A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams



Similar documents
How To Set Up Foglight Nms For A Proof Of Concept

Network Monitoring Comparison

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Logging on a Shoestring Budget

Real-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon Max Putas

Elasticsearch on Cisco Unified Computing System: Optimizing your UCS infrastructure for Elasticsearch s analytics software stack

Towards Smart and Intelligent SDN Controller

Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive

Cisco IOS Flexible NetFlow Technology

Tool Optimization. Benefits. Introduction. Technical Brief. Extend the usage life of tools and avoid costly upgrades

Solving Monitoring Challenges in the Data Center

Multi Stage Filtering

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Enabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon

SOLARWINDS NETWORK PERFORMANCE MONITOR

Using Logstash and Elasticsearch analytics capabilities as a BI tool

VCS Monitoring and Troubleshooting Using Brocade Network Advisor

Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers

How To Use Elasticsearch

Flow Analysis Versus Packet Analysis. What Should You Choose?

SolarWinds Network Performance Monitor

Enhancing Cisco Networks with Gigamon // White Paper

SolarWinds Network Performance Monitor powerful network fault & availabilty management

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013

Elevating Data Center Performance Management

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013

Wireshark Developer and User Conference

Log management with Logstash and Elasticsearch. Matteo Dessalvi

Network Metrics Content Pack for VMware vrealize Log Insight

Maintaining Non-Stop Services with Multi Layer Monitoring

TORNADO Solution for Telecom Vertical

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Beyond Monitoring Root-Cause Analysis

SolarWinds Network Performance Monitor

Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept

Log infrastructure & Zabbix. logging tools integration

Network Security Platform 7.5

Observer Probe Family

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.

PANDORA FMS NETWORK DEVICE MONITORING

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory

UCS Network Utilization Monitoring: Configuration and Best Practice

INFRASTRUCTURE MONITORING:

PANDORA FMS NETWORK DEVICES MONITORING

Scalable Extraction, Aggregation, and Response to Network Intelligence

Observer Analysis Advantages

Open SDN for Network Visibility

April 8th - 10th, 2014 LUG14 LUG14. Lustre Log Analyzer. Kalpak Shah. DataDirect Networks. ddn.com DataDirect Networks. All Rights Reserved.

Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP

PacketTrap One Resource for Managed Services

Proactive Network Performance Monitoring

End-to-End Network Centric Performance Management

I1: Best Practices for Packet Collection, Aggregation & Distribution in the Enterprise

Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down

50. DFN Betriebstagung

WHITE PAPER Redefining Monitoring for Today s Modern IT Infrastructures

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

What s New in Security Analytics Be the Hunter.. Not the Hunted

TITANXR Multi-Switch Management Software

Network Security Demonstration - Snort based IDS Integration -

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

4 Steps to Surviving Big Data

MySQL Enterprise Monitor

Why should you look at your logs? Why ELK (Elasticsearch, Logstash, and Kibana)?

11.1. Performance Monitoring

WhatsUp Gold vs. Orion

Processing millions of logs with Logstash

Monitoring and analyzing audio, video, and multimedia traffic on the network

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

1 Data Center Infrastructure Remote Monitoring

The Purview Solution Integration With Splunk

A Year of HTCondor Monitoring. Lincoln Bryant Suchandra Thapa

SolarWinds Certified Professional. Exam Preparation Guide

Blackboard Open Source Monitoring

Monitor all of your critical infrastructure from a single, integrated system.

