: Management
Chapter 6: Cisco Cloud Webex Applications
Chapter 7: Internet of Things (IoT)
Part 3: Cisco Cloud Security
Chapter 8: Cisco Cloud Security
Reader Services
Register your copy at www.ciscopress.com/title/ISBN for
convenient access to downloads, updates, and corrections
as they become available. To start the registration process,
go to www.ciscopress.com/register and log in or create an
account*. Enter the product ISBN 9780137690121 and click
Submit. When the process is complete, you will find any
available bonus content under Registered Products.
*Be sure to check the box that you would like to hear from
us to receive exclusive discounts on future editions of this
product.
Contents
Part 1: Cisco Datacenter Networking and Infrastructure
Chapter 1: Cisco Data Center Orchestration
IT Challenges and Data Center Solutions
Cisco Nexus Dashboard
Cisco Nexus Dashboard Orchestrator
Cisco Nexus Dashboard Fabric Controller
Third-party Applications and Cloud-based
Services
Summary
References/Additional Reading
Chapter 2: Cisco Data Center Analytics and Insights
Cisco Nexus Dashboard Insights
Cisco Nexus Dashboard Data Broker
Cisco Meraki MX
Summary
References/Additional Reading
Chapter 3: Cisco Data Center Solutions for Hybrid
Cloud
Cisco Cloud Application Centric Infrastructure
(Cisco Cloud ACI)
Cisco UCS Director
Cisco Workload Optimization Manager
Cisco Hyperflex – Intersight
Summary
References/Additional Reading
Part 2: Cisco Applications and Workload Management
Chapter 4: Application, Analytics, and Workload
Performance Management with AppDynamics
What Is AppDynamics?
AppDynamics Concepts
Deployment Planning Guide
Application Monitoring
Integration with Other AppDynamics Modules
Application Security Monitoring
End User Monitoring
Database Visibility
Infrastructure Visibility
Analytics
Monitoring Cloud Applications
Cloud Monitoring with AppDynamics Cloud
Cloud Infrastructure Monitoring
Summary
References/Additional Reading
Chapter 5: Management
IT Challenges and Workload Management
Solutions
Cisco Intersight Workload Optimizer
Understanding Intersight Workload Optimizer
Supply Chain
Cisco Container Platform
Cisco Intersight Kubernetes Service
Summary
References/Additional Reading
Chapter 6: Cisco Cloud Webex Applications
Cisco Webex Features
Cisco Webex Cloud Service Architecture
Summary
References
Chapter 7: Internet of Things (IoT)
Introduction to the Internet of Things
Cisco Kinetic Platform
Introduction to Cisco IoT
Edge Device Manager
Edge Intelligence
Licensing
Summary
Part 3: Cisco Cloud Security
Chapter 8: Cisco Cloud Security
Shadow IT Challenge
Cisco Cloudlock
Cisco Umbrella
Cisco Secure Cloud Analytics
Cisco Duo Security
Summary
Icons Used in This Book
Command Syntax
Conventions
The conventions used to present command syntax in this
book are the same conventions used in Cisco’s Command
Reference. The Command Reference describes these
conventions as follows:
• Boldface indicates commands and keywords that are
entered literally as shown. In actual configuration
examples and output (not general command syntax),
boldface indicates commands that are manually input
by the user (such as a show command).
Note
This book covers multiple operating systems, and a
differentiation of icons and router names indicate
the appropriate OS that is being referenced. IOS
and IOS XE use router names like R1 and R2 and
are referenced by the IOS router icon. IOS XR
routers will use router names like XR1 and XR2 are
referenced by the IOS XR router icon.
Introduction
Almost every company is adopting hybrid cloud solutions as
it provides decreased hosting costs, agility and scalability,
faster deployment ability and security. Using a hybrid cloud
might be an investment upfront, but it will provide plenty of
cost saving benefits down the road. For example, businesses
that use public cloud without a hybrid might have a difficult
and expensive time migrating information if they decide to
make changes to their internal systems. Furthermore,
because a hybrid cloud is scalable, it makes handling
changes in business goals cheaper down the line. Only
hybrid cloud technology can provide a blend of benefits that
come from public and private servers. With a hybrid cloud,
for instance, you can enjoy the scalability of a public cloud
environment without forfeiting all control to a third party. In
fact, with every hybrid cloud situation being different, a
unique solution will have to be applied to each hybrid
system in order to fulfill specific requirements. Because a
hybrid cloud is designed around your organization’s needs,
it can be optimized with speed in mind. For example,
because this system isn’t entirely public, your IT staff will be
able to minimize latency, which will make data transfers
quicker and easier. The overall level of customization
available for hybrid cloud also ensures your organization is
agile enough to handle the needs of customers or clients.
Not only does it connect old systems to new ones, but the
hybrid cloud also allows businesses to create an overarching
structure that meets the unique needs of a specific
enterprise.
As we see an increasing trend in deployment of Hybrid cloud
with on prem solutions, the book will be useful to both small
scale customers and large-scale Data Centers. It can be
considered as one book for all who deals with Cisco Cloud
Solutions on a daily basis. External references are provided
wherever applicable, but readers are expected to be familiar
with Cloud specific technologies, infrastructure concepts,
networking connectivity, and security policies of the
customer installation. Readers can gain knowledge about
the benefits of cloud solutions, how to manage, operate and
integrate existing infrastructure in a hybrid/multi cloud
environment with minimum changes and leverage insights
from the cloud for their business decisions.
Cisco doesn’t have a public cloud offering like AWS but has
many products which complement and facilitate cloud
integration and use of Hybrid Cloud. The attempt of this
book is to fill the gap where a user can find a one stop book
which details all such products and architecture and provide
insights on how they can co-exist in a hybrid cloud
environment.
The book helps IT professionals, CIOs and IT managers in
their decision to move into an hybrid cloud deployment vs.
an on-prem deployment. It describes in detail and from a
technical and business aspect, the possible solutions and
offering from Cisco. The book also describes products such
as the Cisco Nexus Dashboard, that facilitate the
orchestration and insights about your deployment.
Last but not least, the book covers best practices and
guidelines to make readers aware of known caveats prior to
specific deployment, the do’s and don’ts while designing
complex hybrid cloud networks, how and why to design in a
certain way for maximum efficiency.
Goals & Methods
CIOs and IT professionals who want to simplify their IT and
Networking environment are now challenged with the
decision of whether to move fully into the Cloud, build their
own Data Centers, or go with hybrid solution. Making such
decisions depend on a lot of factors that include the scale
and complexity of their existing setup, the level of control
over their own resources, security, availability of IT and
networking resources, level of expertise, overall fixed and
recurring costs and so on.
As Cloud is a new buzz word in industry and multiple
vendors are introducing products that offer various
Infrastructure solutions and are challenging the existing
network design, all the new technologies are getting
confusing to IT professionals who are trying to move into
next generation architectures while maintaining a current
setup that is generating revenue. This book will walk the
reader and provide a reference guide to understand and
independently implement Cloud solutions for Cisco Network,
Compute, Storage, Application and Security.
In this book we are covering Cisco Cloud Infrastructure for
various Cisco Products. This book will cover existing Cisco
technologies in the “Data Center, Security and Applications”
domain which are available in the On-Prem environment and
how the technology has evolved to fit in a Hybrid Cloud
model which facilitates the management and operation of
On-Prem deployments and provides integration with Public
Cloud. This gives you the tools to ask the right questions
when you embark on the transformation of your data center
into private and hybrid clouds.
• Orchestration
• Analytics
• Cloud integration
• Virtualization
• Storage Networking
• Security
• Software applications
• Automation
• DevOPs
Book Structure
The book is organized into three parts.
PART 1—Cisco Datacenter Networking and
Infrastructure
Chapter 1—Cisco Data Center Orchestration: This
chapter talks about Cisco’s Data center orchestration
software that uses the automation of tasks to implement
processes, such as deploying new servers. Automation
solutions which orchestrate data center operations enable
an agile DevOps approach for continual improvements to
applications running in the data center. Data center
orchestration systems automate the configuration of L2-L7
network services, compute and storage for physical, virtual
and hybrid networks. New applications can be quickly
deployed.
Chapter 2—Cisco Data Center Analytics and Insights:
This chapter talks about Cisco’s API-driven monitoring and
assurance solutions which provides essential insights as well
as adds to an expansive and increasingly onerous toolset.
This network insight solutions are bringing ability to see the
big picture, and if something goes wrong, it shows exactly
where to look instead of poking around and hoping to get
lucky. This helps preparing companies to progressively
transitioning from reactive to proactive and eventually
predictive IT operations.
Chapter 3—Cisco Data Center Solutions for Hybrid
Cloud: This chapter talks about the various Hybrid cloud
management platforms like ACI, UCS Director, CWOM and
Intersight that are provided by Cisco and offer flexible
consumption for on-premises infrastructure in order to
optimize workloads across clouds, on-premises data centers,
labs, and co-location facilities for scale, performance and
agility with great value.
PART 2—Cisco Applications and Workload
Management
Chapter 4—Application, Analytics, and Workload
Performance Management with AppDynamics: This
chapter describes Cisco’s AppDynamics solution, Cloud
migration and various monitoring such as Application
Security Monitoring, End User monitoring and Browser
monitoring. It also covers database and infrastructure
visibility and cloud platforms.
Chapter 5—Management: This chapter describes the
challenges that the IT teams face in managing the modern
workloads and gives you various systematic Workload
Management Solutions such as Intersight Workload
Optimization Manager, Cisco Container Platform and Cisco
Intersight Kubernetes Service (IKS).
Chapter 6—Cisco Cloud Webex Applications:
Collaboration is a key component of any IT solution and
Cisco Webex provides an ideal platform for staying
connected and collaborating with individuals, teams, and
meetings to move projects forward faster. This chapter
describes Cisco Webex Features and Cisco Webex Cloud
Service Architecture in detail.
Chapter 7—Internet of Things (IoT): This chapter
describes how well we can combine the Operational
Technology hardware with IT and come up with amazing IOT
Solutions which Cisco currently offers. These solutions can
really help you get the best insights and increase efficiency.
PART 3—Cisco Cloud Security
Chapter 8—Cisco Cloud Security: This chapter talks
about all the Cisco Cloud Security solutions like Cloudlock,
Umbrella, Cloud Analytics and Duo using which one can
adopt the cloud with confidence and protect users, data,
and applications, anywhere they are. Unlike traditional
perimeter solutions, Cisco Cloud Security blocks threats
over all ports and protocols for comprehensive coverage.
Cisco Cloud Security also uses API-based integrations so
that the existing security investments can be amplified.
Part 1: Cisco Datacenter
Networking and
Infrastructure
Chapter 1. Cisco Data
Center Orchestration
We are working in a multidimensional world of data and
applications accessed by a workforce shifting among work-
from-home offices to centralized campuses to work-from-
anywhere setups. Data is widely distributed, and business-
critical applications are becoming containerized
microservices disseminated over on-premises, edge cloud,
and public cloud data center locations. These applications
rely on agile and resilient networks to provide the best level
of experience for the workforce and customers.
It is therefore a multidimensional challenge for IT to keep
applications and networks in sync. With the ever-increasing
scope of the NetOps and DevOps roles, an automation
toolset is needed to accelerate data center operations and
securely manage the expansion to hybrid cloud and
multicloud.
Data center orchestration software uses the automation of
tasks to implement processes such as the deploying of new
servers. Automation solutions that orchestrate data center
operations enable an agile DevOps approach for continual
improvements to applications running in the data center.
Data center orchestration systems automate the
configuration of L2–L7 network services as well as compute
and storage for physical, virtual, and hybrid networks. New
applications can be quickly deployed.
The Cisco Nexus Dashboard provides a single focal point to
unite the disparate views of globe-spanning multicloud data
center operations, application deployment, and
performance.
This chapter will cover following topics:
• Guarantee reliability.
The operations team now has to deal with a single stack and
one operations toolkit—whether they are running Cisco ACI
or Cisco NDFC in their hybrid cloud infrastructures. Figure 1-
3 illustrates the Cisco Nexus Dashboard graphical user
interface (GUI).
Figure 1-3 Cisco Nexus Dashboard GUI
Operational infrastructure standardization and toolchain
unification directly lead to operational excellence and
savings as well as free up resources for business innovation.
• Business continuity
Figure 1-12 illustrates a Cisco NDO large-scale data center
deployment.
