




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、How I Learned to Stop Worrying and Love Prime Infrastructure,Lewis Hickman, Consulting Systems Engineer Jennifer Valentine, Systems Engineer,BRKNMS-2701,Introduction A History Of Use Cases and Intent A Walk Through Prime Infrastructure Discovery and Inventory Configuring Devices Upgrading Software M
2、onitoring for Performance and Faults Doing It API Style Key Takeaways And A Look Ahead,Agenda,A History Of,4,Back in 1996,A History Of,5,CWSI,CiscoWorks Blue,TrafficDirector,CiscoWorks for Windows,NETSYS,AtmDirector,VlanDirector,Content Flow Monitor,nGenius Real-TimeMonitor,And where we are now,6,35
3、+ Products with the “Prime” name,Prime Common User Experience,Cisco Prime NAM,Cisco Prime Collaboration,Cisco Prime DCNM,Cisco Prime LMS,Cisco Prime Infrastructure,7,How Did We Get Here?,8,1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015,Ciscos One
4、Network - Unified Access Portfolio,Control and Visibility for IT - Predictability for Users,Ciscos One Management Prime Infrastructure,AFTER Comprehensive user and Unified Access network Visibility E.g.: #if($SerialNumber = FDO1323Z10Q),68,Pro-Tip: Interactive, Enable, and Multiline Commands,Interac
5、tive commands can be done using the #INTERACTIVE command followed by to denote a question and to specify the reply Use #ENDS_INTERACTIVE to denote the end of the interactive block Multi-line commands can be specified using the tags Enable (i.e., EXEC) mode commands can be specified within #MODE_ENAB
6、LE and #MODE_END_ENABLE comments,69,Previewing The Template Form,70,Click the Form View tab to preview what the template form will look like when it is deployed.,Deploying The Template,71,Once the template is ready, click Deploy to push the template to the Network device(s). Note: 2.2 no longer has
7、a Publishing menu, the template is automatically published, once it is saved.,Preparing To Deploy Configurations,72,Visit the configuration deployment settings to set desired values. Pro-Tip: Increasing the thread count will allow PI to deploy to more devices faster. Consider 10 or 20 for larger PI
8、servers.,Deploying The Template (cont),73,Select the template from the list of “My Templates.” Click the Deploy button to begin the workflow.,Fill In the Template Values,74,Choose the device or devices, and then fill in the parameters. Common parameters can be applied to all devices with per-device
9、overrides.,Pro-Tip: Use Import and Export to fill in values for multiple devices using a spreadsheet,Submit The Configuration Job,75,Decide on a schedule (or run the job immediately), and then click OK to deploy the template to the selected device(s).,(2.2) You can now save the running configuration
10、 to startup and change failure options as part of the job setup.,Verifying The Jobs Status,76,The jobs results will be displayed under Administration Job Dashboard User-Defined. Mouse-over the reticule to view the details pop-up,(2.2) You can now check the box for the Job and the details appear in t
11、he bottom half of the screen,Effective Software Image Management (SWIM),Ability to add images to software repository Archive from current devices Manual upload Obtain from Enhance Image meta-data with DRAM/Flash requirements for pre-qual checks Ability to push image using different transport protoco
12、ls Ability to handle boot string updates and reload Ability to handle parallelism and sequencing,77,78,Start by visiting Administration System Settings Image Management to set your desired defaults,Image Management Settings,Pro-Tip Backup all Currently deployed Images,79,Next Task: Backup all curren
13、tly deployed images Go to Inventory Software Images, Click Import Select Device Source, then All Devices,Image Backup,80,Finally the downloads will complete,Import Image into PI Software Repository,81,2.2: Add Image(s) to Software Repository from source is disabled CSCun09011-PI transmits C credenti
