A node in the Computes view represents one of the compute entities in your on-premises NSX environment. A compute entity is a virtual machine (VM), a physical server, or an IP address.

Computes View Selection

If you are not seeing the Computes view, click the down arrow next to Groups in the Discover view selection area and select Computes from the Objects drop-down menu. To display all the compute entities during the selected time period, you can click Apply in the drop-down menu or click any blank space in the canvas area.

To display only VMs, IPs, or Physical Servers, click Show All Types and select VMs, IPs, or Physical Servers from the drop-down menu. The default selection is All.

You can also select specific compute entities from the Available list. Use the Search text box to filter the selection list. You can deselect any selected items or to cancel all your previous selections, click Clear All.

Select Exclude if you do not want to include in the visualization graph the compute entities you selected. Click Apply after making your selections.

Clustering of Compute Nodes

By default, when you select the Computes view and if there are less than 500 compute nodes or less than 5000 network traffic flows to be displayed, the compute entity nodes are displayed using the No Clustering mode. If those limits are exceeded, the Clustering By Flows mode is the default clustering mode used.

These clustering modes are based on the traffic flows that occurred with the compute entities in your NSX environment when there are 30 days worth of traffic flow data. With the clustering feature, you can have a high-level view of the activities in your NSX environment during the selected time period and can help you decide where to focus your attention.

The following image illustrates a sample Computes view. There are four compute entities shown on the right side that were deleted from the inventory during the selected time period. The rest of the canvas displays the other compute entities that were in the inventory during the selected time period. The view is using the No Clustering mode and displays the traffic flow activities that occurred between the compute entities during the last 1 month.
A screenshot of the Plan & Troubleshoot > Discover & Take Action UI displaying a sample of the Computes view.

As you zoom in closer to the nodes and arrows, the details about the compute entities and traffic flows become more visible and easier to select. To narrow which compute entities are displayed in the visualization graph, apply filters using the Apply Filter section.

To change the clustering mode used for the Computes view, click the clustering control icon clustering control icon described by the surrounding text located at the bottom right of the visualization graph and select a new mode. The available modes are Flows, Labels, Names, Tags, or No Clustering. The visualization graph gets updated immediately based on your clustering mode selection.

Nodes in the Computes View

A node in the Computes view represents a compute entity (such as a VM, a physical server, or an IP address) or an uncategorized VM in your NSX inventory.

Any node that is communicating with one of the compute entities in your NSX environment, but is not identified as part of the NSX inventory, is also represented in the Computes view.

The following table lists the types of compute entity nodes you might see in the Computes view.

Type of compute entity node

Icon

Description

Regular VM


Icon for regular VM in your NSX environment

A Regular VM node represents a virtual machine (VM) that is part of your NSX environment. A VM can belong to more than one group.

External


The icon represents the external addresses on the Internet.

A External node represents either an IPv4 or IPv6 public IP address that is communicating to or from your NSX environment.

Right-clicking this icon lists all the external IP addresses that had network traffic activity during the selected time period. Pointing on a traffic flow arrow connected to this node displays the actual IP address that participated in that traffic flow exchange.

IP


The icon represents the IP address.

An IP node represents an IP address that participated in the network traffic activities during the selected time period. An IP address can be a unicast, broadcast, or multicast IP address.

Physical Server


The icon represents a physical server in the NSX environment

This node represents a physical server that is part of your NSX environment. A physical server can belong to more than one group.

The currently supported physical servers are as follows.

  • RHEL Server release 7.9, 8.2, 8.4

  • Ubuntu 16.04, 18.04

  • CentOS 7.9, 8.4

  • SUSE 12 SP4

  • Windows Server 2016, 2019

Network infrastructure service entity


Icon for a VM that is a network infrastructure service entity


A physical server that is identified as an infrastructure service entity

These nodes represent a VM and a physical server, respectively. They have been classified as providing core network infrastructure services, such as DNS, DHCP, LDAP, or Active Directory.