Figure 1-12 Large-scale data center deployment
Note
One or more templates can be grouped together as
part of a schema, which can be considered a
“container” of policies. However, the association of
policies to a given tenant is always done at the
template level (not at the schema level). This
feature is one of the most important that the Cisco
Multi-Site Orchestrator offers, together with the
capability to define and provision scoped policies
for change management. When you define intersite
policies, Cisco Multi-Site Orchestrator also properly
programs the required namespace translation rules
on the Multi-Site-capable spine switches across
sites. As mentioned in the previous section, every
intersite communication requires the creation of
translation entries on the spine nodes of each fabric
part of the Multi-Site domain. This happens only
when the policy to allow intersite communication is
defined on the Multi-Site Orchestrator and then
pushed to the different APIC cluster managing the
fabrics. As a consequence, the best-practice
recommendation is to manage the configuration of
all the tenant objects [EPGs (Endpoint Group), BDs
(Bridge Domain), and so on] directly on MSO,
independent from the fact that those objects are
stretched across multiple sites or locally defined in
a specific site.
Step 2. Add a new site. Figure 1-22 shows the Cisco NDO
Add Site feature.
Figure 1-22 Cisco NDO Add Site feature
1. From the left navigation menu, select Admin
Console > Sites.
2. In the top right of the main pane, select Add Site.
Benefits
Cisco NDFC empowers IT to move at the increasing speed
required by the business.
Features
With NDFC, you get complete automation, extensive
visibility, and consistent operations for your data center.
• Cisco NDFC App: Cisco NDFC is designed with an
HTML-based web UI, which is the main interface for the
product. NDFC 12.0 is fully integrated and will run
exclusively as a service on the Cisco Nexus Dashboard
(ND), providing a single sign-on and simplified user
experience across the entire data center software
portfolio. Scale and performance were top of mind in
the development of NDFC and, as such, included
modern architectures that incorporate microservices
and containerization of functions to help ensure
reliability and allow for growth over time.
Summary
Are your operations teams tasked with delivering security,
uptime, and business continuity on a complex data center
infrastructure? Do they have the right tools that provide
proactive change management and precise troubleshooting
information tied together in a unified, easy-to-consume user
experience? Start powering the transformation of the
networking operations teams by standardizing on the Cisco
Nexus Dashboard experience. Meet and exceed critical
business mandates of agility and availability as you operate
your secure, intent-based data center from Cisco Nexus
Dashboard.
The new Cisco Nexus Dashboard unleashes a unified
experience and automation workflows by standardizing on
the Cisco Nexus Dashboard platform (physical/virtual/cloud).
Customers can now standardize operations’ processes on a
single platform, and teams can use advanced visibility,
monitoring, orchestration, and deployment services from a
unified pane of glass. The Cisco Nexus Dashboard platform
can be deployed across the hybrid cloud infrastructure in
the form factor of your choosing (physical/virtual or cloud).
The Nexus Dashboard platform is extensible. The Cisco
Nexus Dashboard platform integrates with third-party
services such as ServiceNow and Splunk and also provides
the central point for cross-domain integrations.
With Cisco Nexus Dashboard, you can do the following:
• Improve experience: Reduce the time to value for
powerful operations capabilities with a consistent UX
and a single pane of glass for all native and fabric-
agnostic applications.
References/Additional Reading
https://www.cisco.com/c/en/us/support/cloud-systems-
management/prime-data-center-network-
manager/products-release-notes-list.html
https://www.cisco.com/c/en/us/support/cloud-systems-
management/prime-data-center-network-
manager/products-device-support-tables-list.html
https://www.cisco.com/c/en/us/support/cloud-systems-
management/multi-site-orchestrator/series.html
https://store.servicenow.com/sn_appstore_store.do#!/st
ore/application/56fe817b0f4caa003ac788cce1050e4d/4.
0.0?
referer=%2Fstore%2Fsearch%3Flistingtype%3Dallintegr
ations%25253Bancillary_app%25253Bcertified_apps%2
5253Bcontent%25253Bindustry_solution%25253Boem%
25253Butility%25253Btemplate%26q%3Daci&sl=sh
https://developer.cisco.com/nexusapi/#terraform
https://developer.cisco.com/nexusapi/#ansible
Chapter 2. Cisco Data
Center Analytics and
Insights
When you have hundreds of network fabrics spread across
multiple data centers, it can be extremely challenging to get
a full picture of what’s happening with contextual details
about where, when, and why it’s happening. It is critical for
IT to have a solution that provides a unified and correlated
view of its network infrastructure, endpoints, and events as
well as helps prepare companies to progressively transition
from reactive to proactive and eventually predictive IT
operations.
The networking team should not spend time on
understanding data like a data science team. Cisco’s API-
driven monitoring and assurance solutions provide essential
insights along with security compliance benefits. These
network insight solutions bring the ability to see the big
picture, and if something goes wrong, they show you exactly
where to look instead of you poking around and hoping to
get lucky.
This chapter will cover following solutions:
• Resource utilization.
• Environmental issues such as power failure, memory
leaks, process crashes, node reloads, CPU, and
memory spikes.
• Interface and routing protocol issues such as CRC
errors, DOM anomalies, interface drops, BGP issues
such as lost connectivity with an existing neighbor,
PIM, IGMP flaps, LLDP flaps, CDP issues, and so on.
Also provides a view into microbursts with offending
and victim flows.
• Flow drop with location and reason of drop, abnormal
latency spikes of flows using hardware telemetry and
direct hardware export, flows impacted due to events
in a switch-like buffer, policer, forwarding drops, ACL
or policy drops, and so on using Flow Table Events
(FTE), which is another form of hardware telemetry.
• Endpoint duplicates, rapid endpoint movement, and
rogue endpoints.
• Issues in the network configuration, which are
detected and reported as change analysis anomalies.
Environmental
Most often, environmental data is monitored using
traditional applications like SNMP, CLI, and so on. Data from
these applications is difficult to post-process, is device
specific, is not historical in nature, and requires manual
checks. Hence, monitoring environmental anomalies
becomes very reactive and cumbersome. Cisco Nexus
Dashboard Insights consumes environmental data using
streaming software telemetry and baselines trends, and it
generates anomalies every time the utilization exceeds pre-
set thresholds. It enables the user to determine which
process is consuming CPU or hogging memory, when
storage is overfilled, when process crashes occur, and
whether there are memory leaks. All this data is provided
over time with historical retention, per node, to allow users
to delve into specific anomalies while having full visibility.
Environmental data provides anomaly-detection capabilities
in hardware components such as CPU, memory,
temperature, fan speed, power, storage, and so on. As in
the other screens, components exceeding thresholds and
requiring the operator’s attention are highlighted. Figure 2-8
shows how environmental data provides anomaly-detection
capabilities.
Figure 2-8 How environmental data provides anomaly-
detection capabilities
Statistics
Statistics is all about interfaces and routing protocols. Cisco
Nexus Dashboard Insights ingests data from each node in
the fabric using streaming software telemetry. The data is
then baselined to derive trends and identify when any of
these data sets suddenly show a rapid decline, for example,
in interface utilization or rapid increase in drops or CRC
errors over time.
The Dashboard view presents top nodes by interface
utilization and errors, thereby allowing the user to quickly
identify interfaces to investigate errors.
Protocol statistics provide a view into what interfaces
protocols are active (such as CDP, LLDP, LACP, BGP, PIM,
IGMP, and IGMP snooping), protocol details such as
neighbors, incoming and OIFs for a (*,G), (S,G) entry, along
with trends of errors such as a lost connection or neighbor,
OIF flaps, invalid packets, and so on.
Statistical data is also used for correlation in Cisco Nexus
Dashboard Insights. For instance, if there is a CRC error,
Cisco Nexus Dashboard Insights will use other data sets to
find out the estimated impact (like impacted endpoints) and
provide a recommendation based on other anomalies seen
at that time (such as a DOM anomaly, which could
potentially be causing CRC errors). Figure 2-9 shows how
statistical data provides an estimated impact and
recommendations.
Figure 2-9 Statistical data provides an estimated
impact and recommendations
Flows
Application problem or network problem? This is a
frequently asked question in the data center world. If
anything, it always begins with the network. The time to
innocence and mean time to resolution become imperative
as we deal with business-critical applications in the data
center. The tools for network operations today often have
very limited insights into data-plane counters, flows,
latency, and drops.
Even if we can get the data-plane flow data from the
network switches, how can the data from the individual
switches be pieced together to form an end-to-end view of a
flow while it is traversing the network? How can the end-to-
end network latency of a flow be extracted from the flow
data ? It used to be the network team that had to do all of
these complex flow analysis tasks with limited tools to help
them, which means a lot of man hours.
With Cisco Nexus Dashboard Insights, using Flow Telemetry,
the service consumes flow records and their respective
counters and then correlates this data over time to provide
end-to-end flow path and latency. Cisco Nexus Dashboard
Insights understands what the “normal” latency of each flow
is. When the latency exceeds beyond normal, Cisco Nexus
Dashboard Insights alerts the users and shows the abnormal
latency increase as an anomaly on the dashboard.
The flow analytics dashboard attracts operator attention to
key indicators of infrastructure data-plane health. Time-
series data offers evidence of historical trends, specific
patterns, and past issues and helps the operator build a
case for audit, compliance, and capacity planning or
infrastructure assessment. The flow analytics dashboard
provides a time series–based overview with the capability to
drill down on specific functions by clicking the graph.
Endpoints
Shows time series–based endpoint movement in the fabric,
with endpoint details and endpoints with duplicate IPs. In
virtualized data center environments, this keeps track of
virtual machine (VM) movement, which is extremely useful
to identify a VM’s current location and its historical
movements in the fabric. It provides proof points in
establishing VM movements and thus aids constructively in
problem solving while working with other IT teams.
Endpoint health and consistency is also monitored by Nexus
Dashboard Insights:
Applications
With Cisco AppDynamics and Cisco Nexus Dashboard
Insights integration, users get a single pane of glass for
application and network statistics and anomalies. Cisco
Nexus Dashboard Insights consumes data streamed from
the AppDynamics controller, and in addition to showing
application, tier, node health, and metrics, Cisco Nexus
Dashboard Insights derives a baseline of network statistics
of these applications, such as TCP Loss, Round Trip Time,
Latency, Throughput, Performance Impacting Events (PIE),
and generates anomalies on threshold violations. For any
AppDynamics flows, Cisco Nexus Dashboard Insights also
provides an in-depth end-to-end path, latency, drops (if
any), and drop reasons to help users identify if app slowness
or issues are resulting from network issues. Figure 2-11
shows the Application Dashboard with all applications and
respective statistics.
Figure 2-11 Application Dashboard showing all
applications and respective statistics
Figure 2-12 shows application detail to view health,
respective tiers, and nodes.
Figure 2-12 Application detail to view health,
respective tiers, and nodes
A network link is for communication between tiers. Cisco
Nexus Dashboard Insights maps links to respective flows
traversing the fabric, thereby allowing users to see flow
details and paths with drops, if any.
This integration is vital to blurring the lines between silos
inside the organization, enabling operators to see the
network from the application’s point of view. The operator
does not need to know which IP is associated to which
application or which application flows through which nodes
at any given time. Cisco Nexus Dashboard Insights provides
all this information, enriches the data, and correlates it for a
holistic, unified operational view.
Event Analytics
Event Analytics is tuned for control-plane events in the
infrastructure. It performs the following functions:
• Data collection: Configuration changes and control-
plane events and faults.
Diagnostics, Impact,
Recommendation
Cisco Nexus Dashboard Insights monitors different sets of
data from all nodes in the fabric and baselines the data to
identify “normal” behavior. Any deviation from normal is
represented as an anomaly in the service dashboard. This
helps the operator spend time on resolving the issue instead
of finding where in the network the issue really arose.
With the correlation algorithms that Cisco Nexus Dashboard
Insights has in place, in addition to the anomaly, it can also
point to an estimated impact of this anomaly, helping the
user identify what is the potential impact of a problem. With
the impact, the service will also generate a recommendation
depending on the nature of the anomaly, thus reducing the
mean time to troubleshoot and resolve.
For example, microbursts are complex to identify and cause
a myriad of network issues. For applications that require
reliable and low-latency networks, microbursts can pose
serious issues. Since microbursts occur in a matter of
microseconds, looking at a graph of overall packets per
second will make the overall transmission appear smooth.
Cisco Nexus Dashboard Insights detects these microbursts
due to its rapid cadence of gathering data and details what
flows could be impacted due to these bursts and even be
causing the bursts. It makes it easier for the operator to not
only detect that a burst occurred on a particular node,
interface, or queue but also the flows impacted, with a
recommendation for how to fix this anomaly. Figure 2-14
shows a microburst anomaly.
Figure 2-14 Microburst anomaly
Advisories
To maintain data center network availability and minimize
the downtime, it is critical for network operators to ensure
that their network infrastructure is built with up-to-date
switch platforms and is running the right versions of
software. It requires periodic and thorough audits of the
entire infrastructure, which is historically a manual and
time-consuming task. Cisco Nexus Dashboard Insights turns
this task into an automated process, using digitized
signatures to determine the vulnerability exposure of the
network infrastructure at the click of a button.
