<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Monitoring Best Practice in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4809107#M580964</link>
    <description>&lt;P&gt;After I posted my question I stumbled across a forum post on solarwinds' site and I believe someone said the SNMP traps can be sent with some detail on Application Server/Processes, it just can't be polled, but now i can't find that forum post, lol.&lt;/P&gt;&lt;P&gt;I noticed you had another post about SNMP traps in ISE 2.7, did you get that sorted, and if so do you know if traps could provide those details? I'm not great with SNMP, would that be in the MIB as well?&lt;/P&gt;</description>
    <pubDate>Wed, 05 Apr 2023 22:07:21 GMT</pubDate>
    <dc:creator>mrlorincz</dc:creator>
    <dc:date>2023-04-05T22:07:21Z</dc:date>
    <item>
      <title>ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604198#M509561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333px;"&gt;Hi All,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;My customer has encountered some service port down in ISE which leads to service outage.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;1.) Based on the link below t&lt;SPAN style="font-size: 10pt;"&gt;here is a way to monitor ISE process status change by SNMP traps. Do we have the list of processes being monitored?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2" style="font-size: 13.3333px;"&gt;&lt;SPAN class="s2"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_011000.html#id_17078"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_011000.html#id_17078&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;2.) In case processes are reported as down, what's &lt;STRONG&gt;recommended action to take in order for service restoration&lt;/STRONG&gt;?&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;3.) Noticed that it's possible to issue CLI command to restart ALL the ISE services but not sure the time taken compared with rebooting the appliance, which one would be faster and more effective?&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;4.) &lt;STRONG style="font-size: 10pt;"&gt;For &lt;/STRONG&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/256050#256050" style="font-size: 10pt;"&gt;&lt;SPAN class="s2"&gt;&lt;STRONG&gt;Monitoring ISE health using SNMP Polling&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="p2" style="font-size: 13.3333px;"&gt;&lt;SPAN class="s3"&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/256391#256391"&gt;https://communities.cisco.com/message/256391#256391&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Do we have any &lt;STRONG&gt;ISE monitoring best practice&lt;/STRONG&gt; we can refer to?&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Many thanks,&lt;BR /&gt;CH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 May 2018 12:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604198#M509561</guid>
      <dc:creator>chunhwon</dc:creator>
      <dc:date>2018-05-26T12:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604199#M509565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All excellent questions.&amp;nbsp; &lt;/P&gt;&lt;P&gt;I have also had PSN nodes with failed application server limping along and nobody noticed (except the customers screaming!).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There needs to be more attention given to the operational monitoring of ISE using familiar interfaces like SNMP traps, or a well curated SNMP MIB.&amp;nbsp; ISE has &lt;STRONG&gt;one&lt;/STRONG&gt; SNMP trap (disk threshold).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think SYSLOGs are the only useful notification you'll get from ISE and you have to ensure that you send the correct ones, and then filter on the critical stuff.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have PRTG monitoring my deployment but it really just does a ping to the nodes and reports any loss of responses.&amp;nbsp; And then if you got really fancy you could perform regular Radius authentications of an AD user.&amp;nbsp; That would perhaps test PSN&amp;lt;-&amp;gt;AD - but these are just scratching the surface.&amp;nbsp; I don't believe there is any way I can know via SNMP that the applications on ISE are suffering.&amp;nbsp; I would have to infer this by trending my memory/CPU consumption and wondering what's going on.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In most cases a reboot may be required to solve a tricky memory leak issue and it may add an extra 2 minutes to the downtime.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 May 2018 22:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604199#M509565</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-05-27T22:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604200#M509569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;OL&gt;&lt;LI&gt;Adding to Arne's, see &lt;A _jive_internal="true" data-containerid="2035" data-containertype="14" data-objectid="275738" data-objecttype="2" href="https://community.cisco.com/message/275738#275738" onclick=""&gt;Monitor ISE Processes&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Firstly, to check which process is down and to confirm it not a false alarm. Secondly, to quickly review the logs and see if they giving any clues. Thirdly, to try restarting the ISE services and/or engage Cisco TAC, if needed.