This is one stop global knowledge base where you can learn about all the products, solutions and support features.
Last updated: 2022-06-14
File Analytics provides data and statistics on the operations and contents of a file server.
Once deployed, Files adds an File Analytics VM to the Files cluster. A single File Analytics VM supports all file servers in the cluster; however, you must enable File Analytics separately for each file server. Data on the File Analytics VM is protected, and is kept in a separate volume group.
Once you deploy File Analytics, a new File Analytics link appears on the file server actions bar. You can access File Analytics through this link for any file server where it is enabled.
The File Analytics web console consists of display features:
Main menu bar : The main menu bar appears at the top of every page of the File Analytics web console. The main menu bar includes the following display features:
Meet the following requirements prior to deploying File Analytics.
Ensure that you have performed the following tasks and your Files deployment meets the following specifications.
Open the required ports and ensure that your firewall allows bi-directional Internet Control Message Protocol (ICMP) traffic between the FAVM and CVMs.
The Port Reference provides detailed port information for Nutanix products and services, including port sources and destinations, service descriptions, directionality, and protocol requirements.
In addition to meeting the File Analytics network requirements, ensure to meet Nutanix Files port requirements as described in the Port Reference .
File Analytics has the following limitations.
Overview of administrative processes for File Analytics.
As an admin, you have the privileges to perform administrative tasks for File Analytics. To add a file server admin user, see Managing Roles in the Nutanix Files Guide . The topics in this chapter describe the basics for administering your File Analytics environment. For advanced administrative options, refer to the File Analytics Options chapter.
Follow this procedure to deploy the File Analytics server.
Steps for enabling File Analytics after deployment or disablement.
Follow these steps to enable File Analytics after disabling the application.
Follow the steps as indicated to disable File Analytics.
File Analytics is disabled on the server. Enable File Analytics to start collecting data again or Delete File Analytics Data.
Do the following to launch File Analytics.
To update an File Analytics VM (FAVM), refer to the sizing guidelines in the File Analytics release notes and follow the steps in the VM Management topic of the Prism Web Console Guide .
Remove a File Analytics VM (FAVM) by disabling it and deleting it from the cluster in Prism.
Follow the steps as indicated to update authentication credentials for LDAP or Active Directory.
Manage the audit data of delete shares and exports.
By default, File Analytics retains deleted share and export data. The dashboard widgets do not account for data of deleted shares and exports. The deleted marker appears adjacent to deleted shares and exports in audit trails. The Manage Share/Export Audit data window displays a list of deleted shares and exports.
Follow the directions as indicated to delete audit data for the deleted share or export.
Perform File Analytics upgrades using the Life Cycle Manager feature in Prism Element.
Before you upgrade File Analytics, ensure that you are running a compatible version of AOS and Files. Refer to File Analytics release notes for compatibility details. You can upgrade both AOS and Files through Prism Element, see AOS Upgrade in the Prism Web Console Guide .
To upgrade File Analytics, perform inventory and updates using the Life-Cycle Manager (LCM), see the Life Cycle Manager Guide for instructions on performing inventory and updates. LCM cannot upgrade File Analytics when the protection domain (PD) for the File Analytics VM (FAVM) includes any other entities.
During the upgrade process, File Analytics takes a snapshot of the volume group (VG) that contains File Analytics data. If issues occur during an upgrade, File Analytics restores the FAVM to the pre-upgrade state. If the volume group is protected and is part a protection domain, the File Analytics creates a snapshot and sets the expiry time to 30 days. If the volume group is not protected, File Analytics creates a snapshot and deletes the snapshot after completing the upgrade successfully. If any errors occur, the system keeps the snapshot for 30 days to troubleshoot the issue.
Upgrade File Analytics at a dark site using the Life-Cycle Manager (LCM).
The Dashboard tab displays data on the operational trends of a file server.
The Dashboard tab is the opening screen that appears after launching File Analytics from Prism. The dashboard displays widgets that present data on file trends, distribution, and operations.
Tile Name | Description | Intervals |
---|---|---|
Capacity Trend |
Displays capacity trends for the file server including capacity added, capacity
removed, and net changes.
Clicking an event period widget displays the Capacity Trend Details view. |
Seven days, the last 30 days, or the last 1 year. |
Data Age | Displays the percentage of data by age. | Less than 3 months, 3–6 months, 6–12 months, and > 12 months. |
Anomaly Alerts | Displays alerts for configured anomalies, see Configuring Anomaly Detection. | |
Permission Denials | Displays users who have had excessive permission denials and the number of denials. Clicking a user displays audit details, see Audit Trails - Users for more. | [user id], [number of permission denials] |
File Distribution by Size | Displays the number of files by file size. Provides trend details for top 5 files. | Less than 1 MB, 1–10 MB, 10–100 MB, 100 MB to 1 GB, greater than 1 GB). |
File Distribution by Type | Displays the space taken up by various applications and file types. The file type is determined by the file extension. See the File Types table for more details. | MB or GB |
File Distribution by Type Details view |
Displays a trend graph of the top 5 file types. File distribution details include
file type, current space used, current number of file, and change in space for the
last 7 or 30 days.
Clicking View Details displays the File Distribution by Type view. |
Daily size trend for top 5 files (GB), file type (see File Type table), current space used (GB), current number of files (numeric), change in last 7 or 30 days (GB). |
Top 5 active users | Lists the users who have accessed the most files and number of operations the user performed for the specified period. When there are more than 5 active users, the more link provides details on the top 50 users. Clicking the user name displays the audit view for the user, see Audit Trails - Users for more. | 24 hours, 7 days, 1 month, or 1 year. |
Top 5 accessed files |
Lists the 5 most frequently accessed files. Clicking
more
provides details on the top 50 files.
Clicking the file name displays the audit view details for the file, see Audit Trails - Files for more. |
Twenty-four hours, 7 days, 1 month, or 1 year. |
Files Operations |
Displays the distribution of operation types for the specified period including a
count for each operation type and the total sum of all operations.
Operations include: create, delete, read, write, rename, permission changed, set attribute, symlink, permission denied, permission denied (file blocking). Clicking an operation displays the File Operation Trend view. |
Twenty-four hours, 7 days, 1 month, or 1 year. |
Clicking an event period in the Capacity Trend widget displays the Capacity Trend Details view for that period. The view includes three tabs Share/Export , Folder , and Category . Each tab includes columns detailing entity details: Name . Net Capacity Change, Capacity Added, and Capacity Removed.
Category | Supported File Type |
---|---|
Name | Name of share/export, folder, or category. |
Net Capacity Change | The total difference between capacity at the beginning and the end of the specified period. |
Share Name (for folders only) | The name of the share or export that the folder belongs to. |
Capacity Added | Total added capacity for the specified period. |
Capacity Removed | Total removed capacity for the specified period. |
Clicking View Details for the File Distribution by Type widget displays granular details of file distribution, see the File Types table below for details.
Category | Supported File Type |
---|---|
File Type | Name of file type |
Current Space Used | Space capacity occupied by the file type |
Current Number of Files | Number of files for the file type |
Change (In Last 30 Days) | The increase in capacity over a 30 day period of time for the specified file type . |
Category | Supported File Type |
---|---|
Archives | .cab, .gz, .rar, .tar, .z, .zip |
Audio | .aiff, .au, .mp3, .mp4, .wav, .wma |
Backups | .bak, .bkf, .bkp |
CD/DVD Images | .img, .iso, .nrg |
Desktop Publishing | .qxd |
Email Archives | .pst |
Hard Drive images | .tib, .gho, .ghs |
Images | .bmp, .gif, .jpg, .jpeg, .pdf .png, .psd, .tif, .tiff, |
Installers | .msi, .rpm |
Log Files | .log |
Lotus Notes | .box, .ncf, .nsf, .ns2, .ns3, .ns4, .ntf |
MS Office Documents | .accdb, .accde, .accdt, .accdr, .doc, .docx, .docm, .dot, .dotx, .dotm, .xls, .xlsx, .xlsm, .xlt, .xltx, .xltm, .xlsb, .xlam, .ppt, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .mdb |
System Files | .bin, .dll, .exe |
Text Files | .csv, .pdf, .txt |
Video | .avi, mpg, .mpeg, .mov, .m4v |
Disk Image | .hlog, .nvram, .vmdk, .vmx, .vmxf, .vmtm, .vmem, .vmsn, .vmsd |
Clicking an operation type in the File Operations widget displays the File Operation Trend view. The File Operation Trend view breaks down the specified period into smaller intervals, and displays the number of occurrences of the operation during each interval.
Category | Description |
---|---|
Operation Type | A drop-down option to specify the operation type. See Files Operations in the Dashboard Widgets table for a list of operation types. |
Last (time period) | A drop-down option to specify the period for the file operation trend. |
File operation trend graph | The x-axis displays shorter intervals for the specified period. The y-axis displays the number of operations trend over the extent of the intervals. |
File Analytics uses the file category configuration to classify file extensions.
The capacity widget in the dashboard uses the category configuration to calculate capacity details.
The Health dashboard displays dynamically updated health information about each File File Analytics component.
The Health dashboard includes the following details:
Data panes in the Anomalies tab display data and trends for configured anomalies.
You can configure anomalies for the following operations:
Define anomaly rules by the specifying the following conditions:
Meeting the lower operation threshold triggers an anomaly.
Consider a scenario where you have 1 thousand files, the operation count threshold defined as 10, and the operation percentage threshold defined as 10%. The count threshold takes precedence, as 10% of 1 thousand is 100, which is greater than the count threshold of 10.
Pane Name | Description | Values |
---|---|---|
Anomaly Trend | Displays the number of anomalies per day or per month. | Last 7 days, Last 30 days, Last 1 year |
Top Users | Displays the users with the most anomalies and the number of anomalies per user. | Last 7 days, Last 30 days, Last 1 year |
Top Folders | Displays the folders with the most anomalies and the number of anomalies per folder. | Last 7 days, Last 30 days, Last 1 year |
Operation Anomaly Types | Displays the percentage of occurrences per anomaly type. | Last 7 days, Last 30 days, Last 1 year |
Clicking an anomaly bar in the Anomaly Trend graph displays the Anomaly Details view.
Column | Description |
---|---|
Anomaly Type | The configured anomaly type. Anomaly types not configured do not show up in the table. |
Total User Count | The number of users that have performed the operation causing the specified anomaly during the specified time range. |
Total Folder Count | The numbers of folders in which the anomaly occurred during the specified time range. |
Total Operation Count | Total number of anomalies for the specified anomaly type that occurred during the specified time range. |
Time Range | The time range for which the total user count, total folder count, and total operation count are specified. |
Column | Description |
---|---|
Username or Folders | Indicates the entity for the operation count. Selecting the Users tab indicates operation count for specific users, and selecting the Folders tab indicates the operation count for specific folders. |
Operation count | The total number of operations causing anomalies for the selected user or folder during the time period for the bar in the Anomaly Trend graph. |
Steps for configuring anomaly rules.
Configure an SMTP server for File Analytics to send anomaly alerts, see Configuring an SMTP Server. To create an anomaly rule, do the following.
File Analytics uses a simple mail transport protocol (SMTP) server to send anomaly alerts.
Use audit trails to look up operation data for a specific user, file, folder, or client.
The Audit Trails tab includes Files , Folders , Users , and Client IP options for specifying the audit type. Use the search bar for specifying the specific entity for the audit (user, folder, file, or client IP).
The results table presents details for entities that match the search criteria. Clicking the entity name (or client IP number) takes you to the Audit Trails dashboard for the target entity.
Audit a user, file, client, or folder.
Details for client IP Audit Trails.
When you search by user in the Audit Trails tab, search results display the following information in a table.
Clicking View Audit displays the Audit Details page, which shows the following audit information for the selected user.
The Results table provides granular details of the audit results. The following data is displayed for every event.
Click the gear icon for options to download the data as an xls, csv, or JSON file.
Dashboard details for folder audits.
The following information displays when you search by file in the Audit Trails tab.
The Audit Details page shows the following audit information for the selected folder.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for options to download the data as a CSV file.
Dashboards details for file audit.
When you search by file in the Audit Trails tab, the following information displays:
The Audit Details page shows the following audit information for the selected file.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for options to download the data as a CSV file.
Dashboard details for client IP Audit Trails.
When you search by client IP in the Audit Trails tab, search results display the following information in a table.
The Audit Details page shows the following audit information for the selected client.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for an option to download the data as a CSV file.
You can get more insight into the usage and contents of files on your system by configuring and updating File Analytics features and settings. Some options include scanning the files on your file server on demand, updating data retention, and configuring data protection.
The data retention period determines how long File Analytics retains event data.
Follow the steps as indicated to configure data retention.
Once enabled, File Analytics scans the metadata of all files and shares on the system. You can perform an on-demand scan of shares in your file system.
Blacklist users, file extensions, and client IPs.
Configure File Analytics disaster recovery (DR) using Prism Element.
File Analytics only supports async disaster recovery. File Analytics does not support NearSync and metro availability.
Create an async protection domain, configure a protection domain schedule, and configure remote site mapping. The remote site must have symmetric configurations to the primary site. The remote site must also deploy File Analytics to restore a File Analytics VM (FAVM).
The Data Protection section in the Prism Web Console Guide provides more detail on the disaster recovery process.
To set up disaster recovery for File Analytics, create an async protection domain, configure a protection domain schedule, and configure remote site mapping.
By default, the File Analytics volume group resides on the same container that hosts vDisks for Nutanix Files.
Recover a File Analytics VM (FAVM) after a planned or unplanned migration to the remote site.
Perform the following tasks on the remote site.
Deploy a File Analytics VM (FAVM) after a planned or unplanned (disaster) migration to the remote site.
To perform disaster recovery, deploy and enable File Analytics on the remote site. Restore the data using a snapshot of the volume group from the primary FAVM.
nutanix@favm$ sudo blkid
nutanix@favm$ cd /mnt/containers/config/common_config/
nutnix@avm$ sudo cp cvm.config /tmp
nutanix@favm$ sudo systemctl stop monitoring
nutanix@favm$ docker stop $(docker ps -q)
nutanix@favm$ sudo systemctl stop docker
nutnix@avm$ sudo umount /mnt
nutnix@avm$ sudo /sbin/iscsiadm -m node -u
nutanix@favm$ sudo /sbin/iscsiadm -m node –o delete
nutanix@favm$ sudo blkid
/dev/sr0: UUID="2019-06-11-12-18-52-00" LABEL="cidata" TYPE="iso9660" /dev/sda1: LABEL="_master-x86_64-2" UUID="b1fb6e26-a782-4cf7-b5de-32941cc92722" TYPE="ext4"The output does not show the /dev/sdb device.
nutanix@favm$ sudo cat /etc/iscsi/initiatorname.iscsi
InitiatorName=iqn.1991-05.com.redhat:8ef967b5b8f
nutanix@favm$ sudo /sbin/iscsiadm --mode discovery --type sendtargets --portal data_services_IP_address:3260
Clicking
the Nutanix cluster name in Prism displays cluster details including the
data service IP address. The output displays the restored iSCSI target
from step 2.
nutanix@favm$ sudo /sbin/iscsiadm --mode node --targetname iqn_name --portal data_services_IP_address:3260,1 --login
nutanix@favm$ sudo reboot
nutanix@favm$ sudo blkid
/dev/sr0: UUID="2019-06-11-12-18-52-00" LABEL="cidata" TYPE="iso9660" /dev/sda1: LABEL="_master-x86_64-2" UUID="b1fb6e26-a782-4cf7-b5de-32941cc92722" TYPE="ext4" /dev/sdb: UUID="30749ab7-58e7-437e-9a09-5f6d9619e85b" TYPE="ext4"
nutanix@favm$ cd /mnt/containers/config/common_config/
nutanix@favm$ mv cvm.config cvm_bck.config
nutanix@favm$ cd /tmp
nutanix@favm$ mv cvm.config /mnt/containers/config/common_config/
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --local_update
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --prism_user=admin --prism_password='Prism admin password'
Product Release Date: 2022-04-05
Last updated: 2022-11-04
File Analytics provides data and statistics on the operations and contents of a file server.
Once deployed, Nutanix Files adds a File Analytics VM (FAVM) to the Files cluster. A single File Analytics VM supports all file servers in the cluster; however, you must enable File Analytics separately for each file server. File Analytics protects data on the FAVM, which is kept in a separate volume group.
The File Analytics web console consists of display features:
Main menu bar : The main menu bar appears at the top of every page of the File Analytics web console. The main menu bar includes the following display features:
Meet the following requirements prior to deploying File Analytics.
Ensure that you have performed the following tasks and your Files deployment meets the following specifications.
Open the required ports, and ensure that your firewall allows bi-directional Internet Control Message Protocol (ICMP) traffic between the FAVM and CVMs.
The Port Reference provides detailed port information for Nutanix products and services, including port sources and destinations, service descriptions, directionality, and protocol requirements.
In addition to meeting the File Analytics network requirements, ensure to meet Nutanix Files port requirements as described in the Port Reference .
File Analytics has the following limitations.
Overview of administrative processes for File Analytics.
As an admin, you have the required permissions for performing File Analytics administrative tasks. To add a file server admin user, see Managing Roles in the Nutanix Files Guide . The topics in this chapter describe the basics for administering your File Analytics environment. For advanced administrative options, refer to the File Analytics Options chapter.
Prism Element supports role-based access control (RBAC) that allows you to configure and provide customized access to the users based on their assigned roles.
From the Prism Element dashboard, you can assign a set of predefined built-in roles (system roles) roles to users or user groups. File Analytics support the following built-in roles (system roles) that are defined by default:
Follow this procedure to deploy the File Analytics server.
Steps for enabling File Analytics after deployment or disablement.
Follow these steps to enable File Analytics after disabling the application.
Follow the steps as indicated to disable File Analytics.
File Analytics is disabled on the server. Enable File Analytics to start collecting data again or Delete File Analytics Data.
Do the following to launch File Analytics.
To update a File Analytics VM (FAVM), refer to the sizing guidelines in the File Analytics release notes and follow the steps in the VM Management topic of the Prism Web Console Guide .
Remove a File Analytics VM (FAVM) by disabling it and deleting it from the cluster in Prism.
Follow the steps as indicated to update authentication credentials for LDAP or Active Directory.
Manage the audit data of delete shares and exports.
By default, File Analytics retains deleted share and export data. The dashboard widgets do not account for data of deleted shares and exports. The deleted marker appears next to deleted shares and exports in audit trails. The Manage Share/Export Audit data window displays a list of deleted shares and exports.
Follow the directions as indicated to delete audit data for the deleted share or export.
Steps for updating the password of a File Analytics VM (FAVM).
Context for the current task
nutanix@fsvm$ sudo passwd nutanix
Changing password for user nutanix.
Old Password:
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
The password must meet the following complexity requirements:
Perform File Analytics upgrades using the Life Cycle Manager feature in Prism Element.
Before you proceed with the FA upgrade, ensure you meet the following:
Refer to File Analytics release notes for compatibility details. You can upgrade both AOS and Files through Prism Element, see AOS Upgrade in the Prism Web Console Guide .
To upgrade File Analytics, perform inventory and updates using the Life-Cycle Manager (LCM), see the Life Cycle Manager Guide for instructions on performing inventory and updates.
During the upgrade process, File Analytics takes a snapshot of the volume group (VG) that contains File Analytics data. If issues occur during an upgrade, File Analytics restores the FAVM to the pre-upgrade state. If the volume group is protected and is part a protection domain, the File Analytics creates a snapshot and sets the expiry time to 30 days. If the volume group is not protected, File Analytics creates a snapshot and deletes the snapshot after completing the upgrade successfully. If any errors occur, the system keeps the snapshot for 30 days to troubleshoot the issue.
Upgrade File Analytics at a dark site using the Life-Cycle Manager (LCM).
The Dashboard tab displays data on the operational trends of a file server.
The Dashboard tab is the opening screen that appears after launching File Analytics for a specific file server. The dashboard displays widgets that present data on file trends, distribution, and operations.
Tile Name | Description | Intervals |
---|---|---|
Capacity trend |
Displays capacity trends for the file server including capacity added, capacity
removed, and net changes.
Clicking an event period widget displays the Capacity Trend Details view. |
7 days, the last 30 days, or the last 1 year. |
Data age | Displays the percentage of data by age. Data age determines the data heat, including: hot, warm, and cold. |
Default intervals are as follows:
|
Permission denials | Displays users who have had excessive permission denials and the number of denials. Clicking a user displays audit details, see Audit Trails - Users for more. | [user id], [number of permission denials] |
File distribution by size | Displays the number of files by file size. Provides trend details for top 5 files. | Less than 1 MB, 1–10 MB, 10–100 MB, 100 MB to 1 GB, greater than 1 GB). |
File distribution by type | Displays the space taken up by various applications and file types. The file extension determines the file type. See the File types table for more details. | MB or GB |
File distribution by type details view |
Displays a trend graph of the top 5 file types. File distribution details include
file type, current space used, current number of files, and change in space for the
last 7 or 30 days.
Clicking View Details displays the File Distribution by Type view. |
Daily size trend for top 5 files (GB), file type (see the "File Type" table), current space used (GB), current number of files (numeric), change in last 7 or 30 days (GB). |
Top 5 active users | Lists the users who have accessed the most files and number of operations the user performed for the specified period. When there are more than 5 active users, the more link provides details on the top 50 users. Clicking the user name displays the audit view for the user, see Audit Trails - Users for more. | 24 hours, 7 days, 1 month, or 1 year. |
Top 5 accessed files |
Lists the 5 most frequently accessed files. Clicking
more
provides details on the top 50 files.
Clicking the file name displays the audit view details for the file, see Audit Trails - Files for more. |
24 hours, 7 days, 1 month, or 1 year. |
Files operations |
Displays the distribution of operation types for the specified period, including
a count for each operation type and the total sum of all operations.
Operations include: create, delete, read, write, rename, permission changed, set attribute, symlink, permission denied, permission denied (file blocking). Clicking an operation displays the File Operation Trend view. |
24 hours, 7 days, 1 month, or 1 year. |
Clicking an event period in the Capacity Trend widget displays the Capacity Trend Details view for that period. The view includes three tabs Share/Export , Folder , and Category . Each tab includes columns detailing entity details: Name . Net capacity change, capacity added, and capacity removed.