Cisco Nexus Dashboard Insights scans the entire network to
collect the complete information on its hardware, software
versions, and active configuration. It then runs analysis
against the digitalized database of known defects, PSIRTs,
and field notices to identify the relevant ones that can
potentially impact the particular network environment,
matching on its hardware and software versions, features
and topologies, and so on.
It then proactively alerts the network operators of the
identified vulnerabilities and advises them on the right
hardware and/or software versions for remediation. It also
analyzes and advises on whether the network is running any
out-of-date hardware or software based on Cisco product
EOL or EOS announcement and schedule.
For any of the discovered issues, Cisco Nexus Dashboard
Insights lists the impacted devices, vulnerability details, and
mitigation steps (aka advisories). With the advisories, it
recommends the best software version for the resolution
and the upgrade path—either a single-step upgrade or
through intermediate software versions. It also reveals the
impact of the upgrade, either disruptive or nondisruptive, so
that the operators can proactively plan for the upgrade
accordingly.
With the automated scanning, network-context-aware
vulnerability analysis, and actionable recommendations, the
advisory function in Cisco Nexus Dashboard Insights makes
it so much easier for the operation team to maintain an
accurate audit of the entire network and avoid the
downtime due to product defects or PSIRTS by getting
proactive alerts and taking preventive remediation actions.
Figure 2-15 shows an advisory for a field notice.
Pre-Change Analysis
You can access the Pre-Change Analysis page from the left
navigation column in the Cisco Nexus Dashboard Insights
GUI. Navigate to Change Management and select Pre-
Change Analysis.
When you want to change a configuration for a site, this
feature in Cisco Nexus Dashboard Insights allows you to
model the intended changes, perform a Pre-Change Analysis
against an existing base snapshot in the site, and verify if
the changes generate the desired results.
After you model the changes for a Pre-Change Analysis job,
you can choose Save or Save And Analyze. By choosing
Save, you can save the Pre-Change Analysis job without
having to start the analysis right away. You can return to the
job later, edit the changes if required, and then run the
analysis later. The Save option is supported only for a Pre-
Change Analysis job with manual changes. If you choose
Save And Analyze, the job gets scheduled and an analysis is
provided.
When you choose Save And Analyze for the job, the changes
are applied to the selected base snapshot, the analysis is
performed, and results are generated. For every Pre-Change
Analysis job listed in the table, a delta analysis is performed
between the base snapshot and the newly generated
snapshot. Figure 2-18 shows Pre-Change Analysis.
Use the file you had uploaded from a JSON or XML path to
perform a Pre-change Analysis. After the Pre-Change
Analysis is complete, you can upload the same file to ACI to
be used to make the changes.
Note
Cisco NX-API needs to be enabled on the TAP
aggregation switches as a prerequisite for the
controller to automate SPAN configuration.
Figure 2-21 illustrates SPAN Automation–enabled networks.
Cisco Meraki MX
The Cisco Meraki MX appliances are multifunctional security
and SD-WAN enterprise appliances with a wide set of
capabilities to address multiple use cases—from an all-in-
one device. Organizations of all sizes and across all
industries rely on the MX to deliver secure connectivity to
hub locations or multicloud environments, as well as
application quality of experience (QoE), through advanced
analytics with machine learning.
The MX is 100% cloud-managed, so installation and remote
management is truly zero touch, making it ideal for
distributed branches, campuses, and data center locations.
Natively integrated with a comprehensive suite of secure
network and assurance capabilities, the MX eliminates the
need for multiple appliances. These capabilities include
application-based firewalling, content filtering, web search
filtering, SNORT-based intrusion detection and prevention,
Cisco Advanced Malware Protection (AMP), site-to-site Auto
VPN, client VPN, WAN and cellular failover, dynamic path
selection, web application health, VoIP health, and more.
SD-WAN can be easily extended to deliver optimized access
to resources in public and private cloud environments with
virtual MX appliances (vMX). Public clouds supported with
vMX include Amazon Web Services (AWS), Microsoft Azure,
Google Cloud Platform, and Alibaba Cloud and private cloud
support through Cisco Network Function Virtualization
Infrastructure Software (NFVIS).
Cisco Enterprise Network Function Virtualization
Infrastructure Software (Cisco Enterprise NFVIS) is Linux-
based infrastructure software designed to help service
providers and enterprises dynamically deploy virtualized
network functions, such as a virtual router, firewall, and
WAN acceleration, on a supported Cisco device. There is no
need to add a physical device for every network function,
and you can use automated provisioning and centralized
management to eliminate costly truck rolls.
Cisco Enterprise NFVIS provides a Linux-based virtualization
layer to the Cisco Enterprise Network Functions
Virtualization (ENFV) solution. Figure 2-26 illustrates the
Cisco SD-WAN extensions.
Note
On November 5, 2020, the existing vMX offer on the
AWS Marketplace was discontinued. For any issues
that are not firmware-related, AWS will not provide
support for the old vMX100 offer (as of February 3,
2021).
Summary
Network Insights builds a knowledge base by collecting
software and hardware telemetry data. It has an in-depth
understanding of protocols and features that run on the
environment and can correlate and differentiate between
expected versus unexpected behavior. It builds a
relationship between behavior, symptoms, logs, and
solutions and can derive root causes of the problem. A
virtual assistant or an automated SME always has your
back.
Network Insights detects any root-cause data-plane issues.
It is the industry’s first detailed end-to-end packet path with
information about flow, such as 5-tuple, latency, tenant,
VRF, endpoint groups, packets, drops, and more.
Network Insights provides advisories customized to the
customer environment on maintenance issues that require
their immediate attention so that the end user doesn’t have
to plow through oceans of data. You can troubleshoot across
the data center with the help of connected TAC, notification
of known issues, and steps toward fast remediation.
References/Additional Reading
vMX Setup Guide for Microsoft Azure:
https://documentation.meraki.com/MX/MX_Installation_G
uides/vMX_Setup_Guide_for_Microsoft_Azure
vMX Setup Guide for Google Cloud Platform
(GCP):
https://documentation.meraki.com/MX/MX_Installation_G
uides/vMX_Setup_Guide_for_Google_Cloud_Platform_(GC
P)
vMX Setup Guide for Alibaba Cloud:
https://documentation.meraki.com/MX/MX_Installation_G
uides/vMX_Setup_Guide_for_Alibaba_Cloud
Chapter 3. Cisco Data
Center Solutions for
Hybrid Cloud
The applications and data that run today’s businesses aren’t
just on-premises anymore. They’re spread across the entire
multicloud domain, in private and public clouds and in SaaS
environments. Your organization may have embraced this
distributed model on purpose or arrived there by default.
Either way, the hybrid cloud has a clear advantage:
flexibility. You can move data and applications where they
need to be, quickly and effortlessly.
Because of that flexibility, a hybrid cloud network can also
be complicated to maintain. But by following the principles
of simple, seamless hybrid network management, your
business can harness the benefits of hybrid cloud and run
more efficiently.
Cisco is making this possible—and making it easier every
day. Imagine one hybrid cloud platform that provides the
automation, observability, and cloud-native capabilities
necessary to keep business, technology, and teams
connected and moving as fast as the market demands.
That’s what being “cloud smart” is about.
Cisco’s hybrid cloud offerings give you flexible consumption
for your on-premises infrastructure so you can optimize
workloads across clouds, on-premises data centers, labs,
and co-location facilities for scale, performance, and agility
with great value.
Cisco has a series of innovations across its portfolio of SaaS-
delivered capabilities and cloud-optimized infrastructure to
turn its cloud smart vision into a reality for its customers.
This chapter will cover following solutions:
• Storage connections
• Pools
• Policies
• Service profiles
Monitoring and Reporting
You can also use Cisco UCS Director to monitor and report
on your Cisco UCS domains and their components,
including:
• Power consumption
• Temperature
• Server availability
Infrastructure as a Service
Cisco UCS Director delivers Infrastructure as a Service (IaaS)
for both virtual and physical infrastructure. With Cisco UCS
Director, you can create an application container template
that defines the infrastructure required for a specific
application or how a customer or business unit is expected
to use that application. Cisco UCS Director helps IT teams to
define the rules for the business’s infrastructure services:
• Either you can first onboard tenants and then define
the boundaries of the physical and virtual
infrastructure that they can use, or you can allow your
onboarded tenants to define the infrastructure
boundaries.
• Create policies, orchestration workflows, and
application container templates in Cisco UCS Director
that define the requirements for a specific type of
application that can be used by a tenant, such as a
web server, database server, or generic virtual
machine (VM).
• Publish these templates as a catalog in the End User
Portal.
Users can go to the End User Portal, select the catalog that
meets their needs, and make a service request for that
particular application or VM. Their service request triggers
the appropriate orchestration workflow to allocate the
required infrastructure and provision the application or VM.
If the service request requires approvals, Cisco UCS Director
sends emails to the specified approver(s). Once the service
request is approved, Cisco UCS Director assigns the
infrastructure to those users, creating a virtual machine if
necessary, and doing the base configuration, such as
provisioning the operating system. You can also configure an
orchestration workflow to ask questions before allowing a
user to choose a catalog item. Here are some points to keep
in mind:
• You can configure the workflow to ask the user what
type of application they plan to run and automatically
select a catalog for them based on the answers to
those questions.
• Instance summary
• Secure multitenancy
Secure Multitenancy
The integrated solution provides consistent delivery of
infrastructure components that are ready to be consumed
by clients in a secured fashion. Here are some key points
concerning secure multitenancy:
• The solution optimizes resource sharing capabilities
and provides secure isolation of clients without
compromising quality of service (QoS) in a shared
environment.
Self-Service Portal
After you have defined or adopted a set of application
profiles, you can make them available to clients in a service
catalog visible in the self-service portal. Your clients can log
in to Cisco UCS Director’s self-service portal, view the
service catalog published by your organization, and order
the infrastructure as desired.
The application profiles you define can be parameterized so
that clients can provide attributes during the ordering
process to customize infrastructure to meet specific needs.
For example, clients can be allowed to specify the number
of servers deployed in various application infrastructure
tiers or the amount of storage allocated to each database
server. After your clients have placed their orders, they can
monitor the status of application infrastructure orders, view
the progress of application infrastructure deployment, and
perform lifecycle management tasks.
Target Integration
A target is a service that performs management in your
virtual environment. Workload Optimization Manager uses
targets to monitor workloads and to perform actions in your
environment. The target configuration specifies the ports
that Workload Optimization Manager uses to connect with
these services. You must install Workload Optimization
Manager on a network that has access to the specific
services you want to set up as targets. For each target,
Workload Optimization Manager communicates with the
service through the management protocol that it exposes:
the Representational State Transfer (REST) API, Storage
Management Initiative Specification (SMI-S), XML, or some
other management transport mechanism. Workload
Optimization Manager uses this communication to discover
the managed entities, monitor resource utilization, and
perform actions.
Use the steps that follow to configure target integration:
Automate Actions
The visibility into the entities that exist in your environment
and the relationships among them underlies Workload
Optimization Manager’s core value: real-time decision
automation in the data center and cloud. To make the right
placement, scaling, and capacity decisions, the platform
needs to understand the entire environment. Workload
Optimization Manager models your environment as a
market of buyers and sellers linked together in a supply
chain. This supply chain represents the flow of resources—
from the data center, through the physical tiers of your
environment, to the virtual tier, and to the cloud. By
managing relationships between these buyers and sellers,
Workload Optimization Manager provides closed-loop
management of resources—from the data center through to
the application. You see the supply chain and use detail
across entities, and the platform sees what needs to be
done to achieve continuous health in the environment.
Workload Optimization Manager actions can be
implemented manually (with a mouse click) by an operator,
on command (for example, based on a change management
process), or automatically as events arise. Users can define
the level of automation by action type and at multiple levels
of detail; for example, you can automate actions for
individual virtual machines, for a cluster, or for a data
center.
To configure the level of automation for actions, use the
steps that follow.
Step 1. In Home menu, select Actions.
Step 2. Click to check the box for the entity for which you
want to automate the action (for example, select a
virtual machine).
Deployment Options
Cisco Intersight is a SaaS-delivered cloud operations
platform with the flexibility of advanced deployment
options. You can take advantage of new features as they
become available from Cisco without the challenges and
complexity of maintaining your management tools. The
majority of Cisco users enjoy the benefits of SaaS; however,
if you have data locality or security needs for managing
systems that may not fully meet a SaaS management
model, you can leverage the Cisco Intersight Virtual
Appliance software on your premises to connect your
servers through Intersight.com.
