diff --git a/alert-policies/network-flow-devices/Flow Destinations Baseline.yml b/alert-policies/network-flow-devices/Flow Destinations Baseline.yml deleted file mode 100644 index 57e343db8a..0000000000 --- a/alert-policies/network-flow-devices/Flow Destinations Baseline.yml +++ /dev/null @@ -1,43 +0,0 @@ -# Name of the alert -name: Flow Destinations Baseline - -# Description and details -description: |+ - This alert is triggered when the unique count of 'Destination:Port' endpoints for a Flow Device fluctuates more than 2 standard deviations above or below baseline for over 5 minutes. - This is a measurement on the total number of destinations for your traffic and can be an associated metric to throughput signals from your applications. - -# Type of alert -type: BASELINE - -# NRQL query -nrql: - # Baseline alerts can use an optional FACET - query: "FROM KFlow SELECT uniqueCount(dst_addr, l4_dst_port) FACET entity.name, entity.guid" - -# Direction in which baseline is set (Default: LOWER_ONLY) -baselineDirection: UPPER_AND_LOWER - -# List of Critical and Warning thresholds for the condition -terms: - - priority: CRITICAL - # Operator used to compare against the threshold. - operator: ABOVE - # Value that triggers a violation - threshold: 2 - # Time in seconds; 120 - 3600, must be a multiple of 60 for Baseline conditions - thresholdDuration: 300 - # How many data points must be in violation for the duration - thresholdOccurrences: ALL - -# Loss of Signal Settings -expiration: - # Close open violations if signal is lost (Default: false) - closeViolationsOnExpiration: true - # Open "Loss of Signal" violation if signal is lost (Default: false) - openViolationOnExpiration: true - # Time in seconds; Max value: 172800 (48hrs), null if closeViolationsOnExpiration and openViolationOnExpiration are both 'false' - expirationDuration: 86400 - -# Duration after which a violation automatically closes -# Time in seconds; 300 - 2592000 (Default: 86400 [1 day]) -violationTimeLimitSeconds: 86400 diff --git a/alert-policies/network-flow-devices/Flow Sources Baseline.yml b/alert-policies/network-flow-devices/Flow Sources Baseline.yml deleted file mode 100644 index 81cd8c0c48..0000000000 --- a/alert-policies/network-flow-devices/Flow Sources Baseline.yml +++ /dev/null @@ -1,43 +0,0 @@ -# Name of the alert -name: Flow Sources Baseline - -# Description and details -description: |+ - This alert is triggered when the unique count of 'Source:Port' endpoints for a Flow Device fluctuates more than 2 standard deviations above or below baseline for over 5 minutes. - This is a measurement on the total number of sources for your traffic and can be an associated metric to throughput signals from your applications. - -# Type of alert -type: BASELINE - -# NRQL query -nrql: - # Baseline alerts can use an optional FACET - query: "FROM KFlow SELECT uniqueCount(src_addr, l4_src_port) FACET entity.name, entity.guid" - -# Direction in which baseline is set (Default: LOWER_ONLY) -baselineDirection: UPPER_AND_LOWER - -# List of Critical and Warning thresholds for the condition -terms: - - priority: CRITICAL - # Operator used to compare against the threshold. - operator: ABOVE - # Value that triggers a violation - threshold: 2 - # Time in seconds; 120 - 3600, must be a multiple of 60 for Baseline conditions - thresholdDuration: 300 - # How many data points must be in violation for the duration - thresholdOccurrences: ALL - -# Loss of Signal Settings -expiration: - # Close open violations if signal is lost (Default: false) - closeViolationsOnExpiration: true - # Open "Loss of Signal" violation if signal is lost (Default: false) - openViolationOnExpiration: true - # Time in seconds; Max value: 172800 (48hrs), null if closeViolationsOnExpiration and openViolationOnExpiration are both 'false' - expirationDuration: 86400 - -# Duration after which a violation automatically closes -# Time in seconds; 300 - 2592000 (Default: 86400 [1 day]) -violationTimeLimitSeconds: 86400 diff --git a/dashboards/network-flow-devices/network-flow-devices.json b/dashboards/network-flow-devices/network-flow-devices.json deleted file mode 100644 index 07d152b0f7..0000000000 --- a/dashboards/network-flow-devices/network-flow-devices.json +++ /dev/null @@ -1,340 +0,0 @@ -{ - "name": "Kentik Firehose", - "description": "", - "pages": [ - { - "name": "Top Talkers", - "description": "", - "widgets": [ - { - "visualization": { - "id": "viz.pie" - }, - "layout": { - "column": 1, - "row": 1, - "height": 8, - "width": 6 - }, - "title": "Top 10 - Conversations", - "rawConfiguration": { - "facet": { - "showOtherSeries": false - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT sum(in_bytes) AS 'bytes' FACET src_endpoint AS 'Source', application, dst_endpoint AS 'Destination' SINCE 1 HOUR AGO LIMIT 10" - } - ] - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.bar" - }, - "layout": { - "column": 7, - "row": 1, - "height": 8, - "width": 3 - }, - "title": "Top 10 - Known Apps by TCP Port", - "rawConfiguration": { - "facet": { - "showOtherSeries": false - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT sum(in_bytes) AS 'bytes' FACET l4_src_port AS 'TCP Port', application WHERE application IS NOT NULL SINCE 1 HOUR AGO LIMIT 10" - } - ] - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.bar" - }, - "layout": { - "column": 10, - "row": 1, - "height": 4, - "width": 3 - }, - "title": "Top 5 - Source Endpoints", - "rawConfiguration": { - "facet": { - "showOtherSeries": false - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT sum(in_bytes) AS 'bytes' FACET src_endpoint SINCE 1 HOUR AGO LIMIT 5" - } - ] - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.bar" - }, - "layout": { - "column": 10, - "row": 5, - "height": 4, - "width": 3 - }, - "title": "Top 5 - Destination Endpoints", - "rawConfiguration": { - "facet": { - "showOtherSeries": false - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT sum(in_bytes) AS 'bytes' FACET dst_endpoint SINCE 1 HOUR AGO LIMIT 5" - } - ] - }, - "linkedEntityGuids": null - } - ] - }, - { - "name": "Flow Overview", - "description": "", - "widgets": [ - { - "visualization": { - "id": "38301291-54c7-4042-855f-777bbf9e9294.kentik-map" - }, - "layout": { - "column": 1, - "row": 1, - "height": 8, - "width": 4 - }, - "title": "Traffic by Geo", - "rawConfiguration": { - "accountId": 0, - "autoZoom": null, - "initialLat": "41.8336479", - "initialLng": "-87.8720462", - "initialZoom": "3", - "metric": "kentik.rollup.bytes.rcv", - "showTable": true - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.bar" - }, - "layout": { - "column": 5, - "row": 1, - "height": 4, - "width": 3 - }, - "title": "Top 5 - bps per Destination Geo", - "rawConfiguration": { - "facet": { - "showOtherSeries": true - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT rate(sum(in_bytes)*8, 1 SECOND) FACET dst_geo AS 'Geo' WHERE instrumentation.name = 'netflow-events' AND dst_geo IS NOT NULL LIMIT 5" - } - ] - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "38301291-54c7-4042-855f-777bbf9e9294.kentik-sankey" - }, - "layout": { - "column": 8, - "row": 1, - "height": 8, - "width": 5 - }, - "title": "Source > Destination by Geo", - "rawConfiguration": { - "chartName": "", - "dimensionLeft": "src_geo", - "dimensionRight": "dst_geo", - "nrqlQueries": [ - { - "accountId": 0, - "query": "select rate(sum(in_bytes*sample_rate)*8/1000/1000, 1 second) as mbits from KFlow facet src_geo, dst_geo where src_geo is not null or dst_geo is not null since 60 minutes ago" - } - ], - "showTable": false - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.bar" - }, - "layout": { - "column": 5, - "row": 5, - "height": 4, - "width": 3 - }, - "title": "Top 5 - bps per Source Geo", - "rawConfiguration": { - "facet": { - "showOtherSeries": true - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT rate(sum(in_bytes)*8, 1 SECOND) FACET src_geo AS 'Geo' WHERE instrumentation.name = 'netflow-events' AND src_geo IS NOT NULL LIMIT 5" - } - ] - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.line" - }, - "layout": { - "column": 1, - "row": 9, - "height": 4, - "width": 4 - }, - "title": "Total Endpoints", - "rawConfiguration": { - "legend": { - "enabled": true - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT uniqueCount(src_addr) AS 'Sources', uniqueCount(dst_addr) AS 'Destinations' WHERE instrumentation.name = 'netflow-events' TIMESERIES " - } - ], - "yAxisLeft": { - "zero": false - } - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.bar" - }, - "layout": { - "column": 5, - "row": 9, - "height": 4, - "width": 3 - }, - "title": "Top 5 - bps per Destination ASN", - "rawConfiguration": { - "facet": { - "showOtherSeries": true - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT rate(sum(in_bytes)*8, 1 SECOND) FACET dst_as_name AS 'ASN' WHERE instrumentation.name = 'netflow-events' AND dst_as_name IS NOT NULL LIMIT 5" - } - ] - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "38301291-54c7-4042-855f-777bbf9e9294.kentik-sankey" - }, - "layout": { - "column": 8, - "row": 9, - "height": 8, - "width": 5 - }, - "title": "Source > Destination by