Below is example setup with VxLan Fabric and East West traffic flow All Leafs and Spines are sending grpc/gpb encoded monitoring data to the Server.
Example Configuration on Leafs and Spines
Below Configuration is monitoring Ethernet2/1 Interface counters and information is sent to Server (Telemetry Receiver) (172.27.250.134:50001)
ip address 172.27.250.134 port 50001 protocol gRPC encoding GPB
path sys/intf/phys-[eth2/1]/dbgIfIn depth 0
path sys/intf/phys-[eth2/1]/phys depth 0
snsr-grp 1 sample-interval 5000
snsr-grp 1 sample-interval 0
Server (Telemetry Receiver)
1 Running Receiver/httpserver/Splunk forwarder
docker run –it –p 50001:50001 bash cd /home/tm_receiver/ ./SimpleHttpServer.py & /opt/splunk/bin/splunk start & ./telemetry_receiver 50001 172.27.250.134 10000 2 &
1 Running Kibana
docker run –it –p 50001:50001 bash cd /home/tm_receiver/ ./telemetry_receiver 50001 172.27.250.134 9200 1 & (50001 is port on which receiver is listening, 172.27.250.134 is ip address of elk stack, 9200 is port where data is posted)
docker run -p 5601:5601 -p 9200:9200 -p 5044:5044 -it 079a4838517d bash
service elasticsearch start
service kibana start
/home/programs/elasticsearch-py/example/programs/elasticsearch-cisco-models-mapping.py 172.27.250.134 testlog-new d852e3c1 -> (testlog-new (Index), d852e3c1 (_type))
Once Elasticsearch and Kibana are running, 1. In the server browser type http://localhost:5601 which will load kibana web page.
1 Goto settings-->indices-->configure an index pattern.
2 Type in your index name in the "index name or pattern" textbox.
3 If you have checked the "index contains time-based events" then select the respective "Time-field-event" (postDate) and click create. This will create the index in kibana with all the fields.
4 Set the index as the favorite index.
5 Goto Discover and you should see the telemetry data streamed from the telemetry enabled switches in kibana.
6 Now, goto Visualize and build visualizations beased on your choice with the data received in Kibana.