Alternatively, the Cisco Intersight Private Virtual Appliance
provides an easy way to deploy a VMware Open Virtual
Appliance (OVA), which can be configured, deployed, and
run off-premises. The Private Virtual Appliance allows you to
still take advantage of much of the SaaS functionality
without connectivity back to Intersight.com. Both the
Intersight Virtual Appliance and Private Virtual Appliance
provide advantages over conventional on-premises
management tools.
Benefits
The Intersight Workload Engine (IWE) is used to create and
operate a cluster of UCS servers. The IWE OS is installed
and runs on those servers, and IWE contains all the software
needed to operate the IWE cluster, including the operating
system, hypervisor, clustering software, and storage
software. The following list explains some of the benefits of
using IWE:
Key Features
The IWE management UI and equivalent APIs are used to
deploy and manage your cluster, including cluster lifecycle
tasks such as upgrades, expansion, repair, security
patching, and software or firmware upgrades. Your app or
DevOps teams can use your IWE clusters to run the Cisco
Intersight Kubernetes Service (IKS) and manage Kubernetes
clusters. The following list mentions some features of IWE:
Summary
Application innovation is at the heart of the digital economy.
A new era of apps is redefining what data centers are and
need to be capable of supporting. Today, the data center is
no longer a fixed place. It exists wherever data is created,
processed, and used. “Enterprises should be able to deploy
applications based on the needs of their business, not the
limitations of their technology,” according to Roland Acra,
senior vice president and general manager of the Data
Center Business Group at Cisco. “Customers want to deploy
applications and manage data across a range of diverse
platforms, from on-premises to cloud-based. That is why we
are taking the ‘center’ out of the data center. Today, Cisco is
helping our customers expand their reach into every cloud,
every data center, and every branch.”
ACI Anywhere and Hyperflex Anywhere are the major
innovations that remove data center boundaries.
With Cisco Workload Optimization Manager, data center
operators can deliver differentiated performance while
making the best use of the environment. When used in
combination with Cisco UCS Manager and Cisco UCS
Director, it can help organizations achieve elastic computing
with cloud economics. Full automation can empower data
center operators to focus on innovation: to deliver new
products and services that enable the digitization of their
organization and provide competitive advantage for their
business.
References/Additional Reading
https://www.cisco.com/c/dam/en/us/solutions/collateral/d
ata-center-virtualization/unified-computing/cwom-
setup.pdf
Part 2: Cisco Applications
and Workload Management
Chapter 4. Application,
Analytics, and Workload
Performance Management
with AppDynamics
Monitor, correlate, analyze, and act on application and
business performance data in real time with AppDynamics.
This chapter covers the following topics:
• What is AppDynamics?
• Application Monitoring
• Infrastructure Visibility
• Analytics
What Is AppDynamics?
Cisco AppDynamics is an Application Performance
Management (APM) solution that enhances application
performance and visibility in the multicloud world. Cisco
AppDynamics can help your organization make critical,
strategic decisions. It uses artificial intelligence (AI) to solve
application problems and prevent them from occurring in
the future, and it enhances the visibility into your IT
architecture.
Note
This book will not cover deployment of
AppDynamics. It will only focus on key concepts
and fundamentals of AppDynamics without going
into configuration details.
AppDynamics Concepts
The AppDynamics APM platform enables management and
monitoring of your application delivery ecosystem, ranging
from mobile/browser client network requests to backend
databases/servers and more. This global view across your
application landscape allows you to quickly navigate
through the distributed application into the call graphs and
exception reports generated on individual hosts.
User Interface
AppDynamics provides a tenant to collect, store, analyze,
and baseline the performance data collected by agents as
well as a user interface (UI) to view and manage the
information. You access the AppDynamics Tenant UI through
a URL that uses your account name. Each tenant has a
distinct set of users, reporting agents, and application-
monitoring configurations.
AppDynamics can host one or more accounts, where each
account represents one tenant. The AppDynamics cloud-
based Software as a Service (SaaS) deployment is a multi-
tenant environment that allows you to access multiple
tenants independently.
Note
A database agent is a standalone Java program that
collects performance metrics about your database
instances and database servers. You can view these
performance metrics in the Metric Browser of the
AppDynamics Controller UI.
Use Metrics
A metric is a particular class of measurement, state, or
event in the monitored environment. Many defaults relate to
the overall performance of the application or business
transaction, such as request load, average response time,
and error rate. Others describe the state of the server
infrastructure, such as percentage CPU busy and percentage
of memory used.
Agents register the metrics they detect with the tenant.
They then report measurements or occurrences of the
metrics (depending on the nature of the metric) to the
tenant at regular intervals. You can view metrics using the
Metric Browser in the Tenant UI.
An information point is a particular type of metric that
enables you to report on how your business (as opposed to
your application) is performing. For example, you could set
up an information point to total the revenue from the
purchase on your website of a specific product or set of
products. You can also use information points to report on
how your code is performing; for example, how many times
a specific method is called and how long it is taking to
execute.
You can create extensions that use the machine agent to
report custom metrics that you define. These metrics are
baselined and reported in the tenant, just like the built-in
AppDynamics metrics. As an alternative to using the Tenant
UI, you can access metrics programmatically with the
AppDynamics APIs.
Infrastructure Monitoring
While Business Transaction performance is typically the
focus of a performance monitoring strategy, monitoring
infrastructure performance can add insight into underlying
factors about performance. AppDynamics can alert you of
the problem at the Business Transaction and infrastructure
levels.
AppDynamics provides preconfigured application
infrastructure metrics and default health rules to enable you
to discover and correct infrastructure problems. You can also
configure additional persistent metrics to implement a
monitoring strategy specific to your business needs and
application architecture.
In addition to health rules, you can view infrastructure
metrics in the Metric Browser. In this context, the
Correlation Analysis and Scalability Analysis graphs are
useful to understand how infrastructure metrics can
correlate or relate to Business Transaction performance.
Deployment Models
An AppDynamics deployment uses installed agents to
collect data from a monitored environment. The
AppDynamics UI provides the access to view, understand,
and analyze the data.
The AppDynamics SaaS deployment is a cloud-based
solution that enables real-time visibility into the health and
performance of your instrumented environment, with
significantly reduced cost and maintenance. A SaaS
deployment provides these benefits:
• No need to install the tenant.
• AppDynamics manages the server-side components of
the AppDynamics platform, including its installation
and upgrades.
Installation Overview
Before you install the platform, review the requirements for
the components you plan to install and prepare the host
machines. The requirements vary based on the components
you deploy and the size of your deployment.
For the Controller and Events Service, you first need to
install the AppDynamics Enterprise Console. You then use
the application to deploy the Controller and Events Service.
Note that the Events Service can be deployed as a single
node or a cluster. The Enterprise Console is not only the
installer for the Controller and Events Service; it can
manage the entire lifecycle of new or existing AppDynamics
Platforms and components.
You cannot use the Enterprise Console to perform the End
User Monitoring (EUM) Server installation. Instead, you must
use a package installer that supports interactive GUI or
console modes, or you can use a silent response file
installation.
Platform Components and Tools
An on-premises AppDynamics platform installation consists
of several, separately installed and configured components.
These include the Controller, MySQL database, Events
Service, and optionally the EUM Server.
The AppDynamics Enterprise Console is a GUI- and
command-line-based application that can manage the
installation, configuration, and administration of the
Controller and Events Service.
For the EUM Server, you must continue to use the package
installer to deploy the EUM Cloud.
After you install the platform, you can configure and
manage different components with component-specific
scripts. Based on how you deploy the platform, you might
use a combination of the Enterprise Console and package
installers to install and manage the various components of
the platform.
On-Premises Deployment
Architecture
Figure 4-3 depicts the components of a complete on-
premises AppDynamics APM platform deployment. It shows
how the components interact to fulfill application, database,
infrastructure, end-user monitoring, and more.
Figure 4-3 Components of a complete on-premises
AppDynamics APM platform deployment
Depending on the scale of your deployment, your
requirements, and the products you are using, your own
deployment is likely to consist of a subset of the
components shown in the diagram.
Platform Components
Table 4-1 describes how the components work together in
the AppDynamics platform.
Note
Components must be licensed separately.
Figure 4-4 illustrates a SaaS AppDynamics deployment
architecture.
Figure 4-4 SaaS AppDynamics deployment architecture
Figure 4-5 illustrates the connections, datastores, and key
for the SaaS deployment architecture.
Application Monitoring
AppDynamics Application Performance Monitoring (APM), a
component of the AppDynamics platform, provides end-to-
end visibility into the performance of your applications.
AppDynamics works with popular programming languages
such as Java, .NET, Node.js, PHP, Python, C/C++, and more,
enabling you to do the following:
Business Transactions
In the AppDynamics model, a business transaction
represents the data processing flow for a request, most
often a user request. In real-world terms, many different
components in your application may interact to provide
services to fulfill the following types of requests:
• In an e-commerce application, a user logging in,
searching for items or adding items to a cart
• In a content portal, a user requesting content such as
sports, business, or entertainment news
Business Applications
A business application is the top-level container in the
AppDynamics model. A business application contains a set
of related services and business transactions.
In a small AppDynamics deployment, only a single business
application may be needed to model the environment. In
larger deployments, you may choose to divide the model of
the environment into several business applications.
The best way to organize business applications for you
depends on your environment. A leading consideration for
most cases, however, is to organize business applications in
a way that reflects work teams in your organization, since
role-based access controls in the Controller UI are oriented
by business application.
Nodes
A node in the AppDynamics model corresponds to a
monitored server or Java virtual machine (JVM) in the
application environment. A node is the smallest unit of the
modeled environment. Depending on the agent type, a node
may correspond to an individual application server, JVM, CLR
(Common Language Runtime), PHP application, or Apache
Web server.
Each node identifies itself in the AppDynamics model. When
you configure the agent, you specify the name of the node,
tier, and business application under which the agent reports
data to the Controller.
Tiers
A tier is a unit in the AppDynamics model composed of a
grouping of one or more nodes. How you organize tiers
depends on the conceptual model of your environment.
Often, a tier is used to a group of a set of identical,
redundant servers. But that is not strictly required. You can
group any set of nodes, identical or not, for which you want
performance metrics to be treated as a unit into a single
tier.
The single restriction is that all nodes in a single tier must
be the same type. That is, a tier cannot have mixed types of
agents, such as both .NET and Java nodes.
The traffic in a business application flow between tiers, as
indicated by lines on the flow map, which are annotated
with performance metrics.
In the AppDynamics model, there is no interaction among
nodes within a single tier. Also, an application agent node
cannot belong to more than one tier.
Entities
An entity is any object that AppDynamics monitors, such as
an application, tier, node, or even a business transaction.
Entities typically have associated metrics, events, and a
health status.
Liveness Status
The liveness of an entity affects the associated entities, as
the liveness is rolled up the hierarchy. If the entity type in
Table 4-4 is live, you can determine the liveness of the
associated entities in the right column.
• Flow map.
• Custom dashboards.
Backends
A backend is a component that is not instrumented by an
AppDynamics agent but one that participates in the
processing of a business transaction instance. A backend
may be a web server, database, message queue, or another
type of service.
The agent recognizes calls to these services from
instrumented code (called exit calls). If the service is not
instrumented and cannot continue the transaction context
of the call, the agent determines that the service is a
backend component. The agent picks up the transaction
context at the response at the backend and continues to
follow the context of the transaction from there.
Performance information is available for the backend call.
For detailed transaction analysis for the leg of a transaction
processed by the backend, you need to instrument the
database, web service, or other application.
• .NET Agent
Note
The APM Agent (Java Agent) communicates to the
Cisco Secure Application service through the
AppDynamics Controller.
The high-level architecture works as follows:
• You install the supported APM Agent and then add the
Cisco Secure Application license.
• Severity
• Affected Services/Tiers
• Status
Note
You can search using one or all the categories, but
each category can have a single search value. A
category is disabled when you specify a search
value for that category, but you can continue to
select another available category and specify its
search value. These search values act as filters. You
can remove the search values to remove the search
filter.
Cisco Secure Application provides a real-time dashboard
that displays these pages:
Note
You must assign unique names to EUM applications
and business applications. For example, if you
created a business application called “E-
Commerce,” you cannot create a browser, mobile,
or IoT application with that same name, and vice
versa.
Traffic Segments
A traffic segment connects two end-user events in a journey
and contains data about what users experience in that
journey. If the journey exceeds health performance metrics,
a health status icon will appear on the traffic segment with
more details on the user impact of poor performance.
Click a traffic segment to see the following information:
• Number of users who journeyed from one end-user
event to the next
• Performance metrics for users within a journey
• Option to analyze individual browser or mobile
sessions within a journey
Refresh Loops
A refresh loop is a type of traffic segment and contains data
for users who refresh an end-user event.
