SlideShare a Scribd company logo
November 2016
Deep Traffic Visibility
for Virtualized Infrastructure
Virtualization is powerful ….
2
… but it is difficult to see
the traffic flowing inside virtualized infrastructure
Introducing L7 Viewer
3
Introducing L7 Viewer
4
Introducing L7 Viewer
5
Sounds cool, but…….
6
Slower Application Performance
7
 General slow down in application performance
 Impossible to pinpoint the exact cause
 And a lot of “Could be” …
 the application not working well ?
 the network not well dimensioned ?
 a misusage of some applications ?
 something else?
How to: Identifying Root Cause for Slower Application Performance
8
How to: Identifying Root Cause for Slower Application Performance
9
How to: Identifying Root Cause for Slower Application Performance
10
How to: Identifying Root Cause for Slower Application Performance
11
youtube
How to: Identifying Root Cause for Slower Application Performance
12
youtube
How to: Identifying Root Cause for Slower Application Performance
13
youtube
Straightforward Root Cause Identification for Slower Application
14
 Using L7 Viewer, the IT admin is able to
quickly find out the origin of the slowdown
Identify it as a spike in traffic due to extensive YouTube traffic
 Also applicable to e.g. P2P traffic, shadow IT or SW updates
2600 + protocols and applications recognized
with their categories (Gaming, Email, P2P, etc.)
Safe Active Directory Server Migration
15
 I just installed my new AD 2012
 I have reconfigured my clients to use AD 2012
 It should be ok to shut down my AD 2008 but…
 What if I forgot one client using the AD 08 … ?
 What if this client is essential to my business …. ?
 Is my AD 08 server offering other services ?
 I could of course use TCP dump to address that
but ….
AD 2012
AD 2008
How to: Identifying Root Cause for Slower Application Performance
16
How to: Upgrade for Active Directory Services
17
ldap
How to: Upgrade for Active Directory Services
18
ldap
How to: Upgrade for Active Directory Services
19
ldap
How to: Upgrade for Active Directory Services
20
ldap
LDAP server
ldap
LDAP server
How to: Upgrade for Active Directory Services
21
ldap
LDAP serverLDAP server
ldap
How to: Upgrade for Active Directory Services
22
LDAP server
ldap
How to: Upgrade for Active Directory Services
23
LDAP server
ldap
Safe Active Directory Server Migration
24
 Using L7 Viewer, the IT admin is able to
Identify all clients using services from Active Directory 2008
Reconfigure these clients and check no connections remained
Switch Active Directory 2008 off safely
Reduce time required for the update to 4 hours (vs. usual 2 days)
 Also applicable to e.g. DNS, NTP, etc.
2600 + protocols and applications recognized
Examples of traffic from
active LDAP clients:
Outlook Web access (OWA) ,
LDAP
Kerberos
Detecting idle VMs
25
 I manage a 200-HV infrastructure
 Users forget to switch their VMs off after using them
 Users create much more VM than they need
 I foresee substantial saving here but ….
 I cannot clearly identify the idle VM
 All the VM use my infrastructure for something
 What if I switch off a key VM…. ?
IDLE
IDLE
IDLE
How to: Detecting Idle VMs
26
How to: Detecting Idle VMs
27
VM Name
Mon 04 Wed 06 Fri 08 Sun 10 Tue 12 Thu 14 Sat 16 Mon 18 Wed 20 Fri 22
Detecting Idle VMs
 Using L7 Viewer, the IT admin is able to
Look at the type of traffic in and out of VMs
List all VMs suspected of being idle
Decommission idle VMs
Load servers with active applications instead
 Significant savings estimated at
A typical 10% to 15% VM found inactive
$40,000 per year annual capex + opex savings
Typical client traffic
from idle VM
Typical traffic from
active VM
dns
dhcp
ldap
ntp
MS update
Http
https
ssl
mysql
smtp
Summary: Use Cases for L7 Viewer
29
Application
Dependency Mapping
VM
Optimization
Root Cause
Identification
Security
Policy Validation
Summary: L7 Viewer key differentiating features
30
 View inside the virtualized infrastructure, between VMs
 View up to L7 with 2600+ protocols and applications
 View all flows crossing the virtualized infrastructure
Copyright © 2016 Qosmos Tech S.A.S. All rights reserved. Qosmos, the Qosmos logo, Qosmos ixEngine and L7Viewer
are trademarks of Qosmos Tech. Other names and brands may be claimed as the property of others.
Non-contractual information. Products and services and their specifications are subject to change without prior notice.