Category | Supported File Type |
---|---|
Name | Name of share/export, folder, or category. |
Net capacity change | The total difference between capacity at the beginning and the end of the specified period. |
Share name (for folders only) | The name of the share or export that the folder belongs to. |
Capacity added | Total added capacity for the specified period. |
Capacity removed | Total removed capacity for the specified period. |
Clicking View Details for the File Distribution by Type widget displays granular details of file distribution, see the File Types table for details.
Category | Supported File Type |
---|---|
File type | Name of file type |
Current space used | Space capacity occupied by the file type |
Current number of files | Number of files for the file type |
Change (in last 30 days) | The increase in capacity over a 30-day period for the specified file type |
Category | Supported File Type |
---|---|
Archives | .cab, .gz, .rar, .tar, .z, .zip |
Audio | .aiff, .au, .mp3, .mp4, .wav, .wma |
Backups | .bak, .bkf, .bkp |
CD/DVD images | .img, .iso, .nrg |
Desktop publishing | .qxd |
Email archives | .pst |
Hard drive images | .tib, .gho, .ghs |
Images | .bmp, .gif, .jpg, .jpeg, .pdf .png, .psd, .tif, .tiff, |
Installers | .msi, .rpm |
Log Files | .log |
Lotus notes | .box, .ncf, .nsf, .ns2, .ns3, .ns4, .ntf |
MS Office documents | .accdb, .accde, .accdt, .accdr, .doc, .docx, .docm, .dot, .dotx, .dotm, .xls, .xlsx, .xlsm, .xlt, .xltx, .xltm, .xlsb, .xlam, .ppt, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .mdb |
System files | .bin, .dll, .exe |
Text files | .csv, .pdf, .txt |
Video | .avi, mpg, .mpeg, .mov, .m4v |
Disk image | .hlog, .nvram, .vmdk, .vmx, .vmxf, .vmtm, .vmem, .vmsn, .vmsd |
Clicking an operation type in the File Operations widget displays the File Operation Trend view. The File Operation Trend view breaks down the specified period into smaller intervals, and displays the number of occurrences of the operation during each interval.
Category | Description |
---|---|
Operation type | A drop-down option to specify the operation type. See Files Operations in the Dashboard Widgets table for a list of operation types. |
Last (time period) | A drop-down option to specify the period for the file operation trend. |
File operation trend graph | The x-axis displays shorter intervals for the specified period. The y-axis displays the number of operations trend over the extent of the intervals. |
The Health dashboard displays dynamically updated health information about each file server component.
The Health dashboard includes the following details:
The Data Age widget in the dashboard provides details on data heat.
Share-level data is displayed to provide details on share capacity trends. There are three levels of data heat:
You can configure the definitions for each level of data heat rather than using the default values. See Configuring Data Heat Levels.
Update the values that constitute different data heat levels.
Data panes in the Anomalies tab display data and trends for configured anomalies.
The Anomalies tab provides options for creating anomaly policies and displays dashboards for viewing anomaly trends.
You can configure anomalies for the following operations:
Define anomaly rules by the specifying the following conditions:
Meeting the lower operation threshold triggers an anomaly.
Consider a scenario where you have 1 thousand files, the operation count threshold defined as 10, and the operation percentage threshold defined as 10%. The count threshold takes precedence, as 10% of 1 thousand is 100, which is greater than the count threshold of 10.
Pane Name | Description | Values |
---|---|---|
Anomaly Trend | Displays the number of anomalies per day or per month. | Last 7 days, Last 30 days, Last 1 year |
Top Users | Displays the users with the most anomalies and the number of anomalies per user. | Last 7 days, Last 30 days, Last 1 year |
Top Folders | Displays the folders with the most anomalies and the number of anomalies per folder. | Last 7 days, Last 30 days, Last 1 year |
Operation Anomaly Types | Displays the percentage of occurrences per anomaly type. | Last 7 days, Last 30 days, Last 1 year |
Clicking an anomaly bar in the Anomaly Trend graph displays the Anomaly Details view.
Column | Description |
---|---|
Anomaly Type | The configured anomaly type. Anomaly types not configured do not show up in the table. |
Total User Count | The number of users that have performed the operation causing the specified anomaly during the specified time range. |
Total Folder Count | The numbers of folders in which the anomaly occurred during the specified time range. |
Total Operation Count | Total number of anomalies for the specified anomaly type that occurred during the specified time range. |
Time Range | The time range for which the total user count, total folder count, and total operation count are specified. |
Column | Description |
---|---|
Username or Folders | Indicates the entity for the operation count. Selecting the Users tab indicates operation count for specific users, and selecting the Folders tab indicates the operation count for specific folders. |
Operation count | The total number of operations causing anomalies for the selected user or folder during the time period for the bar in the Anomaly Trend graph. |
Steps for configuring anomaly rules.
To create an anomaly rule, do the following.
File Analytics uses a simple mail transport protocol (SMTP) server to send anomaly alerts.
Use audit trails to look up operation data for a specific user, file, folder, or client.
The Audit Trails tab includes Files , Folders , Users , and Client IP options for specifying the audit type. Use the search bar for specifying the specific entity for the audit (user, folder, file, or client IP).
The results table presents details for entities that match the search criteria. Clicking the entity name (or client IP number) takes you to the Audit Trails dashboard for the target entity.
Audit a user, file, client, or folder.
Details for client IP Audit Trails.
When you search by user in the Audit Trails tab, search results display the following information in a table.
Clicking View Audit displays the Audit Details page, which shows the following audit information for the selected user.
The Results table provides granular details of the audit results. The following data is displayed for every event.
Click the gear icon for options to download the data as an xls, csv, or JSON file.
Dashboard details for folder audits.
The following information displays when you search by file in the Audit Trails tab.
The Audit Details page shows the following audit information for the selected folder.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for options to download the data as a CSV file.
Dashboards details for file audit.
When you search by file in the Audit Trails tab, the following information displays:
The Audit Details page shows the following audit information for the selected file.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for options to download the data as a CSV file.
Dashboard details for client IP Audit Trails.
When you search by client IP in the Audit Trails tab, search results display the following information in a table.
The Audit Details page shows the following audit information for the selected client.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for an option to download the data as a CSV file.
Ransomware protection for your file server.
File Analytics scans files for ransomware in real time and notifies you in the event of a ransomware attack once you configure email notifications.
Using a curated a list of over 250 signatures that frequently appear in ransomware files, the Nutanix Files file blocking mechanism identifies and blocks files with ransomware extensions from carrying out malicious operations. You can modify the list by manually adding or removing signatures.
File Analytics also monitors shares for self-service restore (SSR) policies and identifies shares that do not have SSR enabled in the ransomware dashboard. You can enable SSR through the ransomware dashboard.
The ransomware dashboard includes panes for managing ransomware protection and self-service restore (SSR).
The ransomware dashboard includes two main sections:
Enable ransomware protection on your file server.
Configure ransomware protection on file servers.
Do the following to add signature to the blocked extension list.
Enable self-service restore on shares identified by File Analytics.
File Analytics scans shares for SSR policies.
Generate a report for entities on the file server.
Create a report with custom attribute values or use one of the File Analytics pre-canned report templates. To create a custom report, specify the entity, attributes (and operators for some attributes), attribute values, column headings, and the number of columns. Pre-canned reports define most of the attributes and headings based on the entity and template that you choose.
The Reports dashboard displays a table or previously generated reports. You can rerun existing reports rather than creating a template. After creating a report, you can download it as a JSON or CSV file.
The reports dashboard includes options to create, view, and download reports.
The Reports dashboard includes options to create a report, download reports as a JSON, download reports as a CSV, rerun reports, and delete reports.
The reports table includes columns for the report name, status, last run, and actions.
Clicking Create a new report takes you to the report creation screen, which includes a Report builder and a Pre-canned Reports Templates tabs. The tabs include report options and filters for report configuration.
Both tabs include the following elements:
Entity | Attributes (filters) | Operator | Value | Column |
---|---|---|---|---|
Events | event_date |
|
(date) |
|
Event_operation | N/A |
|
||
Files | Category |
|
(date) |
|
Extensions | N/A | (type in value) | ||
Deleted | N/A | Last (number of days from 1 to 30) days | ||
creation_date |
|
(date) | ||
access_date |
|
(date) | ||
Size |
|
(number) (file size)
File size options:
|
||
Folders | Deleted | N/A | Last (number of days from 1 to 30) days |
|
creation_date |
|
(date) | ||
Users | last_event_date |
|
(date) |
|
Entity | Pre-canned report template | Columns |
---|---|---|
Events |
|
|
Files |
|
|
Users |
|
|
Create a custom report by defining the entity, attribute, filters, and columns.
Use one of the pre-canned File Analytics templates for your report.
You can get more insight into the usage and contents of files on your system by configuring and updating File Analytics features and settings. Some options include scanning the files on your file server on demand, updating data retention, and configuring data protection.
The data retention period determines how long File Analytics retains event data.
Follow the steps as indicated to configure data retention.
Once enabled, File Analytics scans the metadata of all files and shares on the system. You can perform an on-demand scan of shares in your file system.
Deny users, file extensions, and client IP addresses.
File Analytics uses the file category configuration to classify file extensions.
The capacity widget in the dashboard uses the category configuration to calculate capacity details.
Configure File Analytics disaster recovery (DR) using Prism Element.
File Analytics only supports async disaster recovery. File Analytics does not support NearSync and metro availability.
Create an async protection domain, configure a protection domain schedule, and configure remote site mapping. The remote site must have symmetric configurations to the primary site. The remote site must also deploy File Analytics to restore a File Analytics VM (FAVM).
The Data Protection section in the Prism Web Console Guide provides more detail on the disaster recovery process.
To set up disaster recovery for File Analytics, create an async protection domain, configure a protection domain schedule, and configure remote site mapping.
By default, the File Analytics volume group resides on the same container that hosts vDisks for Nutanix Files.
Recover a File Analytics VM (FAVM) after a planned or unplanned migration to the remote site.
Perform the following tasks on the remote site.
Deploy a File Analytics VM (FAVM) after a planned or unplanned (disaster) migration to the remote site.
To perform disaster recovery, deploy and enable File Analytics on the remote site. Restore the data using a snapshot of the volume group from the primary FAVM.
nutanix@favm$ sudo blkid
nutanix@favm$ cd /mnt/containers/config/common_config /tmp
nutanix@favm$ sudo systemctl stop monitoring
nutanix@favm$ docker stop $(docker ps -q)
nutanix@favm$ sudo systemctl stop docker
nutnix@avm$ sudo umount /mnt
nutanix@avm$ sudo reboot
nutanix@favm$ sudo blkid
/dev/sr0: UUID="2019-06-11-12-18-52-00" LABEL="cidata" TYPE="iso9660" /dev/sda1: LABEL="_master-x86_64-2" UUID="b1fb6e26-a782-4cf7-b5de-32941cc92722" TYPE="ext4"The FAVM discovers the attached volume group and assigns to the /dev/sdb device.
nutanix@favm$ mv /mnt/containers/config/common_config/cvm.config \
/mnt/containers/config/common_config/cvm_bck.config
nutanix@favm$ mv /tmp/cvm.config /mnt/containers/config/common_config/
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --local_update
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --prism_user=admin --prism_password='Prism admin password'
Deploy a File Analytics VM (FAVM) after a planned or unplanned (disaster) migration to the remote site.
To perform disaster recovery, deploy and enable File Analytics on the remote site. Restore the data using a snapshot of the volume group from the primary FAVM.
nutanix@favm$ sudo blkid
nutanix@favm$ cd /mnt/containers/config/common_config/ /tmp
nutanix@favm$ sudo systemctl stop monitoring
nutanix@favm$ docker stop $(docker ps -q)
nutanix@favm$ sudo systemctl stop docker
nutnix@avm$ sudo umount /mnt
nutnix@avm$ sudo /sbin/iscsiadm -m node -u
nutanix@favm$ sudo /sbin/iscsiadm -m node –o delete
nutanix@favm$ sudo blkid
/dev/sr0: UUID="2019-06-11-12-18-52-00" LABEL="cidata" TYPE="iso9660" /dev/sda1: LABEL="_master-x86_64-2" UUID="b1fb6e26-a782-4cf7-b5de-32941cc92722" TYPE="ext4"The output does not show the /dev/sdb device.
nutanix@favm$ sudo cat /etc/iscsi/initiatorname.iscsi
InitiatorName=iqn.1991-05.com.redhat:8ef967b5b8f
nutanix@favm$ sudo /sbin/iscsiadm --mode discovery --type sendtargets --portal data_services_IP_address:3260
Clicking
the Nutanix cluster name in Prism displays cluster details including the
data service IP address. The output displays the restored iSCSI target
from step 2.
nutanix@favm$ sudo /sbin/iscsiadm --mode node --targetname iqn_name --portal data_services_IP_address:3260,1 --login
nutanix@favm$ sudo reboot
nutanix@favm$ sudo blkid
/dev/sr0: UUID="2019-06-11-12-18-52-00" LABEL="cidata" TYPE="iso9660" /dev/sda1: LABEL="_master-x86_64-2" UUID="b1fb6e26-a782-4cf7-b5de-32941cc92722" TYPE="ext4" /dev/sdb: UUID="30749ab7-58e7-437e-9a09-5f6d9619e85b" TYPE="ext4"
nutanix@favm$ mv /mnt/containers/config/common_config/cvm.config \
/mnt/containers/config/common_config/cvm_bck.config
nutanix@favm$ mv /tmp/cvm.config /mnt/containers/config/common_config/
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --local_update
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --prism_user=admin --prism_password='Prism admin password'
Product Release Date: 2022-09-07
Last updated: 2022-11-04
File Analytics provides data and statistics on the operations and contents of a file server.
Once deployed, Nutanix Files adds a File Analytics VM (FAVM) to the Files cluster. A single File Analytics VM supports all file servers in the cluster; however, you must enable File Analytics separately for each file server. File Analytics protects data on the FAVM, which is kept in a separate volume group.
The File Analytics web console consists of display features:
Main menu bar : The main menu bar appears at the top of every page of the File Analytics web console. The main menu bar includes the following display features:
Meet the following requirements prior to deploying File Analytics.
Ensure that you have performed the following tasks and your Files deployment meets the following specifications.
Open the required ports, and ensure that your firewall allows bi-directional Internet Control Message Protocol (ICMP) traffic between the FAVM and CVMs.
The Port Reference provides detailed port information for Nutanix products and services, including port sources and destinations, service descriptions, directionality, and protocol requirements.
In addition to meeting the File Analytics network requirements, ensure to meet Nutanix Files port requirements as described in the Port Reference .
File Analytics has the following limitations.
Overview of administrative processes for File Analytics.
As an admin, you have the required permissions for performing File Analytics administrative tasks. To add a file server admin user, see Managing Roles in the Nutanix Files Guide . The topics in this chapter describe the basics for administering your File Analytics environment. For advanced administrative options, refer to the File Analytics Options chapter.
Prism Element supports role-based access control (RBAC) that allows you to configure and provide customized access to the users based on their assigned roles.
From the Prism Element dashboard, you can assign a set of predefined built-in roles (system roles) roles to users or user groups. File Analytics support the following built-in roles (system roles) that are defined by default:
Follow this procedure to deploy the File Analytics server.
Steps for enabling File Analytics after deployment or disablement.
Follow these steps to enable File Analytics after disabling the application.
Follow the steps as indicated to disable File Analytics.
File Analytics is disabled on the server. Enable File Analytics to start collecting data again or Delete File Analytics Data.
Do the following to launch File Analytics.
To update a File Analytics VM (FAVM), refer to the sizing guidelines in the File Analytics release notes and follow the steps in the VM Management topic of the Prism Web Console Guide .
Remove a File Analytics VM (FAVM) by disabling it and deleting it from the cluster in Prism.
Follow the steps as indicated to update authentication credentials for LDAP or Active Directory.
Manage the audit data of delete shares and exports.
By default, File Analytics retains deleted share and export data. The dashboard widgets do not account for data of deleted shares and exports. The deleted marker appears next to deleted shares and exports in audit trails. The Manage Share/Export Audit data window displays a list of deleted shares and exports.
Follow the directions as indicated to delete audit data for the deleted share or export.
Steps for updating the password of a File Analytics VM (FAVM).
Context for the current task
nutanix@fsvm$ sudo passwd nutanix
Changing password for user nutanix.
Old Password:
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
The password must meet the following complexity requirements:
Perform File Analytics upgrades using the Life Cycle Manager feature in Prism Element.
Before you proceed with the FA upgrade, ensure you meet the following:
Refer to File Analytics release notes for compatibility details. You can upgrade both AOS and Files through Prism Element, see AOS Upgrade in the Prism Web Console Guide .
To upgrade File Analytics, perform inventory and updates using the Life-Cycle Manager (LCM), see the Life Cycle Manager Guide for instructions on performing inventory and updates.
During the upgrade process, File Analytics takes a snapshot of the volume group (VG) that contains File Analytics data. If issues occur during an upgrade, File Analytics restores the FAVM to the pre-upgrade state. If the volume group is protected and is part a protection domain, the File Analytics creates a snapshot and sets the expiry time to 30 days. If the volume group is not protected, File Analytics creates a snapshot and deletes the snapshot after completing the upgrade successfully. If any errors occur, the system keeps the snapshot for 30 days to troubleshoot the issue.
Upgrade File Analytics at a dark site using the Life-Cycle Manager (LCM).
The Dashboard tab displays data on the operational trends of a file server.
The Dashboard tab is the opening screen that appears after launching File Analytics for a specific file server. The dashboard displays widgets that present data on file trends, distribution, and operations.
Tile Name | Description | Intervals |
---|---|---|
Capacity trend |
Displays capacity trends for the file server including capacity added, capacity
removed, and net changes.
Clicking an event period widget displays the Capacity Trend Details view. |
7 days, the last 30 days, or the last 1 year. |
Data age | Displays the percentage of data by age. Data age determines the data heat, including: hot, warm, and cold. |
Default intervals are as follows:
|
Permission denials | Displays users who have had excessive permission denials and the number of denials. Clicking a user displays audit details, see Audit Trails - Users for more. | [user id], [number of permission denials] |
File distribution by size | Displays the number of files by file size. Provides trend details for top 5 files. | Less than 1 MB, 1–10 MB, 10–100 MB, 100 MB to 1 GB, greater than 1 GB). |
File distribution by type | Displays the space taken up by various applications and file types. The file extension determines the file type. See the File types table for more details. | MB or GB |
File distribution by type details view |
Displays a trend graph of the top 5 file types. File distribution details include
file type, current space used, current number of files, and change in space for the
last 7 or 30 days.
Clicking View Details displays the File Distribution by Type view. |
Daily size trend for top 5 files (GB), file type (see the "File Type" table), current space used (GB), current number of files (numeric), change in last 7 or 30 days (GB). |
Top 5 active users | Lists the users who have accessed the most files and number of operations the user performed for the specified period. When there are more than 5 active users, the more link provides details on the top 50 users. Clicking the user name displays the audit view for the user, see Audit Trails - Users for more. | 24 hours, 7 days, 1 month, or 1 year. |
Top 5 accessed files |
Lists the 5 most frequently accessed files. Clicking
more
provides details on the top 50 files.
Clicking the file name displays the audit view details for the file, see Audit Trails - Files for more. |
24 hours, 7 days, 1 month, or 1 year. |
Files operations |
Displays the distribution of operation types for the specified period, including
a count for each operation type and the total sum of all operations.
Operations include: create, delete, read, write, rename, permission changed, set attribute, symlink, permission denied, permission denied (file blocking). Clicking an operation displays the File Operation Trend view. |
24 hours, 7 days, 1 month, or 1 year. |
Clicking an event period in the Capacity Trend widget displays the Capacity Trend Details view for that period. The view includes three tabs Share/Export , Folder , and Category . Each tab includes columns detailing entity details: Name . Net capacity change, capacity added, and capacity removed.
Category | Supported File Type |
---|---|
Name | Name of share/export, folder, or category. |
Net capacity change | The total difference between capacity at the beginning and the end of the specified period. |
Share name (for folders only) | The name of the share or export that the folder belongs to. |
Capacity added | Total added capacity for the specified period. |
Capacity removed | Total removed capacity for the specified period. |
Clicking View Details for the File Distribution by Type widget displays granular details of file distribution, see the File Types table for details.
Category | Supported File Type |
---|---|
File type | Name of file type |
Current space used | Space capacity occupied by the file type |
Current number of files | Number of files for the file type |
Change (in last 30 days) | The increase in capacity over a 30-day period for the specified file type |
Category | Supported File Type |
---|---|
Archives | .cab, .gz, .rar, .tar, .z, .zip |
Audio | .aiff, .au, .mp3, .mp4, .wav, .wma |
Backups | .bak, .bkf, .bkp |
CD/DVD images | .img, .iso, .nrg |
Desktop publishing | .qxd |
Email archives | .pst |
Hard drive images | .tib, .gho, .ghs |
Images | .bmp, .gif, .jpg, .jpeg, .pdf .png, .psd, .tif, .tiff, |
Installers | .msi, .rpm |
Log Files | .log |
Lotus notes | .box, .ncf, .nsf, .ns2, .ns3, .ns4, .ntf |
MS Office documents | .accdb, .accde, .accdt, .accdr, .doc, .docx, .docm, .dot, .dotx, .dotm, .xls, .xlsx, .xlsm, .xlt, .xltx, .xltm, .xlsb, .xlam, .ppt, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .mdb |
System files | .bin, .dll, .exe |
Text files | .csv, .pdf, .txt |
Video | .avi, mpg, .mpeg, .mov, .m4v |
Disk image | .hlog, .nvram, .vmdk, .vmx, .vmxf, .vmtm, .vmem, .vmsn, .vmsd |
Clicking an operation type in the File Operations widget displays the File Operation Trend view. The File Operation Trend view breaks down the specified period into smaller intervals, and displays the number of occurrences of the operation during each interval.