14、als insecurely,Import Image into PI Software Repository,82,Next Task: Add Image(s) to Software Repository from File source Go to Inventory Software Images,Click Import Select File Source, then browse to the image,Image Import (cont),83,Difference from LMS PI does not automatically pick up the image
15、meta-data used for pre-qual checks,84,Hit the Download Center to find your image and its RAM/Flash requirements Pro-Tip Use entries 10% smaller because exact number may not match math rounding,Import Image (cont),85,Next Task: Distribute/deploy an Image From the specific Image page, click the comput
16、er-looking icon in the upper-right hover-over says Distribute,Distribute Image from Repository,86,Distribute Image (cont),Next Select Device(s) to software upgrade,Upgrading Devices,87,The system advises if there are DRAM/Flash issues to handle,Upgrading Devices,88,Distribution and Scheduling Option
17、s can be specified Once submitted a job is created,Upgrading Devices (cont),89,Status can be observed and refreshed until complete,Upgrading Devices (cont),90,PI Fault Monitoring,PI does fault collection and monitoring out of the box Device-level faults Server faults Alarms and events can be sent as
18、 email notifications Alert severity can be customized for specific organizational needs Alerts can be acknowledged, cleared and annotated to help identify and prioritize operational work,91,Configuring Alarm Options,92,If not checked, then alarms (even for deleted devices) will not get deleted.,Go t
19、hrough the alarm and event options to make sure you get the most out of on-screen and in email alerts.,Changing Alarm Severities,93,Each alarm has a pre-set severity, but these can be tweaked to make alerts more relevant to your organization.,Changing Alarm Severities (cont.),94,First, select the al
20、arm or alarms to change,Then select the new severity and click Go.,PI Alarms And Events,95,PI Alarm Viewer is found under Monitor Alarms & Events An alarm is the result of one or more events detected by PI. An event is an atomic condition that occurs in the network at a specific point in time.,Filte
21、ring Alarms,96,Click the Filter button to expand the per-column filters. This makes it easy to locate specific alarms.,Viewing Alarm Details,97,Click the triangle next to the alarm to get more details about both it and the related device.,Alarm Actions,98,Each alarm can be acknowledged or cleared, a
22、ssigned to a particular user, annotated, and/or deleted.,Troubleshooting Alarms,99,Troubleshooting and support workflows can be launched, within context, directly from an alarm. E.g., if a switch is down, run a quick ping to make sure it wasnt a transient issue.,Alarms From The “Toaster”,100,Active
23、alarms are also visible throughout PI from the “toaster” popup at the bottom of all PI windows.,Event Viewer,101,Event viewer looks similar to the Alarm viewer. In addition to filtering and obtaining details, you can also perform some of the same troubleshooting steps.,Viewing Syslog Messages,102,Li
24、ke LMS, PI listens for syslog messages. The Syslog tab under Alarms & Events will show all messages with a live refresh every 60 seconds.,(2.2) Provides additional syslog severity visibility.,Client Tracking,User (or Client) Tracking in PI shows converged wired and wireless clients Clients on autono
25、mous APs, lightweight APs, and switches are supported 802.1x authentication can be detected Non-authenticated also supported Like LMS, live tracking of clients can be done by enabling MAC address notification traps on switches,103,On Friday before the show, staff is looking at network health with Pr
26、ime Infrastructure They notice a large volume of traffic, taking up a lot of WAN bandwidth Easily able to see that the traffic is all from one user, and is all Bit-Torrent !?!?! Immediately able to see the exact end-point (IP & MAC address) NAM shows hostname is “Matts MacBook” Integration with MSE