More Related Content

PPTX
Api logger by T5 Systems
PDF
Rubyslava Phoenix Liveview
PDF
surge con 2011 lightning talk - closed loop server lifecycle
PDF
Cloud-Native Roadshow - Solace - Denver
PDF
Cloud- Native Roadshow NYC - Solace
PDF
OS + CF Austin meetup
PDF
OpenStack + CloudFoundry Austin Meetup
PDF
NYC Kubernetes Meetup: Ambassador and Istio - Flynn, Datawire
Api logger by T5 Systems
Rubyslava Phoenix Liveview
surge con 2011 lightning talk - closed loop server lifecycle
Cloud-Native Roadshow - Solace - Denver
Cloud- Native Roadshow NYC - Solace
OS + CF Austin meetup
OpenStack + CloudFoundry Austin Meetup
NYC Kubernetes Meetup: Ambassador and Istio - Flynn, Datawire

Similar to Deep Traffic Visibility for Virtualized Infrastructure (20)

PDF
AWS Community Day - Amy Negrette - Gateways to Gateways
PDF
Essay On It 260 Quiz 1-5
PDF
J-Spring 2018 - A journey from Java EE to Cloud Native microservices
PDF
Scala dayssrinivas v3
PDF
Enabling Mainframe Assets for API Economy with z?OS Connect EE
PPTX
11 Ways Microservices & Dynamic Clouds Break Your Monitoring
PDF
Cloud expo 2015_rags
PPTX
A Blueprint for Cloud-Native Financial Institutions
PDF
AppDynamics Sales Presentation Imagemaker 2014
PDF
Developer-Friendly CI / CD for Kubernetes
PPT
Integration intervention: Get your apps and data up to speed
PDF
Openshift serverless Solution
PDF
z/OS Connect - Overview at the "z Systems Agile Enterprise Development Confer...
PDF
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PPTX
Cytoscape CI Chapter 2
PDF
Docebo: history of a journey from legacy to serverless
PPTX
ATO 2018 - What is Serverless Useful For?
PPTX
Monitoring Cloud Native Apps on Pivotal Cloud Foundry with AppDynamics
PDF
apidays LIVE Australia 2020 - Move to the next generation API ecosystem by lo...
PDF
5 Golden Rules to Building APIs
AWS Community Day - Amy Negrette - Gateways to Gateways
Essay On It 260 Quiz 1-5
J-Spring 2018 - A journey from Java EE to Cloud Native microservices
Scala dayssrinivas v3
Enabling Mainframe Assets for API Economy with z?OS Connect EE
11 Ways Microservices & Dynamic Clouds Break Your Monitoring
Cloud expo 2015_rags
A Blueprint for Cloud-Native Financial Institutions
AppDynamics Sales Presentation Imagemaker 2014
Developer-Friendly CI / CD for Kubernetes
Integration intervention: Get your apps and data up to speed
Openshift serverless Solution
z/OS Connect - Overview at the "z Systems Agile Enterprise Development Confer...
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
Cytoscape CI Chapter 2
Docebo: history of a journey from legacy to serverless
ATO 2018 - What is Serverless Useful For?
Monitoring Cloud Native Apps on Pivotal Cloud Foundry with AppDynamics
apidays LIVE Australia 2020 - Move to the next generation API ecosystem by lo...
5 Golden Rules to Building APIs
Ad

Recently uploaded (20)

PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
L1 - Introduction to python Backend.pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Nekopoi APK 2025 free lastest update
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
AI in Product Development-omnex systems
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Introduction to Artificial Intelligence
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Odoo Companies in India – Driving Business Transformation.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
L1 - Introduction to python Backend.pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Design an Analysis of Algorithms I-SECS-1021-03
Nekopoi APK 2025 free lastest update
Upgrade and Innovation Strategies for SAP ERP Customers
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Softaken Excel to vCard Converter Software.pdf
AI in Product Development-omnex systems
wealthsignaloriginal-com-DS-text-... (1).pdf
How to Migrate SBCGlobal Email to Yahoo Easily
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Introduction to Artificial Intelligence
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Ad

