Skip to content

Commit fd6d382

Browse files
authored
Merge pull request #273677 from sushantjrao/config-monitoring
Config monitoring
2 parents 8b286ab + 3e33720 commit fd6d382

16 files changed

+188
-1
lines changed

articles/operator-nexus/TOC.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,10 @@
4646
href: concepts-observability.md
4747
- name: Metrics
4848
href: reference-operator-nexus-observability-metrics.md
49+
- name: Azure Operator Nexus Network Fabric Configuration Monitoring
50+
href: concepts-network-fabric-configuration-monitoring.md
51+
- name: Azure Operator Nexus Network Fabric Internal Network BGP Metrics
52+
href: concepts-internal-network-bgp-metrics.md
4953
- name: Security
5054
href: concepts-security.md
5155
- name: Control Plane Resiliency
@@ -148,7 +152,8 @@
148152
href: howto-update-access-control-list-for-network-to-network-interconnects.md
149153
- name: Delete ACLs associated with Network-to-Network Interconnects (NNI)
150154
href: howto-delete-access-control-list-network-to-network-interconnect.md
151-
155+
- name: How to Configure Diagnostic Settings and Monitor Configuration Differences in Nexus Network Fabric
156+
href: howto-configure-diagnostic-settings-monitor-configuration-differences.md
152157
- name: Nexus Kubernetes cluster
153158
expanded: false
154159
items:
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: Azure Operator Nexus Network Fabric internal network BGP metrics
3+
description: Overview of internal network BGP metrics.
4+
author: sushantjrao
5+
ms.author: sushrao
6+
ms.reviewer: sushrao
7+
ms.date: 04/29/2024
8+
ms.service: azure-operator-nexus
9+
ms.topic: conceptual
10+
---
11+
12+
# Azure Operator Nexus Network Fabric internal network BGP metrics
13+
14+
Border Gateway Protocol (BGP) Neighbor Monitoring is a critical aspect of network management, ensuring the stability and reliability of communication between routers within internal networks. This concept document aims to provide an overview of BGP Neighbor Monitoring, its significance, and the key metrics involved.
15+
16+
## Established transitions
17+
18+
One key metric in BGP Neighbor Monitoring is Established Transitions, which tracks the connectivity status between the network fabric and its adjacent routers. This metric indicates the stability of neighbor relationships and the efficiency of communication channels.
19+
20+
:::image type="content" source="media/bgp-transitions.png" alt-text="Screenshot of BGP Transitions Diagram.":::
21+
22+
### Monitored BGP Messages
23+
24+
BGP routers engage in the exchange of several messages to establish, maintain, and troubleshoot network connections. Understanding these messages is essential for network administrators to ensure the stability and efficiency of their networks.
25+
26+
a. **Sent Notification:**
27+
28+
When a router encounters an issue, such as the withdrawal of a route or an unsupported capability, it sends a Notification message to its neighbor. These messages serve as alerts, indicating potential disruptions in network connectivity.
29+
30+
b. **Received Notification:**
31+
32+
Conversely, routers also receive Notification messages from their neighbors. Analyzing these messages is crucial for identifying and addressing issues on the neighbor's side that may impact network performance.
33+
34+
c. **Sent Update:**
35+
36+
To communicate routing information, a router sends Update messages to its neighbors. These messages contain details about the prefixes it can reach and their associated attributes. By broadcasting this information, routers inform their neighbors about reachable network destinations.
37+
38+
d. **Received Update:**
39+
40+
Routers also receive Update messages from their neighbors, containing information about advertised prefixes and their attributes. Monitoring these messages allows administrators to detect any inconsistencies or unexpected changes in routing information, which could signify network issues or misconfigurations.
41+
42+
## BGP Prefix Monitoring
43+
44+
In the realm of BGP (Border Gateway Protocol), monitoring prefixes within a BGP neighbor context is essential. It involves tracking the exchange of prefix information, which is crucial for early issue detection, preventing outages or connectivity disruptions, and troubleshooting network connectivity problems. BGP AFI (Address Family Identifier) and SAFI (Subsequent Address Family Identifier) prefixes play a vital role in routing and ensuring network reachability across diverse network environments.