Category | Description |
---|---|
Operation type | A drop-down option to specify the operation type. See Files Operations in the Dashboard Widgets table for a list of operation types. |
Last (time period) | A drop-down option to specify the period for the file operation trend. |
File operation trend graph | The x-axis displays shorter intervals for the specified period. The y-axis displays the number of operations trend over the extent of the intervals. |
The Health dashboard displays dynamically updated health information about each file server component.
The Health dashboard includes the following details:
The Data Age widget in the dashboard provides details on data heat.
Share-level data is displayed to provide details on share capacity trends. There are three levels of data heat:
You can configure the definitions for each level of data heat rather than using the default values. See Configuring Data Heat Levels.
Update the values that constitute different data heat levels.
Data panes in the Anomalies tab display data and trends for configured anomalies.
The Anomalies tab provides options for creating anomaly policies and displays dashboards for viewing anomaly trends.
You can configure anomalies for the following operations:
Define anomaly rules by the specifying the following conditions:
Meeting the lower operation threshold triggers an anomaly.
Consider a scenario where you have 1 thousand files, the operation count threshold defined as 10, and the operation percentage threshold defined as 10%. The count threshold takes precedence, as 10% of 1 thousand is 100, which is greater than the count threshold of 10.
Pane Name | Description | Values |
---|---|---|
Anomaly Trend | Displays the number of anomalies per day or per month. | Last 7 days, Last 30 days, Last 1 year |
Top Users | Displays the users with the most anomalies and the number of anomalies per user. | Last 7 days, Last 30 days, Last 1 year |
Top Folders | Displays the folders with the most anomalies and the number of anomalies per folder. | Last 7 days, Last 30 days, Last 1 year |
Operation Anomaly Types | Displays the percentage of occurrences per anomaly type. | Last 7 days, Last 30 days, Last 1 year |
Clicking an anomaly bar in the Anomaly Trend graph displays the Anomaly Details view.
Column | Description |
---|---|
Anomaly Type | The configured anomaly type. Anomaly types not configured do not show up in the table. |
Total User Count | The number of users that have performed the operation causing the specified anomaly during the specified time range. |
Total Folder Count | The numbers of folders in which the anomaly occurred during the specified time range. |
Total Operation Count | Total number of anomalies for the specified anomaly type that occurred during the specified time range. |
Time Range | The time range for which the total user count, total folder count, and total operation count are specified. |
Column | Description |
---|---|
Username or Folders | Indicates the entity for the operation count. Selecting the Users tab indicates operation count for specific users, and selecting the Folders tab indicates the operation count for specific folders. |
Operation count | The total number of operations causing anomalies for the selected user or folder during the time period for the bar in the Anomaly Trend graph. |
Steps for configuring anomaly rules.
To create an anomaly rule, do the following.
File Analytics uses a simple mail transport protocol (SMTP) server to send anomaly alerts.
Use audit trails to look up operation data for a specific user, file, folder, or client.
The Audit Trails tab includes Files , Folders , Users , and Client IP options for specifying the audit type. Use the search bar for specifying the specific entity for the audit (user, folder, file, or client IP).
The results table presents details for entities that match the search criteria. Clicking the entity name (or client IP number) takes you to the Audit Trails dashboard for the target entity.
Audit a user, file, client, or folder.
Details for client IP Audit Trails.
When you search by user in the Audit Trails tab, search results display the following information in a table.
Clicking View Audit displays the Audit Details page, which shows the following audit information for the selected user.
The Results table provides granular details of the audit results. The following data is displayed for every event.
Click the gear icon for options to download the data as an xls, csv, or JSON file.
Dashboard details for folder audits.
The following information displays when you search by file in the Audit Trails tab.
The Audit Details page shows the following audit information for the selected folder.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for options to download the data as a CSV file.
Dashboards details for file audit.
When you search by file in the Audit Trails tab, the following information displays:
The Audit Details page shows the following audit information for the selected file.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for options to download the data as a CSV file.
Dashboard details for client IP Audit Trails.
When you search by client IP in the Audit Trails tab, search results display the following information in a table.
The Audit Details page shows the following audit information for the selected client.
The Results table provides granular details of the audit results. File Analytics displays the following data for every event.
Click the gear icon for an option to download the data as a CSV file.
Ransomware protection for your file server.
File Analytics scans files for ransomware in real time and notifies you in the event of a ransomware attack once you configure email notifications.
Using a curated a list of over 250 signatures that frequently appear in ransomware files, the Nutanix Files file blocking mechanism identifies and blocks files with ransomware extensions from carrying out malicious operations. You can modify the list by manually adding or removing signatures from in Nutanix Files, see "File Blocking" in the Nutanix Files User Guide .
File Analytics also monitors shares for self-service restore (SSR) policies and identifies shares that do not have SSR enabled in the ransomware dashboard. You can enable SSR through the ransomware dashboard.
The ransomware dashboard includes panes for managing ransomware protection and self-service restore (SSR).
The ransomware dashboard includes two main sections:
Enable ransomware protection on your file server.
Configure ransomware protection on file servers.
Do the following to add signature to the blocked extension list.
Enable self-service restore on shares identified by File Analytics.
File Analytics scans shares for SSR policies.
Generate a report for entities on the file server.
Create a report with custom attribute values or use one of the File Analytics pre-canned report templates. To create a custom report, specify the entity, attributes (and operators for some attributes), attribute values, column headings, and the number of columns. Pre-canned reports define most of the attributes and headings based on the entity and template that you choose.
The Reports dashboard displays a table or previously generated reports. You can rerun existing reports rather than creating a template. After creating a report, you can download it as a JSON or CSV file.
The reports dashboard includes options to create, view, and download reports.
The Reports dashboard includes options to create a report, download reports as a JSON, download reports as a CSV, rerun reports, and delete reports.
The reports table includes columns for the report name, status, last run, and actions.
Clicking Create a new report takes you to the report creation screen, which includes a Report builder and a Pre-canned Reports Templates tabs. The tabs include report options and filters for report configuration.
Both tabs include the following elements:
Entity | Attributes (filters) | Operator | Value | Column |
---|---|---|---|---|
Events | event_date |
|
(date) |
|
Event_operation | N/A |
|
||
Files | Category |
|
(date) |
|
Extensions | N/A | (type in value) | ||
Deleted | N/A | Last (number of days from 1 to 30) days | ||
creation_date |
|
(date) | ||
access_date |
|
(date) | ||
Size |
|
(number) (file size)
File size options:
|
||
Folders | Deleted | N/A | Last (number of days from 1 to 30) days |
|
creation_date |
|
(date) | ||
Users | last_event_date |
|
(date) |
|
Entity | Pre-canned report template | Columns |
---|---|---|
Events |
|
|
Files |
|
|
Users |
|
|
Create a custom report by defining the entity, attribute, filters, and columns.
Use one of the pre-canned File Analytics templates for your report.
You can get more insight into the usage and contents of files on your system by configuring and updating File Analytics features and settings. Some options include scanning the files on your file server on demand, updating data retention, and configuring data protection.
The data retention period determines how long File Analytics retains event data.
Follow the steps as indicated to configure data retention.
Once enabled, File Analytics scans the metadata of all files and shares on the system. You can perform an on-demand scan of shares in your file system.
Deny users, file extensions, and client IP addresses.
File Analytics uses the file category configuration to classify file extensions.
The capacity widget in the dashboard uses the category configuration to calculate capacity details.
Configure File Analytics disaster recovery (DR) using Prism Element.
File Analytics only supports async disaster recovery. File Analytics does not support NearSync and metro availability.
Create an async protection domain, configure a protection domain schedule, and configure remote site mapping. The remote site must have symmetric configurations to the primary site. The remote site must also deploy File Analytics to restore a File Analytics VM (FAVM).
The Data Protection section in the Prism Web Console Guide provides more detail on the disaster recovery process.
To set up disaster recovery for File Analytics, create an async protection domain, configure a protection domain schedule, and configure remote site mapping.
By default, the File Analytics volume group resides on the same container that hosts vDisks for Nutanix Files.
Recover a File Analytics VM (FAVM) after a planned or unplanned migration to the remote site.
Perform the following tasks on the remote site.
Deploy a File Analytics VM (FAVM) after a planned or unplanned (disaster) migration to the remote site.
To perform disaster recovery, deploy and enable File Analytics on the remote site. Restore the data using a snapshot of the volume group from the primary FAVM.
nutanix@favm$ sudo blkid
nutanix@favm$ cd /mnt/containers/config/common_config /tmp
nutanix@favm$ sudo systemctl stop monitoring
nutanix@favm$ docker stop $(docker ps -q)
nutanix@favm$ sudo systemctl stop docker
nutnix@avm$ sudo umount /mnt
nutanix@avm$ sudo reboot
nutanix@favm$ sudo blkid
/dev/sr0: UUID="2019-06-11-12-18-52-00" LABEL="cidata" TYPE="iso9660" /dev/sda1: LABEL="_master-x86_64-2" UUID="b1fb6e26-a782-4cf7-b5de-32941cc92722" TYPE="ext4"The FAVM discovers the attached volume group and assigns to the /dev/sdb device.
nutanix@favm$ mv /mnt/containers/config/common_config/cvm.config \
/mnt/containers/config/common_config/cvm_bck.config
nutanix@favm$ mv /tmp/cvm.config /mnt/containers/config/common_config/
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --local_update
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --prism_user=admin --prism_password='Prism admin password'
Deploy a File Analytics VM (FAVM) after a planned or unplanned (disaster) migration to the remote site.
To perform disaster recovery, deploy and enable File Analytics on the remote site. Restore the data using a snapshot of the volume group from the primary FAVM.
nutanix@favm$ sudo blkid
nutanix@favm$ cd /mnt/containers/config/common_config/ /tmp
nutanix@favm$ sudo systemctl stop monitoring
nutanix@favm$ docker stop $(docker ps -q)
nutanix@favm$ sudo systemctl stop docker
nutnix@avm$ sudo umount /mnt
nutnix@avm$ sudo /sbin/iscsiadm -m node -u
nutanix@favm$ sudo /sbin/iscsiadm -m node –o delete
nutanix@favm$ sudo blkid
/dev/sr0: UUID="2019-06-11-12-18-52-00" LABEL="cidata" TYPE="iso9660" /dev/sda1: LABEL="_master-x86_64-2" UUID="b1fb6e26-a782-4cf7-b5de-32941cc92722" TYPE="ext4"The output does not show the /dev/sdb device.
nutanix@favm$ sudo cat /etc/iscsi/initiatorname.iscsi
InitiatorName=iqn.1991-05.com.redhat:8ef967b5b8f
nutanix@favm$ sudo /sbin/iscsiadm --mode discovery --type sendtargets --portal data_services_IP_address:3260
Clicking
the Nutanix cluster name in Prism displays cluster details including the
data service IP address. The output displays the restored iSCSI target
from step 2.
nutanix@favm$ sudo /sbin/iscsiadm --mode node --targetname iqn_name --portal data_services_IP_address:3260,1 --login
nutanix@favm$ sudo reboot
nutanix@favm$ sudo blkid
/dev/sr0: UUID="2019-06-11-12-18-52-00" LABEL="cidata" TYPE="iso9660" /dev/sda1: LABEL="_master-x86_64-2" UUID="b1fb6e26-a782-4cf7-b5de-32941cc92722" TYPE="ext4" /dev/sdb: UUID="30749ab7-58e7-437e-9a09-5f6d9619e85b" TYPE="ext4"
nutanix@favm$ mv /mnt/containers/config/common_config/cvm.config \
/mnt/containers/config/common_config/cvm_bck.config
nutanix@favm$ mv /tmp/cvm.config /mnt/containers/config/common_config/
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --local_update
nutanix@favm$ sudo python /opt/nutanix/analytics/bin/reset_password.py --user_type=prism \
--password='new password' --prism_user=admin --prism_password='Prism admin password'
Product Release Date: 2021-05-17
Last updated: 2022-12-13
Traditional data centers use firewalls to implement security checks at the perimeter—the points at which traffic enters and leaves the data center network. Such perimeter firewalls are effective at protecting the network from external threats. However, they offer no protection against threats that originate from within the data center and spread laterally, from one compromised machine to another.
The problem is compounded by virtualized workloads changing their network configurations and hosts as they start, stop, and migrate frequently. For example, IP addresses and MAC addresses can change as applications are shut down on one host and started on another. Manual enforcement of security policies through traditional firewalls, which rely on network configurations to inspect traffic, cannot keep up with these frequent changes and are error-prone.
Network-centric security policies also require the involvement of network security teams that have intimate knowledge of network configuration in terms of VLANs, subnets, and other network entities.
Nutanix Flow includes a policy-driven security framework that inspects traffic within the data center. The framework works as follows:
The types of policies in Prism Central and their use cases are described here.
Policy Type | Use Case |
---|---|
Application Security Policy |
Use an application security policy when you want to secure an application by
specifying allowed traffic sources and destinations. This method of securing an
application is typically called
application ring fencing
.
For example,
use an application security policy when you want to allow only those VMs in the
categories
The secured application itself can be divided into tiers by the use of categories (the built-in AppTier category). For example, you can divide the issue tracking tool into web, application, and database tiers and configure tier-to-tier rules. For more information, see Application Security Policy Configuration. |
Isolation Environment Policy |
Use an isolation environment policy when you want to block all traffic,
regardless of direction, between two groups of VMs identified by their category. VMs
within a group can communicate with each other.
For example, use an isolation
environment policy when you want to block all traffic between VMs in the category
For more information, see Isolation Environment Policy Configuration. |
Quarantine Policy |
Use a quarantine policy when you want to isolate a compromised or infected VM and
optionally want to subject it to forensics.
For more information, see Quarantine Policy Configuration. |
VDI Policy |
Use a VDI policy when you want to secure your VDI environment.
For more information, see VDI Policy Configuration |
The security policy model uses an application-centric policy language instead of the more complex, traditional network-centric policy language. Configuring an application security policy involves specifying which VMs belong to the application you want to protect and then identifying the entities or networks, in the inbound and outbound directions, with which you want to allow communication.
All the entities in an application security policy are identified by the categories to which they belong and not by their IP address, VLAN, or other network attributes. After a VM is associated with a category and the category is specified in a security policy, traffic associated with the VM is monitored even if it migrates to another network or changes its IP address.
The default options for allowing traffic on the inbound and outbound directions are also inherently application centric. For application security policies, the default option for inbound traffic is Allowed List , which means that Allowed List is usually the recommended option for inbound traffic. The default option can be changed to Allow All traffic. The default option in the outbound direction allows the application to send traffic to all destinations, but you can configure a destination Allowed List if desired.
For forensic quarantine policies, the default option in both directions is Allowed List , but you can Allow All traffic in both directions. For strict quarantine policies, no traffic is allowed in either direction.
All the VMs within a category can communicate with each other. For example, in a tiered application, regardless of how you configure tier-to-tier rules, the VMs within a given tier can communicate with each other.
An application security policy is expressed in terms of the categories and subnets with which you want the application to communicate and therefore, by extension, the traffic you want to allow. A more granular policy expression can be achieved by specifying which protocols and ports can be used for communication.
Any category or subnet that is not in the allowed list is blocked. You cannot specify the categories and subnets you want to block because the number of such entities are typically much larger and grow at a much higher rate than the categories and subnets with which an application should be allowed to communicate. Expressing a policy in terms of allowed traffic results in a smaller, tighter policy configuration that can be modified, monitored, and controlled more easily.
All policies, whether associated with securing an application, isolating environments, or quarantining VMs, can be run in the following modes:
You can switch a policy between these two modes as many times as you want.
A policy uses categories to identify the VMs to which it must apply. This model allows the automatic enforcement of a policy to VMs regardless of their number and network attributes. Connectivity between Prism Central and a registered AHV cluster is required only when creating and modifying policies, or when changing the mode of operation (applied or monitoring) of a policy. Policies are applied to the VMs in a cluster even if the cluster temporarily loses network connectivity with the Prism Central instance with which it is registered. New policies and changes are applied to the cluster when connectivity is restored.
Prism Central does not provide a way for you to specify priorities between policies of a single type. For example, you cannot prioritize one security policy over another. There is no limit to the number of inbound and outbound rules that you can add to a security policy, allowing you to define all of an application's security requirements in a single policy. This makes priorities between policies unnecessary.
However, priorities exist between the different policy types. Quarantine policies have the highest priority followed by isolation environment policies, and application security policies, in that order. The VDI Policy takes the last precedence, for example, if an application security is protecting a VM, it cannot simultaneously be protected with the VDI policy.
Isolation environment rules take precedence over application security rules, so make sure that isolation environment policies and application security policies are not in conflict. An isolation environment rule and an application security rule are said to be in conflict if they apply to the same traffic (a scenario that is encountered when VMs in one of the categories in the isolation environment send traffic to an application in the other category, and some or all of that traffic is either allowed or disallowed by the application security policy). The effect that an isolation environment policy has on a conflicting application security policy depends on the mode in which the isolation environment policy is deployed, and is as follows:
The Security Policies feature has the following requirements:
Microsegmentation is disabled by default. Before you can configure and use application security policies, isolation environment policies, and quarantine policies, you must enable the feature. The feature requires a Flow license. If you have not installed a Flow license, you can try the feature for a period of 60 days. After this period expires, you will be required to install the license to continue using the feature.
To enable microsegmentation, do the following:
Prism Central web console provides you the ability to disable the microsegmentation feature.
To disable microsegmentation, do the following:
Prism Central includes built-in categories that you can use in application security policies and isolation policies. It also includes a built-in category for quarantining VMs.
Category | Description |
---|---|
AppTier | Add values for the tiers in your application (such as web, application_logic, and database) to this category and use the values to divide the application into tiers when configuring a security policy. |
AppType | Associate the VMs in your application with the appropriate built-in application type such as Exchange and Apache_Spark. You can also update the category to add values for applications not listed in this category. |
Environment | Add values for environments that you want to isolate from each other and then associate VMs with the values. |
Quarantine |
Add a VM to this category when you want to quarantine the VM. You cannot modify
this category. The category has the following values:
|
ADGroup | This category is managed by ID Based Security (ID Firewall). Each ADGroup value represents an imported group from Active Directory. To add or remove values to use in Flow policies use the ID Based Security configuration page ( Prism Central Settings > Flow > ID Based Security ). The category values may be used in VDI policies, see VDI Policy Configuration for details. |
ADGroup:Default | This category is applied to the VDI VMs of the AD group when the VM inclusion criteria is set and allows you to apply a default set of rules for the VDI VMs (without the requirement of user logons). |
Service is a group of protocol-port combination. You can use any of the default services or create a custom service. The ability to use the service entities in the policy creation workflow reduces any manual configuration error and enables reusability of available entities.
To create a custom service, do the following.
Address is a way to group one or many IP addresses or ranges. You can create an address entity and use that address entity while creating policies. The ability to use the addresses in the policy creation workflow reduces any manual configuration error and enables reusability of available entities.
To create an Address, do the following.
default
value, but you can update the category to
add values of your choice.
For information about categories and their values, see Category Management in the Prism Central Guide .
To secure an application, do the following:
AppType
:
value
, where value represents a type of
application. Every application that you want Prism Central to secure
must be associated with a value from the built-in AppType category. The
AppType category includes values for frequently encountered
applications, such as Exchange and Hadoop. The AppType category also
includes a built-in
default
value that you can use if
your application cannot be associated with one of the other built-in
values. You can also update the
AppType
category to add
a value of your choice. For information about categories and their
values, see
Category Management
.
AppType: Exchange
, this option enables you to
further restrict the policy to specific locations (such as
Location: US
and
Location: EU
) or
environments (such as
Environment: Production
,
Environment: Development
, and
Environment:
Test
).
To divide your application into tiers and create tier-to-tier rules, do the following:
Repeat this step to add as many tiers as you require. The following figure shows an application with a web tier, an application tier, and a database tier:
Configure tier-to-tier rules for as many source and destination tiers as you want.
When entering the name of a category, a list of matching names is displayed, and you can select the name you want to specify. The subnet mask must be specified in the CIDR format.
Each entry in this list represents a stream of inbound traffic.
When entering the name of a category, a list of matching names is displayed, and you can select the name you want to specify. The subnet mask must be specified in the CIDR format.
Each entry in this list represents a stream of outbound traffic.
Applying a security policy enforces the security policy on the application, and traffic from entities that are not defined as sources in the policy is blocked.
When a policy is in the monitoring state, the application continues to receive all traffic, but disallowed traffic is highlighted on the monitoring page. Traffic is not blocked until the policy is enforced.
To modify a security policy, do the following:
Applying a security policy enforces the security policy on the application, and any traffic from sources that are not allowed is blocked.
To apply a security policy, do the following:
To monitor a security policy, do the following:
To delete an application security policy, do the following:
An isolation environment identifies two groups of VMs by category, and it blocks communications between the groups.
You can also specify an additional category to restrict the scope of the isolation environment to that category.
For example, consider that you have an
application
category with values
app1
and
app2
and that you have associated some VMs with
application: app1
and some VMs with
application: app2
.
Also, consider that these same VMs are distributed between two sites, and have accordingly
been associated with values site1 and site2 in a category named location (
location:
site1
and
location: site2
).
In this example, you might want to block communications between the VMs in the two locations.
Additionally, you might want to restrict the scope of the policy to VMs in category
application: app1
. In other words,
app1
VMs in
site1
cannot communicate with
app1
VMs in
site2
. The following diagram illustrates the desired outcome. The red
connectors illustrate blocked traffic. The green connectors illustrate allowed traffic.
You can configure an isolation policy for this by creating the following categories and isolation policy in Prism Central:
Entity | Values |
---|---|
Categories |
|
|
|
Isolation Policy |
|
An isolation environment policy identifies two groups of VMs and blocks communications between the groups. The two groups are identified by category. You can specify an additional category to restrict the scope of the policy to that category.
To create an isolation environment, do the following:
Matching names appear in a list as you type. You can click the name of the category you want.
If you isolate
VMs in category
Environment: Production
from VMs in
category
Environment: Staging
, and you restrict the
scope of the policy to VMs in the category
Environment:
Dev
, Prism Central applies the isolation policy to the
following groups:
Environment: Production
and
Environment: Dev
Environment: Staging
and
Environment: Dev
.
To modify an isolation environment, do the following:
Applying an isolation environment policy enforces the policy on the specified categories, and any traffic between the categories is blocked.
