INTRODUCING CONTRAIL INSIGHTS · Any statements of product direction contained in this presentation...
Transcript of INTRODUCING CONTRAIL INSIGHTS · Any statements of product direction contained in this presentation...
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
INTRODUCING CONTRAIL INSIGHTSOPERATIONAL INSIGHTS AND SIMPLICITY
Presenter:
Anuja More
PLM, Analytics and Automation
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
CONFIDENTIALITY AND LEGAL NOTICE
This material contains information that is confidential and proprietary to Juniper Networks, Inc. Recipient may not
distribute, copy, or repeat information in the document without a signed non-disclosure agreement (NDA).
Any statements of product direction contained in this presentation sets forth Juniper Networks’ current intention and is
subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature
or functionality depicted in this presentation.
Copyright 2019 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Juniper, Junos,
and NXTWORK are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other
trademarks, service marks, registered marks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to
change, modify, transfer, or otherwise revise this publication without notice.
2
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
AGENDA
• Product Overview
• Features
• What is Overlay-underlay
correlation?
• Use Case Scenarios
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only4
SOLUTION OVERVIEW
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
CONTRAIL INSIGHTS FOR BETTER NETWORK VISIBILITY & MONITORING
A full-fledged platform that will empower Network Administrators
to better analyze network traffic data
Visualize and monitor
real-time network traffic
flowing across the network
I
Understand workload and
application behavior across
physical and virtual
infrastructure
II
Achieve correlation of the
overlay with the underlay,
providing integrated visibility
into traffic flow paths
III
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only6
FEATURES
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
The Topology View
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
Topology Graph
Live heatmap at any moment of
time
Available metrics related to hosts
or physical interfaces
Additional information on tooltips
and charts
THE TOPOLOGY VIEW
1
2
3
4
An overview of everything that is happening across their infrastructure
4
2
4
1
3
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
THE TOPOLOGY VIEW
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
The Top N View
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
THE TOP N VIEW
Provides end-users with a powerful tool for multi-parameter filtering and drill-downs
Define the level of granularity
by adding columns
Data filtering
Drill down function
1
2
3
1
22
3
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
THE TOP N VIEW
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
The Path Finder
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
THE PATH FINDER
Allows end-users to track particular connections on a physical infrastructure
Displays traffic paths between
physical or virtual machines
Heatmap that represents the
volume of traffic registered on
each particular edge
The bar chart with traffic
distribution for particular paths
1
2
3
3
2
1
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
THE PATH FINDER
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only16
WHAT IS
OVERLAY-UNDERLAY
CORRELATION?
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
THE BUSINESS MODEL OF A DATA CENTER IS TO PROVIDE COMPUTING CAPACITY TO ITS CLIENTS
Data CenterService Provider
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
THE BUSINESS MODEL OF A DATA CENTER IS TO PROVIDE COMPUTING CAPACITY TO ITS CLIENTS
Data CenterService Provider
Hosts
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
HOSTS ARE CONNECTED TO EACH OTHER AND TO THE EXTERNAL WORLD BY NETWORK DEVICES
Underlay network consists of physical devices
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Hosts
Leaf
Spine
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
EACH HOST USUALLY HAS SEVERAL VIRTUAL MACHINES RUNNING ON IT, CALLED WORKLOADS
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Hosts
Workloads
Leaf
Spine
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
DATA CENTRES SHARE RESOURCES AMONG DIFFERENT TENANTS
Tenant BVirtual network B
Tenant CVirtual network C
Tenant DVirtual network D
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Ho
sts
Wo
rklo
ad
s
Ov
erl
ay
Ne
two
rks
(vir
tual)
Tenant AVirtual network A
Le
af
Sp
ine
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only22
USE CASE SCENARIOS
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
USE CASE EXAMPLES: SCENARIO I
Identify physical path for
particular overlay connection
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
CLIENT OF THE DATA CENTER HAS SOME CONNECTIVITY ISSUES BETWEEN TWO APPLICATIONS
!
Tenant BVirtual network B
Tenant CVirtual network C
Tenant DVirtual network DH
ost
sW
ork
loa
ds
Tenant AVirtual network A
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Ov
erl
ay
Ne
two
rks
(vir
tual)
Le
af
Sp
ine
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
NETWORK ADMINISTRATOR IS TROUBLESHOOTING CONNECTIVITY ISSUE
Tenant BVirtual network B
Tenant CVirtual network C
Tenant DVirtual network DH
ost
sL
ea
fS
pin
eW
ork
loa
ds
Tenant AVirtual network A
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Ov
erl
ay
Ne
two
rks
(vir
tual)
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
NETWORK ADMINISTRATOR IS TROUBLESHOOTING CONNECTIVITY ISSUE
Tenant BVirtual network B
Tenant CVirtual network C
Tenant DVirtual network D
Wo
rklo
ad
s
Tenant AVirtual network A
Ho
sts
Le
af
Sp
ine
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Ov
erl
ay
Ne
two
rks
(vir
tual)
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
NETWORK ADMINISTRATOR IS TROUBLESHOOTING CONNECTIVITY ISSUE
Tenant BVirtual network B
Tenant CVirtual network C
Tenant DVirtual network D
Wo
rklo
ad
s
Tenant AVirtual network A
Ho
sts
Le
af
Sp
ine
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Ov
erl
ay
Ne
two
rks
(vir
tual)
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
USE CASE EXAMPLES: SCENARIO I
DEMO VIDEO
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
USE CASE EXAMPLES: SCENARIO II
Identify distribution of overlay
connections between two hosts
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
IDENTIFY DISTRIBUTION OF OVERLAY CONNECTIONS BETWEEN TWO PHYSICAL HOSTS
Ho
sts
Wo
rklo
ad
s
SourceDestinatio
n
Traffic distribution
SourceDestination
Le
af
Sp
ine
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Ov
erl
ay
Ne
two
rks
(vir
tual)
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
USE CASE EXAMPLES: SCENARIO II
DEMO VIDEO
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
USE CASE EXAMPLES: SCENARIO III
Identify physical resources utilised
by a particular Client of a Data Center
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
IDENTIFY PHYSICAL RESOURCES UTILISED BY A PARTICULAR CLIENT OF A DATA CENTER
Tenant BVirtual network B
Tenant CVirtual network C
Tenant DVirtual network DH
ost
sW
ork
loa
ds
Tenant AVirtual network A
Le
af
Sp
ine
Un
de
rla
y N
etw
ork
(ph
ysi
cal)
Ov
erl
ay
Ne
two
rks
(vir
tual)
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only
USE CASE EXAMPLES: SCENARIO III
DEMO VIDEO
© 2019 Juniper Networks Juniper Business Use Only
Juniper Business Use Only35
THANK YOU!