Deep Traffic Visibility for Virtualized Infrastructure

  • 1. November 2016 Deep Traffic Visibility for Virtualized Infrastructure
  • 2. Virtualization is powerful …. 2 … but it is difficult to see the traffic flowing inside virtualized infrastructure
  • 7. Slower Application Performance 7  General slow down in application performance  Impossible to pinpoint the exact cause  And a lot of “Could be” …  the application not working well ?  the network not well dimensioned ?  a misusage of some applications ?  something else?
  • 8. How to: Identifying Root Cause for Slower Application Performance 8
  • 9. How to: Identifying Root Cause for Slower Application Performance 9
  • 10. How to: Identifying Root Cause for Slower Application Performance 10
  • 11. How to: Identifying Root Cause for Slower Application Performance 11 youtube
  • 12. How to: Identifying Root Cause for Slower Application Performance 12 youtube
  • 13. How to: Identifying Root Cause for Slower Application Performance 13 youtube
  • 14. Straightforward Root Cause Identification for Slower Application 14  Using L7 Viewer, the IT admin is able to quickly find out the origin of the slowdown Identify it as a spike in traffic due to extensive YouTube traffic  Also applicable to e.g. P2P traffic, shadow IT or SW updates 2600 + protocols and applications recognized with their categories (Gaming, Email, P2P, etc.)
  • 15. Safe Active Directory Server Migration 15  I just installed my new AD 2012  I have reconfigured my clients to use AD 2012  It should be ok to shut down my AD 2008 but…  What if I forgot one client using the AD 08 … ?  What if this client is essential to my business …. ?  Is my AD 08 server offering other services ?  I could of course use TCP dump to address that but …. AD 2012 AD 2008
  • 16. How to: Identifying Root Cause for Slower Application Performance 16
  • 17. How to: Upgrade for Active Directory Services 17 ldap
  • 18. How to: Upgrade for Active Directory Services 18 ldap
  • 19. How to: Upgrade for Active Directory Services 19 ldap
  • 20. How to: Upgrade for Active Directory Services 20 ldap LDAP server ldap LDAP server
  • 21. How to: Upgrade for Active Directory Services 21 ldap LDAP serverLDAP server ldap
  • 22. How to: Upgrade for Active Directory Services 22 LDAP server ldap
  • 23. How to: Upgrade for Active Directory Services 23 LDAP server ldap
  • 24. Safe Active Directory Server Migration 24  Using L7 Viewer, the IT admin is able to Identify all clients using services from Active Directory 2008 Reconfigure these clients and check no connections remained Switch Active Directory 2008 off safely Reduce time required for the update to 4 hours (vs. usual 2 days)  Also applicable to e.g. DNS, NTP, etc. 2600 + protocols and applications recognized Examples of traffic from active LDAP clients: Outlook Web access (OWA) , LDAP Kerberos
  • 25. Detecting idle VMs 25  I manage a 200-HV infrastructure  Users forget to switch their VMs off after using them  Users create much more VM than they need  I foresee substantial saving here but ….  I cannot clearly identify the idle VM  All the VM use my infrastructure for something  What if I switch off a key VM…. ? IDLE IDLE IDLE
  • 26. How to: Detecting Idle VMs 26
  • 27. How to: Detecting Idle VMs 27 VM Name Mon 04 Wed 06 Fri 08 Sun 10 Tue 12 Thu 14 Sat 16 Mon 18 Wed 20 Fri 22
  • 28. Detecting Idle VMs  Using L7 Viewer, the IT admin is able to Look at the type of traffic in and out of VMs List all VMs suspected of being idle Decommission idle VMs Load servers with active applications instead  Significant savings estimated at A typical 10% to 15% VM found inactive $40,000 per year annual capex + opex savings Typical client traffic from idle VM Typical traffic from active VM dns dhcp ldap ntp MS update Http https ssl mysql smtp
  • 29. Summary: Use Cases for L7 Viewer 29 Application Dependency Mapping VM Optimization Root Cause Identification Security Policy Validation
  • 30. Summary: L7 Viewer key differentiating features 30  View inside the virtualized infrastructure, between VMs  View up to L7 with 2600+ protocols and applications  View all flows crossing the virtualized infrastructure
  • 31. Copyright © 2016 Qosmos Tech S.A.S. All rights reserved. Qosmos, the Qosmos logo, Qosmos ixEngine and L7Viewer are trademarks of Qosmos Tech. Other names and brands may be claimed as the property of others. Non-contractual information. Products and services and their specifications are subject to change without prior notice.