To apply an isolation environment policy, do the following:
To monitor a security policy, do the following:
To delete an isolation environment policy, do the following:
Prism Central includes a built-in quarantine policy that enables you to perform the following tasks:
For these use cases, Prism Central includes built-in categories that are included in the built-in quarantine policy.
Prism Central also enables you to monitor the quarantine policy before applying it.
The quarantine policy cannot be deleted.
In the built-in quarantine policy, you specify categories that can communicate with VMs that have been added to the Quarantine: Forensics category.
To configure the quarantine policy, do the following;
When entering the name of a category, a list of matching names is displayed, and you can select the name you want to specify. The subnet mask must be specified in the CIDR format.
You quarantine a VM by adding the VM to a quarantine category.
To add an infected VM to a quarantine category, do the following:
To remove a VM from the quarantine, do the following:
The VDI Policy is based on identity-based categorization of the VDI VMs using Active Directory group membership. Configuring VDI policy includes adding an Active Directory domain that is used for the ID firewall ( ID Based Security ) and configuring a service account for the domain.
ID firewall is an extension to Flow that allows you to write security policies based on users and groups in an Active Directory domain in which your VDI VMs are attached. When using ID firewall, you can import groups from Active Directory into Prism Central as categories (in the category key ADGroup), and then write policies around these categories, just as you would for any other category. A new type of policy has been added for this purpose - the VDI Policy . ID firewall takes care of automatically placing VDI VMs in the appropriate categories on detecting user logons into the VM hosted on Nutanix infrastructure associated with Prism Central, thus allowing user and group based enforcement of Flow policies.
ID firewall integrates Nutanix Flow with Microsoft Active Directory (AD), such that the groups in the AD can be imported into Prism Central as categories. These imported categories can then be used in the VDI policy as target groups, inbound traffic, and outbound traffic. Prism Central automatically places VMs inside the imported AD group categories when user logons are detected on VMs that are part of the Active Directory domain and also present on Nutanix managed clusters, thus applying security policies based on user group membership.
You can use the VDI VM Filter for the following scenarios.
The Default VDI policy feature allows you to apply a default set of rules as defined by the desktop administrator for VDI VMs and users. There are two primary use cases for Default VDI Policy ( ADGroup:Default ).
You can define a default VDI policy at the time of creating a new VDI policy, or by updating any existing VDI policy. See Step 2b of the VDI Policy Configuration topic for details.
Active Directory Domain Services configuration is used to import user groups for identity based security policies.
To configure an Active Directory domain, do the following.
Click + and add each domain controller individually, then click the blue check mark icon to save.
This is a name you choose to identify this entry; it need not be the name of an actual directory.
Enter the domain name in DNS format, for example, nutanix.com .
A service account is a special user account that an application or service uses to interact with the Active Directory. Enter your Active Directory service account credentials in this (username) and the following (password) field.
ID Firewall uses the service account for ID based security with additional requirements, see Configure Service Account for ID Firewall.
Active Directory service account in Prism Central is used for connectivity with the Active Directory domain services. ID Firewall also uses the same service account for ID based security.
To configure a service account for ID firewall, do the following.
WMIMGMT.msc
command to start
Windows Management Instrumentation
snap-in.
winmgmt
service.
C:\> net stop winmgmt
C:\> net start winmgmt
Alternatively, reboot the domain controller.
To modify the VDI policy, do the following:
Applying the VDI policy enforces the policy on the specified categories (VDI AD groups), and any traffic between the categories is blocked.
To apply the VDI policy, do the following:
To monitor a security policy, do the following:
To delete the VDI policy, do the following:
You can apply different types of filters to view results based on properties like source , destination, category, ports, and more. You can also group related rule attributes together for easier visualization of connection flows. Grouping and Filtering work together to provide an intuitive view for the security policy.
To apply filtering and grouping to a security policy, do the following.
Prism Central allows you to export and import security policies for the following security administration aspects.
Product Release Date: 2022-07-25
Last updated: 2022-12-14
Traditional data centers use firewalls to implement security checks at the perimeter—the points at which traffic enters and leaves the data center network. Such perimeter firewalls are effective at protecting the network from external threats. However, they offer no protection against threats that originate from within the data center and spread laterally, from one compromised machine to another.
The problem is compounded by virtualized workloads changing their network configurations and hosts as they start, stop, and migrate frequently. For example, IP addresses and MAC addresses can change as applications are shut down on one host and started on another. Manual enforcement of security policies through traditional firewalls, which rely on network configurations to inspect traffic, cannot keep up with these frequent changes and are error-prone.
Network-centric security policies also require the involvement of network security teams that have intimate knowledge of network configuration in terms of VLANs, subnets, and other network entities.
Nutanix Flow includes a policy-driven security framework that inspects traffic within the data center. The framework works as follows:
The types of policies in Prism Central and their use cases are described here.
Policy Type | Use Case |
---|---|
Application Security Policy |
Use an application security policy when you want to secure an application by
specifying allowed traffic sources and destinations. This method of securing an
application is typically called
application ring fencing
.
For example,
use an application security policy when you want to allow only those VMs in the
categories
The secured application itself can be divided into tiers by the use of categories (the built-in AppTier category). For example, you can divide the issue tracking tool into web, application, and database tiers and configure tier-to-tier rules. For more information, see Application Security Policy Configuration. |
Isolation Environment Policy |
Use an isolation environment policy when you want to block all traffic,
regardless of direction, between two groups of VMs identified by their category. VMs
within a group can communicate with each other.
For example, use an isolation
environment policy when you want to block all traffic between VMs in the category
For more information, see Isolation Environment Policy Configuration. |
Quarantine Policy |
Use a quarantine policy when you want to isolate a compromised or infected VM and
optionally want to subject it to forensics.
For more information, see Quarantine Policy Configuration. |
VDI Policy |
Use a VDI policy when you want to secure your VDI environment.
For more information, see VDI Policy Configuration |
The security policy model uses an application-centric policy language instead of the more complex, traditional network-centric policy language. Configuring an application security policy involves specifying which VMs belong to the application you want to protect and then identifying the entities or networks, in the inbound and outbound directions, with which you want to allow communication.
All the entities in an application security policy are identified by the categories to which they belong and not by their IP address, VLAN, or other network attributes. After a VM is associated with a category and the category is specified in a security policy, traffic associated with the VM is monitored even if it migrates to another network or changes its IP address.
The default options for allowing traffic on the inbound and outbound directions are also inherently application centric. For application security policies, the default option for inbound traffic is Allowed List , which means that Allowed List is usually the recommended option for inbound traffic. The default option can be changed to Allow All traffic. The default option in the outbound direction allows the application to send traffic to all destinations, but you can configure a destination Allowed List if desired.
For forensic quarantine policies, the default option in both directions is Allowed List , but you can Allow All traffic in both directions. For strict quarantine policies, no traffic is allowed in either direction.
All the VMs within a category can communicate with each other. For example, in a tiered application, regardless of how you configure tier-to-tier rules, the VMs within a given tier can communicate with each other.
An application security policy is expressed in terms of the categories and subnets with which you want the application to communicate and therefore, by extension, the traffic you want to allow. A more granular policy expression can be achieved by specifying which protocols and ports can be used for communication.
Any category or subnet that is not in the allowed list is blocked. You cannot specify the categories and subnets you want to block because the number of such entities are typically much larger and grow at a much higher rate than the categories and subnets with which an application should be allowed to communicate. Expressing a policy in terms of allowed traffic results in a smaller, tighter policy configuration that can be modified, monitored, and controlled more easily.
All policies, whether associated with securing an application, isolating environments, or quarantining VMs, can be run in the following modes:
You can switch a policy between these two modes as many times as you want.
A policy uses categories to identify the VMs to which it must apply. This model allows the automatic enforcement of a policy to VMs regardless of their number and network attributes. Connectivity between Prism Central and a registered AHV cluster is required only when creating and modifying policies, or when changing the mode of operation (applied or monitoring) of a policy. Policies are applied to the VMs in a cluster even if the cluster temporarily loses network connectivity with the Prism Central instance with which it is registered. New policies and changes are applied to the cluster when connectivity is restored.
Prism Central does not provide a way for you to specify priorities between policies of a single type. For example, you cannot prioritize one security policy over another. There is no limit to the number of inbound and outbound rules that you can add to a security policy, allowing you to define all of an application's security requirements in a single policy. This makes priorities between policies unnecessary.
However, priorities exist between the different policy types. Quarantine policies have the highest priority followed by isolation environment policies, and application security policies, in that order. The VDI Policy takes the last precedence, for example, if an application security is protecting a VM, it cannot simultaneously be protected with the VDI policy.
Isolation environment rules take precedence over application security rules, so make sure that isolation environment policies and application security policies are not in conflict. An isolation environment rule and an application security rule are said to be in conflict if they apply to the same traffic (a scenario that is encountered when VMs in one of the categories in the isolation environment send traffic to an application in the other category, and some or all of that traffic is either allowed or disallowed by the application security policy). The effect that an isolation environment policy has on a conflicting application security policy depends on the mode in which the isolation environment policy is deployed, and is as follows:
The Security Policies feature has the following requirements:
Microsegmentation is disabled by default. Before you can configure and use application security policies, isolation environment policies, and quarantine policies, you must enable the feature. The feature requires a Flow license. If you have not installed a Flow license, you can try the feature for a period of 60 days. After this period expires, you will be required to install the license to continue using the feature.
To enable microsegmentation, do the following:
Prism Central web console provides you the ability to disable the microsegmentation feature.
To disable microsegmentation, do the following:
Prism Central includes built-in categories that you can use in application security policies and isolation policies. It also includes a built-in category for quarantining VMs.
Category | Description |
---|---|
AppTier | Add values for the tiers in your application (such as web, application_logic, and database) to this category and use the values to divide the application into tiers when configuring a security policy. |
AppType | Associate the VMs in your application with the appropriate built-in application type such as Exchange and Apache_Spark. You can also update the category to add values for applications not listed in this category. |
Environment | Add values for environments that you want to isolate from each other and then associate VMs with the values. |
Quarantine |
Add a VM to this category when you want to quarantine the VM. You cannot modify
this category. The category has the following values:
|
ADGroup | This category is managed by ID Based Security (ID Firewall). Each ADGroup value represents an imported group from Active Directory. To add or remove values to use in Flow policies use the ID Based Security configuration page ( Prism Central Settings > Flow > ID Based Security ). The category values may be used in VDI policies, see VDI Policy Configuration for details. |
ADGroup:Default | This category is applied to the VDI VMs of the AD group when the VM inclusion criteria is set and allows you to apply a default set of rules for the VDI VMs (without the requirement of user logons). |
Service is a group of protocol-port combination. You can use any of the default services or create a custom service. The ability to use the service entities in the policy creation workflow reduces any manual configuration error and enables reusability of available entities.
To create a custom service, do the following.
Address is a way to group one or many IP addresses or ranges. You can create an address entity and use that address entity while creating policies. The ability to use the addresses in the policy creation work flow reduces any manual configuration error and enables reusability of available entities.
To create an Address, do the following.
default
value, but you can update the category to
add values of your choice.
For information about categories and their values, see Category Management in the Prism Central Guide .
To secure an application, do the following:
AppType
:
value
, where value represents a type of
application. Every application that you want Prism Central to secure
must be associated with a value from the built-in AppType category. The
AppType category includes values for frequently encountered
applications, such as Exchange and Hadoop. The AppType category also
includes a built-in
default
value that you can use if
your application cannot be associated with one of the other built-in
values. You can also update the
AppType
category to add
a value of your choice. For information about categories and their
values, see Category Management in the
Prism Central Guide
.
AppType: Exchange
, this option enables you to
further restrict the policy to specific locations (such as
Location: US
and
Location: EU
) or
environments (such as
Environment: Production
,
Environment: Development
, and
Environment:
Test
).
To divide your application into tiers and create tier-to-tier rules, do the following:
Repeat this step to add as many tiers as you require. The following figure shows an application with a web tier, an application tier, and a database tier:
Configure tier-to-tier rules for as many source and destination tiers as you want.
When entering the name of a category, a list of matching names is displayed, and you can select the name you want to specify. The subnet mask must be specified in the CIDR format.
Each entry in this list represents a stream of inbound traffic.
When entering the name of a category, a list of matching names is displayed, and you can select the name you want to specify. The subnet mask must be specified in the CIDR format.
Each entry in this list represents a stream of outbound traffic.
Applying a security policy enforces the security policy on the application, and traffic from entities that are not defined as sources in the policy is blocked.
When a policy is in the monitoring state, the application continues to receive all traffic, but disallowed traffic is highlighted on the monitoring page. Traffic is not blocked until the policy is enforced.
To modify a security policy, do the following:
Applying a security policy enforces the security policy on the application, and any traffic from sources that are not allowed is blocked.
To apply a security policy, do the following:
To monitor a security policy, do the following:
To delete an application security policy, do the following:
An isolation environment identifies two groups of VMs by category, and it blocks communications between the groups.
You can also specify an additional category to restrict the scope of the isolation environment to that category.
For example, consider that you have an
application
category with values
app1
and
app2
and that you have associated some VMs with
application: app1
and some VMs with
application: app2
.
Also, consider that these same VMs are distributed between two sites, and have accordingly
been associated with values site1 and site2 in a category named location (
location:
site1
and
location: site2
).
In this example, you might want to block communications between the VMs in the two locations.
Additionally, you might want to restrict the scope of the policy to VMs in category
application: app1
. In other words,
app1
VMs in
site1
cannot communicate with
app1
VMs in
site2
. The following diagram illustrates the desired outcome. The red
connectors illustrate blocked traffic. The green connectors illustrate allowed traffic.
You can configure an isolation policy for this by creating the following categories and isolation policy in Prism Central:
Entity | Values |
---|---|
Categories |
|
|
|
Isolation Policy |
|
An isolation environment policy identifies two groups of VMs and blocks communications between the groups. The two groups are identified by category. You can specify an additional category to restrict the scope of the policy to that category.
To create an isolation environment, do the following:
Matching names appear in a list as you type. You can click the name of the category you want.
If you isolate
VMs in category
Environment: Production
from VMs in
category
Environment: Staging
, and you restrict the
scope of the policy to VMs in the category
Environment:
Dev
, Prism Central applies the isolation policy to the
following groups:
Environment: Production
and
Environment: Dev
Environment: Staging
and
Environment: Dev
.
To modify an isolation environment, do the following:
Applying an isolation environment policy enforces the policy on the specified categories, and any traffic between the categories is blocked.
To apply an isolation environment policy, do the following:
To monitor a security policy, do the following:
To delete an isolation environment policy, do the following:
Prism Central includes a system defined quarantine policy that enables you to perform the following tasks:
For these use cases, Prism Central includes built-in categories that are included in the system defined quarantine policy.
Prism Central also enables you to monitor the quarantine policy before applying it.
The quarantine policy cannot be deleted.
In the built-in quarantine policy, you specify categories that can communicate with VMs that have been added to the Quarantine: Forensics category.
To configure the quarantine policy, do the following;
When entering the name of a category, a list of matching names is displayed, and you can select the name you want to specify. The subnet mask must be specified in the CIDR format.
You quarantine a VM by adding the VM to a quarantine category.
To add an infected VM to a quarantine category, do the following:
To remove a VM from the quarantine, do the following:
The VDI Policy is based on identity-based categorization of the VDI VMs using Active Directory group membership. Configuring VDI policy includes adding an Active Directory domain that is used for the ID firewall ( ID Based Security ) and configuring a service account for the domain.
ID firewall is an extension to Flow that allows you to write security policies based on users and groups in an Active Directory domain in which your VDI VMs are attached. When using ID firewall, you can import groups from Active Directory into Prism Central as categories (in the category key ADGroup), and then write policies around these categories, just as you would for any other category. A new type of policy has been added for this purpose - the VDI Policy . ID firewall takes care of automatically placing VDI VMs in the appropriate categories on detecting user logons into the VM hosted on Nutanix infrastructure associated with Prism Central, thus allowing user and group based enforcement of Flow policies.
ID firewall integrates Nutanix Flow with Microsoft Active Directory (AD), such that the groups in the AD can be imported into Prism Central as categories. These imported categories can then be used in the VDI policy as target groups, inbound traffic, and outbound traffic. Prism Central automatically places VMs inside the imported AD group categories when user logons are detected on VMs that are part of the Active Directory domain and also present on Nutanix managed clusters, thus applying security policies based on user group membership.
You can use the VDI VM Filter for the following scenarios.
The Default VDI policy feature allows you to apply a default set of rules as defined by the desktop administrator for VDI VMs and users. There are two primary use cases for Default VDI Policy ( ADGroup:Default ).
You can define a default VDI policy at the time of creating a new VDI policy, or by updating any existing VDI policy. See Step 2b of the VDI Policy Configuration topic for details.
Active Directory Domain Services configuration is used to import user groups for identity based security policies.
To configure an Active Directory domain, do the following.
Click + and add each domain controller individually, then click the blue check mark icon to save.
This is a name you choose to identify this entry; it need not be the name of an actual directory.
Enter the domain name in DNS format, for example, nutanix.com .
A service account is a special user account that an application or service uses to interact with the Active Directory. Enter your Active Directory service account credentials in this (username) and the following (password) field.
ID Firewall uses the service account for ID based security with additional requirements, see Configure Service Account for ID Firewall.
Active Directory service account in Prism Central is used for connectivity with the Active Directory domain services. ID Firewall also uses the same service account for ID based security.
To configure a service account for ID firewall, do the following.
WMIMGMT.msc
command to start
Windows Management Instrumentation
snap-in.
winmgmt
service.
C:\> net stop winmgmt
C:\> net start winmgmt
Alternatively, reboot the domain controller.
To modify the VDI policy, do the following:
Applying the VDI policy enforces the policy on the specified categories (VDI AD groups), and any traffic between the categories is blocked.
To apply the VDI policy, do the following:
To monitor a security policy, do the following:
To delete the VDI policy, do the following:
You can apply different types of filters to view results based on properties like source , destination, category, ports, and more. You can also group related rule attributes together for easier visualization of connection flows. Grouping and Filtering work together to provide an intuitive view for the security policy.
To apply filtering and grouping to a security policy, do the following.
Prism Central allows you to export and import security policies for the following security administration aspects.
Product Release Date: 2022-05-16
Last updated: 2022-12-09
This Flow Networking Guide describes how to enable and deploy Nutanix Flow Networking on Prism Central.
If you have enabled the early access (EA) version of Flow Networking, disable it before upgrading the Prism Central and enabling the general availability (GA) version of Flow Networking.
Links to Nutanix Support Portal software and documentation.
The Nutanix Support Portal provides software download pages, documentation, compatibility, and other information/
Documentation | Description |
---|---|
Release Notes | Flow Networking | Flow Networking Release Notes |
Port Reference | Port Reference: See this page for details of ports that must be open in the firewalls to enable Flow Virtual Networking to function. |
Nutanix Security Guide | Prism Element and Prism Central security, cluster hardening, and authentication. |
AOS guides and release notes | Covers AOS Administration, Hyper-V Administration for Acropolis, Command Reference, Powershell Cmdlets Reference, AOS Family Release Notes, and AOS release-specific Release Notes |
Acropolis Upgrade Guide | How to upgrade core and other Nutanix software. |
AHV guides and release notes | Administration and release information about AHV. |
Prism Central and Web Console guides and release notes | Administration and release information about Prism Central and Prism Element. |
Enabled and administered from Prism Central, Flow Networking powers network virtualization to offer a seamless network experience with enhanced security. It is disabled by default.
To enable and use Flow Networking, ensure that you log on to Prism Central as a local account user with Prism Admin role. If you log on to Prism Central as a non-local account (IDP-based) user or without Prism Admin role privileges, then Prism Central does not allow you to enable or use Flow Networking. The task is reported as Failed with a User Denied Access message.
Nutanix deploys a number of ports and protocols in its software. ports that must be open in the firewalls to enable Flow Networking to function. To see the ports and protocols used Flow Networking, see Port Reference.
It is a software-defined network virtualization solution providing overlay capabilities for the on-prem AHV clusters. It integrates tools to deploy networking features like Virtual Private Cloud (VPC) and Virtual Private Network (VPN) to support flexible app-driven networking that focuses on VMs and applications instead of virtual LANs and network addresses.
After you enable it on Prism Central, Flow Networking delivers the following.
You can enable Flow Networking using a simple Prism Central driven workflow, which installs the network controller. The network controller is a collection of containerized services that run directly on the Prism Central VM(s). The network controller orchestrates all the virtual networking operations.
Enable Flow Networking in Prism Central Settings > Advanced Networking . It is disabled by default. See Enabling Flow Networking
You can opt out of Flow networking by disabling the Advanced Networking option subject to prerequisites to disable advanced networking. See Disabling Flow Networking.
You can deploy Flow Networking in a dark site (a site that does not have Internet access) environment. See the Deploying Flow Networking at a Dark Site topic for more information.
You can upgrade the Flow networking controller. Nutanix releases an upgrade for the Flow networking controller with AOS and Prism Central releases. See Upgrading Flow Networking.
See the AOS Family Release Notes and Release Notes | Prism Central .
Flow networking allows you to create and manage virtual private clouds (VPCs) and overlay subnets to leverage the underlying physical networks that connect clusters and datacenters. See Virtual Private Cloud.
You can upgrade the network gateway version. Network gateway is used to create VPN or VTEP gateways to connect subnets using VPN connections, or Layer 2 subnet extensions over VPN or VTEP.
The Flow Networking architecture uses a three-plane approach to simplify network virtualization.
Prism Central provides the management plane, the network controller itself acts as the control plane while the AHV nodes provide the data plane. This architecture provides a strong foundation for Flow Networking. This architecture is depicted in the following chart.