Click a refresh loop to see the following information:
• How many users needed to hit Refresh because of
poor app performance
• Insights into what causes poor app performance
Browser Monitoring
In this section, we will look at Browser Monitoring and
options available to track application performance.
AppDynamics offers two products to monitor browser
applications:
• Browser Real User Monitoring (Browser RUM):
Monitors how your web application is performing, using
real user data to analyze application performance and
user experience
• Browser Synthetic Monitoring: Analyzes
application availability and performance, using
scheduled testing to analyze website availability
Overview Tab
The Overview tab displays a set of configurable widgets.
The default widgets contain multiple graphs and lists
featuring common high-level indicators of application
performance. Figure 4-19 shows an example of a Browser
Application Dashboard.
Geo Tab
The Geo tab displays key performance metrics by
geographic location based on page loads. If you are using
Browser Synthetic Monitoring for an application, you can
view either “real user” or “synthetic” data using the View
drop-down.
The metrics displayed throughout the dashboard are for the
region currently selected on the map or in the grid. For
example, on the map, if you click France, the widgets and
trend graphs update to display data for France. Figure 4-20
shows an example of a Geo Dashboard.
Overview Tab
The Overview tab displays widgets providing high-level
indicators of resource performance over a specified time
period. The dashboard can be filtered to real user or
synthetic data. The widgets only show a small number of
resources, but you can click See More to view up to 100
resources per widget. Figure 4-22 shows Overview under
Resource Performance.
Figure 4-22 Overview tab
Violations Tab
The Violations tab shows a list of pages, resource types, and
domain or resource violations that have exceeded
performance thresholds. You can use the Violations tab not
to only find problematic resources but also to become aware
of sudden changes that negatively impacted the
performance of a resource. Clicking a specific violation leads
to the Resources tab, and the data is filtered with that
violation for further diagnostics. The configured violation
rules are evaluated every 10 minutes for the last 30
minutes. Figure 4-23 shows Violations under Resource
Performance.
Resources Tab
You can use the Resources tab to diagnose a problematic
resource. You can also add criteria as a filter to the widgets.
All use cases to troubleshoot a resource lead to the
Resources tab, where you can learn more about an
individual resource’s impact on an application. Figure 4-24
illustrates Resource under Resource Performance.
Figure 4-24 Resources tab
IoT Monitoring
AppDynamics IoT Monitoring enables you to track and
understand the transactions of your IoT applications.
Because IoT devices are diverse, both in terms of the
platforms they use and their business functions,
AppDynamics has developed a REST API in addition to
language SDKs to provide the maximum flexibility for
reporting IoT data. This API can be used from any device
that supports HTTPS and is connected to the Internet.
IoT Monitoring requires application developers to instrument
their code. To make this process easier, AppDynamics has
developed C/C++ and Java SDKs so that developers using
the platforms supporting these languages can leverage the
features of the SDK instead of using the REST API.
The IoT SDKs use the REST APIs to report IoT data to
Database Visibility
Database Visibility in AppDynamics provides end-to-end
visibility on the performance of your database, helps you
troubleshoot problems such as slow response times and
excessive load, and provides metrics on database activities
such as the following:
• SQL statements or stored procedures that are
consuming most of the system resources
• Statistics on procedures, SQL statements, and SQL
query plans
• Time spent on fetching, sorting, or waiting on a lock
Infrastructure Visibility
AppDynamics Infrastructure Visibility provides end-to-end
visibility into the performance of the hardware running your
applications. You can use Infrastructure Visibility to identify
and troubleshoot problems that can affect application
performance such as server failures, JVM crashes, and
network packet loss.
Infrastructure Visibility provides the following metrics:
• CPU busy/idle times, disk and partition reads/writes,
and network interface utilization (Machine Agents)
• Packet loss, round-trip times, connection setup/tear
down errors, TCP window size issues, and
retransmission timeouts (Network Visibility, additional
license required)
Network Visibility
Network Visibility monitors traffic flows, network packets,
TCP connections, and TCP ports. Network Agents leverage
the APM intelligence of App Server Agents to identify the
TCP connections used by each application. Network Visibility
includes the following items:
• Detailed metrics about dropped/retransmitted
packets, TCP window sizes (Limited/Zero), connection
setup/tear down issues, high round-trip times, and
other performance-impacting issues
Server Visibility
Server Visibility monitors local processes, services, and
resource utilization. You can use these metrics to identify
time windows when problematic application performance
correlates with problematic server performance on one or
more nodes.
Server Visibility is an add-on module to the Machine Agent.
With Server Visibility enabled, the Machine Agent provides
the following functionality:
Analytics
Analytics extracts the data, generates baselines and
dashboards, and provides perspective beyond traditional
APM by enabling real-time analysis of business performance
correlated with your application performance.
You can use Analytics with the APM, Browser RUM, Mobile
RUM, and Browser Synthetic Monitoring product modules for
the following:
• Transaction Analytics
• Log Analytics
• Browser Analytics
• Mobile Analytics
• Browser Synthetic Analytics
• Connected Devices Analytics
Overview of Analytics
Analytics is built on the AppDynamics APM platform, which
includes the Events Service, the unstructured document
store for the platform.
Analytics can answer business-oriented questions such as
the following:
Note
To view the different widgets on the Home page,
you need the appropriate licenses and access.
You can access the AppDynamics Home page by clicking the
Home icon on the left navigation pane in Analytics. You
can either use the left navigation pane or click Home on the
right pane to navigate to the Analytics modules (Searches,
Metrics, Business Journeys, Experience Levels, Alert &
Respond, and Configuration).
Figure 4-33 shows the Analytics Home view.
Docker
In simple terms, the Docker platform is all about making it
easier to create, deploy, and run applications by using
containers. Containers let developers package up an
application with all the necessary parts, such as libraries
and other elements it is dependent on, and then ship it all
out as one package. By keeping an app and associated
elements within the container, developers can be sure that
the apps will run on any Linux machine no matter what kind
of customized settings that machine might have, or how it
might differ from the machine that was used for writing and
testing the code. This is helpful for developers because it
makes it easier to work on the app throughout its lifecycle.
Docker is kind of like a virtual machine, but instead of
creating a whole virtual operating system (OS), it lets
applications take advantage of the same Linux kernel as the
system they’re running on. That way, the app only has to be
shipped with things that aren’t already on the host
computer instead of a whole new OS. This means that apps
are much smaller and perform significantly better than apps
that are system-dependent.
AppDynamics Docker monitoring offers container monitoring
for dynamic, fast-moving microservice architectures, as
covered in the following section.
Note
Container monitoring requires a Server Visibility
license (>=4.3.3) for both the Controller and the
Machine Agent.
You should deploy the Machine Agent inside a Docker
container. The Machine Agent collects metrics for Docker
containers on the same host, and it collects server and
machine metrics for the host itself. The Controller shows all
monitored containers for each host as well as the container
and host IDs for each container.
In the BRIDGE networking mode, the containers take on the
container ID as the host name. If networking is in host
mode, the containers take on the node name of the host ID.
This means every container on that node has the same host
ID. In this case, you need to use the unique host ID settings.
When you’re using Docker Visibility, if the unique host ID
setting is not configured to use container ID in host network
mode, the Machine Agent automatically registers the
container using the container ID as the host ID. If you have
an older version of the Controller or Machine Agent,
AppDynamics recommends that you upgrade to Machine
Agent version 20.7 or later.
With Controller version 20.11.0 or later:
• If the Machine Agent is 20.7.0 or later, the Machine
Agent automatically registers the container using the
container ID as the host ID. No further action is
needed.
• If the Machine Agent is 20.6.0 or earlier and is
configured incorrectly, the Controller rejects the
misconfigured containers registration.
By default, the Machine Agent only monitors containers that
have a running APM Agent. You can change this by setting
the sim.docker.monitorAPMContainersOnly property on the
Controller.
Note
To deploy a Machine Agent on a host outside a
Docker container, create a symbolic link (ln -s /
/hostroot) on the host. This symbolic link enables
the Machine Agent to collect host metrics with
Docker container metrics. When you deploy a
Machine Agent inside a Docker container for
monitoring, the symbolic link is automatically
created when the volume mounts. To grant more
restrictive permissions, enter this command to
create symbolic links: ln -s /proc /hostroot/proc;
ln -s /sys /hostroot/sys; ln -s /etc
/hostroot/etc. You can make these links read-only
because the AppDynamics Agent does not need
write privileges to these directories.
Figure 4-34 illustrates how to deploy container monitoring,
as detailed in the following list:
Figure 4-34 How to deploy container monitoring
Kubernetes
Kubernetes is a container-orchestration platform for
automating deployment, scaling, and operations of
applications running inside the containers across clusters of
hosts. Open-sourced by Google in 2014, Kubernetes was
built based on the search giant’s own experience with
running containers in production. It’s now under the aegis of
the Cloud Native Computing Foundation (CNCF), which
reports that Kubernetes is the most popular container
management tool among large enterprises, used by 83% of
respondents in a recent CNCF survey
(https://www.cncf.io/wp-
content/uploads/2020/11/CNCF_Survey_Report_2020.pdf).
And in case you’re wondering, the name “Kubernetes” is
Greek for “helmsman” or “pilot.”
Kubernetes Monitoring with AppDynamics gives
organizations visibility into application and business
performance, providing insights into containerized
applications, Kubernetes clusters, Docker containers, and
underlying infrastructure metrics.
and Server metrics for the host, and then forwards the
metrics to the Controller.
• Controller
• sim.machines.tags.k8s.enabled: The value
defaults to true. The global tag’s enabled flag has
priority over this.
• sim.machines.tags.k8s.pollingInterval: The
value defaults to one minute. The minimum value you
can set for the polling interval is 30 seconds.
• Machine Agent
Note
For OpenShift, run the following command:
-Dappdynamics.agent.uniqueHostId=$(sed -rn '1s#.*/##;
1s/docker-(.{12}).*/\1/p' /proc/self/cgroup)
-
Dappdynamics.docker.container.containerIdAsHostId.enable
d=true
BASH
Resource Limits
Consider the following resource limits for applications and
the Machine Agent when deploying the AppDynamics
Machine Agent on Kubernetes:
Note
AppDynamics provides a Kubernetes Snapshot
Extension for monitoring the health of the
Kubernetes cluster. When deploying this extension,
it is important to keep in mind that only a single
version of the extension should be deployed to the
cluster. Do not include it in the DaemonSet to avoid
duplicates and potential cluster overload. Instead,
consider deploying the instance of the Machine
Agent with the extension as a separate deployment
with one replica in addition to the DaemonSet for
Server Visibility. The machine agent SIM and Docker
can be disabled in this case, and the memory
request can be dropped to 250M.
ClusterRole Configuration
Refer to the sample role definition shown in Figures 4-41a
and 4-41b. It provides a wide read access to various
Kubernetes resources. These permissions are more than
sufficient to enable Kubernetes extensions to the Machine
Agent as well as the pod metadata collection. The role is
called “appd-cluster-reader,” but you can obviously name it
as needed. The cluster role definition outlines various api
groups that will be available for members of this role. For
each api group, we define a list of resources that will be
accessed and the access method. Because we only need to
retrieve information from these api endpoints, we only need
the read-only access, expressed by “get,” “list,” and
“watch” verbs.
Figure 4-41a Sample ClusterRole
Figure 4-41b Sample ClusterRole
Once the role is defined, you will need to create cluster role
bindings to associate the role with a service account. Refer
to the example of a ClusterRoleBinding spec in Figure 4-42,
which makes the appd-cluster-reader service account a
member of the appd-cluster-reader-role in project
“myproject.” Note that the naming is purely coincidental.
The names of the service account and the cluster role do
not have to match.
Figure 4-42 Sample ClusterRoleBinding
Note
Make sure you have at least one pod with a Java
Agent (version 4.4 or higher) deployed to the same
cluster as the Network Agent.
Also, ensure that TCP port 3892 is not already used
by the node. Port 3892 will be used by the
application pods to communicate with the
DaemonSet.
Figure 4-46 Sample Code for the Host and Port values
Step 2. In the Controller UI, enable socket instrumentation
so that you can map network metrics to application
flows.
• OpenTelemetry-based extensibility
• Hosts
• AWS Databases
Summary
This chapter has covered a lot of information around the
AppDynamics monitoring features, including Application
Monitoring, End User Monitoring, Database Visibility,
Infrastructure Visibility, and Monitoring Cloud Applications. It
also provided basic information on App Dynamics Cloud and
its ability to provide observability into the AWS and Azure
Cloud infrastructures. There is a lot more to cover in
AppDynamics, but what was covered in this chapter should
help you being to understanding App Dynamics and how it
helps in a hybrid cloud environment with its unique
monitoring capabilities.
