Skip to content

Commit 6ed84a1

Browse files
committed
Release 8.1
1 parent 3ae2c6c commit 6ed84a1

5 files changed

+575
-10
lines changed
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
---
2+
title: BMP log streaming in Azure Operator Nexus Network Fabric
3+
description: An overview of BGP Monitoring Protocol (BMP), its importance, and key components for effective log monitoring..
4+
author: sushantjrao
5+
ms.author: sushrao
6+
ms.service: azure-operator-nexus
7+
ms.topic: conceptual
8+
ms.date: 04/01/2025
9+
ms.custom: template-concept
10+
---
11+
12+
## Introduction to BMP
13+
14+
The **BGP Monitoring Protocol (BMP)** is a protocol designed to monitor BGP sessions. It provides a standardized method for collecting information about BGP sessions, which can be used for analysis, troubleshooting, and ensuring the stability and security of the network.
15+
16+
The BGP Monitoring Protocol (BMP) allows a monitoring station to connect to a router and collect all the BGP announcements received from the router's BGP peers. The announcements are sent to the station in the form of **BMP Route Monitoring messages** formed from path information in the router's **BGP Adj-Rib-In tables**. A BMP speaker may choose to send either **pre-policy routes, post-policy routes, or both**.
17+
18+
BMP is **unidirectional**: BMP sends messages only from the router to the monitoring station, never the other way around. The router's configuration controls the information sent. Besides Route Monitoring messages, BMP also sends these messages:
19+
20+
- **Initiation**: Sent at the beginning of a session and used to identify the router.
21+
- **Termination**: Optionally sent at the end of a session to indicate why the session is being closed.
22+
- **Peer Up**: Used to indicate if a BGP peer is in **Established** state.
23+
- **Peer Down**: Used to indicate that a BGP peer has gone out of **Established** state.
24+
25+
Connections between the router and BMP stations use **TCP**. The router can either passively listen for incoming connections from a station or actively initiate them, configurable per station. Only **one connection per BMP station** is allowed at a time. If a station reconnects, the router closes the old session and starts a new BMP session with the new connection.
26+
27+
## Importance of BMP log monitoring
28+
29+
BMP log monitoring is crucial for maintaining the **health and performance** of BGP sessions. By continuously monitoring BMP logs, network administrators can detect anomalies, identify potential issues, and take proactive measures to prevent network disruptions. Effective BMP log monitoring helps in:
30+
31+
- Ensuring the **stability and reliability** of BGP sessions.
32+
- Detecting and mitigating **security threats**.
33+
- Analyzing **network performance** and identifying optimization opportunities.
34+
- Troubleshooting and resolving **BGP-related issues** promptly.
35+
36+
## Key Components of BMP log monitoring
37+
38+
### **1. Data collection**
39+
BMP logs provide detailed information about BGP sessions, including **route updates, peer status, and error messages**. Collecting this data is the first step in effective BMP log monitoring.
40+
41+
### **2. Data storage**
42+
Storing BMP logs in a **centralized and secure location** is essential for easy access and analysis. This can be achieved using **log management systems** or **databases**.
43+
44+
### **3. Data analysis**
45+
Analyzing BMP logs helps in identifying **patterns, trends, and anomalies**. Advanced analytics tools and techniques, such as **machine learning**, can be used to gain deeper insights into the network's behavior.
46+
47+
### **4. Alerting and reporting**
48+
Setting up **alerts** for specific events or thresholds in BMP logs ensures that network administrators are **promptly notified** of any issues. **Regular reports** provide a comprehensive overview of the network's health and performance.
49+
50+
## Restrictions and limitations of BMP log streaming
51+
52+
### Nexus Network Fabric (NF) restrictions
53+
54+
Nexus NF shall not enable BMP Log streaming for the following BGP neighbors:
55+
56+
- INTERCEGLOBAL
57+
- INTERCEEVPN
58+
- INTERCEOPTION-A
59+
- CETORUNDERLAY
60+
- EVPN_OVERLAY
61+
62+
Nexus NF shall not support BMP Log streaming for RT-Membership and EVPN Address-family.
63+
64+
Nexus NF shall not support monitoring address-families at the station level, even though Nexus NF provides ARM API at the station level by facilitating the address-family. This limitation exists because Arista supports BGP Global level rather than BMP Station level.
65+
66+
### L3ISD requirements
67+
68+
- L3ISD must be enabled prior to associating the L3ISDs as Monitored Networks of any Network Monitors.
69+
- L3ISD must be enabled prior to associating the L3ISDs Internal/External Network as Station Network of any Network Monitors.
70+
- L3ISD shall not be disabled if the respective L3ISD internal/external network is associated under Station Network of any Network Monitors.
71+
72+
### Unsupported features
73+
74+
Nexus shall not support the following features:
75+
76+
- BMP support for VRF Filtering.
77+
- BMP support for local rib VPN imported routes.
78+
- BMP support for exporting Adj-Rib-Out.
79+
80+
### Peer-Address monitoring
81+
82+
Nexus NF shall not support excluding the monitoring of peer-address of neighbor groups where the neighbor group is configured with BGP listen range. This limitation is due to Arista's inability to support excluding the monitoring of certain addresses of neighbors configured with BGP listen-range.
83+
84+
### Network monitors
85+
86+
Nexus shall support a maximum of four Network Monitors (BMP Stations).
87+
88+
## Next steps
89+
[How to enable \ disable BMP log streaming](./howto-enable-disable-log-streaming.md)