Flow Networking supports the following scale:
Entities | Scale |
---|---|
Virtual Private Clouds |
500 |
Subnets |
5,000 |
Ports |
50,000 |
Floating IPs |
2,000 per networking controller-enabled Prism Central. |
Routing Policies |
1,000 per Virtual Private Cloud. 10,000 per networking controller-enabled Prism Central. |
A Virtual Private Cloud (VPC) is an independent and isolated IP address space that functions as a logically isolated virtual network. A VPC could be made up of one or more subnets that are connected through a logical or virtual router. The IP addresses within a VPC must be unique. However, IP addresses may overlap across VPCs. As VPCs are provisioned on top of another IP-based infrastructure (connecting AHV nodes), they are often referred to as the overlay networks. Tenants may spin up VMs and connect them to one or more subnets within a VPC. Virtual Private Cloud (VPC) is a virtualized network of resources that are specifically isolated from the rest of the resource pool. VPC allows you to manage the isolated and secure virtual network with enhanced automation and scaling. The isolation is done using network namespace techniques like IP-based subnets or VLAN based networking.
You can use IP address-based subnets to network virtual machines within a VPC. A VPC may use multiple subnets. VPC subnets use private IP address ranges. IP addresses within a single VPC must be unique, in other words, IP addresses inside the same VPC cannot be repeated. However, IP addresses can overlap across multiple VPCs. The following figure shows two VPCs named Blue and Green. Each VPC has two subnets, 192.168.1.0/24 and 192.168.2.0/24, that are connected by a logical router. Each subnet has a VM with an IP address assigned. The subnets and VM IP addresses overlap between the two VPCs.
The communication between VMs in the same subnets or different subnets in the same VPC (also called East-West communication) is enabled using GEneric NEtwork Virtualization Encapsulation (GENEVE). If a Prism Central manages multiple clusters, then the VMs that belong to the same VPC could be deployed across different clusters. The virtual switch on the AHV nodes provide distributed virtual switching and distributed virtual routing for all VPCs.
Subnets outside a VPC are external subnets. External subnets may be subnets within the deployment but not included in a specific VPC. External subnets may also be subnets that connect to the endpoints outside the deployment such as another deployment or site.
External subnets can be deployed with NAT or without NAT. You can add a maximum of two external subnets - one external subnet with NAT and one external subnet without NAT to a VPC. Both external subnets cannot be of the same type. For example, you cannot add two external subnets, both with NAT. You can update an existing VPC similarly.
SNAT and Floating IP addresses are used only when you use NAT for an external subnet.
In Source Network Address Translation (SNAT), the NAT router modifies the IP address of the sender in IP packets. SNAT is commonly used to enable hosts with private addresses to communicate with servers on the public Internet.
For VMs within the VPC to communicate with the rest of the deployment, the VPC must be associated with an external network. In such a case, the VPC is assigned a unique IP address, called the SNAT IP, from the subnet prefix of the external network. When the traffic from a VM needs to be transmitted outside the VPC, the source IP address of the VM, which is a private IP address, is translated to the SNAT IP address. The reverse translation from SNAT IP to private IP address occurs for the return traffic. Since the SNAT IP is shared by multiple VMs within a VPC, only the VMs within the VPC can initiate connections to endpoints outside the VPC. The NAT gateway allows the return traffic for these connections only. Endpoints outside the VPC cannot initiate connections to VMs within a VPC.
In addition to the SNAT IP address, you can also request a Floating IP address — an IP from the external subnet prefix that is assigned to a VM via the VPC that manages the network of the VM. Unless the floating IP address is assigned to the private IP address (primary or secondary IP address) of the VM, the floating IP address is not reachable. When the VM transmits packets outside the VPC, the private IP of the VM is modified to the Floating IP. The reverse translation occurs on the return traffic. As the VM uses the Floating IP address, an endpoint outside the VPC can also initiate a connection to the VM with the floating IP address.
The translation of the private IP addresses to Floating IP or SNAT IP address, and vice versa, is performed in the hypervisor virtual switch. Therefore, the VM is not aware of this translation. Floating IP translation may be performed on the hypervisor that hosts the VM to which the floating IP is assigned to. However, SNAT translation is typically performed in a centralized manner on a specific host.
NAT Gateways are used only when you use NAT for an external subnet.
Network Address Translation (NAT) is a process for modifying the source or destination addresses in the headers of an IP packet while the packet is in transit. In general, the sender and receiver applications are not aware that the IP packets are being manipulated.
A NAT Gateway provides the entities inside an internal network with connectivity to the Internet without exposing the internal network and its entities.
A NAT Gateway is:
The externally-routable IP address may be an IP address from a private IP address space or an RFC1918 address that is used as a NAT gateway. The NAT Gateway IP address could be a static IP address or a DHCP assigned IP address.
Event | Failover Time |
---|---|
Network controller stops on AHV | Up to 45 seconds. |
Node reboot | Up to 45 seconds. |
Node power off:
When NAT Gateway and network controller MSP worker VMs are not on the same node. |
Up to 45 seconds. |
Node power off:
When NAT Gateway and network controller MSP worker VMs are on the same node. |
Up to 300 seconds (5 minutes). |
A static IP address is a fixed IP address that is manually assigned to an interface in a network. Static IP addresses provide stable routes that do not have to be updated frequently in the routing table since the static routes generated using static IP addresses do not need to be updated.
Usually in a large IP-based network (a network that uses IP addresses), a Dynamic Host Configuration Protocol or DHCP server assigns IP addresses to interfaces of an entity (using DHCP client service on the entity). However, some entities may require a static IP address that can be reached (manual remote access or via VPN) quickly. A static IP address can be reached quickly because the IP address is fixed, assigned manually and is stored in the routing table for a long duration. For example, a printer in an internal network would need a static IP address so that it can be connected reliably. Static IP addresses can be used to generate static routes which remain unchanged in routing tables, thus providing stable long-term connectivity to the entity that has the static IP address assigned.
Static routes are fixed routes that are created manually by the network administrator. Static routes are more suited for small networks or subnets. Irrespective of the size of a network, static routes may be required in a variety of cases. For example, in VPCs where you use virtual private networks (VPNs) or Virtual Tunnel End Point (VTEP) over VxLAN transport connections to manage secure connections, you could use static routes for specific connections such as site-to-site connections for disaster recovery. In such a case it is necessary to have a known reliable route over which the disaster recovery operations can be performed smoothly. Static routes are primarily used for:
In a network that is not constantly changing, static routes can provide faster and more reliable services by avoiding the network overheads like route advertisement and routing table updates for specific routes.
You can create an IP-based Overlay subnet for a VPC. An Overlay network is a virtualized network that is configured on top of an underlying virtual or physical network. A special purpose multicast network can be created as an Overlay network within an existing network. A peer-to-peer network or a VPN are also examples of Overlay networks. An important assumption for an Overlay network is that the underlying network is fully connected. Nutanix provides the capability to create Overlay network-based VPCs.
See how overlay networks compare with VLAN networks. A virtual local area network or VLAN network is a Layer 2 network that provides virtualized network segmentation solution. VLANs route and balance traffic in a network based on MAC addresses, Protocols such as Ethernet, ports or specific subnets. A VLAN creates a virtual Layer 3 network using Layer 2 addressing by separating broadcast domains virtually or logically. A VLAN configured network behaves as if the network is segmented using a physical layer 2 switch without implementing a layer 3 IP based subnet for the segmentation. VLAN traffic usually cannot traverse outside the VLAN.
The main advantage that VLAN networks provide is that VLAN networks require only layer 2 (L2) connectivity. VLANs do not require any of the layer 3 (L3) Flow Networking features.
Overlay networks can be laid on underlying physical network connections including VLAN networks. Overlay networks provide the following advantages and constraints:
When all the guest VMs belonging to a subnet are in the same AHV: Flow Networking broadcasts the traffic to all guest VMs in the same subnet.
When some VMs belonging to a subnet are in other AHVs: Flow Networking tunnels the traffic to only those AHVs which have endpoints in the same subnet.
In other words, Flow Networking broadcasts traffic to all the guest VMs in the same subnet.
Unicast traffic is traffic transmitted on a one-to-one basis between IP addresses and ports. There is only one sender and one receiver for the traffic. Unicast traffic is usually the most used form of traffic in any LAN network using Ethernet or IP networking. Flow Networking transmits unicast traffic based on the networking policies set.
Flow Networking always drops unknown unicast traffic. It is not transmitted to any guest VM within or outside the source AHV.
Flow Networking transmits the traffic to the VMs in the multicast group within the same subnet. If the VM is on another AHV, the destination AHV must have an endpoint in the subnet.
A multicast group is defined by an IP address (called a multicast IP address, usually a Class D IP address) and a port number. Once a host has group membership, the host will receive any data packets that are sent to that group defined by an IP address/port number.
Make sure you meet these prerequisites before you enable Flow networking on Prism Central.
You must have the following fulfilled to enable Flow networking:
Ensure that you log on to Prism Central as a local account user with Prism Admin role. If you log on to Prism Central as a non-local account (IDP-based) user or without Prism Admin role privileges, then Prism Central does not allow you to enable or use Flow Networking. The task is reported as Failed with a User Denied Access message.
Ensure that the Prism Central running Flow networking is hosted on an AOS cluster running AHV.
The network controller has a dependency only on the AHV version.
Choose the x-large PC VM size for Flow networking deployments. Small or large PC VMs are not supported for Flow Networking.
If you are running a small or large Prism Central VMs, upgrade the Prism Central VM resources to x-large PC VM. See Acropolis Upgrade Guide for procedure to install an x-large Prism Central deployment.
Although Flow networking may be enabled on a single-node PC, Nutanix strongly recommends that you deploy a three-node scale-out Prism Central for production deployments. The availability of Flow networking service in Prism Central is critical for performing operations on VMs that are connected to overlay networks. A three-node scale-out Prism Central ensures that Flow networking continues to run even if one of the nodes with a PCVM fails.
Prism Central VM registration. You cannot unregister the Prism Element cluster that is hosting the Prism Central deployment where you have enabled Flow Networking. You can unregister other clusters being managed by this Prism Central deployment.
Ensure that Microservices Infrastructure (CMSP) is enabled on Prism Central before you enable Flow Networking. See the Prism Central Guide for more information.
For the procedure to enable Microservices Infrastructure (including enable in dark site), see Enabling Micro Services Infrastructure section in the Prism Central Guide .
Ensure that you have created a virtual IP address (VIP) for Prism Central. The Acropolis Upgrade Guide describes how to set the VIP for the Prism Central VM. Once set, do not change this address.
Ensure connectivity:
Between Prism Central and its managed Prism Element clusters.
To the Internet for connectivity (not required for dark site) to:
Nutanix recommends increasing the MTU to 9000 bytes on the virtual switch vs0 and ensure that the physical networking infrastructure supports higher MTU values (jumbo frame support). The recommended MTU range is 1600-9000 bytes.
Nutanix CVMs use the standard Ethernet MTU (maximum transmission unit) of 1,500 bytes for all the network interfaces by default. The system advertises the MTU of 1442 bytes to guest VMs using DHCP to account for the extra 58 bytes used by Generic Network Virtualization Encapsulation (Geneve). However, some VMs ignore the MTU advertisements in the DHCP response. Therefore, to ensure that Flow networking functions properly with such VMs, enable jumbo frame support on the physical network and the default virtual switch vs0.
If you cannot increase the MTU of the physical network, decrease the MTU of every VM in a VPC to 1442 bytes in the guest VM console.
The following applies to upgrades of Flow networking network controller ( Advanced Networking in Prism Control Settings ):
See Compatibility and Interoperability Matrix on the Nutanix Support portal for AOS and Prism Central compatibility.
The network controller upgrade fails if any of the AHV hosts is running an incompatible version.
Flow networking does not support Flow security for guest VMs.
You cannot configure rules for Flow security if a guest VM has any NICs connected to VPCs.
Flow networking is supported only on AHV clusters. It is not supported on ESXi or Hyper-V clusters.
Flow networking is not enabled on the new PE cluster registering with the Flow networking-enable Prism Central if the Prism Element cluster has an incompatible AHV version.
Flow networking does not support updating a VLAN-backed subnet as an external subnet.
You cannot enable the external connectivity option in the Update Subnet dialog box. Therefore, you cannot modify an existing VLAN-backed subnet to add external connectivity.
VLAN backed subnets for external connectivity are managed by the Flow networking control plane. Traditional AHV VLAN IPAM networks are managed by acropolis.
Flow networking cannot be disabled if any external subnets and VPCs are in use. Delete the external subnets and VPCs and then disable Flow Networking.
Disaster Recovery backup and migration: CMSP-enabled Prism Central does not support disaster recovery backup and migration operations both as a source and target host.
Ensure tha microservices infrastructure is enabled on Prism Central. See Enabling Micro Services Infrastructure section in the Prism Central Guide .
Before you proceed to enable Flow Networking by enabling the Advanced Networking option, see Prerequisites for Enabling Flow Networking.
To enable Advanced Networking, go to Prism Central Settings > Advanced Networking and do the following.
Ensure that the prerequisites specified on the pane are fulfilled.
You can disable Flow Networking. However, the network controller cannot be disabled if any external subnets and VPCs are in use. Delete the subnets and VPCs before you disable advanced networking.
Flow Networking cannot be disabled if any external subnets and VPCs are in use. Delete the external subnets and VPCs and then disable Flow Networking.
To disable Flow Networking, do the following.
To exit without disabling the Advanced Networking controller, click Cancel .
Before unregistering a Prism Element from PC, disable Flow Networking on that Prism Element using network controller CLI (or atlas_cli).
When Flow Networking is enabled on a Prism Central, it propagates the capability to participate in VPC networking to all the registered Prism Elements that are running the required AHV version.
In cases where there are VMs on the Prism Element attached to the VPC network, or if the Prism Element is used to host one or more of the external VLAN networks attached to a VPC, Prism Central alerts you with a prompt. When being alerted about the aforementioned conditions, close the CLI and make adequate configuration to resolve the condition (for example, select a different cluster for the external VLAN network and delete the VMs attached to the VPC network running on the Prism Element). After making such configurations, execute the network controller CLI to disable Flow Networking. If the command goes through successfully, it is safe to unregister the Prism Element.
For example, in a deployment of three Prism Elements - PE1, PE2 and PE3 - registered to the Flow Networking-enabled PC, you want to unregister PE3 from the PC. You must first disable Flow Networking using the following steps:
nutanix@cvm$ atlas_cli
<atlas>
An example of the PC alert, for the condition that PE3 VM is attached to an external network, is as follows:
<atlas> config.add_to_excluded_clusters 0005bf8d-2a7f-3b2e-0310-d8e34995511e Cluster 0005bf8d-2a7f-3b2e-0310-d8e34995511e has 1 external subnet, which will lose connectivity. Are you sure? (yes/no)
The output displays the enable_atlas_networking parameter as False if Flow Networking is disabled and as True if Flow Networking is enabled on the Prism Element.
nutanix@cvm$ acli atlas_config.get config { anc_domain_name_server_list: “10.10.10.10” enable_atlas_networking: False logical_timestamp: 19 minimum_ahv_version: “20190916.101588" ovn_cacert_path: “/home/certs/OvnController/ca.pem” ovn_certificate_path: “/home/certs/OvnController/OvnController.crt” ovn_privkey_path: “/home/certs/OvnController/OvnController.key” ovn_remote_address: “ssl:anc-ovn-external.default.anc.aj.domain:6652" }
You can now unregister the PE from the PC.
You can upgrade the Flow networking controller ( Advanced Networking Controller in Prism Central Settings ) using Life Cycle Manager (LCM) on Prism Central.
See Prerequisites for Enabling Flow Networking.
In case of upgrading the Flow networking controller in a dark site, ensure that LCM is configured to reach the local web server that hosts the dark site upgrade bundles.
The network controller upgrade fails to start after the pre-check if one or more clusters have Flow Networking enabled and are running an AHV version incompatible with the new network controller upgrade version.
To upgrade the network controller using LCM, do the following.
Click Check for Updates on the Advanced Networking page.
When you click Perform Inventory , the system scans the registered Prism Central cluster for software versions that are running currently. Then it checks for any available upgrades and displays the information on the LCM page under Software .
Dark sites are primarily on-premises installations which do not have access to the internet. Such sites are disconnected from the internet for a range of reasons including security. To deploy Flow networking at such dark sites, you need to deploy the dark site bundle at the site.
This dark site deployment procedure includes downloading and deploying MSP and the network controller bundles.
See Prerequisites for Enabling Flow Networking.
You need access to the Nutanix Portal from an Internet-connected device to download the following dark site bundles:
To deploy Flow Networking at a dark site, do the following.
The web server can be a virtual machine on a cluster at the dark site. All the Prism Central VMs at the dark site must have access to this web server. This web server is used when you deploy any dark site bundle including the network controller darksite bundle.
For more information about the server installation, see:
Linux web server
Windows web server
Alternatively, SSH into the Prim Central VM as an admin user and run the following command.
admin@pcvm$ mspctl controller airgap enable --url=http://<LCM-web-server-ip>/release
Where <LCM-web-server-ip> is the IP address of the LCM web server and release is the name of the directory where the packages were extracted.
For example,
admin@pcvm$ mspctl controller airgap enable
--url=http://10.48.111.33/release
. Here,
10.48.111.33
is the IP address of the LCM web server
and
release
is the name of the directory where the
packages were extracted.
nutanix@cvm$ mspctl controller airgap get
After unpacking, check if the system shows a directory path that includes the following as per the example: http://<LCM-web-server-ip>/release/builds/msp-builds/msp-services/464585393164.dkr.ecr.us-west-2.amazonaws.com/nutanix-msp/atlas-hermes/ .
chmod -R +r builds
$> takeown / R / F *
$> icacls <Build-file-path> /t /grant:F
.
See the Enabling Microservices Infrastructure section in the Prism Central Guide for details.
This section provides information to assist troubleshooting of Flow Networking deployments. This is in addition to the information that the "Prism Central Guide" provides.
Prism Central generates audit logs for all the flow networking activities like it does for other activities on Prism Central. See Audit Summary View in the Prism Central Guide , for more information about Audit log.
To support troubleshooting for Flow Networking, you can collect logs.
To collect the logs, run the following commands on the Prism Central VM console:
nutanix@cvm$ logbay collect -t msp,anc
An example of the command is as follows:
nutanix@cvm$ logbay collect -t msp,anc -O msp_pod=true,msp_systemd=true,kubectl_cmds=true,persistent=true --duration=-48h0m0s
Where:
-t
flag indicates the tags to collect
msp tag will collect logs from the services running on MSP pods and persistent log volumes (application-level logs)
anc tag will collect the support bundle, which includes database dumps and OVN state
-O
flag adds tag-level options
msp_pod=true
collects logs from MSP service pods
On the PC, these logs can be found under /var/log/containers .
persistent=true
collects persistent log volumes
(application-level logs for ANC)
On the PC, these can be found under /var/log/ctrlog
kubectl_cmds=true
runs
kubectl
commands to
get the Kubernetes resource state
--duration
sets the duration from the present to collect
The command run generates a zip file at a location, for example: /home/nutanix/data/logbay/bundles/<filename>.zip
Unzip the bundle and you'll find the anc logs under a directory specific to your MSP cluster, the worker VM where the pod is running, and the logging persistent volume of that pod. For example:
./msp/f9684be8-b4e8-4524-74b4-076ed53ca1fd/10.48.128.185__worker_master_etcd/persistent/default/ovn/anc-ovn_StatefulSet/
For more information about the task run, see the text file that the command generates at a location, for example: /home/nutanix/data/logbay/taskdata/<taskID>/collection_result.txt
For more information about the logbay collect command, see the Logbay Log Collection (Command Line) topic in the Nutanix Cluster Check Guide (NCC Guide).
The L2StretchLocalIfConflict alert (Alert with Check ID - 801109) may occur while performing Layer 2 virtual subnet extensions. See KB-10395 for more information about its resolution.
Nutanix deployment can detect and install upgrades for the onprem Nutanix Gateways.
For information about identifying the current Nutanix Gateway version, see Identifying the Gateway Version.
For onprem Nutanix Gateways, the upgrades need to be detected and installed on the respective PC on which each Nutanix Gateway is installed.
For more information, see Detecting Upgrades for Gateways.
When PC detects the upgrades, it displays a banner on the Gateways tab of the Connectivity page. The banner notifies you that a Gateway upgrade is available after you have run LCM inventory. The table on the Gateways tab also displays an alert (exclamation mark) icon for the network gateways that the upgrade applies to. The hover message for the icon informs you that an upgrade is available for that Gateway.
For more information about the upgrade procedure, see Upgrading the PC-managed Onprem Nutanix VPN Gateways.
To identify the current Nutanix Gateway version, do the following:
In the Gateway table, the VPN Gateway name is a clickable link text.
The Gateway Version is listed in the Properties widget.
Prism Central can detect whether new Gateway upgrades are available, or not, for Nutanix Gateways using LCM. You can then install the upgrade.
Nutanix recommends that you select Enable LCM Auto Inventory in the LCM page in Prism Central to continuously detect new Gateway upgrades as soon as they are available.
The upgrade notification banner is displayed on the Gateways page.
Perform upgrades of PC-managed Nutanix Gateways using the respective PC on which the Gateway is created.
To upgrade the on-prem Nutanix Gateways, do the following:
When you click Perform Inventory , the system scans the registered Prism Central cluster for software versions that are running currently. Then it checks for any available upgrades and displays the information on the LCM page under Software .
Skip this step if you have enabled auto-inventory in the LCM page in Prism Central.
LCM upgrades the Gateway version. This process takes sometime.
The Network and Security category in the Entities Menu expands on-click to display the following networking and security entities that are configured for the registered clusters:
Subnets : This dashboard displays the subnets and the operations that you can perform on subnets.
Virtual Private Clouds : This dashboard displays the VPCs and the operations that you can perform on VPCs.
Floating IPs : This dashboard displays a list of floating IP addresses that you are using in the network. It allows you to request for floating IP addresses from the free pool of I addresses available to the clusters managed by the Prism Central instance.
Connectivity : This dashboard allows you to manage the following networking capabilities:
Gateways : This tab provides a list of network gateways that you have created and configured, and the operations you can perform on the network gateways. You can check and upgrade the Gateway bundle in Administration > LCM > Inventory .
VPN Connections : This tab provides a list of VPN connections that you have created and configured, and the operations you can perform on VPN connections.
Subnet Extensions : This tab provides a list of subnets that you have extended at the Layer 2 level using VPN (point-to-point over Nutanix VPN) or VTEP (point-to-multi-point including third party).