27、lets wireless maps show the exact location of “Matt”,104,Cisco Live Milan 2015: The Bit-Torrent Incident,105,Cisco Live Milan 2015: The Bit-Torrent Incident,Staff walks down and has a chat with “Matt” He shuts off Bit-Torrent ACL added to WAN interface Problem solved in less than 15 minutes - includ
28、ing the time to walk downstairs to find Matt!,Silo tools cannot do this!,Setting Up For Client Tracking,106,Before collecting clients on the network, adjust the settings for hostname resolution (a useful thing), data retention, and ,Viewing/Filtering The Clients,107,The client viewer can be found un
29、der Monitor Clients and Users. The client list can be filtered using basic per-column values with the Quick Filter “Show” option,Viewing Client Details,108,Clicking the radio button next to a client populates the client details pane.,Providing Client Information,109,Just like in LMS, notes can be ad
30、ded per-client to better describe the clients purpose.,Clicking the radio button next to a client populates the client details pane.,Pro-Tip: Bookmarking Client Details,110,The Client Details pane can be detached from the client list and bookmarked for easy access and sharing.,https:/pi1/webacs/welc
31、omeAction.do?commandType=abridgedShell#pageId=monitorClientDetail_pageId&queryParams=command%3Ddetail%26deviceIp%3D1%26mobileStationMac%3D44%3Ad3%3Aca%3Aad%3A53%3A70%26forceLoad%3Dtrue,Tracking Clients,111,The appearance of clients can trigger emails or PI alarms. Combine this with trap pr
32、ocessing, to know immediately when a specific host joins the network.,Network Monitoring,PI has a number of monitoring features Device health Interface utilization Performance and application Performance and application monitoring requires the Assurance License Many of PIs monitoring features are en
33、abled out-of-the-box Dashlets make it easy to quickly spot problems in the network,112,Enabling Monitoring Templates,113,Templates for enabling various monitoring tasks can be found under Design Monitoring Configuration. Of the built-in Metrics templates, only Interface Health is not deployed to dev
34、ices by default.,(2.2) Now done under Monitoring Monitoring Policies Automonitoring and Monitoring Monitoring Policies My Policies.,Selecting Devices For Monitoring,114,Devices (or ports) can be selected for a template based on a static list (Devices radio button) or a dynamic group of devices (Devi
35、ce Groups radio button).,Dashboards and Dashlets,115,The PI dashboards provide a “quilt” for plugging in dashlets that visualize the health and performance of the network and individual devices.,Dashboards and Dashlets,116,Each of the main dashboard tabs (Overview, Incidents, Performance, and Detail
36、 Dashboard) offer their own set of dashlets. When adding a new dashlet, its preview will show up when you mouse-over the reticle.,Custom SNMP Templates,117,If the built-in templates do not give you the visibility you want, create a custom SNMP template under Monitor Monitor Policies and click on Add
37、.,Custom SNMP Templates,118,Use Custom MIB Polling and choose from the list provided, or upload the MIB needed for the new template.,Custom SNMP Templates,119,In PI 2.2, new templates are automatically deployed. They can be deactivated by going to MonitorMonitoring PoliciesMy Policies, and selecting
38、 the new policy.,Monitoring The New Template,120,Add a new Generic Dashlet (DashboardPerformance, not Overview!) to one of the Detail Dashboards and fill in the desired parameters for your custom template.,Monitoring Application Performance,121,With the Assurance license, PI can receive NetFlow sent
39、 to UDP/9991. The Overview Service Assurance and Service Health dashboards will show per-device, per-interface, and per-application performance and utilization.,Network Topology,Network Topology Page Maps Network Topology Main landing page for viewing network topology Topology Dashlets Topology Dash