References/Additional Reading
https://docs.appdynamics.com/appd-cloud/en/what-s-
new
https://docs.appdynamics.com/appd-cloud/en/about-
appdynamics-cloud
https://docs.appdynamics.com/appd/21.x/21.3/en/infrast
ructure-visibility/monitor-containers-with-docker-
visibility/use-docker-visibility-with-red-hat-openshift
https://docs.appdynamics.com/appd/21.x/21.3/en/infrast
ructure-visibility/monitor-kubernetes-with-the-cluster-
agent
Chapter 5. Management
Cisco has been working for over three years to bring the
industry-leading Application Resource Management (ARM)
capability to Cisco customers. It started with Cisco Workload
Optimization Manager (CWOM). CWOM is powered by
Turbonomic, and it enables Cisco customers to continuously
resource applications to perform at the lowest cost while
adhering to policies irrespective of where the application is
hosted (that is, on the premises or in the cloud, containers,
or VMs). In January 2020, Cisco announced Intersight
Workload Optimizer (IWO), which is the integration of CWOM
and Intersight. With IWO, application and infrastructure
teams can now speak the same language to ensure that
applications are automatically and continuously resourced
to perform.
Alongside the Intersight Workload Optimizer, Cisco offers
Intersight Kubernetes Service (IKS), which is a fully curated,
lightweight container management platform for delivering
multicloud production-grade upstream Kubernetes. It
simplifies the process of provisioning, securing, scaling, and
managing virtualized Kubernetes clusters by providing end-
to-end automation, including the integration of networking,
load balancers, native dashboards, and storage provider
interfaces.
This chapter will cover the following topics:
Business Impact
Unchecked complexity can result in the following:
CWOM-to-IWO Migration
In June 2019, Turbonomic and CWOM became inaugural
members of the Integration Partner Program (IPP), which
takes the technology partnership to another level by helping
joint customers maximize the value of their AppDynamics
and CWOM investment. The extended integration and
partnership delivers on the vision of AIOps, where software
is making dynamic resourcing decisions and automating
actions to ensure that applications are always performing,
enabling positive business outcomes and improved user
experiences. Organizations across the world are investing
heavily in developing new applications and innovating faster
to deliver better, more simplified user experiences. The
partnership and the combination of AppDynamics and
CWOM ensures that applications are architected and written
well and are continuously resourced for performance.
As a full-stack, real-time decision engine, Intersight
Workload Optimizer revolutionizes how teams manage
application resources across their multicloud landscape,
significantly simplifying operations. It delivers
unprecedented levels of visibility, insights, and automated
actions, as customers look to prevent application
performance issues.
Figure 5-3 provides a very high-level view of IWO application
management.
Figure 5-3 Very high-level view of IWO application
management
Simply put, IWO provides the following customer benefits:
Risk Index
Intersight Workload Optimizer tracks prices for resources in
terms of the Risk Index (RI). The higher this index for a
resource, the more heavily the resource is utilized, the
greater the delay for consumers of that resource, and the
greater the risk to your QoS. IWO constantly works to keep
the RI within acceptable bounds.
You can think of the RI as the cost for a resource, and IWO
works to keep the cost at a competitive level. This is not
simply a matter of responding to threshold conditions. IWO
analyzes the full range of buyer/seller relationships, and
each buyer constantly seeks out the most economical
transaction available.
This last point is crucial to understanding IWO. The virtual
environment is dynamic, with constant changes to workload
that correspond with the varying requests your customers
make of your applications and services. By examining each
buyer/seller relationship, IWO arrives at the optimal
workload distribution for the current state of the
environment. In this way, it constantly drives your
environment toward the desired state.
• Persistent storage
Step 1. In the left pane, click Clusters and then click the
vSphere tab.
Note
Ensure that DRS and HA are enabled on the cluster
that you choose. For more information on enabling
DRS and HA on clusters, see Cisco Container
Platform Installation Guide.
c. From the DATASTORE drop-down list, choose a
datastore.
Note
Ensure that the datastore is accessible to the hosts
in the cluster.
d. From the VM TEMPLATE drop-down list, choose a
VM template.
Note
Ensure that you select a subnet with an adequate
number of free IP addresses. For more information,
see Managing Networks. The selected network
must have access to vCenter.
For v2 clusters that use HyperFlex systems:
■ The selected network must have access to the
HypexFlex Connect server to support HyperFlex
Storage Provisioners.
■ For HyperFlex Local Network, select k8-priv-
iscsivm-network to enable HyperFlex Storage
Provisioners.
Note
GPU configuration applies only if you have GPUs in
your HyperFlex cluster.
Note
You may skip this step for v2 clusters. You can
configure the number of master nodes only for v3
clusters.
Note
Ensure that you use the Ed25519 or ECDSA format
for the public key. Because RSA and DSA are less-
secure formats, Cisco prevents the use of these
formats.
Note
If you want to install the HX-CSI add-on, ensure that
you set the CIDR network prefix of the DOCKER
BRIDGE IP field to /24.
s. Click NEXT.
Note
Harbor is currently not available for v3 clusters.
d. Click NEXT.
Step 7. In the Summary screen, verify the configuration
and then click FINISH.
Step 1. In the left pane, click Clusters and then click the
AWS tab.
Note
Not all regions support EKS. Ensure that you select
a supported region. Currently, CCP supports the ap-
northeast-1, ap-northeast-2, ap-southeast-1, ap-
southeast-2, eu-central-1, eu-north-1, eu-west-1,
eu-west-2, eu-west-3, us-east-1, us-east-2, and us-
west-2 regions.
c. In the KUBERNETES CLUSTER NAME field, enter
a name for your cluster.
d. Click NEXT.
Step 4. In the Node Configuration screen, specify the
following information:
a. From the INSTANCE TYPE drop-down list, choose
an instance type for your cluster.
Note
Because RSA and DSA are less-secure formats,
Cisco prevents the use of these formats.
f. Click NEXT.
Step 5. In the VPC Configuration screen, specify the
following information:
Note
If you receive the “Could not get token:
AccessDenied” error message, this indicates that
the AWS account is not a trusted entity for the Role
ARN.
Connected Model
In a connected deployment model, the license usage
information is directly sent over the Internet or through an
HTTP proxy server to Cisco SSM.
For a higher degree of security, you can opt to use a
partially connected deployment model, where the license
usage information is sent from CCP to a locally installed VM-
based satellite server (Cisco SSM satellite). Cisco SSM
satellite synchronizes with Cisco SSM on a daily basis.
Note
This option is available only if you are compliant
with the Export-Controlled functionality.
Benefits of IKS
The following are the benefits of using IKS:
How It Works
Cisco Intersight Kubernetes Service (IKS) is a fully curated,
lightweight container management platform for delivering
multicloud, production-grade, upstream Kubernetes. Part of
the modular SaaS Cisco Intersight offerings (with an air-
gapped on-premises option also available), IKS simplifies the
process of provisioning, securing, scaling, and managing
virtualized or bare-metal Kubernetes clusters by providing
end-to-end automation, including the integration of
networking, load balancers, native dashboards, and storage
provider interfaces. It also works with all the popular public
cloud–managed K8s offerings, integrating with common
identity access with AWS Elastic Kubernetes Service (EKS),
Azure Kubernetes Service (AKS) and Google Cloud Google
Kubernetes Engine (GKE). IKS is ideal for AI/ML development
and data scientists looking for delivering GPU-enabled
clusters, and Kubeflow support with a few clicks. It also
offers enhanced availability features, such as multimaster
(tenant) and self-healing (operator model).
IKS is easy to install in minutes and can be deployed on top
of VMware ESXi hypervisors, Cisco HyperFlex Application
Platform (HXAP) hypervisors, and/or directly on Cisco
HyperFlex Application Platform bare-metal servers, enabling
significant savings and efficiency without the need of
virtualization. In addition, with HXAP leveraging container-
native virtualization capabilities, you can run virtual
machines (VMs), VM-based containers, and bare-metal
containers on the same platform! Cisco Intersight also offers
native integrations with Cisco HyperFlex (HX) for enterprise-
class storage capabilities (for example, persistent volume
claims and public cloud-like object storage) and Cisco
Application Centric Infrastructure (Cisco ACI) for networking,
in addition to the industry- standard Container Storage
Interface and Container Network Interface (for example,
Calico).
Intersight Kubernetes Service integrates seamlessly with the
other Cisco Intersight SaaS offerings to deliver a powerful,
comprehensive cloud operations platform to easily and
quickly deploy, optimize, and lifecycle-manage end-to-end
infrastructure, workloads, and applications. Figure 5-14
illustrates the benefits of IKS.
Figure 5-14 Benefits of IKS
Summary
Containers are the latest—and arguably one of the most
powerful—technologies to emerge over the past few years
to change the way we develop, deploy, and manage
applications. The days of the massive software release are
quickly becoming a thing of the past. In their place are
continuous development and upgrade cycles that are
allowing a lot more innovation and quicker time to market,
with a lot less disruption—for customers and IT
organizations alike.
With these new Cisco solutions, you can deploy, monitor,
optimize, and auto-scale your applications.
References/Additional Reading
cisco.com/c/en/us/products/collateral/cloud-systems-
management/intersight-workload-optimizer/solution-
overview-c22-744342.html
https://www.cisco.com/c/en/us/support/docs/cloud-
systems-management/intersight/217640-configure-
deployment-of-kubernetes-clust.html
https://blogs.cisco.com/cloud/ciscocontainerplatform
https://www.cisco.com/c/dam/global/en_uk/products/clou
d-systems-management/pdfs/cisco-container-platform-
at-a-glance.pdf
https://blogs.cisco.com/cloud/saas-based-kubernetes-
lifecycle-management-an-introduction-to-intersight-
kubernetes-service?ccid=cc001268
https://www.cisco.com/c/en/us/products/collateral/cloud-
systems-management/intersight/at-a-glance-c45-
744332.html
https://www.cisco.com/c/en/us/support/docs/cloud-
systems-management/intersight/217640-configure-
deployment-of-kubernetes-clust.html
Chapter 6. Cisco Cloud
Webex Application
Collaboration is a key component of any IT solution, and
Cisco Webex provides an ideal platform for staying
connected and collaborating with individuals, teams, and
meetings to move projects forward faster. In this chapter,
we are going to cover the Cisco Webex application, which
provides new and advanced features in instant messaging
and presence, voice and video communication, business-to-
business communication, Public Switched Telephone
Network (PSTN) access, mobile and remote access, and web
conferencing and meetings. We cover these topics in detail
in the following sections.
• Migration flexibility
• PSTN options
From a Space
If you’re already working together in a space, anyone can
start an instant meeting to meet right away or schedule one
for later. With these types of meetings, everyone in the
space gets invited automatically and gets treated like a
host. Therefore, during the meeting, everyone can let
people in, mute people, and record. Since you’re meeting in
the same space where you’re working, you get easy access
to your messages, files, and whiteboards, and you can work
on them while you’re in the meeting.
From a Calendar
From your Meetings calendar, you can start a meeting right
away in your Personal Room. You’ll see this option if you
have a host license, and it gives you a virtual conference
room assigned just to you. Because it’s your own room, your
link is always the same.
If you don’t see that choice, you can still schedule a meeting
with anyone else. You don’t need to be connected to them in
the app, and they don’t even need to have a Webex
account. Plus, you or anyone you assign as a co-host can
start the meeting, invite people to it, start breakout
sessions, enable recording transcripts, and more. Figure 6-
11 shows how to schedule a Webex meeting from the
Webex app.
Figure 6-11 Scheduling a Webex meeting
Upcoming Meetings
Knowing what meetings you have can help you plan your
workday. You can view details about your upcoming
meetings in your meetings list, such as what the meeting is
about, when it’s happening, who’s invited, and who
scheduled the meeting. When it’s time for a meeting to
start, you can join it from the meetings list, too. Figure 6-12
shows upcoming meetings in Webex.
Webex Messaging
Always-on messaging lets you minimize meetings, organize
your thoughts, and actively engage—how you want and
when you want—in an intelligent space that’s personalized
to you and your work style. With Webex, all your messages,
contacts, files, content, and projects are stored and
organized in a secure space—so you never miss a beat.
Remove time barriers and silos that slow decision making
and connect to all the people and business tools you need
to do your job, from anywhere, anytime, on any device.
Ensure a work–life balance with intuitive features that help
you set boundaries. Set a custom status to show what you
are working on, or set “do not disturb” to show when you
are unavailable. Improve company culture with engaging
and interactive features like animated reactions, GIFs, and
more, which let participants express their personality. Figure
6-15 shows Webex Messaging.
Send a Message
When you write your messages, you can send a quick one,
or make it stand out with more text formatting and emojis.
You can also share files, pictures, videos, and even GIFs. The
Webex app keeps a list of all the content shared in a space,
so you’ll never lose track of them. Use @Mentions to make
sure the right people see your message. Don’t worry if
you’ve made a mistake and need to edit it, or if you’ve
pasted in the wrong space and need to delete the message
entirely.