Network Visibility Guide

OBSERVEIT DEPLOYMENT SIZING GUIDE

Monitoring Best Practices for

Latency Analyzer (LANZ)

mbits Network Operations Centrec

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Beyond Monitoring Root-Cause Analysis

Best Practices for 10G and 40G Network Forensics

NetQoS Delivers Distributed Network

Analyze hop-by-hop path, devices, interfaces, and queues Locate and troubleshoot problems

Secure Networks for Process Control

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Network Performance Management Solutions Architecture

RSA Security Analytics Security Analytics System Overview

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

Cisco Performance Visibility Manager 1.0.1

Cisco Bandwidth Quality Manager 3.1

Monitoring Best Practices for COMMERCE

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

VMware vcenter Log Insight User's Guide

Best Practices for Network Monitoring

Transcription:

A New Approach to Network Visibility at UBC Presented by the Network Management Centre and Wireless Infrastructure Teams

Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring Tool Data Analytics and Visualization Tool Q&A 2

Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring Tool Data Analytics and Visualization Tool Q&A 3

University Services 4

Business Requirements High availability High performance Virtualized Secure 5

Why is Visibility Needed? Client Experience Application Performance NEED VISIBILITY Data Centre Security 6

Challenges Life cycling needed Complex network with multiple paths Highly virtualized infrastructure Budget $$$$ 7

Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring Tool Data Analytics and Visualization Tool Q&A 8

Overview of UBCNet 9

Visibility of Physical and Virtual Networks A virtual network spans multiple network devices Collect network information from multiple sources 10

Multiple Sources of Network Information Netflow Many devices Collector (Netflow Analyzer, StealthWatch) SNMP Many devices Tool (Statseeker, Intermapper) Logs Many devices Tool (Kibana-Elasticsearch) Real network traffic One or many Tool (WireShark, Cisco NAM, WildPacket, IDS/IPS) 11

Traditional Approach Manage large number of tools and span sessions Separated tools and information make analysis difficult 12

Need a New Approach Manage much less number of tools and span sessions Single tool and information make analysis much easier 13

Why Network Packet Brokers? Many-to-many port mapping for real-time adjustments of packet flow. Filtering of packet data based on the characteristics found in the packet headers. Packet slicing and de-duplication that allows a subset of the full packet data to be passed to the monitoring device. Aggregating multiple packet stream inputs into one larger stream, or balancing one large stream into several smaller streams. Insertion of hardware-based time stamps that monitoring tools can use to take more accurate measurements. (Gartner Analyst Jonah Kowall, April 2012) 14

Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring Tool Data Analytics and Visualization Tool Q&A 15

Current Visibility at UBC 16

Future Visibility at UBC 17

APCON: Main Panel Network ports (Ingress) Tool ports (Egress) 18

APCON: Port Mapping 19

APCON: Traffic Filtering 20

APCON: Advanced Features 21

APCON: Protocol Stripping 22

APCON: Blade/Port Status 23

Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring Tool Data Analytics and Visualization Tool Q&A 24

Network Monitoring Tool: Agenda Challenges What is Statseeker? Advantages Use Cases Troubleshooting Proactive Alerting Baseline Traffic Aggregation 25

Challenges Limited visibility What s happening on this part of the network? Troubleshooting Is it a network issue? No baseline What is normal? 26

What is Statseeker? Statseeker - Commercial product - Charts network statistics including bandwidth, latency, utilization, errors, discards, CPU, memory and temperature. - Threshold and alerting - Syslog 27

Statseeker: Advantages Fast! Small footprint 1 VM monitoring over 1000 switch stacks, and 100,000 ports Polls every 60 seconds Keeps data indefinitely with original granularity 28

Use Cases Troubleshooting Proactive alerting Baseline 29

Troubleshooting Troubleshooting with Network Statistics Does the time of the issue correlate with traffic dips / spikes? Are other ports experiencing the same issue? How about other switches? Track down source of traffic dip / spike Any errors or discards on the ports? 30

Example 1 Unicast Storm 31

Example 2 High Utilization 32

Example 3 Compromised Server 33

Example 4 DOS Attack 34

Example 5 High Errors 35

Proactive Alerting High CPU, interface down, syslog matches 36

Baseline Do we need to increase bandwidth on any interfaces? Someone wants to upgrade their uplink from 1 Gbps to 10 Gbps. Do the traffic patterns justify the upgrade? Able to see historical trends, and anticipate growth requirements 37