40、lets available for Overview level dashboards Multiple Topology dashlets supported Any topology map can be viewed in a dashlet Device 360 “N-Hop” contextual topology view Device 360 adds new action icon to see device context topology,Location Group Topology Campus.,Alarm Badge indicates highest alarm
41、 state of items inside the Container,Location Group Topology,Launch the Device 360 View,Click on the device to get Device Summary,Manually Create ElementsNetwork / Device / Link,Edit Interface Assignment,Doing it API Style,RESTful APIs,126,Cisco Prime Infrastructure 2.2 API Reference Guide,Automated
42、 Monitoring,Getting Started,Organized around: Device related information, such as physical and logical details, but also credentials, alarms and events. Statistics related to devices, enabling assessment of the health of Devices in the network. Report access, where you can trigger and collect result
43、 of any report defined in the system. Template Configuration access, manage, and deploy configuration templates through the API. A Representational State Transfer (RESTful) resource Supports the XML & JSON data formats,The Prime Infrastructure API,127,Getting Started,128,https:/SERVER/webacs/api/v1/
44、,Getting Started with Authentication,Poll with an account in the Admin or North Bound API group The API uses basic authentication - the user name is appended with a colon and concatenated with the password and encoded with the Base64 algorithm Example: with user name Aladdin and password open sesame
45、, Base64 encode the string Aladdin:open sesame to get QWxhZGRpbjpvcGVuIHNlc2FtZQ= The Authorization HTTP header used is Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ= curl -k -u username:password https:/your_server/webacs/api/v1/data/InventoryDetails,129,Getting Started,130,There are LOADS of metr
46、ics that can be polled most under the Statistics category,Enhanced Northbound REST APIs,Following additional RW APIs are supported in PI 2.2,131,API example,132,Example: Get all Device summary data https:/your_server/webacs/api/v1/data/Devices/2285291,Getting Started,133,Example: Get all Top 5 devic
47、es by CPU Usage https:/SERVER/webacs/api/v1/op/statisticsService/device/topNCPU?range=1&topN=5,Key Takeaways and Looking Ahead,Key Takeaways/Conclusion,135,There are many good features in Prime Infrastructure - many are better than LMS,Feature Parity with LMS has made great strides - Take advantage
48、of the flexible licensing to run both,PI 3.0 continues the progression,We hope you see the usability and highly customizable interface that PI brings to the table,Prime Infrastructure 3.0 HighlightsAvailable July/August 2015,Generic SNMP Trap Support- Support receiving any trap from any device and c
49、reating a top level Alarm,Useful Information,Cisco Prime LMS 4.2 and Cisco Prime Infrastructure 2.2 Functional Comparison Transitioning from Cisco Prime LMS to Cisco Prime Infrastructure Cisco Prime Infrastructure 2.X Deployment Guide Cisco Prime Infrastructure Best Practices,137,Call to Action,Visi
50、t the World of Solutions for Cisco Campus: EN and ACI areas for Prime Infra and APIC-EM Demos Whisper Suites: Get in touch with your Cisco Account/Partner team to schedule 1-on-1 meetings with Product Teams at SDN and Network Transformation Whisper Suites Visit the NOC to see a live version of Prime Infrastructure managing the s
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 宗教场所装修终止合同范本
- 二零二五年度养老设施面积补差及养老服务补充协议
- 2025年度网络安全合同管理制度及流程保障
- 2025年度住宅小区物业漏水紧急赔偿协议书
- 2025年度绝交协议范本:理性处理情感纠纷的协议样本
- 2025-2030年中国棉布遮阳棚项目投资可行性研究分析报告
- 2025年夹圈绒行业深度研究分析报告-20241226-175543
- 2025年度商品房团购合作协议书
- 2025年度互联网医疗股份分配协议书模板
- 二零二五年度肉牛养殖与肉类加工厂订单定制销售协议
- TCASWSS 025-2024 老年大学课程设置规范
- 课堂互动和学生参与度提升
- 两办意见八硬措施煤矿安全生产条例宣贯学习课件
- 教师课堂教学语言技能范例课件
- 《体育与健康说课》课件
- 人教版化学九年级下册同步练习:第九单元 溶液
- 华南师范大学附属小学招聘教师笔试真题2022
- 山东女子学院《C语言程序设计》2022-2023学年期末试卷
- 2020年中国人身保险产品研究报告
- 常见织带花链的排法和穿棕方法
- 《化工工程制图》完整教案
评论
0/150
提交评论