Security Policies : This dashboard provides a list of security policies you configured using Flow Segmentation. For more information about Security Policies, see the Flow Microsegmentation Guide.
See "Network Connections" section for information on how to configure network connections.
Subnets (Overlay IP subnets), Virtual private clouds, floating IPs, and Connectivity are Flow Networking features. These features support flexible app-driven networking that focuses on VMs and applications instead of virtual LANs and network addresses. Flow Networking powers network virtualization to offer a seamless network experience with enhanced security. It is disabled by default. It is a software-defined network virtualization solution providing overlay capabilities for the on-premises AHV clusters.
Security policies drives the Flow Segmentation features for secure communications. See Flow Microsegmentation Guide.
Manage subnets in the
List
view of
Subnets
dashboard in the
Network and
Security
section.
To access the Subnets dashboard, select Subnets from the entities menu in Prism Central. The Subnets dashboard allows you to view information about the subnets configured for the registered clusters.
The following table describes the fields that appear in the subnets list. A dash (-) is displayed in a field when a value is not available or applicable.
Parameter | Description | Values |
---|---|---|
Name | Displays the subnet name. | (subnet name) |
External Connectivity | Displays whether or not the subnet has external connectivity configured. | (Yes/No) |
Type | Displays the subnet type. | VLAN |
VLAN ID | Displays the VLAN identification number. | (ID number) |
VPC | Displays the name of the VPC that the Subnet is used in. | (Name of VPC) |
Virtual Switch |
Displays the virtual switch that is configured for the VLAN you selected. The
default value is the default virtual switch
vs0
.
Note:
The virtual
switch name is displayed only if you add a VLAN ID in the VLAN ID
field.
|
(virtual switch name) |
IP Prefix | Displays the IPv4 Address of the network with the prefix. | (IPv4 Address/Prefix) |
Cluster | Displays the name of the cluster for which this subnet is configured. | (cluster name) |
Hypervisor | Displays the hypervisor that the subnet is hosted on. | (Hypervisor) |
To filter the list by network name, enter a string in the filter field. (Ignore the Filters pane as it is blank.)
To view focused fields in the List, select the focus parameter from the Focus drop down list. You can create your own customised focus parameters by selecting Add custom from the drop down list and selecting the necessary fields after providing a Name , in the Subnet Columns .
There is a Network Config action button to configure a new network (see Configuring Network Connections
The Actions menu appears when one or more networks are selected and includes a Manage Categories option (see Assigning a Category ).
Go to the Subnets list view by clicking Network and Security > Subnets on the left side-bar.
To view or select actions you can perform on a subnet, select the subnet and click the Actions dropdown.
Action | Description |
---|---|
Update | Click this action to update the selected subnet. see Updating a Subnet in the Flow Networking Guide. |
Manage Extension | Click this action to create a subnet extension. A subnet extension allows VMs to communicate over the same broadcast domain to a remote Xi availability zone (in case of Xi-Leap based disaster recovery) via the extension. |
Manage Categories | Click this action to associate the subnet with a category or change the categories that the subnet is associated with. |
Delete | Click this action to delete the selected subnet. See Deleting Subnets, Policies, or Routes in the Flow Networking Guide . |
You can also filter the list of subnets by clicking the Filters option and selecting the filtering parameters.
View the details of a subnet listed on the Subnets page.
To view the details of a subnet, click the name of the subnet on the subnet list view.
The Summary page provides buttons for the actions you can perform on the subnet, at the top of the page. Buttons for the following actions are available: Update , Extend , Manage Categories , and Delete .
The subnet Summary page has the following widgets:
Widget Name | Information provided |
---|---|
Subnet Details |
Provides the following:
|
IP Pool | Provides the IP address Pool Range assigned to the network. |
External Connectivity |
Provides the following:
|
You can manage Virtual Private Clouds (VPCs) on the
Virtual Private
Clouds
dashboard.
Go to the Virtual Private Clouds dashboard by clicking Network and Security > Virtual Private Clouds on the left side-bar.
You can configure the table columns for the VPC list table. The available column list includes Externally Routable IP Addresses that provides address space within the VPC that is reachable externally without NAT.. For the list of columns that you can add to the list table, see Customizing the VPC List View.
Ensure that the externally routable IP addresses (subnets with external connectivity without NAT) for different VPCs do not overlap.
Configure the routes for the external connectivity subnets with next hop as the Router or SNAT IP address. Also configure the routes on the router for the return traffic to reach the VPC. See External Connectivity panel in VPC Details View.
To view or select actions you can perform on a VPC, select the VPC and click the Actions drop down.
You can also filter the list of VPC by clicking the Filters option and selecting the filtering parameters.
You can customize the columns in the table. Click the View by drop down and select + Add custom .
In the Virtual Network Columns dialog box, do the following.
During the column selection, the columns you select are moved under the Selected Columns list. The Name (of the VPC) column is the default column already selected. You can add a maximum of 10 columns (including the Name column) to the Selected Column list.
To arrange the order of the selected columns, hover on the column name and click the up or down arrow button as appropriate.
To view the details of a VPC, click the name of the VPC on the VPC list view.
The VPC details view has the following tabs:
The Summary tab provides the following panes:
The Subnet tab provides the following information for the subnets:
The Policies tab maps the following information about the security-based traffic shaping policies you configure:
The Routes tab provides the following information about the routes:
The VPC details view has the following configuration options for the VPC:
You can access floating IPs on the
Floating IPs
dashboard or list view in the
Network and Security
section.
For information about floating IP addresses and their role in Flow Networking, see SNAT and Floating IP Address.
Go to the Floating IPs dashboard by clicking Network and Security > Floating IPs on the left side-bar.
To view or select actions you can perform on a floating IP address assigned, select the floating IP address and click the Actions drop down. The following actions are available for a selected floating IP address:
To filter the list of floating IP address assignments, click the Filters option and select the appropriate filtering parameters.
To request floating IP addresses, see Requesting Floating IPs.
You can access network Gateways, VPN connections and subnet extensions on the
Connectivity
dashboard.
Click Network & Security > Connectivity to see the Connectivity dashboard.
The Connectivity dashboard opens on the Gateways tab. To see the VPN connections, click the VPN Connections tab. To see the subnets extended across AZs, click the Subnet Extensions tab.
The Connectivity dashboard opens on the Gateways dashboard or summary view.
The Gateway dashboard provides a list of gateways created for the clusters managed by the Prism Central.
The Gateways dashboard provides a Create Gateway dropdown menu that lets you create a Local or a Remote gateway. You can create a local or remote gateway with VPN or VTEP service. For more information, see Creating a Network Gateway.
You can select a gateway from the list (select the checkbox provided for the gateway) and then perform an action provided in the Actions dropdown list. The Actions dropdown list allows you to Update or Delete the selected gateway.
The Gateway summary list view provides the following details about the gateway.
Parameter | Description | Values |
---|---|---|
Name | Displays the name of the gateway. | (Name of gateway) |
Type | Displays the gateway type. | (Local or Remote) |
Service | Displays the service that the gateway uses. | (VPN or VTEP) |
Service IP | Displays the IP address used by the service. | (IP address) |
Status | Displays the operational status of the gateway. | (Up or Down) |
Attachment Type/Vendor | Displays the type of subnet associated with the gateway. | (VLAN or Overlay-VPC name) |
Connections | Displays the number of service connections (such as VPN connections) configured and operational on the gateway. | (number) |
You can click the name of a gateway to open the gateway details page that presents the information about the gateway in widgets.
You can click the name of a gateway in the Gateway dashboard list to open the gateway details page that presents the information about the gateway in widgets.
The gateway details page displays the name of the gateway on the top left corner.
On the top right corner, the close button (X) allows you to close the details page.
The Update button opens the Update Gateway page. For more information, see Updating a Network Gateway in Flow Networking Guide .
The Delete button allows you to delete the gateway. For more information, see Deleting a Network Gateway in Flow Networking Guide .
The details about the gateway are organized in widgets as follows:
Parameter | Description | Values |
---|---|---|
Properties widget | ||
Type | Displays the gateway type. | (Local or Remote) |
Attachment Type | Displays the network entity like VLAN or VPC that the gateway is attached to. | (VLAN or VPC) |
VPC or Subnet (VLAN) | Displays the name of the attached VPC or VLAN subnet. | (Name of VLAN or VPC) |
Floating or Private IP Address | Displays the Floating (for VPC) or Private (for VLAN) IP address assigned to the gateway. | (IP Address) |
Status | Displays the operational status of the gateway. | (Up or Down) |
Gateway Version | Displays the version of the Nutanix gateway appliance deployed. | (Version) |
Cluster | Displays the name of the cluster on which the gateway is created. | (Cluster name) |
Gateway VM | Displays the name of the VM on which the gateway is created. | (Name of VM - actionable link. Click the name-link to open the VM details page of the gateway VM.) |
Service Configuration | ||
Service | Displays the service used by the gateway. | (VPN or VTEP) |
External Routing | Displays the type of routing associated with the gateway for external traffic routing. | (Static or eBGP with ASN) |
Internal Routing | Displays the type of routing associated with the gateway for internal traffic routing. | (Static or eBGP with ASN) |
VPN Connections | Displays the total number of VPN connections associated with the gateway. | (Number - actionable link. Click the link to open the VPN connection details page for the associated VPN connection.) |
View VPN Connections | Click this link to open the VPN Connections tab. | - |
The Connectivity dashboard allows you to open the VPN Connections dashboard or summary view.
VPN Connection: Represents the VPN IPSec tunnel established between local gateway and remote gateway. When you create a VPN connection, you need to select two gateways between which you want to create the VPN connection.
The VPN Connections dashboard provides a list of VPN connections created for the clusters managed by the Prism Central.
The VPN Connections dashboard provides a Create VPN Connection button that opens the Create VPN Connection . For more information, see Creating a VPN Connection in Flow Networking Guide .
You can select a VPN connection from the list (select the checkbox provided for the VPN connection) and then perform an action provided in the Actions dropdown list. The Actions dropdown list allows you to Update or Delete the selected VPN connection.
The VPN Connections summary list view provides the following details about the VPN connection.
Parameter | Description | Values |
---|---|---|
Name | Displays the name of the connection. | (gateway name) |
IPSec Status | Displays the connection status of IPSec tunnel. | (Connected or Not Connected) |
EBGP Status | Displays the status of the EBGP gateway connection. | (Established or Not Established) |
Local Gateway | Displays the name of the local gateway used for the connection. | (Name of local gateway) |
Remote Gateway | Displays the name of the remote gateway used for the connection. | (Name of remote gateway) |
Dynamic Routing Priority | Displays the dynamic routing priority assigned to the connection for throughput management. You can assign any value in the range of 100-1000. Flow networking assigns the first VPN connection the value 500 by default. Thereafter, subsequent VPN connections are assigned values decremented by 50. For example, the first connections is assigned 500, then the second connection is assigned 450, the third one 400 and so on. | (Number in the range of 100-1000. User assigned.) |
You can click the name of a VPN connection in the VPN Connections dashboard list to open the VPN connection details page that presents the information about the VPN connection in widgets.
The VPN connection details page displays the name of the VPN connection on the top left corner.
On the top right corner, the close button (X) allows you to close the details page.
The Update button opens the Update VPN Connection page. For more information, see Updating a VPN Connection in Flow Networking Guide .
The Delete button allows you to delete the VPN connection. For more information, see Deleting a VPN Connection in Flow Networking Guide .
The details about the VPN connection are organized in widgets as follows:
Parameter | Description | Values |
---|---|---|
VPN Connection widget | ||
IPSec Status | Displays the connection status of IPSec tunnel. | (Connected or Not Connected) |
EBGP Status | Displays the status of the EBGP gateway connection. | (Established or Not Established) |
Dynamic Routing Priority | Displays the dynamic routing priority assigned to the connection for throughput management. You can assign any value in the range of 100-1000. Flow networking assigns the first VPN connection the value 500 by default. Thereafter, subsequent VPN connections are assigned values decremented by 50. For example, the first connections is assigned 500, then the second connection is assigned 450, the third one 400 and so on. | (Number in the range of 100-1000. User assigned.) |
Local Gateway Properties | ||
Gateway Name | Displays the name of the local gateway used for the connection. | (Name of local gateway) |
Type | Displays the type of gateway. | (Local) |
Attachment Type | Displays the network entity like VLAN or VPC that the gateway is attached to. | (VLAN or VPC) |
VPC or Subnet (VLAN) | Displays the name of the attached VPC or VLAN subnet. | (Name of VLAN or VPC) |
Tunnel IP | Displays the Tunnel IP address of the local gateway. | (IP Address) |
Connection Type | Displays the connection type you selected while creating the VPN connection. The connection type may be Initiator or Acceptor of a VPN connection between the local and remote gateways. T | (Initiator or Acceptor) |
External Routing | Displays the type of routing associated with the gateway for external traffic routing. | (Static or eBGP with ASN) |
Internal Routing | Displays the type of routing associated with the gateway for internal traffic routing. | (Static or eBGP with ASN) |
Floating or Private IP Address | Displays the Floating (for VPC) or Private (for VLAN) IP address assigned to the gateway. | (IP Address that you assigned to the local gateway with /30 prefix when you configured the VPN connection.) |
Status | Displays the operational status of the gateway. | (Up or Down) |
Cluster | Displays the name of the cluster on which the gateway is created. | (Cluster name) |
Gateway VM | Displays the name of the VM on which the gateway is created. | (Name of VM - actionable link. Click the name-link to open the VM details page of the gateway VM.) |
Remote Gateway Properties | ||
Gateway Name | Displays the name of the remote gateway used for the connection. | (Name of remote gateway) |
Type | Displays the type of gateway. | (Remote) |
Tunnel IP | Displays the Tunnel IP address of the remote gateway. | (IP Address) |
Connection Type | Displays the connection type you selected while creating the VPN connection. The connection type may be Initiator or Acceptor of a VPN connection between the local and remote gateways. T | (Initiator or Acceptor) |
External Routing | Displays the type of routing associated with the gateway for external traffic routing. | (Static or eBGP with ASN) |
ASN | Displays the ASN of the EBGP route. This information is only displayed if you configured EBGP as the External Routing protocol. | (Number) |
Vendor | Displays the name of the vendor of the gateway appliance at the remote site. | (Name of vendor of gateway appliance) |
External IP | Displays the IP address assigned to remote the gateway. | (IP Address that you assigned to the remote gateway with /30 prefix when you configured the VPN connection.) |
Status | Displays the operational status of the gateway. | - |
Protocol Details | ||
Service | Displays the service used by the gateway. | (VPN or VTEP) |
Gateway Routes | Displays the status of the routes used by the gateways. | (Sent) |
The Connectivity dashboard opens on the Subnet Extensions dashboard or summary view.
The Subnet Extensions dashboard provides a list of subnet extensions created for the clusters managed by the Prism Central.
The Subnet Extensions dashboard provides a Create Subnet Extension dropdown menu that lets you extend a subnet Across Availability Zones or To a Third Party Data Center . You can extend a subnet using VPN or VTEP service. See Layer 2 Virtual Network Extension for more information.
You can select a subnet extension from the list (select the checkbox provided for the subnet extension) and then perform an action provided in the Actions dropdown list. The Actions dropdown list allows you to Update or Delete the selected subnet extension.
The Subnet Extensions summary list view provides the following details about the gateway.
Parameter | Description | Values |
---|---|---|
Name | Displays the name of the subnet extension. | (Name of subnet extension) |
Type | Displays the subnet extension type. | ( Across Availability Zones or To a Third Party Data Center ) |
Extension Over | Displays the service that the subnet extension uses. | (VPN or VTEP) |
Extension Uses | Displays the name of the local network gateway that the subnet extension uses. | (Name of local network gateway) |
Local Subnet | Displays the name of the local subnet that the subnet extension uses. | (Name of local subnet) |
Remote Site | Displays the name of the remote network gateway that the subnet extension uses. | (Name of remote network gateway) |
Connection Status | Displays the status of the connection that is created by the subnet extension. Not Available status indicates that Prism Central is unable to ascertain the status. | (Not Available, Connected, or Disconnected) |
Interface Status | Displays the status of the interface that is used by the subnet extension. | (Connected or Down) |
You can click the name of a subnet extension to open the subnet extension details page that presents the information about the subnet extension in widgets.
You can click the name of a subnet extension in the Subnet Extensions dashboard list to open the subnet extension details page that presents the information about the subnet extension in widgets.
The subnet extension details page displays the name of the subnet extension on the top left corner. It has two tabs - Summary and Address Table . The Summary tab provides the information about the subnet extension in widgets. The Address Table tab provides MAC Address information only when the subnet extension uses VTEP service.
On the top right corner, the close button (X) allows you to close the details page.
The Update button opens the Update Subnet Extension page. See Updating an Extended Subnet for more information.
The Delete button allows you to delete the subnet extension. See Removing an Extended Subnet for more information.
The details about the subnet extension are organized in two tabs. The Summary tab organizes the subnet extension details in the extended widget as provided in the table. The Address Table tab provides details about the MAC addresses in a list.
Parameter | Description | Values |
---|---|---|
Properties | ||
Type | Displays the subnet type. | (VLAN or Overlay) |
VLAN ID | (For VLAN subnets only) Displays the VLAN ID of the VLAN subnet that is extended. | (VLAN ID number) |
VPC | (For Overlay subnets only) Displays the name of the VPC subnet that is extended. | (Name of VPC) |
Cluster | (For VLAN subnets only) Displays the cluster that the VLAN subnet belongs to. | (Name of cluster) |
IP Address Prefix | Displays the network IP address with prefix, of the VLAN subnet that is extended. | (IP Address with prefix) |
Virtual Switch | (For VLAN subnets only) Displays the virtual switch on which the VLAN subnet is configured. | (Virtual Switch name such as vs0 or vs1) |
IP Address Pools | ||
Pool Range | Displays the range of IP addresses in the pool configured in the subnet that is extended. | (IP address range) |
(Interactive Graphic Pie Chart) |
Displays a dynamic pie chart that displays the statistic you hover on. Displays
the following IP address statistics outside the pie chart, that you can hover on:
|
(IP Address statistics) |
Subnet Extension | ||
Subnet Extension (properties) - Common | ||
Type | Displays the subnet extension type. | ( Across Availability Zones or To a Third Party Data Center ) |
Interface Status | Displays the status of the interface that is used by the subnet extension. | (Connected or Down) |
Connection Status | Displays the status of the connection that is created by the subnet extension. Not Available status indicates that Prism Central is unable to ascertain the status. | (Not Available, Connected, or Disconnected) |
Local IP Address | Displays the IP address that you entered in the Local IP Address field while creating the subnet extension. | (IP Address) |
Local Subnet | Displays the name of the local subnet that the subnet extension uses. | (Name of local subnet) |
Subnet Extension (properties) - (Only for Across Availability Zones type) | ||
Local Availability Zone | (Only for Across Availability Zones type) Displays the name of the local AZ that is hosting the subnet that is extended. | (Name of the local Availability Zone) |
Remote Availability Zone | (Only for Across Availability Zones type) Displays the name of the remote AZ that the subnet is extended to. | (Name of the remote Availability Zone) |
Remote Subnet | (Only for Across Availability Zones type) Displays the name of the remote subnet that the subnet extension connects to. | (Name of remote subnet) |
Remote IP Address | (Only for Across Availability Zones type) Displays the IP address that you entered in the Remote IP Address field while creating the subnet extension. | (IP Address) |
Subnet Extension (properties) - (Only for To a Third Party Data Center type) | ||
Local Gateway | (Only for To a Third Party Data Center type) Displays the name of the local gateway used for the subnet extension. | (Name of local gateway) |
Remote Gateway | (Only for To a Third Party Data Center type) Displays the name of the remote gateway used for the subnet extension. | (Name of remote gateway) |
To access the security policies dashboard, select Policies > Security Policies from the entities menu (see Entities Menu). The security policies dashboard allows you to view summary information about defined security policies.
The following table describes the fields that appear in the security policies list. A dash (-) is displayed in a field when a value is not available or applicable.
Parameter | Description | Values |
---|---|---|
Name | Displays the policy name. The policy is one of three types: application, quarantine, or isolation. | (name), Application, Quarantine, Isolation |
Purpose | Describes (briefly) the policy's purpose. | (text string) |
Policy | Displays (high level) what the policy does. | (boxed text) |
Status | Displays the current status of the policy (either applied currently or in monitoring mode). | Applied, Monitoring |
Last Modified | Displays the date the policy was last modified (or the creation date if the policy has never been modified). | (date) |
You can filter the security polices list based on several parameter values. The following table describes the filter options available when you open the Security Policies view Filter pane. To apply a filter, select a parameter and check the box of the desired value (or multiple values) you want to use as a filter. You can apply filters across multiple parameters.
Parameter | Description | Values |
---|---|---|
Name | Filters on the item name. Select a condition from the pull-down list ( Contains , Doesn't contain , Starts with , Ends with , or Equal to ) and enter a string in the field. It will return a list of security policies that satisfy the name condition/string. | (policy name string) |
Type | Filters on the policy type. Check the box for one or more of the policy types (application, quarantine, isolation). It will limit the list to just those policy types. | Application, Quarantine, Isolation |
Status | Filters on the policy status. Check the box for applied or monitoring. | Applied, Monitoring |
The security policies dashboard includes a Create Security Policy action button with a drop-down list to Secure an Application or Isolation Environments .
The Actions menu appears when one or more policies are selected. It includes options to update, apply, monitor, and delete. The available actions appear in bold; other actions are grayed out. (For grayed out options, a tool tip explaining the reason is provided.)
To access the details page for a security policy, click on the desired security policy name in the list (see Security Policies Summary View). The Security Policy details page includes the following:
For more information about Security Policies, see Flow Microsegmentation Guide.
A Virtual Private Cloud (VPC) is an independent and isolated IP address space that functions as a logically isolated virtual network. A VPC could be made up of one or more subnets that are connected through a logical or virtual router. The IP addresses within a VPC must be unique. However, IP addresses may overlap across VPCs. As VPCs are provisioned on top of another IP-based infrastructure (connecting AHV nodes), they are often referred to as the overlay networks. Tenants may spin up VMs and connect them to one or more subnets within a VPC.