Example: Traffic Utilization Traffic Utilization over 30 days 38

Traffic Aggregation Total traffic of multiple interfaces 39

Traffic Aggregation 40

Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring Tool Data Analytics and Visualization Tool Q&A 41

Data Analytics with ELK = 42

ELK: How? By using free and open source software Elasticsearch database optimized for search Logstash Parse any data Kibana HTML visualization frontend All components are horizontally scalable Current deployment has about 20 Virtual Machines 5 VM s for central syslog, 2 REDIS queues, 2 logstash parsers, and 11 Elasticsearch database servers These VM s handle 100 million log events daily, about 100 gig per day on disk 43

ELK: Architecture Logstash Forwarder (LSF) is a lightweight daemon that forwards logs from your application/server to Logstash Logstash gets the log from LSF, or acts as a Central Syslog receiver (udp/514) from other network devices (switches, servers, etc). It sends those logs into a REDIS queue for processing Logstash Parser pulls the logs from REDIS and parses/converts them into a format that can easily be searched by Elasticsearch The Elasticsearch cluster contains dedicated master nodes (esm1-3), client load balancer (esc1-2) and data nodes (es1-6). Each data node has 32GB Ram and 2TB disk. The Kibana3 GUI and Kibana4 beta provide user access to the log data 44

ELK: Logstash Input: File, syslog, udp (netflow) Filters: grok, mutate, GeoIP, replace, split, clone Output: Elasticsearch, REDIS, file Many, many more @ https://github.com/logstash-plugins Common timestamp format Easy to convert timestamps from various applications, devices, and servers into one standard format Data manipulation All MAC Addresses have the same format. Any MAC s that come in as aabb.ccdd.eeff or aa:bb:cc:dd:ee:ff are converted to aa-bbcc-dd-ee-ff to make searching the different datasets easier 45

ELK Dashboard: Wireless user

ELK Dashboard: Wireless Overview

ELK Dashboard: TACACS

Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring Tool Data Analytics and Visualization Tool Q&A 49

Q&A Any questions? 50

Contacts Amy Osman Network Analyst, Network Management Centre amy.osman@ubc.ca Solomon Huang Network Analyst, Network Management Centre solomon.huang@ubc.ca Jeremy Cohoe Network Analyst, Wireless Infrastructure jeremy.cohoe@ubc.ca Sean Wang Network Architect, Network Management Centre sean.wang@ubc.ca Miranda Chiu Manager, Network Management Centre miranda.chiu@ubc.ca 51

Photo Credits Slide 4: University Services 1. Erhardt, Don, The multi-purpose Franklin Lew Forum at Allard Hall., http://en.wikipedia.org/wiki/allard_hall 2. Baer, Rhoda, Researcher Looking Through Microscope, http://commons.wikimedia.org/wiki/file:researcher_looking_through_microscope.jpg 3. http://www.amsrentsline.com/vancouver-bc/apartment/shared-ubc-campus-gallery26922 4. http://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone- 7941g/product_data_sheet0900aecd802ff012.html 5. http://moementum.com/work-smart-blog/six-thoughts-on-curbing-the-disease-of-being-busy/ 6. Grigoryan, Arthur, Videoconference classroom, http://commons.wikimedia.org/wiki/file:videoconference_classroom.jpg 7. https://it.ubc.ca/projects/new-university-data-centre-udc 8. TedxVancouver c/o Maurice Li, TEDxVancouver 2011, UBC Chan Centre, http://commons.wikimedia.org/wiki/file:tedxvancouver_2011,_ubc_chan_centre.jpg 9. Sistoiv, POS device (Italy), http://commons.wikimedia.org/wiki/file:pos_device.jpg Slide 5: Business Requirements 1. Zammit, Jared, Blue fibre, http://www.jisc.ac.uk/network/connectivity 2. Samollov, Yuri, System Lock, https://www.flickr.com/photos/110751683@n02/13334048894/ 52

The End Thank you for your interest! 53