An orange-hued badge on the upper-right edge of the icon, as shown in this image infrastructure node with an orange circle badge on the node's edge, indicates that the system-inferred infrastructure classification for this compute entity needs your review. For more information, see Managing Compute Entity Classifications in Security Intelligence.

Color of a Node

The color of the border of a compute entity node corresponds to the types of traffic flows that occurred with the compute entity during the selected time period. A compute entity that did not communicate with any other compute entities during the selected time period is placed together with similar compute entities in a separate cluster. The following table illustrates and describes the different node colors for a VM compute entity.

Type of Compute Entity Node Description

VM node with red-hued border

A node with a red-hued border indicates that at least one unprotected traffic flow was detected, regardless of the number of blocked or allowed flows that were detected during the selected time period.


VM node with blue-hued border

A blue-hued border on a node means that no unprotected traffic flows were detected, but at least one blocked flow was detected, regardless of how many allowed flows were detected during the selected time period.


VM node with green-hued border

A node with a green-hued border indicates that there were no unprotected or blocked flows detected during the selected time period, and at least one allowed flow was detected.


VM node with grey-hued node

A node with a gray-hued border means that during the selected time period there were no traffic flows detected for that compute entity.

Arrows in the Computes View

The arrows between the compute entity nodes represent the types of traffic flows that have occurred between the compute entities during the selected time period. See Working with Traffic Flows in Security Intelligence for more information.

Node Selection in Computes View

When you point to a compute entity node, a pop-up window with information about the compute entity is displayed, as illustrated by the following sample image.
Image of information about the compute node that the pointer is currently pointing to.

Also listed in the East West Flow Details section are the types and number of traffic flows that occurred with that compute entity during the selected time period. If the compute entity is added during the selected time period, the New badge icon New/add badge icon and the details of when the compute entity was added are also displayed. If it was part of a recommendation analysis, that information is shown in the contextual menu. If the compute entity was deleted, a Removed badge icon removed badge is displayed, and information about when it was removed.

When you click a compute entity node, a dashed circle marks the selection as a pinned compute entity node. Other compute entity nodes that had traffic flows with that pinned node are also made more prominent in the Computes view. All other nodes become dimmed to make them less visible. To clear the pinned selection, click in any empty area of the Computes view. For example, in the following image, the rhelvm4 compute entity node is selected and becomes the pinned compute entity node. One other compute entity had at least one traffic flow with rhelvm4 entity during the selected time period, so they are displayed more prominently. All the other compute entities that did not communicate with rhelvm4 during the selected time period are dimmed in the view.
Selected compute node is pinned and all compute entities that had traffic with rhelvm4 are also displayed. All other nodes are dimmed.

When you zoom out of the Computes view and the details in the compute entity nodes are no longer visible, point to any visible part of the node. The details for the compute entity are displayed.

Selecting Multiple Compute Nodes

You can select multiple compute entity nodes and perform the same action, such as assigning a label or a tag, or starting a recommendation analysis, on your selection of compute entities.

Click the selection control icon selection control icon to select one or more of the compute entity nodes displayed in the visualization canvas. You can click individual nodes one at a time or drag your pointer over the compute nodes that you want to select. You can also keep the Shift key pressed and click each specific compute nodes to make your selection.

The system displays the number of selected compute nodes in a new Selected panel that appears next to the Flows section. The panel looks similar to the following image Selected compute nodes panel. Each icon displayed in this panel is described in the following table.
Selected panel icon Description

recommendation icon

From this panel you can click the recommendation icon and start a new recommendation analysis using the selected compute entities. See Working with Security Intelligence Recommendations for details.

tag icon

You can assign a tag to the selected compute entities simultaneously by clicking this tag icon. See Managing VM Tags in Security Intelligence for more information.

label icon

You can also click this label icon and assign a label for the selected compute entities. For more information, see Managing Visualization Labels in Security Intelligence.

remove icon

If you want to remove the label assignments to the selected compute entities, click this remove label icon

hide all flows icon shown in the Selected panel

When you click this icon, the system does not display on the Security Intelligence visualization canvas all of the traffic flows that occurred involving the selected compute entities during the specified time period.