Virtual Private Cloud (VPC) is a virtualized network of resources that are specifically isolated from the rest of the resource pool. VPC allows you to manage the isolated and secure virtual network with enhanced automation and scaling. The isolation is done using network namespace techniques like IP-based subnets or VLAN based networking.
AHV provides the framework to deploy VPC on on-premises clusters using the following.
Flow Networking simplifies the deployment and configuration of overlay-based VPCs. It allows you to quickly:
This section covers the concepts and procedures necessary to implement VPCs in the network.
The primary IP address is assigned to a VM during initialization when the cluster provides any virtual NIC (NIC) to a VM.
For more information about attaching a subnet to a VM, see Creating a VM through Prism Central (AHV) in the Prism Central Guide .
For your deployment, you may need to configure multiple (static) IP addresses to a single NIC. These IP addresses (other than the primary IP address) are secondary IP addresses. A secondary IP address can be permanently associated with a specific NIC or be changed to any other NIC. The NIC ownership of a secondary IP address is important for security routing policies.
You can configure secondary IP addresses to a NIC when you want to:
In applications that use secondary IP addresses as virtual IP addresses and the NIC ownership of the secondary IP address changes dynamically from one NIC to another, configure the application to incorporate the ownership change in its settings or configuration. If the applications do not incorporate these ownership changes, the VPCs configured for such applications fail.
For information about configuring secondary IP addresses, see Creating Secondary IP Addresses.
You can view the IP addresses configured on a VM by clicking the See More link in the IP Address column in the VM details view to open the IP Address Information box.
You can assign multiple secondary IP addresses to a single vNIC.
You can add multiple secondary IP addresses to the vNIC configured on a VM. Add the secondary IP addresses to the vNIC in the Create VM or the Update VM page.
Ensure that the secondary IP addresses are within the same subnet that the primary IP address of the NIC is from. The subnets are displayed in the Private IP Assignment section in the Update NIC dialog box.
Ensure that the secondary IP address is not the same as the IP address provided in the Private IP Assignment field.
If you need to make any other changes on the Resources and the Management tabs for any configurations other than adding secondary IP addresses, make the changes and then click Next on these tabs.
Assign the secondary IP addresses to interfaces or subinterfaces on the VM.
To assign the secondary IP addresses to virtual interfaces on the VM, do the following on the VM details page:
root@host$ ifconfig <interface> <secondary ip address> <network mask>
Provide the following in the command:
Parameter | Description |
---|---|
<interface> | The interface of the VM such as eth0. You can provide subinterfaces such as eth0:1 and eth0:2. |
<secondary IP address> | The secondary IP address that you created and want to associate with the interface. |
<network mask> | The network mask that is an expansion of the network prefix of the network that the secondary IP address belongs to. For example, if the secondary IP address belongs to 10.0.0.0/24 then the network mask is 255.255.255.0. |
Assign the secondary IP addresses to floating IP addresses on the VM.
After you assign secondary IP addresses to interfaces or subinterfaces on the VM, you can assign the secondary IP addresses to floating IP addresses that may be used for external connectivity.
Do one of the following:
A virtual private cloud (VPC) can be deployed on Nutanix cluster infrastructure to manage the internal and external networking requirements using Flow Networking. The workflow to create a complete network based on VPC is described below.
This section provides information and procedures that you need to manage virtual private clouds using Flow networking.
You can create VPCs on the Virtual Private Clouds page. Go to the Virtual Private Clouds page by clicking Virtual Infrastructure > Networking > Virtual Private Clouds .
To create a VPC, do the following.
See Network and Security View for more information about the VPC dashboard.
Fields | Description and Values |
---|---|
Name |
Provide a name for the VPC. |
External Connectivity |
This section takes you through configuration of the
parameters necessary for connectivity to the Internet or
clusters outside the VPC.
A subnet with external connectivity (External Subnet) is required if the VPC needs to send traffic to a destination outside of the VPC.
Note:
You
can add a maximum of two external subnets - one external
subnet with NAT and one external subnet without NAT to a
VPC. Both external subnets cannot be of the same type. For
example, you cannot add two external subnets, both with NAT.
You can update an existing VPC similarly.
Network address translation (NAT) Gateways perform the required IP-address translations required for external routing. You can also have external connectivity without NAT. |
External Subnet |
Select an external subnet from the drop down list. By
associating the VPC with the external subnet you can provide
external connectivity to the VPC.
Note:
Ensure that the externally routable IP addresses (subnets with external connectivity without NAT) for different VPCs do not overlap. Configure the routes for the external connectivity subnets with next hop as the Router or SNAT IP address. Also configure the routes on the router for the return traffic to reach the VPC. See External Connectivity panel in VPC Details View. |
Externally Routable IP Addresses | Provide IP addresses that are externally routable. Externally routable IP addresses are IP addresses that within the VPC which can communicate externally without NAT. These IP addresses are used when an external subnet without NAT is used. |
Domain Name Servers (DNS) |
(Optional) DNS is advertised to Guest VMs via DHCP. This can
be overridden in the subnet configuration.
Click + Server IP to add DNS server IPs under IP Address and click the check mark. You can Edit or Delete an IP address you added using the options under Actions . |
Each VPN gateway requires a floating IP. If you do not provide one during the VPN gateway creation, then Flow Networking automatically allocates a floating IP to a VPN gateway. To provide floating IP during the VPN gateway creation, you can request floating IPs and assign them to VMs.
You can view the allocated floating IPs on the Floating IPs page. Click Networking > > Floating IPs .
To request a floating IP, do the following.
Uncheck the Assign Floating IPs box if you want to assign the requested IP addresses after you receive it.
See Floating IPs for more information.
Fields | Description and Values |
---|---|
External Subnet | Select a subnet that you configured with external connectivity. |
Number of Floating IPs | Enter the number of floating IPs you want. You can request a maximum of 5 floating IP addresses. |
Assign Floating IPs |
Select this check box if you want to assign the floating IPs to specific VMs in the table. Based on the number you entered in the Number of Floating IPs field, the system provides an equivalent number of rows of Search VMs and IP Address in the table. Under Search VMs , select the VM to which you want to assign a floating IP address. Under IP Address , select the IP address on the VM (primary or secondary IP address) to which you want to assign the floating IP. You can assign multiple floating IP addresses to multiple secondary IP addresses that you can create on the NIC of the VM. For information about configuring secondary IP addresses, see Creating Secondary IP Addresses. |
You can create subnets on the Subnets page. Go to the Subnets page by clicking Virtual Infrastructure > Networking and open the Create Subnet dialog box.
You can also open the Create Subnet dialog box from the VPC details view by clicking the Add Subnet option.
To create a subnet, do the following.
Fields | Description and Values |
---|---|
Name | Provide a name for the subnet. |
Type |
Select the type of subnet you want to create. You can create a VLAN subnet or an Overlay subnet. |
VLAN ID |
(VLAN subnet only) Enter the number of the VLAN . Enter just the number in this field, for example 1 or 27. Enter 0 for the native VLAN. The value is displayed as vlan.1 or vlan.27 in the View pages.
Note:
Provision any single VLAN ID either in the AHV network
stack or in the Flow Networking (brAtlas) networking stack.
Do not use the same VLAN ID in both the stacks.
|
IP Address management |
(Mandatory for Overlay type subnets) This section provides the Network IP Prefix and Gateway IP fields for the subnet. (Optional for VLAN type subnet) Check this box to display the Network IP Prefix and Gateway IP fields and configure the IP address details. Unchecking this box hides these fields. In this case, it is assumed that this virtual LAN is managed outside the cluster.
Note:
The DHCP Settings option is only available for VLAN subnets if you select this option. |
DHCP Settings |
(Optional for both VLAN and Overlay subnets) Check this box to display fields for defining a domain. Checking this box displays fields to specify DNS servers and domains. Unchecking this box hides those fields. See Settings the DHCP Options for more information. |
Cluster (VLAN subnet only) | (VLAN subnet only) This option is available only for VLAN subnet configuration. Select the cluster that you want to assign to the subnet. |
External Connectivity |
(VLAN subnet
only) Turn on this toggle switch if you want use this
VLAN
subnet for external
connectivity.
Note:
Ensure that the externally routable IP addresses (subnets with external connectivity without NAT) for different VPCs do not overlap. Configure the routes for the external connectivity subnets with next hop as the Router or SNAT IP address. Also configure the routes on the router for the return traffic to reach the VPC. See External Connectivity panel in VPC Details View. |
NAT |
(Option under
External Connectivity
)
If you turn on the
External Connectivity
toggle switch, then you can choose whether to connect to
external networks with or without enabling NAT. Check the
NAT
check box to enable NAT for
external connectivity for VPCs.
|
Virtual Switch | (VLAN subnet only) Select the virtual switch that is configured for the VLAN you selected. The default value is the default virtual switch vs0. This option is displayed only if you add a VLAN ID in the VLAN ID field. |
VPC (Overlay subnet only) |
Select the Virtual Private Cloud (VPC) that you want to assign to the subnet from the drop down list. You can create VPCs and assign them to Overlay subnets. |
IP Address Pool |
Defines a range of addresses for automatic assignment to virtual NICs. This field is optional for both VLAN and Overlay . For VLAN , this field is displayed only if you select the IP Address Management option.
Note:
Configure this field for
VLAN
or
Overlay
to complete the creation
of the VPC, if you do not need external connectivity for
this subnet. You must configure this field only if you need
external connectivity for this subnet.
Click the Create Pool button and enter the following in the Add IP Pool page:
|
Override DHCP Server |
(VLAN subnet only) To configure a DHCP server, check the Override DHCP Server box and enter an IP address in the DHCP Server IP Address field. See Override DHCP Server (VLAN Only) in Settings the DHCP Options for information about this option. |
Selecting the DHCP Settings checkbox in Create Subnet or Update Subnet allows you to configure the DHCP options for the VMs within the subnet. When DHCP settings are configured for a VM in a subnet and the VM is powered on, Flow Networking configures these options on the VM automatically. If you do not configure the DHCP settings, then these options are not available on the VM automatically when you power it on.
You can enable DHCP Settings when you create a subnet and configure the DHCP Settings for the new subnet. You could also update the DHCP Settings for an existing subnet.
DHCP Settings is common to and is available on both the Create Subnet and the Update Subnet dialog boxes.
To configure the DHCP Settings , do the following in the Create Subnet or the Update Subnet dialog box:
Fields | Description and Values |
---|---|
Domain Name Servers |
Provide a comma-separated list of DNS IP addresses. Example: 8.8.8.8, 9.9.9.9 |
Domain Search |
Enter the VLAN domain name. Use only the domain name format. Example: nutanix.com |
TFTP Server Name |
Enter a valid TFTP host server name of the TFTP server where you host the host boot file. The IP address of the TFTP server must be accessible to the virtual machines to download a boot file. Example: tftp_vlan103 |
Boot File Name |
The name of the boot file that the VMs need to download from the TFTP host server. Example: boot_ahv2020xx |
You can configure a DHCP server using the Override DHCP Server option only in case of VLAN networks.
The DHCP Server IP address (reserved IP address for the Acropolis DHCP
server) is visible only to VMs on this network and responds only to DHCP
requests. If this box is not checked, the DHCP Server IP Address field is
not displayed and the DHCP server IP address is generated automatically. The
automatically generated address is
network_IP_address_subnet.254
, or if the default
gateway is using that address,
network_IP_address_subnet.253
.
Usually the default DHCP server IP is configured as the last usable IP in the subnet (For eg., its 10.0.0.254 for 10.0.0.0/24 subnet). If you want to use a different IP address in the subnet as the DHCP server IP, use the override option.
To attach a subnet to a VM, go to the Virtual Infrastructure > VM > List view in Prism Central and do the following.
The Network Connection State selection defines the state of the connection after the NIC configuration is implemented.
You can select Assign with DHCP to assign a DHCP based IP address to the VM.
You can select Assign Static IP to assign a static IP address to the VM to reach the VM quickly from any endpoint in the network such as a laptop.
For Policy-based routing you need to create policies that route the traffic in the network.
Policies control the traffic flowing between subnets (inter-subnet traffic).
Policies control the traffic flowing in and out of the VPC.
Policies do not control the traffic within a subnet (intra-subnet traffic).
You can create a traffic policy using the Create Policy dialog box. You can open the Create Policy dialog box either from the VPC list view or the VPC list view.
On the VPC list view, select the VPC you want to update and click Create Policy in the Actions drop down menu.
On the VPC details view, click the Create Policy option in the More drop down menu.
To create a policy, do the following in the Create Policy dialog box.
Fields | Description and Values | Value in Default Policy |
---|---|---|
Priority |
The priority of the access list (ACL) determines which ACL is
processed first. Priority is indicated by an integer number. A
higher priority number indicates a higher priority.For example,
if two ACLs have priority numbers 100 and 70 respectively, the
ACL with priority 100 takes precedence over the ACl with
priority 70.
Note:
|
1 |
Source |
The source indicates the source IP or subnet for which you want to manage traffic. Source can be:
|
Any |
Source Subnet IP |
Only required if you selected the Source as Custom . Provide the subnet IP and prefix that you want to designate as the source for the policy. Use the CIDR notation format to provide the subnet IP. For example, 10.10.10.0/24. |
None |
Destination |
The destination is the destination IP or subnet for which you want to set the priority. Destination can be:
|
Any |
Destination Subnet IP |
Only required if you selected the Destination as Custom . |
None |
Protocol |
You can also set the priority configure policy for certain
protocols. You can select one of the following options:
|
|
Protocol Number |
This field is displayed only if you select Protocol Number as the value in the Protocol field. The number you provide must be the IANA designated number that indicates respective protocol. See IANA Protocol Numbers . |
None |
Action |
Assign the appropriate action for implementation of the policy.
|
Permit |
You can create a static route using the Create Static Routes dialog box. You can open the Create Static Routes dialog box either from the VPC list view or the VPC details view.
On the VPC list view, select the VPC and click Create Static Routes in the Actions drop down menu.
On the VPC details view, click the Create Static Routes option in the More drop down menu.
To create static route, do the following in the Create Static Routes dialog box:
Fields | Description and Values |
---|---|
Destination Prefix | Provide the IP address with prefix of the destination subnet. |
Next Hop Link | Select the next hop link from the drop down list. The next hop link is the IP address that the traffic must be sent for the static route you are configuring. |
Add Prefix | You can create multiple static routes using this option. Click this link to add another set of Destination Prefix and Next Hop Link to configure another static route. |
You can update a VPC using the Update Virtual Private Cloud (VPC) dialog box. You can open the Update Virtual Private Cloud (VPC) dialog box either from the VPC list view or the VPC details view.
On the VPC list view, select the VPC you want to update and click Update in the Actions drop down menu.
On the VPC details view, click the Update option.
The Update Virtual Private Cloud (VPC) dialog box is identical to the Create Virtual Private Cloud (VPC) dialog box.
For details about the parameters that you can update in the Update Virtual Private Cloud (VPC) dialog box, see Creating Virtual Private Cloud.
You can update a subnet displayed on the Subnets page. Go to the Subnets page by clicking Virtual Infrastructure > Networking > Subnets and open the Update Subnet dialog box.
You can also open the Update Subnet dialog box from the VPC dashboard for a specific VPC. Click the Edit option for the subnet listed on the Subnets tab of the VPC dashboard.
To update a subnets, do the following.
The Update Subnet dialog box has the same fields as the Create Subnet dialog box. For details about the fields and the values that can be updated in the Update Subnet dialog box, see Creating a Subnet.
A category is a key-value pair that groups similar entities. Associating a policy with a category ensures that the policy applies to all the entities in the group regardless of how the group scales with time. For example, you can associate a group of VMs with the Department: Marketing category, where Department is a category that includes a value Marketing along with other values such as Engineering and Sales.
Currently, you can associate only VMs with a category. Categories are implemented in the same way on on-premises Prism Central instances and in Xi Cloud Services. For information about configuring categories, see the Prism Central Guide .
You can update a policy using the Update Policy dialog box. You can open the Update Policy dialog box in two ways in the VPC details view.
The Update Policy dialog box has the same parameters as the Create Policy dialog box.
For details about the parameters that you can update in the Update Policy dialog box, see Creating a Policy.
You can update a static route using the Update Static Routes dialog box. You can open the Update Static Routes dialog box either from the VPC list view or the VPC details view.
The Update Static Routes dialog box has the same parameters as the Create Static Routes dialog box.
For details about the parameters that you can update in the Update Static Routes dialog box, see Creating Static Routes.
Prism Central does not allow you to delete a VPC if the VPC is associated with any subnets and/or VPNs. After you remove all the subnets or VPN associations from the VPC, delete the VPC.
You can delete a VPC from the VPC list view or the VPC details view.
You can delete VPC entities such as subnets, policies or routes from the VPC details page.
Do the following.
This section covers the management of network gateways, VPN connections and Subnet Extensions including operations like create, update and delete network gateways and VPN connections, and extending subnets.
You can create, update or delete network gateways that host one of VPN or VTEP service for connections.
VPN or s connect two networks together, and can be used in both VLAN and VPC networks on AHV. In other words, you can extend the routing domain of a VLAN network or that of a VPC using a VPN. Accordingly, VPN gateways can be configured using VLANs or VPCs. You need VPN gateways on clusters to provide a gateway to the traffic between on-premise clusters or remote sites.
You can create multiple VPN gateways for a VPC. Since a VPC is configured only on a PC, the VPC is available to all the clusters registered to that PC.
A VPN gateway may be defined as a Local gateway or a Remote gateway based on where the traffic needs to be routed.
To create a VPN gateway, do the following on the Networking & Security > Connectivity > Gateways page.
Fields | Description | Values |
---|---|---|
VM Deployment | ||
Name | Enter a name for the network gateway. | (Name) |
Gateway Attachments |
(for Local gateway type only) Select the gateway attachment
as
VPC
or
VLAN
.
The VPN VM is deployed on a VPC VM or a cluster that has the
selected VLAN respectively.
|
(VLAN or VPC) |
Gateway VM Deployment - VPC Attachment | ||
Cluster | Select the cluster on which you want to deploy the Gateway VM on. | (Name of the cluster) |
VPC (If Gateway Attachment type is VPC) | Select the VPC configured on the selected cluster that you want to use for the Gateway VM deployment. | (Name of the VPC selected) |
Floating IP (Optional) |
Select a floating IP for the network gateway configuration. If you do not select a floating IP address then Prism Central allocates a floating IP automatically. This allocated floating IP is deleted when you delete the gateway. To request floating IPs and allocate them to subnets, see Requesting Floating IPs |
(IP address) |
Gateway VM Deployment - VLAN Attachment | ||
Cluster |
Select the Cluster, from the drop down list, on which you
want to deploy the Gateway VM on.
Note:
Only clusters with VLANs
are available in the list.
|
(Name of the cluster) |
Subnet |
Select the subnet you want to attach the Gateway VM to, from
the drop down list.
Note:
The list includes all the subnets you
created on the selected cluster.
After you select the
subnet, the details of the subnet are displayed in a box below
the
Subnet
field. The details include:
VLAN ID, IPAM type being Managed or Unmanaged, and Network
Address with Prefix.
|
(Name of the VLAN subnet) |
Static IP Address for VPN Gateway VM | Enter the static IP address that the Gateway VM needs to use. | (IP Address with Prefix) |
Default Gateway IP | Enter the default gateway IP of the subnet for the Gateway VM. | (IP Address) |
Service Configuration | ||
Gateway Service | Select the gateway service you want to use for the gateway. | (VPN or VTEP) |
VPN Service Configuration - External Routing Configuration (This section is available for VLAN and VPC attachment types) | ||
Routing Protocol |
|
(Static or eBGP) |
Redistribute Connected Routes (Applicable only if VLAN type gateway attachment is selected) | ( VLAN only) Select this checkbox to enable the redistribution of connected routes into the eBGP. | (Check mark or blank) |
ASN (Only available if eBGP routing protocol is selected) |
(For eBGP only) Enter the ASN for your on-prem gateway. If you do not have a BGP environment in your on-prem site, you can choose any number. For example, you can choose a number in the 65000 range.
Note:
Make sure that this ASN does not conflict with any of the
other on-premises BGP ASNs.
ASN must be distinct in case of eBGP. |
(Number) |
eBGP Password | (For eBGP in Local gateway type only) Enter the eBGP password for the eBGP route. |
(Password: The password must be between 1 and 80 characters.
|
VPN Service Configuration - Internal Routing Configuration (This section is available for VLAN attachment type only.) | ||
Routing Protocol (Between On-prem Gateway and On-prem Router) |
Select the
Routing Protocol
to be used
between on-premises Nutanix gateway and on-premises
router.
You can select:
|
(Static or OSPF or iBGP) |
+Add Prefix (Applicable to Static routing) |
(For Static routing selected in Routing Protocol ) Click this to enter a Local Prefix and click the check mark under Actions to add the prefix. If you click the X mark under Actions , the local prefix you entered is not added. The prefixes you add are advertised to all the connected peers via eBGP. The prefix must be a valid IP address with the host bits not set. You can add multiple local prefix IP addresses. |
(prefix like /24) |
Area ID (Applicable to OSPF protocol) | (OSPF only) Enter the OSPF area id in the IPv4 address format. | |
Password Type |
(OSPF only) Select the password type you want to set for the
OSPF route. The options are:
|
|
Password |
(OSPF only) Enter a password for the MD5 or Plain Text password type you select in the Password Type field.
|
|
Peer IP (for iBGP) | Enter the IP Address of the On-prem router used to exchange routes with the network gateway. | (IP Address) |
Password | Enter a password with 1-80 characters. | (Password) |
VTEP Service Configurations | ||
VxLAN (UDP) Port | The default value provided is 4789. Do not change this. | (Number. Default value is 4789) |
Fields | Description | Values |
---|---|---|
Name | Enter a name for the network gateway. | (Name) |
Gateway Service | Select the gateway service you want to use for the gateway. | (VPN or VTEP) |
VPN Service Configurations | ||
Public IP Address | Enter the public IP address of the remote endpoint. If a Floating IP is not selected, a new Floating IP is automatically allocated for the Gateway. These allocated IP addresses are deleted when the network gateway is deleted. | (IP Address) |
Vendor | Select the vendor of the third party gateway appliance. | (Name of Vendor) |
External Routing | ||
Protocol |
|
(Static or eBGP) |
eBGP ASN (Only available if eBGP routing protocol is selected) |
(For eBGP only) Enter the ASN for your on-prem gateway. If you do not have a BGP environment in your on-prem site, you can choose any number. For example, you can choose a number in the 1-65000 range.
Note:
Make sure that this ASN does not conflict with any of the
other on-premises BGP ASNs.
ASN must be distinct in case of eBGP. |
(Number) |
VTEP Service Configurations | ||
VTEP IP Address | Enter VTEP IP Addresses of the remote endpoints that you want to create the gateway for. You can add IP addresses of multiple endpoints in one remote gateway. | (Comma separated list of IP Addresses) |
VxLAN (UDP) Port | The default value provided is 4789. Do not change this. | (Number. Default value is 4789) |
The Gateway you create is displayed in the Gateways page.
You can update a network gateway using the Update Gateway dialog box.
You can open the Update Gateway dialog box. The parameters in the Update Gateway dialog box are the same as those in the Create Local Gateway or Create Remote Gateway dialog box.
If you want to delete a network gateway, you must first delete all the VPN connections associated with the gateway and only then you can delete the network gateway.
To delete a network gateway, do the following on the Gateway page.
You can use the Nutanix VPN solution to set up VPN between your on-prem clusters, which exist in distinct routing domains that are not directly connected. These distinct routing domains could either be VPCs within the same cluster or remote clusters or sites.
If you need to connect one Nutanix deployment in one site to another deployment in a different site, you can create a VPN endpoint in each of the sites. A VPN endpoint consists of a local VPN gateway, remote VPN gateway and VPN connection. Local VPN gateway can be instantiated in a VPC context or a legacy VLAN context. Launching the VPN gateway within a VPC allows stretching of the VPC. For example, in the figure, the Blue VPC is stretched between two sites with a VPN.
VPN connections are useful in connecting two points. You can connect two VPCs in the same cluster using a VPN or VPCs in different clusters in the same site. However, VPN connection can connect only one endpoint to another endpoint. Flow networking based VPN service allows you to only connect two endpoints that use Nutanix VPN based gateway service.
To connect one endpoint to multiple endpoints or third party (non Nutanix) networks, use Virtual Tunnel End Point (VTEP) service based subnet extensions. For more information about VTEP, see .
If you need to connect one Nutanix deployment in one site to another deployment in a different site, you can create a VPN endpoint in each of the sites. A VPN endpoint consists of a local VPN gateway, remote VPN gateway and VPN connection. You can configure multiple VPN endpoints for a site.
Each endpoint must have configurations for a local VPN gateway, remote VPN gateway (pointer information for the peer local VPN in the remote site endpoint) and a VPN connection (connecting the two endpoints). Then, based on the VPN connection configuration as initiator or acceptor, one endpoint initiates a tunnel and the endpoint at the other end accepts the tunnel connection and, thus, establishes the VPN tunnel.
Gateways: Every VPN endpoint for each site consists of two VPN gateway configurations - Local and Remote.
Local gateway is a VM that runs the VPN protocols (IKEv2, IPSec) and routing (BGP and OSPF). Remote gateway is a pointer - database entry - that provides information about the peer remote VPN endpoint. One of the key information contained in the remote gateway is the source IP of the remote VPN endpoint. For security reasons, the local VPN gateway will accept IKEv2 packets originating only from this Source IP.
VPN gateways are of the following types:
On premises Nutanix VPN Gateway: Represents the VPN gateway appliance at your on-premises local or remote site if you are using the Nutanix VPN solution.
On premises Third Party Gateway: Represents the VPN gateway appliance at your on-prem site if you are using your own VPN solution (provided by a third-party vendor).
To configure third party VPN Gateways, see the relevant third party documentation.
VPN Connection: Represents the VPN IPSec tunnel established between local gateway and remote gateway. When you create a VPN connection, you need to select two gateways between which you want to create the VPN connection.
VPN appliances perform the following:
Ensure that you have enabled Flow Networking with microservices Infrastructure.
Ensure that you have floating IP addresses when you create VPN gateways.
Flow Networking automatically allocates a floating IP to a VPN gateway if you do not provide one during the VPN gateway creation. To provide floating IP during the VPN gateway creation, you can request floating IPs. See Requesting Floating IPs.
Ensure that you have one of the following, depending on whether you are using iBGP or OSPF:
Peer IP (for iBGP): The IP address of the router to exchange routes with the VPN gateway VM.
Area ID (for OSPF): The OSPF area ID for the VPN gateway in the IP address format.
Ensure that you have the following details for the deployment of the VPN gateway VM:
Public IP address of the VPN Gateway Device: A public WAN IP address that you want the on-prem gateway to use to communicate with the Xi VPN gateway appliance.
Static IP Address: A static IP address that you want to allocate to the VPN gateway VM. Use a floating IP address requested as the static IP address.
IP Prefix Length: The subnet mask in CIDR format of the subnet on which you want to install the VPN gateway VM. You can use an overlay subnet used for a VPC and assigned to the VM that you are using for the VPN gateway.
Default Gateway IP: The gateway IP address for the on-premise VPN gateway appliance.
Gateway ASN: ASN must not be the same as any of your on-prem BGP ASNs. If you already have a BGP environment in your on-prem site, the customer gateway is the ASN for your organization. If you do not have a BGP environment in your on-prem site, you can choose any number. For example, you can choose a number in the 65000 range.
Nutanix deploys a number of ports and protocols in its software. ports that must be open in the firewalls to enable Flow Networking to function. To see the ports and protocols used Flow Networking, see Port Reference.
The following endpoints and terminations occur in the course of Flow networking based connections. For information about creating, updating or deleting VPN connections, see Connections Management.
In this scenario, the IPSec tunnel terminates behind a network address translation (NAT) or firewall device. For NAT to work, open UDP ports 500 and 4500 in both directions.
Things to do in NAT | Things to do in on-prem VPN GW |
---|---|
Open UDP ports 500 and 4500 on both directions |
Enable the business application policies to Allow the commonly-used business application ports. |
In this scenario, you do not need to open the ports for NAT (500 and 4500).
However, enable the on-prem VPN gateway to allow the traffic from the PC subnet to the advertised load balancer route where the Source port is any and the Destination port may be in the range of 1024-1034.
The PC subnet refers to the subnet where your Prism Central is running.
Create a VPN connection to establish a VPN IPSec tunnel between VPN gateways in your on-prem site. Select the gateways between which you want to create the VPN connection.
To create a VPN connection, do the following on the Networking > VPN Connections page.
Fields | Description and Values |
---|---|
Name | Enter a name for the connection. |
VPN Connection | |
IPSec Secret | Enter a secret password for the IPSec connection. To see the password, click Show . To hide the password, click Hide . |
Local Gateway | Select the connection parameters on the local gateway as Initiator or Acceptor of VPN Tunnel connections. |
VPN Gateway | Select the appropriate VPN Gateway as the local gateway for the VPN connection |
VTI Prefix - Local Gateway |
Enter a IPv4 Address with /<prefix>. Example:
10.25.25.2/30.
This is the VPN Tunnel Interface IP address with prefix for the local gateway. The subnet for this IP address must be a /30 subnet with two usable IP addresses. One of the IP addresses is used for Local Gateway. Use the other IP address for the Remote Gateway. |
Connection Handshake |
This defines the type of handshake that the connection must
use. There are two types of connection handshakes:
Note:
In a VPN connection do not configure both the
gateways (local gateway and remote gateway) in an endpoint as Initiators or as Acceptors. If
you configure the local gateway as Initiator then configure the remote gateway as Acceptor
in one endpoint and vice-versa in the (other) remote endpoint.
|
Remote Gateway | For a specific VPN connection, set the remote gateway as Initiator or Acceptor when you configure the VPN connection on the Remote Gateway. |
VPN Gateway | Select the appropriate VPN Gateway as the remote gateway for the VPN connection. |
VTI Prefix - Remote Gateway |
The VPN Tunnel Interface IP address with prefix for the local
gateway. Provide a IPv4 Address with /<prefix>. Example:
10.25.25.2/30.
This is the VPN Tunnel Interface IP address with prefix for the local gateway. The subnet for this IP address must be a /30 subnet with two usable IP addresses. One of the IP addresses is used for Local Gateway. Use the other IP address for the Remote Gateway. |
Advanced Settings | Set the traffic route priority for the VPN connection. The route priority uses Dynamic route priority because the priority is dependent on the routing protocol configured in the VPN gateway. |
Route Priority - Dynamic Route Priority | Set the route priority as an integer number. The greater the number, higher is the priority. |
You can update a VPN Connection using the Update VPN Connection dialog box.
You can open the Update VPN Connection dialog box. The parameters in the Update VPN Connection dialog box are the same as those in the Create VPN Connection dialog box.
To delete a VPN connection, do the following on the VPN Connection page.
You can connect two VPCs within the same Prism Central availability zone using a VPN connection.
Assume that you have created two VPCs named vpc-a and vpc-b with overlay subnets named subnet-a and subnet-b .
To connect the two VPCs within the same Prism Central using a VPN connection, do the following.
See Creating a Network Gateway for more information about creating a VPN gateway.
See Creating a Network Gateway for more information about creating a VPN gateway.
Ensure that you select local-vpn-a as the local gateway with Connection Handshake set as Acceptor .
Ensure that you select remote-vpn-b as the remote gateway.
Ensure that you select local-vpn-b as the local gateway with Connection Handshake set as Initiator .
Ensure that you select remote-vpn-a as the remote gateway.
You can extend a subnet between on-prem local and remote clusters or sites (Availability Zones or AZs) to support seamless application migration between these clusters or sites.
With Layer 2 subnet extension, you can migrate a set of applications to the remote AZ while retaining their network bindings such as IP address, MAC address, and default gateway. Since the subnet extension mechanism allows VMs to communicate over the same broadcast domain, it eliminates the need to re-architect the network topology, which could otherwise result in downtime.
Layer 2 extension assumes that there are underlying existing layer 3 connectivity already available between the Availability Zones. You can extend a subnet from a remote AZ to the primary (Local) AZ (and other remote AZs in case of VTEP-based subnet extensions)
You can extend subnets for the following configurations.
Ensure the following before you configure Layer 2 subnet extension between your on-prem AZs.
See the Prism Central Upgrade and Installation Guidelines and Requirements section of the Acropolis Upgrade Guide for instructions about how to upgrade a Prism Central instance through the Prism Central web console.
See the Pairing Availability Zones for instructions about how to pair the local and remote AZs.
0.0.0.0/0
prefix and
the External Network next hop for the VPC you use for any subnet extension. This allows
NTP and DNS access for the Network Gateway appliance.
Nutanix recommends the following configurations to allow IP address retention for VMs on extended subnets.
You can manage Layer 2 subnet extension on the Subnet Extensions tab of the Connectivity page. Open the Subnet Extensions by clicking the hamburger icon in the top-left corner of the Dashboard and then clicking Connectivity .
You can create point-to-point Layer 2 subnet extensions between two AZs over VPN or VTEP by opening the Create Subnet Extension Across Availability Zones dialog box. See Extending a Subnet Over VPN for VPN-based extensions. See Extending a Subnet Across Availability Zones Over VTEP for VTEP-based extensions.
You can create point-to-point or point-to-multipoint Layer 2 subnet extensions to third party datacenters over VTEP by opening the Create Subnet Extension To A Third Party Data-Center dialog box. See Extending a Subnet to Third Party Datacenters Over VTEP.
You can update a subnet extension that extends across AZs using the Update Subnet Extension Across Availability Zones dialog box. The Update Subnet Extension Across Availability Zones has the same parameters and fields as the Create Subnet Extension Across Availability Zones dialog box. You can open the Update Subnet Extension Across Availability Zones dialog box by:
Selecting the subnet extended across AZs in the Subnet Extensions and clicking the Update button.
Clicking the subnet extended across AZs in the Subnet Extensions and clicking the Update button on the Summary tab.
You can update a subnet extension that extends to multiple AZs or third party datacenters using the Update Subnet Extension To A Third Party Data-Center dialog box. Update Subnet Extension To A Third Party Data-Center dialog box has the same parameters and fields as the Create Subnet Extension To A Third Party Data-Center dialog box. You can open the Update Subnet Extension To A Third Party Data-Center dialog box by:
Selecting the subnet extended to third datacenters in the Subnet Extensions and clicking the Update button.
Clicking the subnet extended to third datacenters in the Subnet Extensions and clicking the Update button on the Summary tab.
See Updating an Extended Subnet.
Subnet extension using VPN allows seamless, secure migration to a new datacenter or for disaster recovery. VPN based Layer 2 extension provides secure point to point connection to migrate workloads between Availability Zones. Consider VTEP-only Subnet Extension without VPN when encryption is not required.
Subnet extension using VPN is useful:
See Layer 2 Virtual Network Extension for general prerequisites to extend subnets.
To use subnet extension over a VPN, both sites must use the VPN service of the Nutanix Network Gateway. Consider VTEP-only subnet extension to connect to non-Nutanix third party sites.
To replicate entities (protection policies, recovery plans, and recovery points) to different on-prem AZs (AZs) bidirectionally, pair the AZs with each other. To replicate entities to different Nutanix clusters at the same AZ bidirectionally, you need not pair the AZs because the primary and the recovery Nutanix clusters are registered to the same AZ (Prism Central). Without pairing the AZs, you cannot perform DR to a different AZ.
To pair an on-prem AZ with another on-prem AZ, perform the following procedure at both the AZs.
The subnet extension allows VMs to communicate over the same broadcast domain to a remote site or Availability Zone (AZ).
Perform the following procedure to extend a subnet from the on-prem site.
Fields | Description | Values |
---|---|---|
Extend Subnet over a | Select the gateway service you want to use for the subnet extension. | (VPN or VTEP) |
Note:
Configure the following fields for the
Local
and the
Remote
sides of the dialog
box.
|
||
Availability Zone |
(For Local) Local AZ is pre-selected default.
(For Remote) Select the appropriate AZ from the drop-down list of AZs. |
(Local: Local AZ)
(Remote: Dropdown list of AZs.) |
Subnet Type | Select the type of subnet that you want to extend. | (VLAN or Overlay) |
Cluster | Displayed if your selected VLAN subnet. Select the cluster from the dropdown list of clusters. | (Name of cluster selected from dropdown list) |
VPC | Displayed if your selected Overlay subnet. Select the appropriate VPC from the dropdown list of VPCs. | (Name of VPC selected from dropdown list) |
Subnet | Select the subnet that needs to be extended. | (Name of subnet selected from dropdown list) |
(Network Information frame) | Displays the details of the VLAN or Overlay network that you selected in the preceding fields. | (Network information) |
Gateway IP Address/Prefix | Displays the gateway IP address for the subnet. This field is already populated based on the subnet selected. | (IP Address) |
(Local or Remote) IP Address | Enter a unique and available IP address that are externally accessible IP addresses in Local IP Address and Remote IP Address . | (IP Address) |
VPN Connection | Select the appropriate VPN Connection from the dropdown list that Flow networking must use for the subnet extension. See Creating a VPN Connection for instructions to create VPN connection. | (Name of VPN connection selected from the dropdown list) |
A successful subnet extension is listed on the Subnet Extension dashboard. See .
Subnet extension using Virtual tunnel End Point (VTEP) allows seamless migration to new datacenters or for disaster recovery. VTEP based Layer 2 extension provides point-to-multipoint connections to migrate workloads from one Availability Zone to multiple Availability Zones without encryption. If you need security and encryption, consider using Subnet Extension over VPN.
Subnet extension using VTEP is useful:
VTEP-based Layer 2 Subnet Extension provides the following advantages:
See Layer 2 Virtual Network Extension for general prerequisites to extend subnets.
Set up VTEP local and remote gateway services on local and remote AZs. In case of point-to-multipoint extension, ensure that you create local and remote VTEP gateways on all the remote AZs that the subnet needs to be extended to.
The subnet extension over VTEP allows VMs to communicate two Availability Zones (AZ) without a VPN connection.
To extend a subnet over VTEP across two availability zones (AZs), do the following.
On the Subnet Extensions tab, click > Create Subnet Extension > Across Availability Zones > .
In the Subnets dashboard, select the subnet you want to extend and click Actions > Extend > Across Availability Zones
In the Subnets dashboard, click the subnet you want to extend. On the subnet details page, click Extend > Across Availability Zones .
Parameters | Description and Value |
---|---|
Availability Zone | Displays the name of the paired availability zone at the local AZ. |
Subnet Type | Select the type of the subnet - VLAN or Overlay that you are extending. |
Cluster | Select the name of the cluster in the local AZ that the subnet is configured for. |
Subnet | Select the name of the subnet at the local AZ for network. The VLAN ID and the IPAM - managed or unmanaged are displayed in the box below the Subnet field. |
Gateway IP Address. |
Enter the gateway IP address of the subnet you want to
extend. Ensure that you provide the IP address in
<IP-address/network-prefix> format. for example the gateway
IP is 10.20.20.1 in a
/24
subnet then provide the
gateway
IP address as
10.20.20.1/24
.
Note:
For
an
unmanaged network, enter the gateway IP
address of the created subnet.
|
Local IP Address | Enter a unique and available (unused) IP address from the subnet provided in Subnet for the Network Gateway appliance. |
Remote IP Address | Enter a unique and available (unused) IP address from the subnet provided in Subnet for the remote Network Gateway appliance. |
Local VTEP Gateway | Select the local VTEP gateway you created on the local AZ. See Creating a Network Gateway for information about creating VTEP gateways. |
Remote VTEP Gateway | Select the VTEP gateway you created on the remote AZ. See Creating a Network Gateway for information about creating VTEP gateways. |
Connection Properties | |
VxLAN Network Identifier (VNI) | Enter a unique number from the range 0-16777215 as VNI. Ensure that this number is not reused anywhere in the local or remote VTEP Gateways. |
MTU | The default MTU is 1392 to account for 108 bytes of overhead and the standard physical MTU of 1500 bytes. VPC Geneve encapsulation requires 58 bytes and VXLAN encapsulation requires 50. However, you can enter any valid MTU value for the network, taking this overhead into account. For example, if the physical network MTU and vs0 MTU are 1600 bytes, the Network Gateway MTU can be set to 1492 to account for 108 bytes of overhead. Ensure that the MTU value does not exceed the MTU of the AHV Host interface and all the network interfaces between the local and remote AZs. |
The subnet extension over VTEP allows VMs to communicate with multiple remote sites or Availability Zones (AZ) that may be third party (non-Nutanix) networks, or datacenters. It also provides the flexibility of adding more remote AZs to the same VTEP-based extended Layer 2 subnet. Examples of compatible VTEP gateways are switches from Cisco, Juniper, Arista, and others that support plain VXLAN VTEP termination.
To extend a subnet over VTEP across multiple availability zones (AZs) or third party datacenters, do the following.
On the Subnet Extensions tab, click > Create Subnet Extension > To A Third Party Data-Center
In the Subnets dashboard, select the subnet you want to extend and click Actions > Extend > To A Third Party Data-Center
In the Subnets dashboard, click the subnet you want to extend. On the subnet details page, click Extend > To A Third Party Data-Center .
Parameters | Description and Value |
---|---|
Local | |
Availability Zone | Displays the name of the paired availability zone at the local AZ. |
Subnet Type | Select the type of the subnet - VLAN or Overlay that you are extending. |
Cluster | Select the name of the cluster in the local AZ that the subnet is configured for. |
Subnet | Select the name of the subnet at the local AZ for network. The VLAN ID and the IPAM - managed or unmanaged are displayed in the box below the Subnet field. |
Gateway IP Address |
Enter the gateway IP address of the subnet you want to
extend. Ensure that you provide the IP address in
<IP-address/network-prefix> format. for example the gateway
IP is 10.20.20.1 in a .24 subnet then provide the gatewway IP
address as
10.20.20.1/24
.
Note:
For
unmanaged network, enter the gateway IP address of the
created subnet.
|
Local IP Address | Enter a unique and available (unused) IP address from the subnet provided in Subnet . |
Local VTEP Gateway | Select the local VTEP gateway you created on the local AZ. See Creating a Network Gateway for more information about creating a local VTEP gateway. |
Remote | |
Remote VTEP Gateway | Select the remote VTEP gateway you created on the local AZ. See Creating a Network Gateway for more information about creating a remote VTEP gateway. |
Connection Properties | |
VxLAN Network Identifier (VNI) | Enter a unique number from the range 0-16777215 as VNI. Ensure that this number is not reused anywhere in the networks that the Prism Central and Cluster are a part of. |
MTU |
The default MTU is 1392 to account for 108 bytes of overhead and the standard physical MTU of 1500 bytes. VPC Geneve encapsulation requires 58 bytes and VXLAN encapsulation requires 50. However, you can enter any valid MTU value for the network, taking this overhead into account. For example, if the physical network MTU and vs0 MTU are 1600 bytes, the Network Gateway MTU can be set to 1492 to account for 108 bytes of overhead. Ensure that the MTU value does not exceed the MTU of the AHV Host interface and all the network interfaces between the local and remote AZs. |
The Update Subnet Extension Across Availability Zones has the same parameters and fields as the Create Subnet Extension Across Availability Zones dialog box.
You can update a subnet extension that extends across AZs using the Update Subnet Extension Across Availability Zones or the Update Subnet Extension To A Third Party data center dialog box. The Update Subnet Extension Across Availability Zones or the Update Subnet Extension To A Third Party data center dialog box has the same parameters and fields as the Create Subnet Extension Across Availability Zones or the Create Subnet Extension To A Third Party data center dialog box, respectively.
Based on the type of the subnet extension that you want to modify, refer to the following:
Perform the following procedure to remove the subnet extension. This procedure deletes the extended subnet between the two Availability Zones (AZs) or between one Nutanix AZ and one or more third party subnets. Deleting the subnet extension does not automatically remove the network gateways or VPN connections that may have automatically been created by the Subnet Extension wizard. You need to separately delete these entities created automatically when the subnet was extended.