Course Description
Tetration Analytics is the platform that discovers and monitors your applications – enabling a Zero Trust Model. Tetration, using machine learning, can perform Application Dependency Mapping to build dynamic policies and automate enforcement. Tetration is capable of supporting hybrid Data Center environments using a choice of deployment models.
The Cisco Tetration Technical Workshop provides network engineers with the skills and insight that enable them to discover, operate, manage, and monitor applications in new or existing Data Center environments.
Course Details
Duration: 2 Days
Fee: Contact Us
Course Prerequisites
The knowledge and skills that a learner should have before attending this course are:
- Basic understanding of network and application operational dynamics
- Knowledge of Firewall and Load Balancer principles
- Appreciation of network and application monitoring
- Familiarity with the Linux command line
Target Audience
The primary audience for this course includes:
- Partners and customers
- IT individuals in a post and pre-sales role
- IT individuals involved in an evaluation, recommendation or decision making capacity
- Application architects and developers
- Network architects and engineers
- IT security personnel
- Operations and support engineers
Course Goal
This course will provide attendees with an overview of the features and functionality of Cisco’s Tetration solution. Operational concepts will be reinforced with hands-on lab exercises.
Course Outline
Module 1: Scene setting and DC Challenges – A need for Tetration
- DC Challenges
- Lack of Visibility
- Network Performance
- Security
Module 2: Analytics Overview
- Busting the Acronyms
- Telemetry
- Big Data
- Machine Learning
Module 3: Tetration Product Overview
- What is Tetration?
- Visibility and Application Insight
- Network Insight
- Policy Model
- Compliance
- Enforcement
- Tetration Platforms
Module 4: Tetration – First Looks
- Accessing the GUI
- Help and documentation
- Tenants, Scopes, and VRFs
- Workspaces and applications
- Policy and Policy Views
- Flows
- Inventory
- Lab
- First Looks and Exploration
Module 5: Agents and Sensors
- Agent Overview
- Software Agents
- Installing Software Agents
- Hardware Agents
- Data Collection
- Collection Rules
- Lab
- Installing the Software agent
Module 6: Tetration Components
- Architectural Overview
- Front End
- Compute
- Data Cleaning and Analytics
- Storage
- Tetration Data Analysis
Module 7: ADM and Policy
- Application Structure
- Tetration ADM
- ADM configuration
- Post ADM Run
- Cluster View
- App View
- Editing Policy
- Provided Services
- Policy Analysis
- Policy Enforcement
- Lab
- ADM Run and Policy Modification
- Policy Enforcement
Module 8: Flows and Inventory
- Flow Details
- Tags and Annotations
- Inventory details and searching
- Packages and Process
- Lab
- Flow Search
- Inventory Search
Module 9: Network Insight
- Network Performance Monitoring and Diagnostics (NPMD)
- ACI Integration
- ERSPAN
- Lab
- NPMD Exploration
Module 10: Tetration Tools – (Optional Extension)
- Tetration API
- Tetration Apps
- Neighborhood Graph
- Kafka and Streaming Telemetry
- Bring Your Own Data
- Lab (optional)