Performance of traffic monitoring actions

ABSTRACT

Some embodiments provide a method for performing data traffic monitoring. For each packet processing stage of a set of packet processing stages in a packet processing pipeline, the method determines whether a packet received by the packet processing pipeline specifies a set of monitoring actions to be performed on the packet. When the packet specifies a set of monitoring action, the method determines whether the monitoring actions in the set are supported by the packet processing stage. The method executes the supported monitoring actions on the packet in addition to processing the packet according to configuration data for the stage.

BACKGROUND

Today, network virtualization is crucial for cloud computinginfrastructure as it offers preferable network productivity, efficiency,and elasticity by decoupling network services from the underlyinghardware and allowing virtual provisioning of network resources.Existing utilities for network troubleshooting, however, work in anend-to-end manner and lack the capability to localize issues on specificvirtual network components. Additionally, typical tools provided bynetwork virtualization platforms rely on probing with crafted trafficrather than live traffic, and the number of tools required to adequatelydebug a network issue tend to make the process of debugging laboriousand error-prone due to the manual correlation of data from the multipletools that is required.

BRIEF SUMMARY

Some embodiments of the invention provide a method for performing datatraffic monitoring by tagging packets with information specifying a setof monitoring actions for one or more stages of a packet processingpipeline to perform on the packet. The packet processing pipelineincludes a filtering stage that matches packets to a set of filters and,if a packet matches a particular filter, tags the packet with the set ofmonitoring actions specified by the particular filter. Each additionalstage in the packet processing pipeline (i) identifies from the packetwhich monitoring actions are specified, (ii) determines whether thestage supports those actions, and (iii) performs any monitoring actionsthat are both specified for the packet and supported by the stage, inaddition to performing the standard operations for the stage on thepacket.

In some embodiments, the packet processing pipeline is a set of packetprocessing stages executed by a computing device (e.g., a host computeror edge device) to perform various packet processing operations onpackets. The stages, in some embodiments, can include a filtering stage,firewall and/or other service stages, logical switching and/or routingstages, and an encapsulation stage, in addition to other stages. In someembodiments, the stages of a packet processing pipeline are performed byone or more forwarding elements (e.g., software forwarding elements(SFEs)) and/or other modules (e.g., firewall engines, filter engine,etc.) executing on the computing device (e.g., in virtualizationsoftware of the computing device).

The filtering stage is the first stage in the packet processing pipelineat the initial computing device (i.e., source computing device), in someembodiments. This filtering stage is configured to match packets againsta specified set of characteristics and, when a packet matches thosecharacteristics, tag the packet with a set of monitoring actions (e.g.,by writing the set of monitoring actions into the packet's metadata). Insome embodiments, the set of characteristics can include a flowidentifier (e.g., five-tuple identifier) and/or the source of the packet(e.g., a source machine or source interface that corresponds to a sourcemachine).

Following the filtering stage, packets are processed by a set ofintermediate stages. In some embodiments, each of these stage processesa packet by (i) identifying from the packet which monitoring actions (ifany) are specified, (ii) determining whether the stage supports thoseactions, and (iii) performing any monitoring actions that are bothspecified for the packet and supported by the stage, in addition toperforming the standard operations for the stage on the packet. Theseintermediate stages, in some embodiments, include firewall and/or otherservice stages that perform services on packets, such as applyingfirewall and service rules to the packets, as well as logical switchingand/or routing stages that perform switching and routing services forthe packets.

In some embodiments, to identify which monitoring actions are specifiedfor a packet, a stage reads the set of monitoring actions to beperformed from the packet's metadata stored at the computing device. Indifferent embodiments, the packet's tag specifies either a general setof monitoring actions to be executed on the packet or specificmonitoring actions for specific stages to execute. In some embodiments,one stage may support a particular monitoring action that is notsupported by other stages in the packet processing pipeline, while othermonitoring actions are supported by multiple stages that each performthose monitoring actions on packets for which the actions are specified.In some embodiments, a subset of stages in the packet processingpipeline do not support any monitoring actions and only process packetsaccording to configuration data for the stage.

When a stage in the packet processing pipeline determines that a packetspecifies one or more monitoring actions that are supported by thatstage, the stage executes the monitoring actions on the packet. In someembodiments, the monitoring actions specified for a packet are specifiedin a priority order. For a stage that supports at least two monitoringactions to be performed on the packet, in some embodiments, the stageexecutes the at least two monitoring actions on the received packet inthe specified priority order (i.e., with higher priority actionsexecuted prior to lower priority actions by the packet processingstage). If a first higher-priority monitoring action modifies thepacket, then a second lower-priority monitoring action is executed onthe modified packet.

In some embodiments, after any intermediate stages have processed thepacket, the packet is processed by an encapsulation stage thatencapsulates the packet with an encapsulating header (e.g., a Geneveheader, in-band network telemetry (INT) header, etc.) that includes dataspecifying the monitoring actions (i.e., based on the monitoring actionstagged for the packet). By encapsulating packets with encapsulationheaders that specify the monitoring actions, the encapsulation stageenables other computing devices that process the packet to perform themonitoring actions on the packet and to generate additional metricsassociated with the packet and the live packet monitoring session.

Examples of other computing devices that process the packet to performmonitoring actions, in some embodiments, can include the destinationcomputing device at which the destination machine executes, an edgedevice that processes the packet before the packet leaves the logicalnetwork, and/or any intermediate devices that process the packet (e.g.,devices that enable the packet to be sent from one physical site toanother when the logical network spans multiple sites). In someembodiments, each of these computing devices executes a staged packetprocessing pipeline that operates in a similar manner as described abovefor the initial computing device (except that these other devices do notapply a filtering stage to the packet).

In some embodiments, the particular filter (i.e., set ofcharacteristics, such as a flow identifier) is specified as part of alive packet monitoring session that a user (e.g., administrator) definesthrough a network management and control system (e.g., via anapplication programming interface (API) entry point provided by thenetwork management and control system). The user-defined live packetmonitoring session, in some embodiments, also specifies a source machineor source interface that corresponds to a machine from which packets ofinterest are sent, and the set of monitoring actions to be performed onpackets of interest.

Examples of monitoring actions, in some embodiments, include packettracing, packet capture, and packet counting. In some embodiments, eachstage of each packet processing pipeline that supports packet tracingcreates a record for each packet that it processes when packet tracingis specified as a monitoring action for the packet. Aggregating theresulting packet metrics produces the path traversed by the packetbetween its source and destination as well as aggregated metrics. Stagesof packet processing pipelines that support packet capture interceptpackets tagged for packet capture, and temporarily store the capturedpackets for analysis. In some embodiments, analyzing packets usingpacket capture can be useful for granting visibility in order toidentify and/or troubleshoot network issues. Packet counting, in someembodiments, provides insight into how many packets (and/or how muchdata) are received and processed by each packet processing pipeline ofeach computing device traversed by packet flows for which the livepacket monitoring session is performed. In some embodiments, packetcount can be useful for identifying packet loss, as well as whichpackets are being dropped based on packet identifiers associated withthe packets. Other monitoring actions in some embodiments may includepacket flow statistics accumulation, packet latency measurement, orother packet monitoring measurements. It should be understood that theexamples given in this document are not exhaustive of the types ofmonitoring actions that could be incorporated into the describedframework.

The network management and control system, in some embodiments, uses thesource machine or source interface specified by the user to determinewhich computing device should be configured to filter and tag packetsfor the live packet monitoring session. In some embodiments, theparticular filter can define a packet flow or set of packet flows. Apacket flow defined by the particular filter, in some embodiments, canbe a bidirectional packet flow, in which case the filtering stage isimplemented at both the source computing device and the destinationcomputing device (to tag return traffic).

In some embodiments, a centralized data repository (e.g., a datastore atthe network controller and/or network manager) is automaticallypopulated with packet metrics generated as a result of a monitoringactions being executed on a packet. The computing devices that performthe monitoring actions provide this data to the centralized repository(e.g., after each stage, after each packet has completed the packetprocessing pipeline at the device, or at regular intervals). The packetmetrics for each packet, in some embodiments, are accompanied by apacket identifier associated with the packet, and a session identifierassociated with the live packet monitoring session. Both the packetidentifier and session identifier are part of the packet's tag andincluded in the packet's encapsulation header, according to someembodiments.

Once the live packet monitoring session is terminated (or during thesession), the network management and control system aggregates thepackets metrics in the repository using the accompanying packetidentifiers and session identifier, in some embodiments. For instance,in some embodiments, the packet identifiers are used to correlatedifferent metrics generated from different monitoring actions executedon a packet, while the session identifier is used to aggregate overmultiple packets. The network management and control system can then usethe aggregated packet metrics to respond to queries at different levelsof granularity. For instance, in some embodiments, the networkmanagement and control system provides both an aggregated set of sessionmetrics for packets matching the particular filter, and individualpacket metrics for at least one packet using the packet identifiers.

The preceding Summary is intended to serve as a brief introduction tosome embodiments of the invention. It is not meant to be an introductionor overview of all inventive subject matter disclosed in this document.The Detailed Description that follows and the Drawings that are referredto in the Detailed Description will further describe the embodimentsdescribed in the Summary as well as other embodiments. Accordingly, tounderstand all the embodiments described by this document, a full reviewof the Summary, the Detailed Description, the Drawings, and the Claimsis needed. Moreover, the claimed subject matters are not to be limitedby the illustrative details in the Summary, the Detailed Description,and the Drawings.

BRIEF DESCRIPTION OF FIGURES

The novel features of the invention are set forth in the appendedclaims. However, for purposes of explanation, several embodiments of theinvention are set forth in the following figures.

FIG. 1 illustrates an example of a workflow of performing live trafficmonitoring on packets between a source machine and a destinationmachine, in some embodiments.

FIG. 2 illustrates a process performed by a source host computer, insome embodiments, to initiate and terminate a live traffic monitoringsession.

FIG. 3 illustrates a packet processing pipeline of a host computer, insome embodiments.

FIG. 4 illustrates a process performed by a packet processing pipelineon a source host computer to process packets for a live trafficmonitoring session, in some embodiments.

FIG. 5 illustrates an example header for a packet that includes metadataspecifying the monitoring actions for a live traffic monitoring session,in some embodiments.

FIG. 6 illustrates a diagram depicting a more detailed example of apacket processing pipeline that performs live traffic monitoringsessions, in some embodiments.

FIG. 7 illustrates a process performed for a live traffic monitoringsession by a packet processing pipeline executed by a destinationcomputing device, in some embodiments.

FIG. 8 illustrates an example network architecture in which a livetraffic monitoring system is implemented, in some embodiments.

FIG. 9 illustrates a process performed by a network management andcontrol system to initiate a live traffic monitoring session, in someembodiments.

FIG. 10 illustrates an example of packet metrics for two packets beforeand after aggregation, in some embodiments.

FIG. 11 illustrates a diagram showing a network management and controlsystem collecting packet metrics for use in responding to queries from auser (e.g., administrator), in some embodiments.

FIG. 12 conceptually illustrates a computer system with which someembodiments of the invention are implemented.

DETAILED DESCRIPTION

In the following detailed description of the invention, numerousdetails, examples, and embodiments of the invention are set forth anddescribed. However, it will be clear and apparent to one skilled in theart that the invention is not limited to the embodiments set forth andthat the invention may be practiced without some of the specific detailsand examples discussed.

Some embodiments of the invention provide a method for performing datatraffic monitoring by tagging packets with information specifying a setof monitoring actions for one or more stages of a packet processingpipeline to perform on the packet. The packet processing pipelineincludes a filtering stage that matches packets to a set of filters and,if a packet matches a particular filter, tags the packet with the set ofmonitoring actions specified by the particular filter. Each additionalstage in the packet processing pipeline (i) identifies from the packetwhich monitoring actions are specified, (ii) determines whether thestage supports those actions, and (iii) performs any monitoring actionsthat are both specified for the packet and supported by the stage, inaddition to performing the standard operations for the stage on thepacket.

In some embodiments, the packet processing pipeline is a set of packetprocessing stages executed by a computing device (e.g., a host computeror edge device) to perform various packet processing operations onpackets. The stages, in some embodiments, can include a filtering stage,firewall and/or other service stages, logical switching and/or routingstages, and an encapsulation stage, in addition to other stages. In someembodiments, the stages of a packet processing pipeline are performed byone or more forwarding elements (e.g., software forwarding elements(SFEs)) and/or other modules (e.g., firewall engines, filter engine,etc.) executing on the computing device (e.g., in virtualizationsoftware of the computing device).

The filtering stage is the first stage in the packet processing pipelineat the initial computing device (i.e., source computing device), in someembodiments. This filtering stage is configured to match packets againsta specified set of characteristics and, when a packet matches thosecharacteristics, tag the packet with a set of monitoring actions (e.g.,by writing the set of monitoring actions into the packet's metadata). Insome embodiments, the set of characteristics can include a flowidentifier (e.g., five-tuple identifier) and/or the source of the packet(e.g., a source machine or source interface that corresponds to a sourcemachine).

Following the filtering stage, packets are processed by a set ofintermediate stages. In some embodiments, each of these stage processesa packet by (i) identifying from the packet which monitoring actions (ifany) are specified, (ii) determining whether the stage supports thoseactions, and (iii) performing any monitoring actions that are bothspecified for the packet and supported by the stage, in addition toperforming the standard operations for the stage on the packet. Theseintermediate stages, in some embodiments, include firewall and/or otherservice stages that perform services on packets, such as applyingfirewall and service rules to the packets, as well as logical switchingand/or routing stages that perform switching and routing services forthe packets. In some embodiments, the packet monitoring actions areincorporated into the intermediate stages (e.g., the firewall stage willalso include the determination as to whether to perform any monitoringactions and the performance of those monitoring actions), while in otherembodiments the packet monitoring actions are executed as a separatestage (e.g., the determination as to whether to perform any monitoringactions and performance of those monitoring actions for the firewallstage are performed as a separate stage after the execution of thefirewall stage).

FIG. 1 illustrates an example of a workflow of some embodiments forperforming live traffic monitoring on packets between a source machineand a destination machine. As shown, the source host computer 105includes a source virtual machine (VM) 120, a physical network interfacecard (PNIC) 130, and a packet processing pipeline that includes afiltering stage 122, an observing stage for a firewall 124, an observingstage for a virtual switch 126, and an encapsulation stage 128.

Similar to the source host computer 105, the destination host computer110 includes a destination VM 140, a PNIC 135, and a packet processingpipeline that includes a decapsulation stage 146, an observing stage fora virtual switch 144, and an observing stage for a firewall 142.Different embodiments may include different stages and/or differentnumbers of stages than illustrated, as indicated by the dashed linesbetween stages. In addition, it should be noted that while theseexamples show the source and destination endpoints of data messages asVMs, in other embodiments the source and/or destination endpoints couldbe other types of data compute nodes (e.g., containers).

In order to initiate the live traffic monitoring session, in someembodiments, the network management and control system 115 instructs thesource host computer 105 to install the filtering stage 122 as the firststage in the pipeline (e.g., at the encircled 1). For instance, FIG. 2illustrates a process performed by a source host computer, in someembodiments, to initiate and terminate a live traffic monitoringsession. In some embodiments, the process 200 is performed at both thesource host computer and the destination host computer when the livetraffic monitoring session is specified for a bidirectional flow.

The process 200 starts (at 210) by receiving instructions from thenetwork management and control system to initiate a live trafficmonitoring session by installing a filtering stage as the first stage ina packet processing pipeline executed by the source host computer. Thenetwork management and control system 115, for example, instructs thehost computer 105 to install the filtering stage 122. In someembodiments, the instructions for installing the filtering stage alsoinclude configuration data specifying the filter to be used by thefiltering stage and monitoring actions to be performed on packetsmatching the filter. The filtering stage, in some embodiments, isinstalled as the first stage in the pipeline so that packets for whichthe live traffic monitoring session is specified (i.e., packets matchinga specified filter) can be tagged with the monitoring actions.

The process installs (at 220) the filtering stage as the first stage inthe packet processing pipeline to initiate the live traffic monitoringsession. Once the filtering stage is installed, it can begin todetermine whether packets sent from the VM 120 match the filterspecified for the live traffic monitoring session. Once the session isinitiated, each of the subsequent packet processing stages 124-126 onthe source host computer process the packets and perform monitoringactions specified for tagged packets (e.g., at the encircled 3 and 4).As each stage performs monitoring actions on tagged packets, packetmetrics generated by the monitoring actions are sent to the networkmanagement and control system 115 (e.g., at the encircled 3′ and 4′).The packets are then encapsulated by the encapsulation stage 128 (e.g.,at the encircled 5) and sent from the physical network interface card(PNIC) 130 of the source host computer 105 to the PNIC 135 at thedestination host computer 110 (e.g., at the encircled 6).

On the destination host computer 110, the decapsulation stage 146decapsulates encapsulated packets (e.g., at the encircled 7) andprovides the decapsulated packets to the subsequent packet processingstages 144 and 142. The stages 142 and 144 process the packets, performmonitoring actions specified for tagged packets (e.g., at the encircled8 and 9), and provide packet metrics generated by the monitoring actionsto the network management and control system 115 (e.g., at the encircled8′ and 9′). The packets are then delivered to the destination VM 140,and the network management and control system 115 aggregates thereceived packet metrics (e.g., at the encircled 10). Additional detailsof the packet processing pipeline will be discussed further below.

Returning to the process 200, the process eventually receives (at 230) acontrol message from the network management and control systemindicating the live traffic monitoring session should be terminated. Insome embodiments, this control message is triggered by a timer set forthe live traffic monitoring session upon initiation. In otherembodiments, the control message is triggered in response to a usermanually terminating the live traffic monitoring session. In response tothe received control message, the process removes (at 240) the filteringstage from the packet processing pipeline in order to terminate the livetraffic monitoring session. In some embodiments, rather than receiving acontrol message, the process terminates the live traffic monitoringsession based on a certain number of packets having been tagged (i.e.,an amount specified in the instructions initiating the monitoringsession). The process 200 then ends.

FIG. 3 illustrates a packet processing pipeline of a host computer ofsome embodiments. The host computer 305 includes a software switch 320,a software router 380, VMs 330, a context engine 340, an attributesstorage 342, a MUX (multiplexer) 344, service engines 350, and a servicerules storage 355. The software switch 320 includes ports 322 forconnecting to the VMs 330, a port 324 for connecting to a softwarerouter 380, and a port 326 for connecting to a physical networkinterface card (PNIC) (not shown) of the host computer 305. In someembodiments, the context engine 340, the software switch 320, thesoftware router 380, the service engines 350, the service rules storage355, and the MUX 344 operate in the kernel space of a hypervisor, whilethe VMs 330 operate in the user space of the hypervisor. In otherembodiments, one or more service engines are user space modules (e.g.,are service VMs).

The VMs 330, in some embodiments, serve as data endpoints in adatacenter. While illustrated as VMs in this example, the VMs 330 inother embodiments are machines such as webservers, application servers,database servers, etc. In some embodiments, all of the VMs belong to oneentity (e.g., an enterprise that operates on the host computer 305),while in other embodiments, the host computer 305 operates in amulti-tenant environment (e.g., in a multi-tenant datacenter), anddifferent VMs 330 may belong to one tenant or to multiple tenants. Inaddition, as mentioned above, in some embodiments at least some of theseendpoint machines may be containers or other types of data compute nodesrather than VMs.

Each of the VMs 330 includes a GI agent 332 that interacts with thecontext engine 340 to provide contextual attribute sets to this engineand to receive instructions and queries from this engine. Each GI agent332, in some embodiments, registers with notification services of itsrespective endpoint machine to receive notifications regarding newlylaunched processes and/or previously launched processes on theirendpoint machines, and/or regarding new message flows sent by orreceived for their endpoint machine. As shown, all communicationsbetween the context engine 340 and the GI agents 332 are relayed throughthe MUX 344, in some embodiments. An example of such a MUX is the MUXthat is used by the Endpoint Security (EPSec) platform of ESXhypervisors of VMware, Inc.

In some embodiments, the GI agents 332 communicate with the MUX 344through a fast communication channel (e.g., a virtual machinecommunications interface channel). This communication channel, in someembodiments, is a shared memory channel. In some embodiments, theattributes collected by the context engine 340 from the GI agents 332include a rich group of parameters (e.g., layer 7 parameters, processidentifiers, user identifiers, group identifiers, process name, processhash, loaded module identifiers, consumption parameters, etc.).

In addition to the GI agents 332, each VM 330 includes a virtual networkinterface card (VNIC) 334, in some embodiments. Each VNIC is responsiblefor exchanging packets between its VM and the software switch 320 andconnects to a particular port 322 of the software switch. In someembodiments, the software switch 320 maintains a single port 322 foreach VNIC of each VM. As mentioned above, the software switch 320 alsoincludes a port 324 that connects to the software router 380, and a port326 that connects to a PNIC (not shown) of the host computer 305. Insome embodiments, the VNICs are software abstractions of one or morePNICs of the host computer that are created by the hypervisor.

The software switch 320 connects to the host PNIC (through a networkinterface card (NIC) driver (not shown)) to send outgoing packets and toreceive incoming packets. In some embodiments, the software switch 320is defined to include a port 326 that connects to the PNIC's driver tosend and receive packets to and from the PNIC. The software switch 320performs packet-processing operations to forward packets that itreceives on one of its ports to another one of its ports. For example,in some embodiments, the software switch 320 tries to use data in thepacket (e.g., data in the packet header) to match a packet to flow-basedrules, and upon finding a match, to perform the action specified by thematching rule (e.g., to hand the message to one of its ports 322, 324,or 326, which directs the packet to be supplied to a destination VM, thesoftware router, or the PNIC).

The software router 380, in some embodiments, is a local instantiationof a distributed virtual router (DVR) that operates across multipledifferent host machines and can perform layer 3 (L3) packet forwardingbetween VMs on a same host or on different hosts. In some embodiments, ahost computer may have multiple software routers connected to a singlesoftware switch (e.g., software switch 320), where each software routerimplements a different DVR.

The software router 380, in some embodiments, includes one or morelogical interfaces (LIFs) (not shown) that each serves as an interfaceto a particular segment (virtual switch) of the network. In someembodiments, each LIF is addressable by its own IP address and serves asa default gateway or ARP proxy for network nodes (e.g., VMs) of itsparticular segment of the network. All of the different software routerson different host computers, in some embodiments, are addressable by thesame “virtual” MAC address, while each software router is also assigneda “physical” MAC address in order to indicate on which host computer thesoftware router operates.

In some embodiments, the software switch 320 and the software router 380are a combined software switch/router. The software switch 320 in someembodiments implements one or more logical forwarding elements (e.g.,logical switches or logical routers) with software switches executing onother host computers in a multi-host environment. A logical forwardingelement, in some embodiments, can span multiple hosts to connect VMsthat execute on different hosts but belong to one logical network.

Different logical forwarding elements can be defined to specifydifferent logical networks for different users, and each logicalforwarding element can be defined by multiple software forwardingelements on multiple hosts. Each logical forwarding element isolates thetraffic of the VMs of one logical network from the VMs of anotherlogical network that is serviced by another logical forwarding element.A logical forwarding element can connect VMs executing on the same hostand/or on different hosts. In some embodiments, the software switch 320extracts from a packet a logical network identifier (e.g., a VNI) and aMAC address. The software switch in these embodiments uses the extractedVNI to identify a logical port group, and then uses the MAC address toidentify a port within the identified port group.

Software switches and software routers (e.g., software switches andsoftware routers of hypervisors) are sometimes referred to as virtualswitches and virtual routers because they operate in software. However,in this document, software switches may be referred to as physicalswitches because they are items in the physical world. This terminologyalso differentiates software switches/routers from logicalswitches/routers, which are abstractions of the types of connectionsthat are provided by the software switches/routers. There are variousmechanisms for creating logical switches/routers from softwareswitches/routers. VXLAN provides one manner for creating such logicalswitches. The VXLAN standard is described in Mahalingam, Mallik; Dutt,Dinesh G.; et al. (2013-05-08), VXLAN: A Framework for OverlayingVirtualized Layer 2 Networks over Layer 3 Networks, IETF.

In some embodiments, the ports of the software switch 320 include one ormore function calls to one or more modules that implement specialinput/output (I/O) operations on incoming and outgoing packets that arereceived at the ports. Examples of I/O operations that are implementedby the ports 322 include ARP broadcast suppression operations and DHCPbroadcast suppression operations, as described in U.S. Pat. No.9,548,965. Moreover, the operation of the context engine 340 as well asthe GI agents 332 for some embodiments is further described in U.S. Pat.No. 10,802,857, which is incorporated herein by reference.

Other I/O operations (e.g., firewall operations, load-balancingoperations, network address translation (NAT) operations, trafficmonitoring operations, etc.) can also be implemented. For example, theservice engines 350 include a filtering stage 360 for tagging packets ofinterest for live traffic monitoring sessions, an initial observationstage 362, a firewall stage 364, a firewall observation stage 366, otherservices stage 368, and other service observation stage 370. Byimplementing a stack of such function calls, the ports can implement achain of I/O operations on incoming and/or outgoing packets, in someembodiments. For example, the source host computer 105 and destinationhost computer 110 described above include such I/O operations forincoming and outgoing packets.

In addition to the function call observation operations of the serviceengines 350, other modules in the datapath implement observationoperations as well. For example, the software switch 320 includes aswitching observation stage 372 and the software router 380 includes arouter observation stage 374. Together, these stages, along with anencapsulation stage (not shown), make up the packet processing pipelineof the host computer 305. The initial observation stage 362, firewallobservation stage 366, other services observation stage 370, switchingobservation stage 372, and router observation stage 374 all providemetrics generated by monitoring actions executed on packets to thedatastore 315 of the network management and control system 310, asillustrated by the dashed lines leading from these stages to thedatastore 315.

In some embodiments, one or more function calls of the software switchports 322 can be to one or more service engines 350 that process servicerules in the service rules storage 355 and that perform monitoringactions for live traffic monitoring sessions. While illustrated assharing one service rules storage 355, in some embodiments, each serviceengine 350 has its own service rules storage 355. Also, in someembodiments, each VM 330 has its own instance of each service engine350, while in other embodiments, one service engine can service packetflows for multiple VMs on a host (e.g., VMs for the same logicalnetwork).

To perform its configured service operation(s) for a packet flow, aservice engine 350 in some embodiments tries to match the flowidentifier (e.g., five-tuple identifier) and/or the flow's associatedcontextual attribute set to the match attributes of its service rules inthe service rules storage 355. Specifically, for a service engine 350 toperform its service check operation for a packet flow, the softwareswitch port 322 that calls the service engine supplies a set ofattributes of a packet that the port receives. In some embodiments, theset of attributes are packet identifiers, such as traditional five-tupleidentifiers. In some embodiments, one or more of the identifier valuescan be logical values that are defined for a logical network (e.g., canbe IP addresses defined in a logical address space). In otherembodiments, all of the identifier values are defined in the physicaldomains. In still other embodiments, some of the identifier values aredefined in the logical domain, while other identifier values are definedin the physical domain.

A service engine, in some embodiments, then uses the received packet'sattribute set (e.g., five-tuple identifier) to identify a contextualattribute set for the flow. In some embodiments, the context engine 340supplies the contextual attributes for new flows (i.e., new networkconnection events) sent or received by the VMs 330, and for newprocesses executing on the VMs 330, to the service engines 350, alongwith a flow identifier or process identifier. In some embodiments, theservice engines 350 pull the contextual attribute sets for a new flow ornew process from the context engine. For instance, in some embodiments,a service engine supplies a new flow's five-tuple identifier that itreceives from the software switch port 322 to the context engine 340,which then examines its attributes storage 342 to identify a set ofattributes that is stored for this five-tuple identifier, and thensupplies this attribute set (or a subset of it that it obtains byfiltering the identified attribute set for the service engine) to theservice engine.

After identifying the contextual attribute set for a data message flowor process, the service engine 350, in some embodiments, performs itsservice operation based on service rules stored in the service rulesstorage 355. To perform its service operation, the service engine 350compares the received attribute set with the match attribute sets of theservice rules to attempt to find a service rule with a match attributeset that matches the received attribute set.

The match attributes of a service rule, in some embodiments, can bedefined in terms of one or more layer 2 (L2) through layer 4 (L4) headerparameters, as well as contextual attributes that are not L2-L4 headerparameters (e.g., are layer 7 (L7) parameters, process identifiers, useridentifiers, group identifiers, process name, process hash, loadedmodule identifiers, consumption parameters, etc.). Also, in someembodiments, one or more parameters in a rule identifier can bespecified in terms of an individual value or a wildcard value. In someembodiments, a match attribute set of a service rule can include a setof individual values or a group identifier, such as a security groupidentifier, a compute construct identifier, a network constructidentifier, etc.

In some embodiments, to match a received attribute set with the rules,the service engine compares the received attribute set with theassociated match attribute sets of the service rules stored in theservice rules storage 355. Upon identifying a matching rule, the serviceengine 350 performs a configured service operation (e.g., a firewalloperation), based on the action parameter set (e.g., based on Allow/Dropparameters) of the matching rule. The service rules storage 355, in someembodiments, is defined in a hierarchical manner to ensure that a packetrule check will match a higher priority rule before matching a lowerpriority rule, when the packet's attribute subset matches multiplerules. In some embodiments, the context-based service rule storage 355includes a default rule that specifies a default action for any packetrule check that cannot identify any other service rules. Such a defaultrule will be a match for all possible attribute subsets, in someembodiments, and ensures that the service engine will return an actionfor all received attribute sets. In some embodiments, the default rulewill specify no service.

For packets having the same packet identifier attribute sets (e.g.,packets belonging to the same flow), the service engine of someembodiments stores any service rules matching the attribute sets in aconnection state cache storage (not shown) for later use on subsequentpackets of the same packet flow. This connection state cache storage, insome embodiments, stores the service rule, or a reference to the servicerule. In some embodiments, the rule or reference to the rule is storedwith an identifier (e.g., the flow's five-tuple identifier and/or a hashvalue of the same) that is generated from the matching packet identifierset. In some embodiments, a service engine 350 checks this connectionstate cache storage before checking the service rule storage 355 inorder to determine if any service rules have been identified for packetsbelonging to the same flow. If not, the service engine checks the rulesstorage 355.

In some embodiments, the other services 368 service engine includes adeep packet inspection (DPI) for performing DPI on packets to identify atraffic type (i.e., the application on the wire) that is being sent inthis packet flow, generates an AppID for this traffic type, and storesthe AppID in the attributes storage 342. In some embodiments, the AppIDis stored in the attributes storage 342 based on that flow's five-tupleidentifier.

In addition to the configured operations of the service engines 350,some stages of the I/O chain perform monitoring actions on packetstagged by the filtering stage 360 as part of a live traffic monitoringsession. To identify which monitoring actions are specified for apacket, in some embodiments, a stage reads the set of monitoring actionsto be performed from the packet's metadata stored at the computingdevice. Additional details regarding FIG. 3 and the live trafficmonitoring sessions will be further described below with reference toFIG. 4 .

FIG. 4 conceptually illustrates a process 400 of some embodiments forprocessing packets for a live traffic monitoring session. In someembodiments, the process 400 is performed by a packet processingpipeline on a source host computer (e.g., by various componentsexecuting on the source host computer, including various serviceengines, software forwarding elements, etc.).

As shown, the process 400 starts by receiving (at 405) a packet sentfrom a source interface specified for a live traffic monitoring session.For instance, when a VM 330 sends a packet, a port 322 of the softwareswitch 320 provides the packet to the service engines 350 forprocessing, starting with the filtering stage 360. In some embodiments,some of the ports are specified for live traffic monitoring while otherports do not have any traffic monitoring specified.

The process determines (at 410) whether the packet matches the filterspecified for the live traffic monitoring session. As described above,the filtering stage matches packets against a filter specified for theparticular interface from which the packet is received. In someembodiments, the particular filter can define a packet flow or set ofpacket flows. For instance, in some embodiments, the filter is afive-tuple identifier (e.g., source and destination addresses, sourceand destination ports, and protocol) for a packet flow. A packet flowdefined by the particular filter, in some embodiments, can be abidirectional packet flow, in which case the filtering stage isimplemented at both the source computing device and the destinationcomputing device (to tag return traffic). Live traffic monitoring forbidirectional flows will be discussed in more detail below withreference to FIG. 9 .

When the process determines (at 410) that the packet does not match thefilter, the process transitions to provide the packet (at 420) to thenext stage in the packet processing pipeline. Otherwise, when theprocess determines (at 410) that the packet does match the filter, theprocess tags (at 415) the packet with any monitoring actions specifiedfor the session. In some embodiments, to tag the packet with themonitoring actions, the filtering stage writes identifiers for themonitoring actions into the metadata of the packet (e.g., as anattribute of the packet). The packet is stored in memory duringprocessing by the various components (service engines, software switchesand/or routers, etc.) of the virtualization software of the hostcomputer in some embodiments, and the filtering stage writes theidentifiers for the specified monitoring actions into this memory aspacket metadata.

The process then provides (at 420) the packet to the next stage in thepacket processing pipeline. For instance, on the host computer 305, thefiltering stage 360 provides the packet to the initial observation stage362. Other embodiments may have a different stage, such as a stage thatdoes not perform any monitoring actions for the live monitoring session,as the next stage in the packet processing pipeline. In addition, whileFIG. 3 shows the observation stages as separate stages from the firewallstage, switching stage, etc., it should be understood that in someembodiments these observation stages are actually executed as part oftheir underlying stage (e.g., as part of the firewall stage, switchingstage, etc.).

At the next packet processing stage, the process determines (at 425)whether the packet is tagged for monitoring actions. In someembodiments, to identify which monitoring actions are specified for apacket, a stage reads the set of monitoring actions to be performed fromthe packet's metadata stored at the computing device. In differentembodiments, the packet's tag specifies either a general set ofmonitoring actions to be executed on the packet or specific monitoringactions for specific stages to execute. If the process determines (at425) that the packet is not tagged for any monitoring actions, theprocess transitions to perform (at 445) any additional operationsconfigured for that stage on the packet.

Otherwise, when the process 400 determines (at 425) that the packet istagged for monitoring actions, the process determines (at 430) whetherany of the tagged monitoring actions are supported by the packetprocessing stage. In some embodiments, one stage may support aparticular monitoring action that is not supported by other stages inthe packet processing pipeline, while other monitoring actions aresupported by multiple stages that each perform those monitoring actionson packets for which the actions are specified. In some embodiments, asubset of stages in the packet processing pipeline do not support anymonitoring actions and only process packets according to configurationdata for the stage.

If none of the tagged monitoring actions are supported by the stage, theprocess 400 transitions to perform (at 445) any additional operationsconfigured for that stage on the packet. Otherwise, when the processdetermines (at 430) that at least one tagged monitoring action issupported by the stage, the process executes (at 435) any supportedmonitoring actions specified by the tag on the packet. In someembodiments, the monitoring actions specified for a packet are specifiedin a priority order. For a stage that supports at least two monitoringactions to be performed on the packet, in some embodiments, the stageexecutes the at least two monitoring actions on the received packet inthe specified priority order (i.e., with higher priority actionsexecuted prior to lower priority actions by the packet processingstage). If a first higher-priority monitoring action modifies thepacket, then a second lower-priority monitoring action is executed onthe modified packet.

The process 400 then exports (at 440) metric data generated by eachexecuted monitoring action to a centralized data repository (e.g., adatastore at the network controller and/or network manager). On the hostcomputer 305, for example, each of the observation stages 362, 366, 370,372, and 374 are illustrated with dotted lines leading to the datastore315 of the network management and control system 310 to indicate thesestages provide the metrics to the datastore. This export process isdescribed further below.

Next, the process 400 performs (at 445) any additional operationsconfigured for the stage on the packet. While illustrated as separatestages, the firewall stage 364 and the firewall observation stage 366(as well as other pairs of packet processing stage and correspondingobservation stage), in some embodiments, are one stage that performsboth monitoring actions and other firewall operations (e.g., filteringtraffic based on source or destination information).

The process 400 determines (at 450) whether there are additionalintermediary stages in the pipeline to process the packet. Whenadditional intermediary stages remain in the packet processing pipeline,the process 400 provides the packet (at 420) to the next stage in thepacket processing pipeline. For instance, once the other servicesobservation stage 370 on the host computer 305 processes a packet, itprovides the packet back to a port 322 of the software switch 320 wherethe switching observation stage 372 processes the packet.

Otherwise, once all of the intermediary stages in the packet processingpipeline have been completed, the process 400 provides (at 455) thepacket to the encapsulation stage. If the switching observation stage372 is the last intermediary stage in the pipeline on the host computer305, for example, the switching observation stage 372 would provide thepacket to the encapsulation stage (not shown).

At the encapsulation stage, the process determines (at 460) whether thepacket is a tagged packet. Like the intermediary stages, theencapsulation stage, in some embodiments, determines whether the packetis tagged in order to determine how to process the packet. When thepacket is not tagged with any packet monitoring actions, the processencapsulates the packet and sends the packet (at 470) to itsdestination.

Otherwise, when the packet is tagged with identifiers for one or morepacket monitoring actions, the process encapsulates (at 465) the packetwith an encapsulating header that includes the monitoring actionsspecified by the tag. In some embodiments, the encapsulation stageencapsulates the packet with a Geneve header or an in-band networktelemetry (INT) header that includes data specifying the monitoringactions. By encapsulating packets with encapsulation headers thatspecify the monitoring actions, the encapsulation stage enables othercomputing devices that process the packet (e.g., edge devices,destination devices) to perform the monitoring actions on the packet andto generate additional metrics associated with the packet and the livepacket monitoring session.

FIG. 5 illustrates an example header 500 of some embodiments for apacket that includes the metadata specifying the monitoring actions. TheVer field for the header 500 is set to 2 to indicate the currentimplementation is based on INT 2.0, the D bit is set to 0 to indicateINT sink should not drop packets with live traffic monitoring sessionmetadata, and HopML is 0 because the INT header populated by sessiononly includes live traffic monitoring session-specific instructions,which do not write data into INT metadata stack. Additionally, thedesired monitoring actions are encoded into live traffic monitoringsession-specific instructions stored in a domain-specific instructionbitmap (i.e., DS Instruction) identified by a domain-specific ID, witheach non-auxiliary action having a unique bit allocated to it.

Returning to process 400, the process then sends the packet (at 470) toits destination (e.g., a destination network address specified in theencapsulation header). These destinations may include gateway devicesbetween a logical network and an external network, a destination devicethat hosts a destination endpoint machine for the packet, etc.

FIG. 6 illustrates a more detailed example of a packet processingpipeline that performs live traffic monitoring sessions, in someembodiments. This figure shows a host computer datapath 610, a datastore650, and a legend 605. The datastore 650, in some embodiments, is partof a network management and control system (e.g., the network managementand control system 310 described above). For instance, the datastore 650might be located on a network controller or network manager in someembodiments, while in other embodiments the datastore 650 is located ina separate virtual appliance or a physical server.

The host computer datapath 610 includes a VM interface 620 from whichpackets of interest are sent, a filtering stage 622, an initialobservation stage 624, a firewall stage 626 a, a firewall observationstage 626 b, a virtual switching stage 628 a, a virtual switchingobservation stage 628 b, and a PNIC processing stage 630. Differentembodiments may include different stages than those illustrated (e.g.,additional stages, fewer stages, other stages). As indicated by thelegend 605, the VM interface 620, filter stage 622, firewall stage 626a, virtual switching stage 628 a, and PNIC processing 630 are allordinary stages in the datapath 610 because these stages do not supportmonitoring actions. Conversely, the initial observation stage 624,firewall observation stage 626 b, and virtual switching observationstage 628 b are each represented with a different (i.e., bold) outline,indicating that these stages are observing stages as denoted by thelegend 605.

In addition to the different outline, the observing stages 626 b and 628b include a solid circle indicating these stages support monitoringaction 2, while stage 624 includes a hollow circle and a solid circleindicating this stage supports both monitoring action 1 and monitoringaction 2. As described above, the monitoring actions can include packettracing, packet capturing, packet counting, and/or other monitoringactions, in some embodiments.

As described above, the filtering stage 622 is responsible foridentifying packets that match a filter (e.g., flow identifier(s)), andtagging these identified packets with monitoring actions to be performedon the packets. The set of packets 640 a represents packets that havenot yet been processed by the filtering stage 622. The packets 640 ainclude two packets that do not match the filter, and two packets thatdo match the filter, as indicated by the legend 605. Accordingly, thetwo matching packets in the set of packets 640 b, which represent thepackets after they have been processed by the filtering stage 622, eachinclude a hollow circle and a solid circle indicating these packets aretagged for monitoring action 1 and monitoring action 2.

In some embodiments, the monitoring actions specified for a live trafficmonitoring session are listed in the user request in order of priority(e.g., in a hierarchical API command). In some such embodiments, thefiltering stage 622 tags the packets with the monitoring actions in thatsame priority order so that each observation stage that processes thepackets performs the monitoring actions in the priority order in whichthey are listed (i.e., with higher priority actions executed prior tolower priority actions by the packet processing stage). If a firsthigher-priority monitoring action modifies the packet, then a secondlower-priority monitoring action is executed on the modified packet. Forinstance, the initial observation stage 624 supports both monitoringaction 1 and monitoring action 2, and may then perform these monitoringactions in order (i.e., monitoring action 1 then monitoring action 2).

As the stages perform monitoring actions on packets, the packet metricsgenerated by the monitoring actions automatically populate the datastore650, as indicated by the dashed lines leading from the observationstages 624, 626 b, and 628 b to the datastore 650. The packet metrics,in some embodiments, include a session identifier for the live trafficmonitoring session, a packet identifier for the packet, and actionresults for each action performed. The session identifier and packetidentifier are used, in some embodiments, to aggregate the metrics andresponse to queries at different levels of granularity (e.g., at theindividual packet level, and at the session level).

As mentioned above, including the monitoring action information in apacket's encapsulation header enables other computing devices thatprocess the packet to perform these monitoring actions as well. FIG. 7conceptually illustrates a process 700 of some embodiments forprocessing packets for a live traffic monitoring session at adestination computing device. Like the process 400 shown in FIG. 4 , insome embodiments the process 400 is performed by a packet processingpipeline on a destination host computer (e.g., by various componentsexecuting on the source host computer, including various serviceengines, software forwarding elements, etc.).

The process 700 starts by receiving (at 705) an encapsulated packet. Thepacket is received, in some embodiments, by a decapsulation stage of thedestination computing device's packet processing pipeline. The processdecapsulates (at 710) the packet and rewrites any monitoring actionsspecified by the packet's header into the packet's metadata. Forinstance, the decapsulation stage would rewrite the live trafficmonitoring session-specific instructions stored in the domain-specificinstruction bitmap (i.e., DS Instruction) identified by thedomain-specific ID of the packet header 500 into the packet's metadataas stored at the host computing device.

The process then provides (at 715) the packet to the next stage in thepacket processing pipeline. As described for the process 400, the nextstage, in some embodiments, is an intermediary stage between thedecapsulation stage and a destination interface of the packet. Forexample, on the destination host computer 110, the decapsulation stage146 provides packets to the switching observation stage 144.

At the next stage, the process determines (at 720) whether the packet istagged for any monitoring actions. The intermediary stages, in someembodiments, identify which monitoring actions are specified for apacket by reading the set of monitoring actions to be performed from thepacket's metadata stored at the computing device. In differentembodiments, either a general set of monitoring actions to be executedon the packet or specific monitoring actions for specific stages toexecute may be specified by the packet's tag.

When the packet is not tagged for any monitoring actions, the process700 performs (at 740) any additional operations configured for the stageon the packet. For instance, a packet processing pipeline may include adeep packet inspection (DPI) engine for performing DPI on packets todetermine an AppID (i.e., traffic type) associated with the packet.Unlike the metric data generated by the monitoring actions, datagenerated by any other operations configured for a stage is not providedto the datastore that stores the monitoring action metric data,according to some embodiments.

Otherwise, if the packet is tagged for monitoring actions, the process700 determines (at 725) whether any of the tagged monitoring actions aresupported by the stage. If none of the tagged monitoring actions aresupported by the stage, the process 700 performs (at 740) any additionaloperations configured for the stage on the packet.

Otherwise, when at least one tagged monitoring action is supported bythe stage, the process execute (at 730) the supported monitoring actionsspecified by the tag on the packet. When at least two monitoring actionsare specified for a packet in a priority order, in some embodiments, thestage performs the actions in that priority order. In some embodiments,this is to ensure that monitoring actions meant to be performed on theoriginal packet are not instead performed on a modified packet (i.e.,when a first monitoring action performed modifies the packet).

The process exports (at 735) metric data generated by the monitoringactions to a centralized data repository (e.g., a datastore at thenetwork controller and/or network manager), and performs (at 740) anyadditional operations configured for the stage on the packet. Theprocess then determines (at 745) whether there are any additionalintermediary stages in the packet processing pipeline. When additionalintermediary stages in the packet processing pipeline remain, theprocess returns to 715 to provide the packet to the next stage in thepipeline. For instance, the switching observation stage 144 of thedestination host computer 110 would provide the packet to the firewallobservation stage 142.

Otherwise, once all of the intermediary stages in the pipeline have beenexecuted, the process provides (at 750) the packet to the destinationmachine. After processing the packet, the firewall stage 142 of thedestination host computer 110 provides the packet to the VM 140, forexample. Following 750, the process 700 ends.

The embodiments above describe packets sent from one host computer toanother host computer. However, live packet monitoring sessions can alsobe used for packets sent to different edge devices, in some embodiments,as well as packets that traverse edge devices en route to theirdestinations. FIG. 8 illustrates an example network architecture 800 ofsome embodiments in which a live traffic monitoring system isimplemented.

The architecture 800 includes a network management and control system805 and a dataplane 850. As illustrated, the dataplane 850 includes hostcomputers 820 and edge devices 830 (e.g., in one or more datacenters),while the network management and control system 805 includes amanagement plane 810 and a central control plane 815. The managementplane 810 provides an API entry point (e.g., for receiving live trafficmonitoring requests) and persists user configuration data. The centralcontrol plane 815 of some embodiments computes stateless configurationsbased on user configuration data from the management plane 810 andruntime states from the dataplane (e.g., from the host computers 820 andedge devices 830) and provides this configuration to the host computers820 and edge devices 830. The live traffic monitoring system isrepresented on the network management and control system 805 by thetraffic monitoring module 845 of the management plane 810.

As shown, each of the host computers 820 includes an agent 822 and avmkernel 824 (e.g., the packet processing pipeline), while each of theedge devices 830 includes an agent 832 and an edgeOdatapath 834 (whichexecutes a packet processing pipeline on the edge device 830). In someembodiments, the traffic monitoring modules 840 in the agents 822 and832 receive live traffic monitoring requests from the management planetraffic monitoring module 845 and configure the filtering and/orobservation stages 843 in the vmkernels 824 and edge-datapaths 834.

In some embodiments, the filtering stages 843 implemented in a vmkernel824 and/or edge-datapath 834 tags packets that match the filter bystoring monitoring actions as packet attributes. In some embodiments,the vmkernels 824 and edge-datapaths 834 also implement the observingstages (e.g., the initial observation stage 624, firewall observation626 b, and virtual switching observation 628 b).

In some embodiments, intra-dataplane communication between the trafficmonitoring modules 840 and 843 is based on Unix Domain Socket (UDS),while communication between the network management and control system'straffic monitoring module 845 and the dataplane traffic monitoringmodules 840 is based on remote procedure call (RPC). The trafficmonitoring modules 840 use RPC, for instance, to report metric datagenerated by monitoring actions performed on packets to the networkmanagement and control system 805.

The live traffic monitoring sessions, in some embodiments, can bespecified for packets sent northbound (i.e., from a host computer 820,out of the network) and southbound. In some embodiments, as mentionedabove, edge devices can be intermediate devices between two hostcomputers (i.e., depending on the logical network) such that a sourcehost computer, an edge device, and a destination host computer would allbe providing metric data to the network management and control system805. Also, in some embodiments, an edge device may be specified in alive traffic monitoring request as the source computing device and/ordestination computing device for packets of interest.

In some embodiments, when an edge device that is an intermediary devicebetween a packet's source and destination receives a packet encapsulatedwith a header specifying monitoring actions, a decapsulation stage ofthe edge device's packet processing pipeline decapsulates the packet,rewrites the monitoring actions into the packet's metadata, and providesthe decapsulated packet to the next stage in the edge device's pipeline.Once each stage of the pipeline has processed the packet and performedany supported monitoring actions on the packet, an encapsulation stagere-encapsulates the packet with an encapsulating header that specifiesthe monitoring actions (e.g., packet header 500), and sends the packettoward its destination, according to some embodiments.

FIG. 9 illustrates a process 900 of some embodiments for initiating alive traffic monitoring session. The process 900 is performed by one ormore components of a network management and control system. In differentembodiments, this may be the management plane (e.g., the trafficmonitoring module of the management), central control plane, or acombination thereof.

As shown, the process 900 starts by receiving (at 910) a live trafficmonitoring request that specifies the source interface (or sourcemachine) from which packets of interest are sent, a filter for use inidentifying packets of interest, and a set of monitoring actions to beperformed on the packets of interest. This request, in some embodiments,is received from a user (e.g., administrator) as an API command via anAPI entry point provided by the network management and control system.

In some embodiments, the live traffic monitoring request also specifiesa packet sampling setting. This packet sampling setting, in someembodiments, identifies whether all packets matching the filter shouldbe tagged or only a subset. For instance, this might specify that onlythe first N packets matching the filter will be tagged (at least up to Npackets, if the packet monitoring session ends prior to N beingreached). The packet sampling setting could also specify that only everyM packets matching the filter is tagged (e.g., every 5 packets, etc.) orthat packets are checked against the filter per T (an amount of time),with matching packets being tagged.

The process locates (at 920) the computing device at which the sourceinterface specified in the request is located. For example, the networkmanagement and control system 805 may locate any of the host computers820 or edge devices 830 based on the source interface specified in arequest. For edge devices, in some embodiments, a request may specify anuplink through which the edge device receives packets as a sourceinterface for packets of interest. In some embodiments, if the livetraffic monitoring session is specified for a bidirectional packet flow,the network management and control system identifies both the source anddestination computing devices (because the destination computing devicein one direction is the source device in the return direction).

The process 900 provides (at 930) configuration information to thesource computing device in order to instruct the source computing deviceto install a filtering stage as the first stage in a packet processingpipeline executed by the source computing device. As described by theprocess 200 above, when the source computing device installs thefiltering stage, the live traffic monitoring session is initiated. As aresult, packets matching the filter are tagged by the filtering stagewith monitoring actions to be performed on the tagged packets bysubsequent packet processing stages.

When the live traffic monitoring session is performed for abidirectional packet flow, the process provides the configurationinformation to both the source and destination computing devices, insome embodiments, so that the filtering stage is installed at both thesource and destination computing devices. This enables return trafficfrom the destination computing device to the source computing device tobe tagged with the monitoring actions as well.

The process 900 eventually receives (at 940) packet metrics generated asthe monitoring actions are performed on the tagged packets during thelive packet monitoring session. The network management and controlsystem 115, for example, is illustrated as receiving packet metrics fromeach of the observing stages executed by the source and destination hostcomputers 105 and 110. In some embodiments, a central data repository(e.g., a datastore) is automatically populated with the packet metricsas they are generated. This repository, in some embodiments, is a partof the network management and control system (e.g., stored at themanagement plane or control plane), while in other embodiments, therepository is located in a separate virtual appliance, or a physicalserver.