45+
46+
### Monitored BGP prefixes
47+
48+
a. **AFI-SAFI prefixes installed:**
49+
50+
These prefixes are learned from a neighbor and installed in the router's routing table. Monitoring these prefixes ensures the routing table is up-to-date and accurate, including IPv4/IPv6 prefixes, paths, and next hops.
51+
52+
:::image type="content" source="media/afi-safi-prefixes-installed.png" alt-text="Screenshot of installed AFI-SAFI Prefixes.":::
53+
54+
b. **AFI-SAFI prefixes received:**
55+
56+
These prefixes are advertised by a neighbor in its update messages. Monitoring them helps detect inconsistencies between advertised and installed prefixes in the routing table.
57+
58+
:::image type="content" source="media/afi-safi-prefixes-received.png" alt-text="Screenshot of received AFI-SAFI Prefixes.":::
59+
60+
c. **AFI-SAFI Prefixes Sent:**
61+
62+
These prefixes are the ones that a router communicates to its neighbor in its update messages. Monitoring these prefixes provides insight into the network destinations that the router actively announces to other nodes in the network. Understanding these announcements is essential for comprehending the router's routing decisions and its impact on network reachability.
63+
64+
:::image type="content" source="media/afi-safi-prefixes-sent.png" alt-text="Screenshot of sent AFI-SAFI Prefixes.":::
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: Azure Operator Nexus Network Fabric configuration monitoring
3+
description: Overview of configuration monitoring for Azure Operator Nexus.
4+
author: sushantjrao
5+
ms.author: sushrao
6+
ms.reviewer: sushrao
7+
ms.date: 04/27/2024
8+
ms.service: azure-operator-nexus
9+
ms.topic: conceptual
10+
---
11+
12+
# Nexus Network Fabric configuration monitoring overview
13+
14+
Nexus Network Fabric stands out as a robust solution, providing comprehensive support for identifying and reporting configuration differences across all devices.
15+
16+
## Understanding configuration differences
17+
18+
Configuration changes within network devices occur frequently, driven by automation or manual interventions such as break glass procedures. Nexus Network Fabric offers a robust mechanism to track these modifications, ensuring transparency and accountability in network management.
19+
20+
## Comprehensive reporting
21+
22+
One of the key features of Nexus Network Fabric is its ability to generate detailed reports on configuration differences. With every modification to the running configuration, whether initiated through Nexus itself or via break glass procedures, Nexus Network Fabric captures and highlights the changes.
23+
24+
## Result categories attributes
25+
26+
Nexus Network Fabric meticulously tracks configuration changes, associating each difference with essential attributes:
27+
28+
| Attribute | Description |
29+
|--------------------|---------------------------------------------------------------------------------------------------|
30+
| Timestamp | Indicates the time when the configuration change occurred in UTC. |
31+
| Event Category | Indicates the type of event captured, such as "systemSessionHistoryUpdates." |
32+
| Fabric ID | Refers to the ARM ID of the Network Fabric. |
33+
| Device Name | Indicates the device ID, such as TORs, CEs, etc. |
34+
| Session Diffs | Refers to the configuration differences within the device, including additions and deletions. |
35+
| Session ID | Refers to the unique identifier (or name) of the configuration session that initiated the change. |
36+
| Device ID/Resource ID | Refers to the ARM ID of the resource such as TORs, CEs, NPBs, MGMT switches. |
37+
38+
39+
## Enhanced accountability
40+
41+
By monitoring and reporting on configuration changes, Nexus Network Fabric enhances accountability within network management. Administrators can swiftly identify the individuals responsible for initiating modifications, facilitating effective oversight and adherence to security protocols.
42+
43+
## Next steps
44+
45+
[How to configure diagnostic settings and monitor configuration differences](howto-configure-diagnostic-settings-monitor-configuration-differences.md)