Your messages are persistent. The next time you message
the group, your conversation picks right up where you’ve
left it. And after you send a message, you can see who has
read your message. Figure 6-16 shows the Webex
Messaging features.
Polls in Slido
Hosts can also use live polls with Slido to engage
participants during a meeting or webinar. Figure 6-24 shows
Cisco Webex Polling using Slido.
• Create a poll
• Create a survey
• Edit or duplicate a poll
• Reset a poll
In case you only want to use the Q&A during your meeting
or webinar, you can turn off polls. Go to
https://www.slido.com and click Log In > Log in with
Webex.
Webex Events
The expanded Webex Events portfolio includes solutions for
events of all types and sizes—from webinars to multi-
session events, to conferences and community building.
With the recent acquisition of Socio, Cisco has expanded its
existing virtual event solutions to include end-to-end hybrid
event management and new capabilities for ticketing,
monetization, networking, and more.
Webex Events (formerly Webex Webinars) can be used to
engage your audience through powerful, interactive online
webinars. Figure 6-29 shows Cisco Webex Events (webinars).
Join a Webinar
You can join a Webex webinar on your computer, mobile
device, browser, and more. Figure 6-32 shows how to join a
Cisco Webex webinar.
Webex Integrations
Webex integrates with hundreds of industry-leading apps
and tools so you can get more done. Webex helps unlock
frictionless collaboration with apps right inside Webex.
Instead of toggling between a thousand windows, you can
now use Webex collaboration experience with your favorite
apps integrated right inside Webex meetings and
messaging.
Simplify your daily routines, accelerate business outcomes,
and automate everyday tasks using Webex App bots and
integrations. Connect your favorite tools to Webex App and
get notified when tasks are done, follow up on team status,
or simply translate a message.
All Webex App users can browse through the available list in
the Webex App Hub and choose a bot or an integration. The
bots and integrations are grouped into categories (for
example, customer relations and developer tools). Figure 6-
37 shows the Webex App Hub and some of the available
apps.
Integrations
You can use integrations to connect other tools to Webex
App. For each integration you add, you are presented with a
consent page that lists the functionality the integration
needs to work in Webex App.
When you remove the integration, this access is also
removed.
Functionality depends on the integration and how it is
configured. The following are some things to know about
integrations:
Bots
A bot acts like any other Webex App user. It has a special
bot badge, though, so you can tell it isn’t human. The bot
can post messages, answer your questions, let you know
when something happens, or do your bidding like an in-app
assistant.
Keep in mind the following when you’re working with a bot:
• A bot only reads the information you send to it directly.
If you’re in a group space, use an @mention when you
want it to respond. If you’re in a space with just the
bot, then the bot reads every message.
Support
If you’re having issues with an integration or bot, you should
reach out to the company that created it. You can find the
company name below the bot or integration name in the
Webex App Hub. If you notice anything urgent, report issues
to [email protected]. Cisco reviews every integration
and bot listed in the Webex App Hub.
Remove a Bot
You can remove bots from teams and spaces in the same
way you remove members from teams and spaces.
New feature additions are happening as we speak, making
Cisco Webex a standout collaboration solution. Hopefully,
the information covered in this section provided insight into
some of the key features. In the next section, we will cover
the Cisco Webex Cloud Service Architecture.
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
• Only TLS version 1.2 is supported.
• Webex Teams TLS servers also support
TLS_FALLBACK_SCSV
(https://datatracker.ietf.org/doc/rfc7507/) to prevent
TLS version downgrade attacks.
• All messages and content (files) sent by Webex Teams
are encrypted before they are sent over the TLS
connection. Encrypted messages and content sent by
the Webex Teams use AES_256_GCM encryption keys.
• Space details
• Meeting details
• Whiteboard files
• OAuth tokens
Webex Teams apps on desktop and mobile devices store this
content in an SQLite database that is encrypted using the
AES-256-OFB algorithm. The master key for the SQLite
database is encrypted by and stored in the platform OS
secure store (for example, Windows Data Protect API,
macOS/iOS Secure Enclave and Keychain, and Android
Keystore).
Figure 6-48 shows Webex Teams feature for the encryption
of data at rest.
Figure 6-48 Webex Teams encryption of data at rest
Files downloaded by the Webex Teams app are decrypted
prior to storage. The storage location of downloaded files is
determined by the user (for example, the Windows
Downloads folder).
KMS On-Premises
Webex Teams and Webex devices establish TLS connections
to the Webex cloud. These encrypted connections are used
for all communication to Webex cloud services and on-
premises services such as the Hybrid Data Security service.
To ensure that communication between Webex Teams and
on-premises HDS services remain confidential, an additional
encrypted connection is established between Webex Teams
and the on-premises HDS service. This secure connection
uses ECHDE for key negotiation and AES-256_GCM for
authenticated encryption of data. Figure 6-51 shows the
Webex Teams secure feature Webex cloud and HDS
connections.
Figure 6-51 Webex Teams – Webex cloud and HDS
connections
Key management services in HDS nodes automatically
federate with the KMS services of other organizations when
Webex Teams users from two or more organizations
participate in a Webex Teams space. This KMS-to-KMS
connection is established by using mutual TLS between the
HDS nodes in each organization. Figure 6-52 shows KMS
federation between two organizations using Webex Teams
and HDS.
Figure 6-52 KMS federation between two organizations
using Webex Teams and HDS
The Key Management Server (KMS) does not perform an
encryption function; it creates and distributes encryption
keys to Webex Teams that use end-to-end encryption for
content (messages and files). The KMS does not create and
distribute encryption keys for Webex Teams media streams;
these keys are generated by the Webex Teams, devices, and
media servers participating in a call or conference.
All encryption keys used by Webex Teams are securely
stored. Encryption keys for messages and content shared in
Webex Teams spaces and the details of these spaces are
held in a database and encrypted before being stored. The
space details include the space name, space owner or
moderator, and participants.
For Webex Teams organizations using the Webex cloud KMS
service, their encryption keys and space details are securely
stored on Cisco-dedicated database servers. For Webex
Teams organizations using the Webex Teams HDS service,
their encryption keys and space details are securely stored
in the organization’s premises on customer-owned database
servers (for example, Microsoft SQL or Postgres).
Access to KMS/HDS-related data is tenanted through a
combination of the following:
• Ping Identity
• OpenAM
• IBM Security Access Manager
• CA Siteminder
• F5 Big-IP
• Shibboleth
• IaaS vendors:
• Okta
• PingOne
• Salesforce
• Microsoft Azure
• Oracle Identity Cloud Service
• Centrify
• OneLogin
Multifactor Authentication
Webex Teams provides authentication through multifactor
authentication (MFA) by integrating with SAML v2 identity
providers that support this mechanism. Many organizations
deploy MFA mechanisms across their enterprise for all
services that require special additional factors during
authentication—something you know, such as your
password, and something you have, such as an x509
certificate, HMAC-based one-time password (HOTP), time-
based one-time password (TOTP), device fingerprinting, or
other supported mechanisms by the IdP.
Note
Webex Teams for web supports manual pairing only.
Summary
In this chapter, we covered some of the key features and
insights into Webex Teams architecture and some best
practices to be used when you are deploying Webex in your
network.
References
https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_co
mm/cloudCollaboration/spark/esp/Cisco-Webex-Apps-
Security-White-Paper.pdf
https://www.cisco.com/c/en/us/products/collateral/confer
encing/webex-meeting-center/white-paper-c11-
737588.html
https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_co
mm/cloudCollaboration/spark/esp/Webex-Teams-
Security-Frequently-Asked-Questions.pdf
https://help.webex.com/en-us/article/nv2hm53/Webex-
Security-and-Privacy
https://help.webex.com/
https://www.cisco.com/c/en/us/products/conferencing/we
b-conferencing/index.html
https://www.cisco.com/c/en/us/solutions/collaboration/w
ebex-call-message-meet.html
Chapter 7. Internet of
Things (IoT)
Introduction to the Internet of Things
Before we can begin to see the importance of the Internet of
Things (IoT), it is first necessary to understand the
differences between the Internet and the World Wide Web
(or Web)—terms that are often used interchangeably. The
Internet is the physical layer or network made up of
switches, routers, and other equipment. Its primary function
is to transport information from one point to another
quickly, reliably, and securely. The Web, on the other hand,
is an application layer that operates on top of the Internet.
Its primary role is to provide an interface that makes the
information flowing across the Internet usable.
By comparison, the Internet has been on a steady path of
development and improvement, but arguably hasn’t
changed much. In this context, IoT becomes immensely
important because it is the first real evolution of the Internet
—a leap that will lead to revolutionary applications that
have the potential to dramatically improve the way people
live, learn, work, and entertain themselves. Already, IoT has
made the Internet sensory (temperature, pressure,
vibration, light, moisture, stress), allowing us to become
more proactive and less reactive. Figure 7-1 provides an
overview of Cisco’s IoT portfolio.
Figure 7-1 An overview of Cisco’s IoT portfolio
As the planet’s population continues to increase, it becomes
even more important for people to become stewards of the
earth and its resources. In addition, people desire to live
healthy, fulfilling, and comfortable lives for themselves,
their families, and those they care about. By combining the
ability of the next evolution of the Internet (IoT) to sense,
collect, transmit, analyze, and distribute data on a massive
scale with the way people process information, humanity
will have the knowledge and wisdom it needs not only to
survive, but to thrive in the coming months, years, decades,
and centuries.
The sheer size and variety of data traversing today’s
networks are increasing exponentially. This highly
distributed data is generated by a wide range of cloud and
enterprise applications, websites, social media, computers,
smartphones, sensors, cameras, and much more—all
coming in different formats and protocols. IoT contributes
significantly to this rising volume, often by generating a
high frequency of relatively small amounts of data.
IoT Challenges
The following is a list of some of the challenges IoT
presents:
Figure 7-3 How Cisco Kinetic can get data from devices
in a highly distributed environment
Cisco Kinetic is a new class of platform—an IoT data fabric.
This distributed system of software streamlines your IoT
operations by performing three key functions:
• It extracts data from disparate sources (“things”),
regardless of protocol, and transform it, making it
usable by the applications that provide business value.
• Software upgrades
• Configuration updates
• Device monitoring
• Device diagnostics
• Alerts and Events
• Multitenancy
• Role-based access control (RBAC)
Onboarding IR devices
Use Edge Device Manager (EDM) to add network devices to
IoT OD. Enter the device serial number and select the
device group that is associated with the correct
configuration template. You can then make any device-
specific settings and add the device. The following example
describes how to create a device group and apply an eCVD
(Cisco Validated Design) template to an IR 1101 device.
Figure 7-13 illustrates the IR device onboarding process.
Figure 7-13 IR device onboarding process
Step 1. Set up a new organization in Cisco IoT OD, or log in
to an existing admin account.
Step 2. Select the Edge Device Manager service in the
left banner.
a. Click Configuration.
b. In the Groups tab, click Add Group.
Note
This configuration can be used as-is or customized
later.
e. Group Description (Optional). Describe the devices
and configuration.
f. Verify the settings and click Create. Your new
group appears in the list.
SDO Architecture
Figure 7-14 is a simplified graphic of the Secure Device
Onboarding process.
Figure 7-14 Secure device onboarding process
Summary Steps
Step 1. Log in to your Operations Dashboard account.
Step 2. A system administrator sets up device access.
Edge Intelligence
Edge Intelligence (EI) is edge-to-multicloud data
orchestration software designed for connected assets. This
software is deployed on Cisco industrial routers and
compute gateways for simple out-of-the box deployment.
EI gives organizations full control over data—from its
extraction to its transformation to its governance to its
delivery. At each stage of data collection, EI streamlines the
process so that it can be delivered easily at scale. For
example, EI significantly speeds the labor-intensive process
of developing and deploying applications that process data
at the edge. It offers a plug-in for Microsoft Visual Studio
Code. Organizations everywhere can easily create code and
push applications out wherever they need to go without
having to leave Microsoft Visual Studio.
EI provides the flexibility to integrate with multiple
applications in multiple clouds. EI offers native integrations
that simplify the entire process for Microsoft Azure IoT Hub
and other MQ Telemetry Transport (MQTT) applications.
• Test and verify the data model. The data model can
be tested before saving it.
Licensing
Cisco Edge Intelligence is licensed as a subscription.
Licenses are divided into two groups: base functionality and
industry-specific device adapters. A base license defines the
general set of agent capabilities available for the agent and
is required for each Cisco network device that will run an
Edge Intelligence agent. An additional industry-specific
device adapter license may be purchased for each agent
when industry-specific device connectivity is needed.
One base license must be purchased for each hardware
device that will run the Cisco Edge Intelligence agent.