ASN", - "rawConfiguration": { - "chartName": "", - "dimensionLeft": "src_as_name", - "dimensionRight": "dst_as_name", - "nrqlQueries": [ - { - "accountId": 0, - "query": "select rate(sum(in_bytes*sample_rate)*8/1000/1000, 1 second) as mbits from KFlow facet src_as_name, dst_as_name where src_as_name is not null or dst_as_name is not null since 60 minutes ago" - } - ], - "showTable": false - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.line" - }, - "layout": { - "column": 1, - "row": 13, - "height": 4, - "width": 4 - }, - "title": "Estimated Packets/sec (Flows * Sample Rate)", - "rawConfiguration": { - "facet": { - "showOtherSeries": false - }, - "legend": { - "enabled": true - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT count(*) * latest(sample_rate) AS 'Packets/sec' WHERE instrumentation.name = 'netflow-events' FACET device_name TIMESERIES " - } - ], - "yAxisLeft": { - "zero": true - } - }, - "linkedEntityGuids": null - }, - { - "visualization": { - "id": "viz.bar" - }, - "layout": { - "column": 5, - "row": 13, - "height": 4, - "width": 3 - }, - "title": "Top 5 - bps per Source ASN", - "rawConfiguration": { - "facet": { - "showOtherSeries": true - }, - "nrqlQueries": [ - { - "accountId": 0, - "query": "FROM KFlow SELECT rate(sum(in_bytes)*8, 1 SECOND) FACET src_as_name AS 'ASN' WHERE instrumentation.name = 'netflow-events' AND src_as_name IS NOT NULL LIMIT 5" - } - ] - }, - "linkedEntityGuids": null - } - ] - } - ] - } - \ No newline at end of file diff --git a/dashboards/network-flow-devices/network-flow-devices01.png b/dashboards/network-flow-devices/network-flow-devices01.png deleted file mode 100644 index 239f624cb4..0000000000 Binary files a/dashboards/network-flow-devices/network-flow-devices01.png and /dev/null differ diff --git a/dashboards/network-flow-devices/network-flow-devices02.png b/dashboards/network-flow-devices/network-flow-devices02.png deleted file mode 100644 index 52d2a06436..0000000000 Binary files a/dashboards/network-flow-devices/network-flow-devices02.png and /dev/null differ diff --git a/install/network/flow/install.yml b/install/network/flow/install.yml deleted file mode 100644 index ae377b4408..0000000000 --- a/install/network/flow/install.yml +++ /dev/null @@ -1,21 +0,0 @@ -id: network-flow -name: Network flow -title: New Relic network flow monitoring -description: | - Set up your network devices so they send network data to New Relic One. - -target: - type: agent - destination: host - os: - - linux - -install: - mode: nerdlet - destination: - nerdletId: network-performance-monitoring.setup-network-flow - -fallback: - mode: link - destination: - url: https://docs.newrelic.com/docs/network-performance-monitoring/setup-performance-monitoring/network-flow-monitoring \ No newline at end of file diff --git a/quickstarts/network-monitoring/network-flow-devices/config.yml b/quickstarts/network-monitoring/network-flow-devices/config.yml deleted file mode 100644 index 426665d3b9..0000000000 --- a/quickstarts/network-monitoring/network-flow-devices/config.yml +++ /dev/null @@ -1,42 +0,0 @@ -id: 6d275d10-9aaf-4351-b556-0174fca3ffca -slug: network-flow-devices -title: Network Flow Devices -description: | - The Network Flow Devices quickstart provides dashboards and alerts designed to give you deeper insights into your flow data. - - Use this quickstart together with New Relic's Network Performance Monitoring (NPM) feature to visualize how users are consuming your bandwidth. - - (This quickstart contains Custom Visualizations which require Full User permissions to access) -summary: | - Network Flow Devices from NPM give you valuable insights into how your network bandwidth is being used. -level: Verified -authors: - - New Relic - - Zack Mutchler -keywords: - - npm - - network - - networking - - flow - - netflow - - sflow - - ipfix - - jflow - - ktranslate - - kentik - - infrastructure - - newrelic partner -documentation: - - name: Network flow data installation docs - url: https://docs.newrelic.com/docs/network-performance-monitoring/setup-performance-monitoring/network-flow-monitoring/ - description: | - Install NPM for flow data collection using a simple Docker container. -installPlans: - - network-flow -dataSourceIds: - - network-syslog -icon: logo.svg -dashboards: - - network-flow-devices -alertPolicies: - - network-flow-devices diff --git a/quickstarts/network-monitoring/network-flow-devices/logo.svg b/quickstarts/network-monitoring/network-flow-devices/logo.svg deleted file mode 100644 index 8dea5435a1..0000000000 --- a/quickstarts/network-monitoring/network-flow-devices/logo.svg +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -