Nexus 7k - Interface Statistics Across VDCs

Is there anyway to get interface statistics from all interfaces regardless of what vdc they are in? Trying to setup solarwinds to monitor them all. 
Thanks,
Alex

You can, but each VDC need its own interface to SolarWinds. Each VDC acts as a separate switch.
HTH

Similar Messages

  • Catalyst 3550 & 3560/3750 command 'show mls qos interface statistics'

    On the Catalyst 3550 the command 'show mls qos interface statistics' will show ingress packet (or byte) counts with DSCP values. If you have policers configured then it also shows a count of packets that have been marked down to another DSCP value due to policing or any that have been dropped (obviously 'mls qos monitor dscp x' needs configuring). The same command on the 3560/3750 only shows the ingress & egress DSCP values, there is no column that shows packets (or bytes) that have been policed or dropped. Is there any command to display the same information with the 3560/3750?
    Neither platform show counters when the command 'show policy-map interface x/x' is used so this won't work.
    Thanks
    Andy

    Hi, I believe there is a command on the 3560 'sh mls qos interface policers' may be what you are looking for.
    Here is what the command says it outputs:
    To display QoS information at the interface level. This information includes:
    The configuration of the egress queues and the CoS3-to-egress-queue map
    Which interfaces have configured policers
    Ingress and egress statistics, which includes the number of bytes that have been dropped

  • PI 7.1 AAE Interface statistics and monitoring

    Hi SAP community!
    I currently have Advanced Adapter Engine interfaces running through my systems (which bypass Integration Server by design), and my issue is for data/statistics.
    RWB is able to display the AAE/Adapter Engine messages in groups, but in terms of numbers (Datbase Overview in Message Monitoring), only messages that flow through the Integration Server is displayed.
    I have used Wily to get some data, but I'd like to see daily totals and statistics.
    Thank you all in advanced
    Rocco

    Hi Sekhar,
    I have not been given any answers in terms of data and statistics. 
    We have been told that the Java Early Watch reports can give totals, but have not implemented it yet.
    Message Monritoing via RWB is the simplest way, unfortunately because AAE is mostly in memory when the maximum number of messages are hit.  The oldest are removed from memory.
    I've been trying to figure out how Wily collects the AAE messages, but am finding it difficult to understand their logic (and since it's CA's software they probably won't share how they are doing it).
    7.11 apparently has a way to mornitor data in a very simple way (but not worth to update/upgrade if only doing it for stats).
    730 is going to be the latest PI which will collect the statistics, J2EE will be decentralized seperated from ABAP side.
    Hope that helps your situation a little bit. 
    Also if you didn't know (because I didn't right away) here is the message monitoring link for messages which breaks down the inbound/outbound connection times and steps (for single message troubleshooting and message breakdown).
    http://<host>:5<SN>00MessagingSystem/monitor/monitor.jsp
    Good luck
    Rocco

  • Vfc and vsan on nexus 5K interface

    Hi,
    I am seeing the following configuration on one of the 5K interfaces & related subsequent configs follow;
    int eth1/2
    description test1 vfc-1030
      switchport mode trunk
      spanning-tree port type edge trunk
      spanning-tree bpduguard enable
    sh run int vfc 1003
    version 5.2(1)N1(3)
    interface vfc1030
      bind interface Ethernet1/2
      switchport trunk allowed vsan 120
      switchport description test1
      no shutdown
    sh vsan 120
    vsan 120 information
             name:VSAN-120  state:active  
             interoperability mode:default  
             loadbalancing:src-id/dst-id/oxid   
             operational state:up
    Now the vfc1030 interface says only allow vsan 120 over the trunk, whereas eth1/2 switch port status tells me that all vlans(1-4094) are allowed on this interface.
    So , how does this work here? which one takes precedence and what vlans actually flow over this.
    I am confused by this linkages, appreciate if some one can shed some light on the above please.
    Thanks in advance!

    What NX-OS version are you using? It is available starting NX-OS 5.1(3)N2(1) on the Nexus 5500:
    http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/qos/521_n1_1/b_5k_QoS_Config_521N11_chapter_01000.html#topic_93B8067633394356B790D6F1E522CC61
    HTH,
    jerry

  • 3750 - Show mls qos interface statistics

    Hi All,
    Sorry if this is posted in the wrong place but can anyone shed any light on the meaning of the five columns given in the output for the following command on a 3750 ?
    Show Mls Qos Interface <interface id> Statistics
    Many Thanks
    Shaun

    I think that this is my first post, so I hope it will be useful ;-)
    It's indeed very strange, I faced the same problem before, so I tried to check older switches, and I was able to find what these values are, for example, if You check the link :
    Understanding QoS Policing and Marking on the Catalyst 3550
    http://www.cisco.com/en/US/products/hw/switches/ps646/products_tech_note09186a00800feff5.shtml
    You will find that these five fields mean:
    incoming   no_change       classified      policed    dropped (in pkts)
    This is a description of the fields in the example:
    Incoming—shows how many packets arrive from each           direction
    NO_change—shows how many packets were trusted (such           as QoS level not changed)
    Classified—shows how many packets have been assigned           this internal DSCP after classification
    Policed—shows how many packets were marked down by           policing; DSCP shown before markdown.
    Dropped—shows how many packets were dropped by           policing

  • Show mls qos interface statistics equivalent command on Cat6500 SUP720-3B?

    Hi all
    Is there a command on the SUP720-3B that is similar to the show mls qos interface gi0/x statistics command on the access-layer series switches (3560 etc.)?
    I'd like to see the incoming and outgoing DSCP/COS values in number of packets.
    Thx :)

    Hi,
    You can use this command:
    SUP720#show queueing interface xx
    You should be able to see all that information there.
    Hope this helps.

  • Interface statistics

    Is it possible that Cisco router collects traffic statistcics (value of traffic counter of interface
    at given intervals) from interface and store it localy so it can be fetched later
    or deliver to some ftp server or simmilar?

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    Collect traffic statistics, yes and no.  For the most part, counters just have current values which can be polled for, generally from an external SNMP management system, although later IOSs have scripting capabilities which, I believe, can poll locally and "decide" what to do with the data.
    On such IOSs with scripting, I beleive it might be possible to script something like getting show interface and sending it somewhere, but SNMP stats would more what you would expect when "Service Provider".
    There are some cumulative stats that can collected on the device, often by enabling configuration options.  For instance one such option, Netflow, can kept some local information as well as exporting stats to a system designed to collect them.
    If you want to pursue this question, suggest posting to Network Infrastructure - Network Management,

  • Nexus 1010v interfaces, port-channel, Catalyst 6500E VSS

    I'm installing a pair of 1010v-X appliances using flexible network option 5 on version 4.2(1)SP1(5.1).
    I have all interfaces grouped into a single port channel 6.  All interfaces uplink to a pair of Catalyst 6506Es in a VSS (Sup2T).
    My question relates to the VSS configuration.
    For example, do I set up one port-channel on the VSS and put all 12 interfaces in it? Or, do I set up two port-channels on the VSS and put the active 1010v-X in one port-channel and the standby into another port-channel?
    Do I set dot1q trunking up on the port-channel(s) on the VSS?
    Thanks.

    Hi,
    What version of IOS are you running on the ASAs?
    see table-12-3 in this link:
    http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/interface_start.html
    Also, since the 4500x are in VSS mode, you need to bundle one link from each switch and use LACP.
    HTH

  • 3560 mls qos interface statistics output

    Hi
    I've seen questions like this before, but never seen a satisfactory answer... I can't find any good documentation anywhere about this command.
    If you run it, you get tabular output of some statistics - with no headers to the columns.
    The closest thing I've found to it is in this document:
    http://www.cisco.com/univercd/cc/td/doc/product/lan/c3550/12113ea1/3550cr/cli2.htm#wp2418191
    It shows the fields as: Incoming, No_Change, Classified, Policed and dropped.
    I have a switch with a modified cos-dscp map so that cos 5 is marked to dscp 46. This shows normal traffic as in the row titled 0-4 in the 'incoming' column, and cos 5 traffic appears in the 40-44 row and the 'dropped' column... which can't be right.
    Anyone know what the columns mean?
    Aaron

    I figured this out after looking at it sideways and upside down. Here is part of the output from the command I ran on one of our 3750 switches (copy it and paste it into notepad so the rows stretch back out): 'sh mls qos int f0/35 statistics'
    dscp: outgoing
    0 - 4 : 63683 0 0 0 0
    5 - 9 : 0 0 0 0 0
    10 - 14 : 0 0 0 0 0
    15 - 19 : 0 0 0 0 0
    20 - 24 : 0 0 0 0 81
    25 - 29 : 0 0 0 0 0
    30 - 34 : 0 0 0 0 13366
    35 - 39 : 0 0 0 0 0
    40 - 44 : 0 0 0 0 0
    45 - 49 : 0 10749 0 13653 0
    50 - 54 : 0 0 0 0 0
    55 - 59 : 0 0 0 0 0
    On the left side X - X are the DSCP values for the five columns of that row. For example, 20 - 24 row has the number 81 in the fith column. That shows that 81 packets with the DSCP value of 24 went out of that port. In row 45 - 49, 10749 packets with DSCP of 46 and 13653 packets with DSCP value of 48 went out that port.
    I finally was able to use this table to show that a video conferencing unit was truely generating voice packets with DSCP 46 (EF), video packets with DSCP 34, and call control packets with DSCP 24 (this is COS 3 that is mapped to DSCP 24 in the cos-dscp map entry.)
    So to clarify, the five columns have nothing to do with Incoming, No_Change, Classified, Policed and dropped, they represent the number of packets that have the DSCP values as referred to by the far left table.
    Hope this helps.

  • Nexus 7K F2 & F3 Mixed VDC

    Does anyone know if the new 12 port 40G F3 module can coexist in the same VDC as an F2 card? Looking for OTV and LISP support at the aggregation layer without replacing the F2's. The F2e card wasn't released when we purchased so I'm hoping that the F3's will be compatible.
    Thanks!

    Thanks for the quick reply Marwanshawi.
    I've seen that the F2 and F2e's can coexist so It will be excellent news if your suspicions are correct! I guess that F2e customers wouldn't need to worry about the 80G Fabric limitation on the M1's when mixed also, so that's another bonus (I didn't like that limitation when looking at LISP the aggregation layer).
    Hopefully the F3 cards will make things much simpler without so many design worries.
    Thanks!

  • Nexus 7000 - Management best practice in multi-VDC environment

    Hello all, my topology includes an Admin VDC, a Core\Agg VDC and a Storage VDC for FCoE traffic. In the absence of a dedicated OOB Management switch, could I patch from an interface in the Core\Agg VDC to the Mgmt0 interface of the SUP2 and get access to mgmt0 IP of all VDCs? Or is an OOB management switch a necessity to manage this topology?  
    Any information would be appreciated.
    Kind regards
    Rays

    Thanks for the reply Richard. I understand the risk with not having an OOB network, thanks for that.
    So without the OOB management network, are you saying I need a separate switch to which I can connect a physical interface from each VDC to, for management purposes? And to access the Storage and Admin VDC, would I connect the mgmt0 interfaces to the same switch? As i understand it you cannot allocate a physical i/f to the Admin VDC, so the only method is via console or mgmt0 interface...
    Thanks for you're assistance...
    Rays

  • Connecting NEXUS 5548 1gig interface to 100mbps

    Hi,
    I have a 5548 that I need to connect to a firewall that supports 100 Mbps only.
    Can I configure interface speed on Nexus 5548 interface (GLC-T) to 100 Mbps inorder to connect it to the firewall??
    Regards,
    Sabih

    Hi Sabih,
    The interfaces on a Nexus 5548 can NOT be configured as 100 Mbps.
    If you wish to connect to the firewall via a 100 Mbps connection, you will need to make use of a Fabric Extender (Nexus 2000) that supports 100 Mbps.
    http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/data_sheet_c78-618603.html
    Thanks,
    Michael

  • Nexus 7K out of band Management interface

    Dears,
    regarding to the out of band Management interface , if I configured an intervace vlan to be as a managment interface for one vdc ( the default vdc )
    , when I connected to this vdc via telnet , can I switch to any other vdc ?  ( suppose that I have the Admin role which allows me to enter and config all the vdc's )
    If that is possible so that I dont have to make a dedicated managment ip for each VDC
    I need to do that only if I want to make vdc admin's account to allow some users to access specific vlans only , is that true ?

    Hi,
    Yes, it is possible.  When you login as admin and you want to get to another vdc, you just use this command:
    switchto vdc
    This will take to the that vdc.  If you want to switch back to the admin vdc, you just type "switchback"
    HTH

  • Vdc question

       This may be a stupid question for most but with my limited knowledge of nexus 7000 gear I'll ask anyway.  If you say ssh into a created vdc  how do you get back to the default vdc if you didn't use a mgmt 0 interface . Used mgmt 0 as a vpc peer keepalive link .  I know if you get into the box via console it takes you into the default vdc then you use the switchto command and you can just switchback to the default .  Is this comand still available if you ssh into a given vdc ??? Hope this made sense.

    Reza, isn't it true that when you allocate mgmt0 interface on the 7K to multiple VDCs, even though the mgmt0 is shared, you cannot have mgmt0 of VDC 2 talk to mgmt0 of VDC3?
    And, wouldn't the three VDC's mgmt0 IP be in different subnets?
    However, I looked this up on Cisco,
    "Basic device management is local to the virtual device context (VDC). The mgmt0 interface exists in the management virtual routing and forwarding instance (VRF) and is accessible from any VDC. You can configure a unique IP address for the mgmt0 interface in each VDC."
    Say I have VDC 1 (default) and 3 other VDCs - (2,3,4), could you certify the following?
    VDC 1 - mgmt0 - 172.16.0.1/30
    VDC 2 - mgmt0 - 172.16.0.5/30
    VDC 3 - mgmt0 - 172.16.0.9/30
    VDC 4 - mgmt0 - 172.16.0.13/30
    or
    VDC 1 - mgmt0 - 172.16.0.1/24
    VDC 2 - mgmt0 - 172.16.0.2/24
    VDC 3 - mgmt0 - 172.16.0.3/24
    VDC 4 - mgmt0 - 172.16.0.4/24
    I thought the vrf management of each VDC is isolated. You'd need a physical L3 interface across VDCs for them to route to each other.

  • The management port in Nexus 7k

    Is the mgmt port in the Nexus 7K shared by all VDC's? I came across a configuration which looks to be something like that but I just want to confirm.
    Regards,
    Nikhil

    Yes the physical port is shared - however there is a unique logical mgmt port per VDC. Which means you configure the mgmt0-interface on a per VDC basis with a spearate IP:
    VDC1
    int mgmt0
    ip address 192.168.1.84/24
    VDC2
    int mgmt0
    ip address 192.168.1.85/24
    etc.
    Regards
    Marcel

Maybe you are looking for