articles/operator-nexus/howto-apply-access-control-list-to-network-to-network-interconnects.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,3 +70,8 @@ az networkfabric nni update --resource-group "example-rg" --resource-name "<nni-
7070
| Parameter | Description |
7171
|-------------------|----------------------------------------------------------------------------------------------------------------|
7272
| --ingress-acl-id, --egress-acl-id | To apply both ingress and egress ACLs simultaneously, create two new ACLs and include their respective resource IDs. |
73+
74+
75+
## Next steps
76+
77+
[Updating ACL on NNI or External Network](howto-update-access-control-list-for-network-to-network-interconnects.md)
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: How to configure diagnostic settings and monitor configuration differences in Nexus Network Fabric
3+
description: Process of configuring diagnostic settings and monitor configuration differences in Nexus Network Fabric
4+
author: sushantjrao
5+
ms.author: sushrao
6+
ms.service: azure-operator-nexus
7+
ms.topic: how-to
8+
ms.date: 04/18/2024
9+
ms.custom: template-how-to
10+
---
11+
12+
# How to configure diagnostic settings and monitor configuration differences in Nexus Network Fabric
13+
14+
In this guide, we'll walk you through the process of setting up diagnostic settings and monitoring configuration differences in Nexus Network Fabric.
15+
16+
## Step 1: Accessing device settings in Azure Portal
17+
18+
- Sign in to the Azure portal.
19+
20+
- In **Search resources, service, and docs (G+/)** at the top of the portal page, enter **Network Device**.
21+
22+
- :::image type="content" source="media/search-network-device.png" alt-text="Screenshot of search box for Network Device in portal.":::
23+
24+
- Select the appropriate network device from the search results. Ensure that you choose the device for which you need to configure diagnostic settings.
25+
26+
## Step 2: Adding diagnostic setting
27+
28+
- After selecting the appropriate network device, navigate to the monitoring and select diagnostic settings.
29+
30+
- Within the diagnostic settings section, select "Add diagnostic setting".
31+
32+
- :::image type="content" source="media/network-device-dignostics-settings.png" alt-text="Screenshot of diagnostics settings page for network device.":::
33+
34+
- In the diagnostic settings, provide a descriptive name for the diagnostic setting to easily identify its purpose.
35+
36+
- Select the desired categories of data that you want to collect for this diagnostic setting. In this case, select "System Session History Updates" from the list of available categories.
37+
38+
:::image type="content" source="media/network-device-system-session-history-updates.png" alt-text="Showcases specific categories of data to collect in portal.":::
39+
40+
## Step 3: Choosing log destination
41+
42+
- Once the diagnostic setting is added, locate the section where the log destination can be specified.
43+
44+
- Select the log destination from several choices, including Log Analytics Workspace, Storage account, and Event Hubs.
45+
46+
- :::image type="content" source="media/network-device-log-analytics-workspace.png" alt-text="Screenshot of configuration page for selecting Log Analytics Workspace as the log destination for a network device.":::
47+
48+
> [!Note]
49+
> In our example, we'll push the logs to the Log Analytics Workspace.<br>
50+
> To set up the Log Analytics Workspace, if you haven't done so already, you might need to create one. Simply follow the prompts to create a new workspace or select an existing one.
51+
52+
- Once the log destination is configured, confirm the settings and save.
53+
54+
## Step 5: Monitoring configuration differences
55+
56+
- Navigate to the Log Analytics Workspace where the logs from the network device are being stored.
57+
58+
- Within the Log Analytics Workspace, access the query interface or log search functionality.
59+
60+
- :::image type="content" source="media/network-device-config-difference.png" alt-text="Screenshot of comparison of configuration differences for a network device in a visual format.":::
61+
62+
- In the query interface, specify the event category as "MNFSystemSessionHistoryUpdates". This will filter the logs to specifically show configuration updates and changes comprehensively.

articles/operator-nexus/howto-create-access-control-list-for-network-to-network-interconnects.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,3 +151,6 @@ az networkfabric acl create --resource-group "example-rg" --location "eastus2eua
151151
> After creating the ACL, make sure to note down the ACL reference ID for further reference.
152152
153153

154+
## Next Steps
155+
156+
[Applying Access Control Lists (ACLs) to NNI in Azure Fabric](howto-apply-access-control-list-to-network-to-network-interconnects.md)

articles/operator-nexus/howto-update-access-control-list-for-network-to-network-interconnects.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,3 +103,6 @@ az networkfabric fabric commit-configuration --resource-group "<resource-group>"
103103

104104
4. Verify the changes using the `resource list` command.
105105

106+
## Next Steps
107+
108+
[Deleting ACLs associated with Network-to-Network Interconnects (NNI)](howto-delete-access-control-list-network-to-network-interconnect.md)
61.8 KB
Loading
74.9 KB
Loading
73.7 KB
Loading

0 commit comments

Comments
 (0)