The process then aggregates (at 950) the generated packet metrics. Insome embodiments, the network management and control system periodicallyaggregates generated packet metrics as the metrics are received, whilein other embodiments, the network management and control system does notaggregate the metrics until the live traffic monitoring session iscompleted (i.e., terminated).

For instance, in some embodiments, the network management and controlsystem aggregates the metrics after it has sent a control message to thecomputing device(s) at which the filtering stage is implemented toinstruct the computing device(s) to remove the filtering stage from thepipeline. In some embodiments, the network management and control systemsends the control message based on a timer for the live trafficmonitoring session, while in other embodiments, a user manually triggersthe termination of the live traffic monitoring session. After thegenerated packet metrics have been aggregated, the process 900 ends.

FIG. 10 illustrates an example of packet metrics for two packets beforeand after aggregation, in some embodiments. As illustrated by the table1010 of collected packet metrics for packets 1 and 2, the packets belongto the same session identified by the session ID 5. The “FW” refers to afirewall component (e.g., firewall observation 626 b), while the “OR”refers to an overlay routing component.

For packet 1, the table 1010 indicates the firewall component andoverlay routing component each counted the packet one time.Additionally, the firewall component applied a rule resulting in thepacket being allowed, as indicated by “action=allow” in the trace resultcolumn, while the overlay routing component identified the source anddestination VNIs of the packet. For packet 2, only the firewallcomponent provided a count result, indicating the packet was countedonce. The trace results from the firewall component indicate that a rulewas applied to packet 2, which resulted in packet 2 being dropped. Thedropping of packet 2 by the firewall component could be an indication ofwhy there are no metrics provided by the overlay routing component forpacket 2 (i.e., because the packet was dropped before it could beprocessed by the overlay routing component).

In the post-aggregation table 1020, the metrics for the session as awhole, and for each packet are aggregated. For instance, the countresults indicate 2 packets for the session were counted by the firewallcomponent, and one packet for the session was counted by the overlayrouting component. No packet identifiers are listed for these counts,indicating these are session totals, not individual packet totals.Additionally, the table 1020 shows aggregated metrics for the individualtrace results, with packet 1 having trace results from both the firewallcomponent and overlay routing component, and packet 2 having traceresults from only the firewall component.

The network management and control system, in some embodiments, can usethe aggregated metrics of table 1020 to respond to various user queries.For instance, a user can query the occurrences of filtered traffic atthe various observation stages during the live traffic monitoringsession window, as well as a complete packet trace for each individualpacket (e.g., distinguished by packet ID). Since packet counting andpacket tracing metrics are associated to the same set of packets, itmakes possible for users to analyze complicated issues such that packetsunder the same flow schema (e.g., with the same source IP address anddestination IP address) are dropped occasionally, by comparing metricsproduced by different monitoring actions, according to some embodiments.

FIG. 11 illustrates a network management and control system 1110collecting packet metrics for use in responding to queries from a user(e.g., administrator), in some embodiments. As shown, the networkmanagement and control system 1110 receives packet metrics from multiplecomputing devices 1120-1128. It should be noted that if the computingdevices 1120-1128 provide the packet metrics to a data store that isseparate from the network management and control system 1110, then thenetwork management and control system 1110 retrieves the packet metricsfrom this data store. However, in other embodiments, the data store ispart of the network management and control system 1110 or is distributedand located on the computing devices 1120-1128 themselves.

Examples of computing devices that process the packet to performmonitoring actions and provide packet metrics to the network managementand control system 1110, in some embodiments, can include the source anddestination computing devices at which source and destination machinesfor packet flows execute, edge devices that process packets between thelogical network and an external network, and/or any intermediate devicesthat process the packet (e.g., devices that enable the packet to be sentfrom one physical site to another when the logical network spansmultiple sites). In some embodiments, each of these computing devicesexecutes a staged packet processing pipeline that operates in a similarmanner as described above for the initial computing device anddestination computing device (except that these other devices do notapply a filtering stage to the packet).

In some embodiments, the computing devices use a synchronizationmechanism for reporting the packet metrics. Specifically, within theencapsulation header (and the packet metadata stored at the computingdevice) of a tagged packet, the source computing device calculates andincludes an indicator of the amount of time remaining in the packetmonitoring session (e.g., by subtracting the time from the start of thesession until the packet was detected from the time the session willend). The destination computing device for the packet (which has notreceived instructions from the network management and control system)receives this time remaining indicator and knows to report its metricsby a time given by the time of receipt plus the time remaining indicator(plus a latency time estimate).

In some embodiments, as the network management and control system 1110receives packet metrics from the computing devices 1120-1128, thenetwork management and control system 1110 aggregates the receivedmetrics in order to respond to queries from the user 1105 for packetmetrics. As discussed above, the metrics are aggregated in such a waythat a user can query metrics at different levels of granularity. Forexample, a user can query the occurrences of filtered traffic at variousobservation stages during the live traffic monitoring session window(e.g., for the session as a whole), as well as a complete packet tracefor each individual packet (e.g., distinguished by packet ID). Users areable to analyze complicated issues such that packets under the same flowschema (e.g., with the same source IP address and destination IPaddress) are dropped occasionally, by comparing metrics produced bydifferent monitoring actions, according to some embodiments.

For example, the user 1105 can send a query to the network managementand control system 1110 to determine the number of packets dropped andwhen these packets were dropped. Referring to table 1020, the networkmanagement and control system 1110 could be able to respond to such aquery by indicating packet 2 was dropped after processing by thefirewall component. The user 1105 would also be able to query the numberof packets processed by each of the observation stages. Again referringto table 1020, the user would learn that the firewall component receivedtwo of two packets, while the overlay routing component received one ofthe two packets. Additionally, because each packet is associated withboth a session identifier and a packet identifier, the user would beable to determine exactly which packets of which sessions experiencedissues.

Many of the above-described features and applications are implemented assoftware processes that are specified as a set of instructions recordedon a computer-readable storage medium (also referred to ascomputer-readable medium). When these instructions are executed by oneor more processing unit(s) (e.g., one or more processors, cores ofprocessors, or other processing units), they cause the processingunit(s) to perform the actions indicated in the instructions. Examplesof computer-readable media include, but are not limited to, CD-ROMs,flash drives, RAM chips, hard drives, EPROMs, etc. The computer-readablemedia does not include carrier waves and electronic signals passingwirelessly or over wired connections.

In this specification, the term “software” is meant to include firmwareresiding in read-only memory or applications stored in magnetic storage,which can be read into memory for processing by a processor. Also, insome embodiments, multiple software inventions can be implemented assub-parts of a larger program while remaining distinct softwareinventions. In some embodiments, multiple software inventions can alsobe implemented as separate programs. Finally, any combination ofseparate programs that together implement a software invention describedhere is within the scope of the invention. In some embodiments, thesoftware programs, when installed to operate on one or more electronicsystems, define one or more specific machine implementations thatexecute and perform the operations of the software programs.

FIG. 12 conceptually illustrates a computer system 1200 with which someembodiments of the invention are implemented. The computer system 1200can be used to implement any of the above-described hosts, controllers,gateway, and edge forwarding elements. As such, it can be used toexecute any of the above described processes. This computer system 1200includes various types of non-transitory machine-readable media andinterfaces for various other types of machine-readable media. Computersystem 1200 includes a bus 1205, processing unit(s) 1210, a systemmemory 1225, a read-only memory 1230, a permanent storage device 1235,input devices 1240, and output devices 1245.

The bus 1205 collectively represents all system, peripheral, and chipsetbuses that communicatively connect the numerous internal devices of thecomputer system 1200. For instance, the bus 1205 communicativelyconnects the processing unit(s) 1210 with the read-only memory 1230, thesystem memory 1225, and the permanent storage device 1235.

From these various memory units, the processing unit(s) 1210 retrieveinstructions to execute and data to process in order to execute theprocesses of the invention. The processing unit(s) 1210 may be a singleprocessor or a multi-core processor in different embodiments. Theread-only-memory (ROM) 1230 stores static data and instructions that areneeded by the processing unit(s) 1210 and other modules of the computersystem 1200. The permanent storage device 1235, on the other hand, is aread-and-write memory device. This device 1235 is a non-volatile memoryunit that stores instructions and data even when the computer system1200 is off. Some embodiments of the invention use a mass-storage device(such as a magnetic or optical disk and its corresponding disk drive) asthe permanent storage device 1235.

Other embodiments use a removable storage device (such as a floppy disk,flash drive, etc.) as the permanent storage device. Like the permanentstorage device 1235, the system memory 1225 is a read-and-write memorydevice. However, unlike storage device 1235, the system memory 1225 is avolatile read-and-write memory, such as random access memory. The systemmemory 1225 stores some of the instructions and data that the processorneeds at runtime. In some embodiments, the invention's processes arestored in the system memory 1225, the permanent storage device 1235,and/or the read-only memory 1230. From these various memory units, theprocessing unit(s) 1210 retrieve instructions to execute and data toprocess in order to execute the processes of some embodiments.

