About Traffic Analytics
The Traffic Analytics (TA) feature has the following capabilities:
-
Provides an ability to identify services offered by servers behind a switch, delivering aggregated analytics data. To distinguish between servers and clients, TCP flags (SYN and SYN ACK) in a three-way handshake are utilized.
-
Collapses multiple TCP session data traffic from a client to a server or from a server to client into a single record in the show flow cache database and exports it to the collector. During the traffic analytics aggregation, the source port of TCP is set to a value of 0.
-
Supports faster export cadence for troubleshoot flows.
-
Supports TA interface filter and VRF filter.
A flow is defined by the source interface, protocol, source IP address, source port, destination IP address, and destination port values. If traffic analytics is enabled, the flows of TCP sessions are aggregated based on source IP address (SIP), destination IP address (DIP), source port (SP) for server to client traffic and SIP, DIP, destination port (DP) for client to server traffic.
Aging of Traffic Database Entries
The traffic database entries will be monitored every 24 hours using a timer. If there is no traffic hitting a database entry, then within 24 to 48 hours that traffic database entry will be deleted. By default the size of the database is 5000.
Troubleshooting Rules
The Troubleshooting rules are used to debug a flow by programming an analytics ACL filter. These rules take precedence over the traffic analytics rules and can be used for capturing specific flow. Troubleshooting rules might result in two entries in the flow cache.
Troubleshooting rules should be used only for specific flows preferably host for short duration only.
Faster Export Cadence for Troubleshoot Flows
Currently, the flow records and troubleshoot records are exported at a fixed interval of one minute. To enhance the efficiency of troubleshooting analysis, a new filter export-interval command is introduced. This command facilitates the export of troubleshoot records at a faster interval by utilizing a dedicated hash database.
This configuration can be applied only if traffic analytics is enabled, and a filter is set up within the flow system settings. For more information on filter export-interval command, see Example for Traffic Analytics.
TA Interface Filter and VRF Filter
The Traffic Analytics feature is enhanced to offer more granular support to capture TCP flows using filter configuration at both the interface and VRF levels, similar to the existing FT interface configuration.
Under this TA filter configuration, you can achieve the following:
-
Configure an IP address that is required for monitoring.
-
Configure an IP address which does not need flow collection using a deny keyword.
-
Configure the VRF filter across all interfaces in a given VRF.
-
Provide permit subnet rules for TCP packets (TCP SYN, SYN ACK, and without any TCP flag).
-
For general TCP packets (without SYN or SYN ACK) which are considered for profile 31, the TCS flows forwarded to the collector can be stopped using the show flow cache command.
For more information on TA interface filter and VRF filter, see Example for TA Interface Filter and VRF Filter.
About UDP Port support
Beginning with Cisco NX-OS Release 10.5(2)F, Traffic Analytics supports UDP port(s) configuration to mask the exported flows.
For masking, the following procedure is followed:
-
If the UDP ports are configured, the flows will be masked in the TA DB and NFM flow cache.
-
If the destination port is matched, then the source port is masked and vice versa.
-
The NetFlow entry will be inserted first, followed by TA entries.
-
If UDP port is not configured, the current functionality is not impacted.
To configure the UDP port(s), the following [no] udp-port port-range command is introduced under the flow traffic-analytics submode (under analytics).
The UDP port must be in the range of 1 to 65565. The port(s) can be entered in a comma-separated and/or range-based format
(For example: 2000-3000, 400, 500
).
When the number of ports in the input exceeds the maximum number of ports that can be displayed in a single line command, they will be spilled over to a new configuration line as shown in the example below:
analytics
flow traffic-analytics
udp-port 53,400,500,1002,1004,1006,1008,1010,1012,1014,1016,1018,1020,1022,1024,1026,1028,1030,1032,1034,1036,1038,1040,1042,1044,1046,1048,1050,1052,1054,1056,1058,1060,1062,1064,1066,1068,1070,1072,1074,1076,1078,1080,1082,1084,1086,1088,1090,1092,1094,1096,1098,1100,1102,1104,1106,1108,1110,1112,1114,1116,1118,1120,1122
udp-port 1124,1126,1128,1130,1132,1134,1136,1138,1140,1142,1144,1146,1148,1150,1152,1154,1156,1158,1160,1162,1164,1166,1168,1170,1172,1174,1176,1178,1180,1182,1184,1186,1188,1190,1192,1194,1196,1198,1200,2000-3000,3002,3004,3006