Using Labels in the Computes View

You can assign a label to a selection of compute entity nodes. Create a label, right-click any of the selected nodes, select Assign a Label, select a label from the drop-down menu of available labels, and click Assign. See Managing Visualization Labels in Security Intelligence for details.

Available Actions in the Computes View

A contextual menu of available actions is displayed when you right-click the node for a compute entity, as illustrated in the following image.
Contextual menu of available actions you can take when right-clicking a compute node. Each action are described the table following this image.

The following table describes the available actions you can select from the drop-down menu.

Selection

Description

Suspicious Traffic Events (n)

If a suspicious traffic event is detected involving this compute entity during the selected time period, this item will be selectable. The (n) indicates the number of detected suspicious traffic events that occurred during that time period. See Detecting Suspicious Traffic Events in NSX for more information.

Recommendations (n)

The system displays a table of DFW recommendations that includes the current compute entity. The (n) indicates the number of available recommendations. From the Recommendations table, you can view the recommendation details and perform the available actions. See Working with Security Intelligence Recommendations for more information.

VM Information

The details are displayed for the currently selected compute entity during the selected time period. Details depend on the type and can include the Name, IP Address, ID, operating system information, computer name, tags, BIOS ID, host transportation node, and infrastructure classification.

注:

If a VM is attached to the segment profile as the default IP Discovery profile and has (Trust On First Use) TOFU enabled, the VM initially gets an IP address from DHCP. If the DHCP IP address is released and the VM IP address is changed to a static IP address, both the DHCP and static IP addresses are displayed in VM Information. If TOFU was disabled in the default IP discovery profile, when the initially assigned DHCP IP address is released and the VM IP address is changed to a static address, only the static IP address is displayed in VM Information.

Related Groups

Displays the Groups table with information about groups to which the compute entity belonged during the selected time period.

Related Firewall Rules

Displays the Related Firewall Rules dialog box that lists all of the distributed firewall rules associated with this selected compute entity. See Viewing Related Firewall Rules in Security Intelligence for more information.

Processes

(For VM nodes only) Displays the Processes table, which displays the details about the processes that involved traffic flows where data was either sent, received, or both to the VM.

To be able to view information about the processes, you must install guest components on the VMs. See the "Installing Guest Components" section of the NSX Administration Guide that is delivered with the VMware NSX Documentation set.

Flow Details

Shows the details about the completed flows and the flows that are currently active with the compute entity during the selected time period.

注:

The active flows during the selected time period are more than 2.5 minutes old at the time the details are displayed.

The details include the following information.

  • Flow type: completed or active

  • Flow's source and destination groups

  • Services that were used

  • L7 information: application ID and FQDN

  • Type of the latest flow: unprotected, blocked, allowed

  • Time the flow ended

You can click some of the details to obtain more information. See Working with Traffic Flows in Security Intelligence for more information.

Hide Flows (n)

The lines for the traffic flows that the compute entity participated in are removed from the current security posture visualization. The (n) indicates the number of flow lines that are affected.

User Login Information

(For VM nodes only) Shows user login information for the selected VM.

To be able to view user login information, you must install guest components on the VMs. See the "Installing Guest Components" section of the NSX Administration Guide that is delivered with the VMware NSX Documentation set.

Filter By

The compute entity gets added to the visualization filter that is used for the current Computes view. The visualization is refreshed when the filter is applied.

Start Recommendation

When selected, displays the Start New Recommendations wizard. See Working with Security Intelligence Recommendations for more details.

The following topics provide information about using the Security Intelligence visualization UI to assign and manage visualization labels to compute entities and tags to VMs.