The bus 1205 also connects to the input and output devices 1240 and1245. The input devices 1240 enable the user to communicate informationand select commands to the computer system 1200. The input devices 1240include alphanumeric keyboards and pointing devices (also called “cursorcontrol devices”). The output devices 1245 display images generated bythe computer system 1200. The output devices 1245 include printers anddisplay devices, such as cathode ray tubes (CRT) or liquid crystaldisplays (LCD). Some embodiments include devices such as touchscreensthat function as both input and output devices 1240 and 1245.

Finally, as shown in FIG. 12 , bus 1205 also couples computer system1200 to a network 1265 through a network adapter (not shown). In thismanner, the computer 1200 can be a part of a network of computers (suchas a local area network (“LAN”), a wide area network (“WAN”), or anIntranet), or a network of networks (such as the Internet). Any or allcomponents of computer system 1200 may be used in conjunction with theinvention.

Some embodiments include electronic components, such as microprocessors,storage and memory that store computer program instructions in amachine-readable or computer-readable medium (alternatively referred toas computer-readable storage media, machine-readable media, ormachine-readable storage media). Some examples of such computer-readablemedia include RAM, ROM, read-only compact discs (CD-ROM), recordablecompact discs (CD-R), rewritable compact discs (CD-RW), read-onlydigital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a varietyof recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.),flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.),magnetic and/or solid state hard drives, read-only and recordableBlu-Ray® discs, ultra-density optical discs, any other optical ormagnetic media, and floppy disks. The computer-readable media may storea computer program that is executable by at least one processing unitand includes sets of instructions for performing various operations.Examples of computer programs or computer code include machine code,such as is produced by a compiler, and files including higher-level codethat are executed by a computer, an electronic component, or amicroprocessor using an interpreter.

While the above discussion primarily refers to microprocessor ormulti-core processors that execute software, some embodiments areperformed by one or more integrated circuits, such asapplication-specific integrated circuits (ASICs) or field-programmablegate arrays (FPGAs). In some embodiments, such integrated circuitsexecute instructions that are stored on the circuit itself.

As used in this specification, the terms “computer”, “server”,“processor”, and “memory” all refer to electronic or other technologicaldevices. These terms exclude people or groups of people. For thepurposes of the specification, the terms “display” or “displaying” meandisplaying on an electronic device. As used in this specification, theterms “computer-readable medium,” “computer-readable media,” and“machine-readable medium” are entirely restricted to tangible, physicalobjects that store information in a form that is readable by a computer.These terms exclude any wireless signals, wired download signals, andany other ephemeral or transitory signals.

While the invention has been described with reference to numerousspecific details, one of ordinary skill in the art will recognize thatthe invention can be embodied in other specific forms without departingfrom the spirit of the invention. Thus, one of ordinary skill in the artwould understand that the invention is not to be limited by theforegoing illustrative details, but rather is to be defined by theappended claims.

1. A method for performing data traffic monitoring, the methodcomprising: for each packet processing stage of a set of packetprocessing stages in a packet processing pipeline: determining whether apacket received by the packet processing pipeline specifies a set ofmonitoring actions to be performed on the packet; when the packetspecifies a set of monitoring action, determining whether the monitoringactions in the set are supported by the packet processing stage; andexecuting the supported monitoring actions on the packet in addition toprocessing the packet according to configuration data for the stage;wherein at least one particular packet processing stage in the packetprocessing pipeline supports a particular monitoring action that is notsupported by other packet processing stages in the packet processingpipeline.
 2. (canceled)
 3. The method of claim 1, wherein the particularmonitoring action is a first monitoring action, wherein a secondmonitoring action is supported by at least two packet processing stagesin the packet processing pipeline.
 4. The method of claim 3, wherein theat least two packet processing stages each perform the second monitoringaction on packets for which the second monitoring action is specified.5. The method of claim 1, wherein: a subset of packet processing stagesin the set of packet processing stages do not support any monitoringactions; and each stage in the subset of packet processing stages thatdoes not support any monitoring actions processes the packet accordingto configuration data for the stage.
 6. The method of claim 1, whereindetermining whether a packet specifies the set of monitoring actionscomprises determining whether the set of monitoring actions are storedin metadata of the packet.
 7. The method of claim 6, wherein: the set ofmonitoring actions are stored in the metadata in a priority order; andfor a packet processing stage that supports at least two monitoringactions in the set of monitoring actions, executing the at least twomonitoring actions on the received packet comprises executing the atleast two monitoring actions in the priority order.
 8. The method ofclaim 7, wherein a first monitoring action of the at least twomonitoring actions comprises a monitoring action (i) that is a higherpriority than a second monitoring action of the at least two monitoringactions, (ii) that is executed by the packet processing stage on thereceived packet before the second monitoring action is executed based onthe higher priority, and (iii) that modifies the packet.
 9. The methodof claim 8, wherein the second monitoring action is executed on themodified packet.
 10. The method of claim 1, wherein executing thesupported monitoring actions on the packet further comprises (i)generating packet metrics and (ii) automatically populating a datastorewith the generated packet metrics.
 11. The method of claim 1, whereinthe set of monitoring actions comprises at least one of packet tracing,packet capture, and packet count.
 12. The method of claim 1, wherein thepacket processing pipeline is executed by virtualization software of ahost computer.
 13. The method of claim 12, wherein a source machine fromwhich the packet is sent executes on the host computer.
 14. The methodof claim 12, wherein a destination interface to which the packet isaddressed executes on the host computer.
 15. A non-transitorymachine-readable medium storing a program which when executed by atleast one processing unit performs data traffic monitoring, the programcomprising sets of instructions for: for each packet processing stage ofa set of packet processing stages, including first and second packetprocessing stages, in a packet processing pipeline: determining whethera packet received by the packet processing pipeline specifies a set ofmonitoring actions to be performed on the packet; when the packetspecifies a set of monitoring action, determining whether the monitoringactions in the set are supported by the packet processing stage; andexecuting any supported monitoring action on the packet in addition toprocessing the packet according to configuration data for the stage;wherein at least one particular monitoring action is supported by atleast the first packet processing stage but not supported by the secondpacket processing stage, which causes the first packet processing stageto execute the particular monitoring action and the second packetprocessing stage not to execute the particular monitoring action. 16.The non-transitory machine-readable medium of claim 15, wherein theparticular monitoring action is not supported by any packet processingstages in the packet processing pipeline other than the first packetprocessing stage.
 17. The non-transitory machine-readable medium ofclaim 15, wherein the particular monitoring action is supported by atleast two packet processing stages in the packet processing pipeline,including the first packet processing stage and a third packetprocessing stage, the third packet processing stage performing theparticular monitoring action on packets for which the particularmonitoring action is specified.
 18. The non-transitory machine-readablemedium of claim 15, wherein: a subset of packet processing stages in theset of packet processing stages do not support any monitoring actions;and each stage in the subset of packet processing stages that does notsupport any monitoring actions processes the packet according toconfiguration data for the stage.
 19. The non-transitorymachine-readable medium of claim 15, wherein the set of instructions fordetermining whether a packet specifies the set of monitoring actionscomprises a set of instructions for determining whether the set ofmonitoring actions are stored in metadata of the packet.
 20. Thenon-transitory machine-readable medium of claim 19, wherein: the set ofmonitoring actions are stored in the metadata in a priority order; andfor a packet processing stage that supports at least two monitoringactions in the set of monitoring actions, the set of instructions forexecuting the at least two monitoring actions on the received packetcomprises a set of instructions for executing the at least twomonitoring actions in the priority order.
 21. The non-transitorymachine-readable medium of claim 15, wherein the set of instructions forexecuting any supported monitoring action on the packet furthercomprises sets of instructions for (i) generating packet metrics and(ii) automatically populating a datastore with the generated packetmetrics.
 22. A computing device comprising: a set of processing units;and a non-transitory machine-readable medium storing a program whichwhen executed by at least one of the processing units performs datatraffic monitoring, the program comprising sets of instructions for: foreach packet processing stage of a set of packet processing stages in apacket processing pipeline: determining whether a packet received by thepacket processing pipeline specifies a set of monitoring actions to beperformed on the packet; when the packet specifies a set of monitoringaction, determining whether the monitoring actions in the set aresupported by the packet processing stage; and executing the supportedmonitoring actions on the packet in addition to processing the packetaccording to configuration data for the stage; wherein at least oneparticular packet processing stage in the packet processing pipelinesupports a particular monitoring action that is not supported by otherpacket processing stages in the packet processing pipeline.