articles/operator-nexus/howto-append-custom-suffix-to-interface-descriptions.md

Lines changed: 27 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: template-how-to
1111

1212
# Append custom suffix to interface descriptions in Azure Operator Nexus Network Fabric
1313

14-
TThis guide explains how to append a user-defined suffix (`additionalDescription`) to interface descriptions in Azure Operator Nexus Network Fabric. The primary interface description is `read-only,` but the `additionalDescription` property provides enhanced flexibility for operational annotations. This approach allows users to customize interface descriptions for specific maintenance or operational requirements without altering the system-generated description.
14+
This guide explains how to append a user-defined suffix (`additionalDescription`) to interface descriptions in Azure Operator Nexus Network Fabric. The primary interface description is `read-only,` but the `additionalDescription` property provides enhanced flexibility for operational annotations. This approach allows users to customize interface descriptions for specific maintenance or operational requirements without altering the system-generated description.
1515

1616
## Prerequisites
1717

@@ -131,9 +131,33 @@ Once committed, the interface description reverts to its original state:
131131
AR-CE2(Fab3-AR-CE2):Et1/1 to CR1-TOR1(Fab3-CP1-TOR1)-Port23
132132
```
133133

134+
## Network interface updates
135+
136+
Updates to network interface of a network device
137+
138+
### Standardized Interface Descriptions
139+
140+
Interface descriptions follows a consistent format:
141+
142+
Source Device to Destination Device (including hostname and interface name).
143+
144+
### Example:
145+
AR-CE2 (Fab3-AR-CE2): Et1/1 to CR1-TOR1 (Fab3-CP1-TOR1) - Port23
146+
147+
### connectedTo property
148+
149+
The `connectedTo` property returns the ARM resource ID of the connected interface, where available.
150+
151+
### Comparison of Old and New Values:
152+
153+
| Example | Previous Value | New Value |
154+
|---------|---------------|-----------|
155+
| **Example 1** | CR1-TOR1-Port23 | `/subscriptions/<subscriptionID>/resourceGroups/<resourceGroupName>/providers/Microsoft.ManagedNetworkFabric/networkDevices/fab3nf-CompRack1-TOR1/networkInterfaces/Ethernet23-1` |
156+
| **Example 2** | AR-CE2 (Fab3-AR-CE2): Et1/1 to CR1-TOR1 (Fab3-CP1-TOR1) - Port23 | `/subscriptions/<subscriptionID>/resourceGroups/<resourceGroupName>/providers/Microsoft.ManagedNetworkFabric/networkDevices/fab3nf-CompRack1-TOR1/networkInterfaces/Ethernet23-1` |
157+
134158
## Supported interface types
135159

136-
This feature is available for the following interface types:
160+
All the above features is available for the following interface types:
137161

138162
- **Agg Rack CE**
139163
- **Agg Rack Management**
@@ -142,4 +166,4 @@ This feature is available for the following interface types:
142166
- **NPB Device**
143167

144168
> [!Note]
145-
> **Existing deployments** will retain their **current descriptions** until Fabric instances are **migrated to Release 8.0**. After migration, users must update descriptions via the **API**.
169+
>For non-NF managed devices for e.g., PE \ Storage Device the `connectedTo` property will continue to reflect value as a `string` with no active link.
Lines changed: 195 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,195 @@
1+
---
2+
title: How to configure BGP prefix limit on Customer Edge (CE) devices for Azure Operator Nexus
3+
description: Learn the process for upgrading Network Fabric for Azure Operator Nexus.
4+
author: sushantjrao
5+
ms.author: sushrao
6+
ms.date: 06/11/2023
7+
ms.topic: how-to
8+
ms.service: azure-operator-nexus
9+
ms.custom: template-how-to, devx-track-azurecli
10+
---
11+
12+
# BGP prefix limiting overview
13+
14+
BGP (Border Gateway Protocol) prefix limiting is an essential overload protection mechanism for Customer Edge (CE) devices. It helps prevent the Nexus fabric from being overwhelmed when a Nexus tenant advertises an excessive number of BGP routes into a Nexus Virtual Routing and Forwarding (VRF) instance. This feature ensures network stability and security by controlling the number of prefixes received from BGP peers.
15+
16+
## Configuration of BGP prefix limits
17+
18+
BGP prefix limits can be configured using two primary parameters:
19+
20+
- **max-routes (hard limits)**: This parameter sets the maximum number of prefixes a BGP router will accept from a neighbor. If the limit is exceeded, the BGP session with that neighbor is terminated to prevent overloading the router.
21+
22+
- **warn-threshold (soft limits)**: The warn-threshold parameter sets a warning threshold below the max-routes limit. When the number of prefixes received from a neighbor exceeds this threshold, a warning is generated, but the BGP session is not terminated. This allows network administrators to take corrective action before the hard limit is reached.
23+
24+
### Hard limits (max-routes)
25+
26+
The `max-routes` parameter specifies the maximum number of prefixes that a BGP router can accept from a neighbor. If the number exceeds this limit, the BGP session with that neighbor is terminated. This is a "hard" limit to protect the router from excessive load and to maintain network stability.
27+
28+
### Soft limits (warn-threshold)
29+
30+
The `warn-threshold` parameter is a "soft" limit. When the number of prefixes exceeds this threshold, a warning is triggered, but the BGP session remains active. This serves as a precautionary measure, allowing administrators to intervene before reaching the hard limit.
31+
32+
To configure **BGP Prefix Limit** on **Customer Edge (CE)** devices for **Azure Operator Nexus**, follow the steps below. This includes configuring the prefix limits for BGP sessions to manage network stability and prevent the Nexus fabric from being overwhelmed when a tenant advertises excessive BGP routes.
33+
34+
### Prerequisites
35+
36+
1. Ensure that the **Network Fabric (NF)** is upgraded to the supported version or later.
37+
38+
2. Verify that your **Customer Edge (CE)** devices are running on compatible software.
39+
40+
3. Check that the **peer groups** for both **IPv4** and **IPv6** address-families are properly set up for internal networks.
41+
42+
### Steps to configure BGP prefix limits
43+
44+
#### Step 1: Define BGP prefix limits
45+
46+
You need to configure the BGP prefix limits using the parameters `maximumRoutes` and `threshold`.
47+
48+
- **`maximumRoutes`**: This defines the maximum number of BGP prefixes the router will accept from a BGP peer.
49+
50+
- **`threshold`**: This defines the warning threshold as a percentage of the `maximumRoutes`. When the number of prefixes exceeds this threshold, a warning is generated.
51+
52+
#### Step 2: Configure on the CE device
53+
54+
##### Example 1: BGP Prefix Limit with automatic restart
55+
56+
This configuration will automatically restart the session after a defined idle time when the prefix limit is exceeded.
57+
58+
```json
59+
{
60+
"prefixLimits": {
61+
"maximumRoutes": 5000,
62+
"threshold": 80,
63+
"idleTimeExpiry": 100
64+
}
65+
}
66+
```
67+
68+
- **Explanation**:
69+
70+
- **maximumRoutes**: 5000 routes is the limit for the BGP session.
71+
72+
- **threshold**: A warning is triggered when the prefix count reaches 80% (4000 routes).
73+
74+
- **idleTimeExpiry**: If the session is shut down, it will restart automatically after 100 seconds of idle time.
75+
76+
##### Example 2: BGP prefix limit without automatic restart
77+
78+
This configuration will shut down the session when the maximum prefix limit is reached, but manual intervention is required to restart the session.
79+
80+
```json
81+
{
82+
"prefixLimits": {
83+
"maximumRoutes": 5000,
84+
"threshold": 80
85+
}
86+
}
87+
```
88+
89+
- **Explanation**:
90+
91+
- **maximumRoutes**: 5000 routes is the limit for the BGP session.
92+
93+
- **threshold**: A warning is triggered when the prefix count reaches 80% (4000 routes).
94+
95+
- No automatic restart; manual intervention is required to restart the session.
96+
97+
##### Example 3: Hard-Limit drop BGP sessions
98+
99+
This configuration will drop additional routes if the prefix limit is exceeded without maintaining a cache of the dropped routes.
100+
101+
```json
102+
{
103+
"prefixLimits": {
104+
"maximumRoutes": 5000
105+
}
106+
}
107+
```
108+
109+
- **Explanation**:
110+
111+
- **maximumRoutes**: 5000 routes is the limit for the BGP session.
112+
113+
- Once the limit is reached, the CE device will drop any additional prefixes received from the BGP peer.
114+
115+
##### Example 4: Hard-Limit warning only
116+
117+
This configuration will generate a warning once the prefix count reaches a certain percentage of the maximum limit but will not shut down the session.
118+
119+
```json
120+
{
121+
"prefixLimits": {
122+
"maximumRoutes": 8000,
123+
"threshold": 75,
124+
"warning-only": true
125+
}
126+
}
127+
```
128+
129+
- **Explanation**:
130+
131+
- **maximumRoutes**: 8000 routes is the limit for the BGP session.
132+
133+
- **threshold**: A warning is generated when the prefix count reaches 75% (6000 routes).
134+
135+
- The session is not shut down. This configuration is used to only generate a warning without taking any session-terminating action.
136+
137+
#### Step 3: Apply Configuration Using Azure CLI
138+
139+
You can use Azure CLI commands to apply the BGP prefix limits to the external network configuration for Nexus.
140+
141+
1. **With Automatic Restart**:
142+
143+
```bash
144+
az networkfabric externalnetwork create --resource-group <resource-group> --fabric-name <fabric-name> --network-name <network-name> --prefix-limits '{"maximumRoutes": 5000, "threshold": 80, "idleTimeExpiry": 100}'
145+
```
146+
147+
2. **Without Automatic Restart**:
148+
149+
```bash
150+
az networkfabric externalnetwork create --resource-group <resource-group> --fabric-name <fabric-name> --network-name <network-name> --prefix-limits '{"maximumRoutes": 5000, "threshold": 80}'
151+
```
152+
153+
3. **Hard-Limit Drop BGP Sessions**:
154+
155+
```bash
156+
az networkfabric externalnetwork create --resource-group <resource-group> --fabric-name <fabric-name> --network-name <network-name> --prefix-limits '{"maximumRoutes": 5000}'
157+
```
158+
159+
4. **Hard-Limit Warning Only**:
160+
161+
```bash
162+
az networkfabric externalnetwork create --resource-group <resource-group> --fabric-name <fabric-name> --network-name <network-name> --prefix-limits '{"maximumRoutes": 8000, "threshold": 75, "warning-only": true}'
163+
```
164+
165+
#### Step 4: Monitor and validate the configuration
166+
167+
After applying the configuration, ensure to monitor the **BGP session** and validate whether the prefix limits are being enforced properly. You can check the status of the BGP session by using the following command:
168+
169+
```bash
170+
show ip bgp summary
171+
```
172+
173+
Look for the session states and the number of prefixes advertised by each peer. If the limits are being hit, you should see the session state change to **Established** or **Idle** based on the configuration.
174+
175+
### Considerations
176+
177+
- **Threshold and Maximum Limits**: Ensure that you set appropriate thresholds to avoid unnecessary session terminations while still protecting the network from overload.
178+
179+
- **Automatic vs. Manual Restart**: Depending on your network operations, choose between automatic and manual restart options. Automatic restart is useful for minimizing manual intervention, but manual restart may give network administrators more control over recovery.
180+
181+
## Handling BGP Prefix Limits for Different Networks
182+
183+
### Internal network:
184+
185+
The platform supports Layer 3 Isolation Domain (L3IsolationDomain) for tenant workloads. It performs device programming on Nexus instances and Arista devices with peer groups for both IPv4 and IPv6 address families.
186+
187+
### External network Option B (PE):
188+
189+
For external network configuration, only the **hard-limit warning-only** option is supported. Nexus supports this configuration via the ARM API under the **NNI optionBlayer3Configuration** with the `maximumRoutes` parameter.
190+
191+
### NNI Option A:
192+
193+
For NNI Option A, only a single peer group is allowed. IPv4 over IPv6 and vice versa are not supported. Warning-only mode is available for handling prefix limits.
194+
195+
By following this guide, you can configure BGP prefix limits effectively to protect your network from overload and ensure that BGP sessions are properly managed for both internal and external networks.

0 commit comments

Comments
 (0)