Additional device adapter licenses may be purchased for
specific industry use cases.
Summary
Cisco all-in-one IoT gateways provide simple, essential
connectivity for assets at mass scale. The solution offers low
upfront costs with an affordable monthly cloud subscription.
The gateways take just a few minutes to deploy with
minimal IT support. It’s a fast and simple Day 0 set up: plug
in and power on, with no staging required. The SIM
provisioning is automated with Cisco Control Center
integration with no manual intervention.
The Cisco IoT gateways portfolio consists of ruggedized and
non-ruggedized options, allowing you to connect outdoor
and indoor assets. Simply connect your unconnected assets
to eliminate digital blind spots in your operations.
The IoT gateways are managed centrally through a simple,
easy-to-use cloud management tool, the Cisco IoT
Operations Dashboard. With this dashboard, you can
remotely deploy, monitor, and troubleshoot the gateways. It
enables you to gain insights into network usage and carry
out updates remotely without sending anyone onsite. You
receive automatic alerts if a device goes down so that you
can take quick action. All of this is done remotely and at
scale.
The gateways have essential security built in to secure the
hardware, interfaces, and all communications to the data
center. With Cisco networking, organizations benefit from
end-to-end security, from the edge all the way to the
headend in the data center. They can remotely monitor and
diagnose the operational assets connected to an IoT
gateway using Cisco’s Secure Remote Access, eliminating
the need for any truck rolls.
Part 3: Cisco Cloud Security
Chapter 8. Cisco Cloud
Security
More applications and servers are moving to the cloud to
take advantage of cost savings, scalability, and accessibility.
Because of this, you’ve lost some of the visibility and control
you once had. You don’t know who is doing what and when
in the cloud. Your data is now hosted in the cloud, which
brings up concerns about what information is there, who’s
accessing it, where it’s going, whether it’s being exfiltrated,
and so on. Despite multiple layers of security, malware
infections and other advanced threats still loom.
With Cisco Cloud Security, you can adopt the cloud with
confidence and protect your users, data, and applications,
anywhere they are. Unlike traditional perimeter solutions,
Cisco Cloud Security blocks threats over all ports and
protocols for comprehensive coverage. Cisco Cloud Security
also uses API-based integrations so you can amplify your
existing security investments. It’s simple to use and deploy,
so you can start defending your organization in minutes.
This chapter will cover following solutions:
• Cisco Cloudlock
• Cisco Umbrella
Cisco Cloudlock
Cisco Cloudlock is a cloud-native cloud access security
broker (CASB) that helps you move to the cloud safely. It
protects your cloud users, data, and apps. Cloudlock’s
simple, open, and automated approach uses APIs to manage
the risks in your cloud app ecosystem. With Cloudlock, you
can more easily combat data breaches while meeting
compliance regulations. Figure 8-3 illustrates Cisco
Cloudlock solution.
User Security
Cloudlock uses advanced machine learning algorithms to
detect anomalies based on multiple factors. It also identifies
activities outside allowed countries and spots actions that
seem to take place at impossible speeds across distances.
You can defend against compromised accounts and
malicious insiders with User and Entity Behavior Analytics
(UEBA), which runs against an aggregated set of cross-
platform activities for better visibility and detection.
Data Security
Cloudlock’s data loss prevention (DLP) technology
continuously monitors cloud environments to detect and
secure sensitive information. It provides countless out-of-
the-box policies as well as highly tunable custom policies.
App Security
The Cloudlock Apps Firewall discovers and controls cloud
apps connected to your corporate environment. You can see
a crowd-sourced Community Trust Rating for individual
apps, and you can ban or allow-list them based on risk.
Cloudlock Apps Firewall discovers and controls malicious
cloud apps connected to your corporate environment and
provides a crowd-sourced Community Trust Rating to
identify individual app risks.
The following are Cloudlock use cases for user and entity
behavior analytics, Cloud DLP, and Cloudlock Apps Firewall:
• Analyze and take action: Analyze application risk in
order to block access to risky applications so they don’t
introduce unnecessary cost or risk to your
organization.
DNS-Layer Security
Umbrella’s DNS-layer security provides the fastest, easiest
way to improve your security. It helps improve security
visibility, detect compromised systems, and protect your
users on and off the network by stopping threats over any
port or protocol before they reach your network or
endpoints.
Firewall
Umbrella’s firewall logs all activity and blocks unwanted
traffic using IP, port, and protocol rules. To forward traffic,
simply configure an IPsec tunnel from any network device.
As new tunnels are created, policies are automatically
applied for easy setup and consistent enforcement
everywhere.
Application Details
Preset application-level reports provide a list of apps labeled
either Unreviewed, Under Audit, Approved, or Not Approved.
You can easily apply filters to create custom views that help
you understand and track by category, usage, type, or
status. Figure 8-18 shows an example of a Cisco Umbrella
application-level report.
Figure 8-18 Cisco Umbrella application-level report
Optimization
With hundreds of apps in use and new ones being adopted
on a regular basis, organizations need an automated way to
view key vendor and app details and compare risk elements
and compliance certifications. It’s also important to be able
to view which identities are using which applications to
enable monitoring and to help with policy formation or
incident investigations. This information is provided in the
app detail pages, which can be accessed from the
dashboard or any of the aforementioned App Grid reports.
All of this insight will help you to make informed decisions
about the cloud apps you want to approve in your
environment.
Utilize the 30 application categories to organize the apps in
use and filter by risk level or number of requests to
understand your current exposure. Then make informed
decisions about categories and assign the individual apps to
the Approved, Under Audit, or Not Approved group. Figure 8-
19 shows an example of a Cisco Umbrella categorized
application-level report.
Figure 8-19 Cisco Umbrella categorized application-
level report
Figure 8-20 shows apps by category and risk.
Figure 8-20 Apps by category and risk
Application Blocking
Once the organization has visibility into the full spectrum of
apps in use and details on the usage and risk levels, it is
natural to want to block either entire categories or specific
applications that don’t match the cloud adoption or security
strategy. The blocking capabilities in Umbrella allow you to
select a category or individual application and block it for all
users, specific groups, individuals, or networks.
You can easily block the available apps by clicking the link in
the application listing or detail pages as well as enforce this
control for any network, group, or individual user accessible
by Umbrella policies. Figure 8-21 illustrates the
configuration steps to control an application.
Figure 8-21 Configuration steps to control an
application
Cisco Umbrella
Security is shifting and converging in the cloud. You may
hear different names for this trend, such as secure Internet
gateway (SIG), edge security, secure access service edge
(SASE), and more. It can get confusing. Regardless of what
you call it, it denotes multiple security functions integrated
into one cloud service, the flexibility to deploy security
services how and where you choose, the ability to secure
direct-to-Internet access, cloud app usage, and roaming
users, plus, no appliances to deploy.
Today’s work environment allows employees to work from
any device, anywhere and anytime. As remote users work
directly in cloud apps, perimeter security appliances and
VPNs are no longer always going to protect devices and
data. Therefore, Cisco continues to enhance its secure
Internet gateway (SIG), Cisco Umbrella, to protect users
when off the network and off the VPN. Formally launched at
the RSA Conference in February 2017, Cisco Umbrella now
processes more than 120 billion DNS requests per day, with
more than 85 million daily active users. The recently
announced Cisco Security Connector app for iOS enables
company-managed iPhones and iPads to be protected by
Cisco Umbrella, whether on Wi-Fi or the cellular network.
Cisco Umbrella is a cloud-delivered security platform that
secures Internet access and controls cloud app usage across
networks, branch offices, and roaming users. Unlike
disparate security tools, Umbrella unifies secure web
gateway, cloud-delivered firewall, DNS-layer security, and
cloud access security broker (CASB) functionality into a
single cloud platform. Umbrella also integrates with Cisco
SD-WAN to provide security and policies for direct Internet
access (DIA) at branch offices. Umbrella acts as a secure
onramp to the Internet and delivers deep inspection and
control to support compliance and provide the most
effective protection against threats for users anywhere they
connect. Figure 8-23 provides an overview of Cisco Umbrella
SIG.
Deployment Options
The following are some key points concerning the
deployment of Cisco Umbrella:
• To deploy Umbrella’s DNS-layer security, you can
provision any network device (router, DHCP server, and
so on) by pointing external DNS to Cisco’s IP
addresses. You can also use your existing Cisco
footprint—SD-WAN (Viptela), Integrated Services
Router (ISR) 1K and 4K Series, Meraki MR, and wireless
LAN controllers—to quickly provision protection across
hundreds of routers and access points.
• IPSec tunnels.
• If the end user IP address needs to be visible, you can
deploy Umbrella Virtual Appliance (VA) within the
customer environment.
Umbrella Integrations
Umbrella, while providing multiple levels of defense against
Internet-based threats, is the center piece of a larger
architecture for Internet security. Figure 8-29 illustrates
Cisco Umbrella integrations.
Umbrella Packages
Cisco offers various Umbrella packages based on the
functionality needed to address your cybersecurity
challenges. Table 8-1 details the various Cisco Umbrella
packages and their features.
Deployment
Secure Cloud Analytics supports two deployment types to
support your network:
• Public cloud monitoring: Agent-less monitoring of
workloads by ingesting native cloud logs, and API
integration to deliver threat detection and
configuration monitoring.
• Private cloud monitoring: Virtual Cisco Secure
Cloud Analytics sensor deployment to ingest network
flow data, SPAN/mirror port traffic, and NGFW log
information. (In this book, we only focus on public
cloud monitoring.)
You can deploy either or both at the same time and review
the configuration and alerts from both in a single Secure
Cloud Analytics web portal UI. The web portal displays all
sensors and monitored cloud deployments from the same
page, so you can quickly review the state of your
monitoring.
Watchlist Configuration
Watchlists control whether or not traffic from a specific
entity will generate an alert. You can configure entries such
that traffic involving those entities always causes the
system to generate an alert. You can also configure those
watchlist entries to expire after a configured period of time,
at which point traffic involving those entities no longer
causes the system to generate an alert. Figure 8-39
illustrates the alerts on the Secure Cloud dashboard.
Figure 8-39 Alerts on the Secure Cloud dashboard
Dashboard Overview
The Dashboard menu option presents several different ways
to view your network at a high level:
• The dashboard provides a summary of alerts, entities
on your network, and traffic statistics.
• The AWS visualizations present AWS-related spider
graphs, with your AWS resources, security groups, and
IAM permissions as nodes.
• View the overall health of your network from the
dashboard.
• View the open alerts and supporting observations and
other context to determine whether network behavior
is malicious.
• View the models to detect historical patterns in entity,
network, and other related behavior over time.
• View reports in the Help menu to understand the
breadth and depth of traffic monitored by the system.
Figure 8-40 illustrates the Secure Cloud dashboard.
Figure 8-40 Secure Cloud dashboard
Types of 2FA
A number of different second factors that can be used to
verify a user’s identity. From passcodes to biometrics, the
available options address a range of use cases and
protection levels:
• SMS 2FA: SMS two-factor authentication validates the
identity of a user by texting a security code to their
mobile device. The user then enters the code into the
website or application to which they’re authenticating.
• TOTP 2FA: The time-based one time password (TOTP)
2FA method generates a key locally on the device a
user is attempting to access. The security key is
generally a QR code that the user scans with their
mobile device to generate a series of numbers. The
user then enters those numbers into the website or
application to gain access. The passcodes generated
by authenticators expire after a certain period of time,
and a new one will be generated the next time a user
logs in to an account. TOTP is part of the Open
Authentication (OAuth) security architecture.
• Push-based 2FA: Push-based 2FA improves on SMS
and TOTP 2FA by adding additional layers of security,
while improving ease of use for end users. Push-based
2FA confirms a user’s identity with multiple factors of
authentication that other methods cannot. Duo
Security is the leading provider of push-based 2FA.
• WebAuthn: Created by the FIDO (Fast IDentity
Online) Alliance and W3C, the Web Authentication API
is a specification that enables strong, public key
cryptography registration and authentication.
WebAuthn (Web Authentication API) allows third parties
like Duo to tap into built-in capabilities on laptops,
smartphones, and browsers, letting users authenticate
quickly and with the tools they already have at their
fingertips.
Summary
Securing the public cloud is an increasingly difficult
challenge for businesses. As a result, IT departments are
searching for a cloud-delivered security solution that
provides sufficient end-user security.
Cisco Cloud Security products extend protection to all
aspects of your business. Cisco Umbrella helps secure cloud
access, and Cisco Cloudlock safeguards the use of SaaS
applications.
In addition, Cisco Secure Cloud Analytics(Stealthwatch
Cloud) monitors your IaaS instances and alerts on suspicious
activities. Cisco Cloud Security products deliver a broad,
effective security solution for your multicloud world.