Abstract:
Techniques are disclosed for implementing scalable policies across a plurality of categories that support application workloads. In one example, a policy controller assigns to the plurality of categories tags specifying one or more of a plurality of dimensions. The policy controller distributes a plurality of policies to policy agents for the plurality of categories. Each policy includes one or more policy rules, and each policy rule includes one or more tags specifying one or more of the plurality of dimensions. For each policy rule, the policy agents allow or deny a traffic flow between objects that belong to categories of the plurality of categories described by the one or more dimensions of a respective tag of the policy rule.
Abstract:
The techniques described herein may dynamically adjust the sampling threshold based on a comparison of a flow export rate to a configured flow export rate. Based on the comparison of the flow export rate and the configured flow export rate, the network device may dynamically adjust the sampling threshold, such as increasing, reducing, or not changing the sampling threshold. Moreover, traffic flows are exported based on the adjusted sampling threshold. For example, if a number of bytes of a packet flow is more than or equal to the adjusted sampling threshold, network devices may export the sampled packet flow with the byte count and packet count of the sampled packet flow reported as-is. When a number of bytes of a packet flow is less than the adjusted sampling threshold, the packet flow will be exported with the byte count and packet count adjusted according to a probability.
Abstract:
Graphical user interfaces are generated that, when displayed, provide a visual and interactive representation of one or more aspects associated with the execution of one or more applications on a computer network. The graphical user interfaces may in include graphical depictions representation policy objects, each policy object assigned one or more tags, each tag assigned to a category or a sub-category. The tags, when taken in combination, may identify an application, and one or more other characteristics associated with each of the policy objects. The graphical elements representing the policy objects may be displayed in the graphical user interfaces so that the policy objects assigned to tags in a category are positioned in an outer ring, and policy objects assigned to sub-category tags are positioned in a inner ring surrounded by the outer ring, with interconnection elements representing communications between policy objects extending within an interior area.
Abstract:
A controller coordinates execution of a set of related processes executed by respective devices in the virtual network, wherein coordinating comprises causing the respective devices to execute the set of related processes; receiving a data set for the set of related processes from the respective devices, comprising receiving operational states of the related processes from the respective devices; reading a previous data set comprising previous operational states of the related processes from the respective devices; processing an update to the previous operational states from the received operational states of the received data set; and aggregating the received operational states of the data set with the previous operational states of the related processes to form aggregated data of updated operational states.
Abstract:
In one example, a controller device includes one or more network interfaces communicatively coupled to one or more devices of a virtual network, and a processor configured to determine, for the virtual network, a set of two or more related processes executed by respective devices in the virtual network, receive via the network interfaces data for the set of two or more related processes, and aggregate the data for the set of two or more related processes to form aggregated data for the set of two or more related processes.
Abstract:
Techniques are disclosed for implementing scalable policies across a plurality of categories that support application workloads. In one example, a policy controller assigns to the plurality of categories tags specifying one or more of a plurality of dimensions. The policy controller distributes a plurality of policies to policy agents for the plurality of categories. Each policy includes one or more policy rules, and each policy rule includes one or more tags specifying one or more of the plurality of dimensions. For each policy rule, the policy agents allow or deny a traffic flow between objects that belong to categories of the plurality of categories described by the one or more dimensions of a respective tag of the policy rule.
Abstract:
Techniques are disclosed for session-based traffic statistics. In an example method, a virtual router of a cloud data center processes traffic flows for virtual machines executing on a server within the cloud data center to generate traffic flow statistics. The traffic flows include ingress traffic flows originating from the virtual machines and destined for a network of the cloud data center, and egress traffic flows originating from the network of the cloud data center and destined for the virtual machines. A virtual routing agent processes the traffic flow statistics to identify pairs of ingress and egress traffic flows corresponding to a common communication session. The virtual routing agent generates, for each identified pair of ingress and egress traffic flows, session records comprising traffic session statistics for each of the ingress and egress traffic flows of the pair and uploads the session records to a traffic collector for the network.
Abstract:
Techniques are disclosed for session-based traffic statistics. In an example method, a virtual router of a cloud data center processes traffic flows for virtual machines executing on a server within the cloud data center to generate traffic flow statistics. The traffic flows include ingress traffic flows originating from the virtual machines and destined for a network of the cloud data center, and egress traffic flows originating from the network of the cloud data center and destined for the virtual machines. A virtual routing agent processes the traffic flow statistics to identify pairs of ingress and egress traffic flows corresponding to a common communication session. The virtual routing agent generates, for each identified pair of ingress and egress traffic flows, session records comprising traffic session statistics for each of the ingress and egress traffic flows of the pair and uploads the session records to a traffic collector for the network.