&lt;/LI&gt;&lt;LI&gt;Some earlier ISE releases might not gracefully shutdown the ISE services before reload so I would recommend to stop ISE services before performing a reload. Since reload takes some time to restart the operating system, it's taking a bit more time than an ISE service restart but it might help clearing up some issues on the O/S level.&lt;/LI&gt;&lt;LI&gt;No, there is no such best practices doc today. Many of Cisco Live presentations do give some tips and tricks on related areas.&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jun 2018 03:44:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604200#M509569</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-06-02T03:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604201#M509571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No argument on need for more remote, app-based monitoring capabilities via SNMP or API.&amp;nbsp; Yes, syslog can provide details on health and other services.&amp;nbsp; And yes, performing health monitor checks is generally best way to validate a service is working and is a standard mechanism with load balancers deployed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, minor correction on the comment "there is only one trap".&amp;nbsp; Here is a quick example of traps sent just at boot time that I captured from my lab server...&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" height="317" src="https://community.cisco.com/legacyfs/online/fusion/117358_pastedImage_0.png" style="width: 481px; height: 317.305px;" width="481" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jun 2018 22:14:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604201#M509571</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-06-02T22:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604202#M509578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not to belabour the point, but the example you cited is the result of the coldstart feature of the NET-SNMP server.&lt;/P&gt;&lt;P&gt;One can provoke this behaviour by simply enabling and disabling SNMP on the ISE CLI (&lt;STRONG&gt;snmp-server enable&lt;/STRONG&gt;).&amp;nbsp; &lt;/P&gt;&lt;P&gt;However the value of this is questionable because it only happens when you restart the SNMP daemon.&amp;nbsp; The OS doesn't send a trap when the interface goes down (e.g. disable NIC in VMWare).&amp;nbsp; Or, you might expect a trap when it comes back up again, as a sign of life notification.&lt;/P&gt;&lt;P&gt;My point is that the ISE CLI only offers one configurable SNMP trap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ise-01/admin(config)# snmp-server trap ?&lt;/P&gt;&lt;P&gt;&amp;nbsp; dskThresholdLimit&amp;nbsp; SNMP Trap for disk threshold&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen a few others during an &lt;SPAN style="text-decoration: underline;"&gt;ISE server reboot&lt;/SPAN&gt; that tell you that the application server is running (and a few other processes).&amp;nbsp; That is quite useful.&amp;nbsp; But, when I manually restart ise application then I don't get any traps. &lt;/P&gt;&lt;P&gt;It would be useful to have some examples of SNMP traps that inform us of things happening while the server is operational (i.e. not after a reboot).&amp;nbsp;&amp;nbsp; E.g. when application ise fails, is an SNMP trap sent?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an authoritative list of traps that the ISE platform sends?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2018 00:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/3604202#M509578</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-06-04T00:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4808979#M580959</link>
      <description>&lt;P&gt;It's been awhile, anyone familiar with ways to monitor the services running on node? We had the application server fail on a PSN but no one noticed and I'd like to try and catch these in the future.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 17:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4808979#M580959</guid>
      <dc:creator>mrlorincz</dc:creator>
      <dc:date>2023-04-05T17:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4809104#M580963</link>
      <description>&lt;P&gt;AFAIK, there is no syslog or SNMP trap that can inform an NMS of such a process failure.&lt;/P&gt;
&lt;P&gt;We still have to drop to the CLI to issue the command "show application status ise" to see that a process is "not running" or "initializing" etc.&lt;/P&gt;
&lt;P&gt;And no MIB to query either, AFAIK. Nor any REST API call that could be used.&amp;nbsp; You might get away with doing a REST API call to a PSN to see if its web interface is still responding to a simple dummy HTTP request. However, that doesn't prove if RADIUS is working. So, what I have seen is customers sending synthetic RADIUS and TACACS+ requests to their important PSNs to check for health. But that's a very expensive way to monitor. A better way would be to expose the process status via SNMP or REST.&amp;nbsp; Or an SNMP trap (assuming SNMP is still working) about the death of some ISE process would be nice.&lt;/P&gt;
&lt;P&gt;Perhaps it's coming or I missed it since I last checked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 22:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4809104#M580963</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-04-05T22:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4809107#M580964</link>
      <description>&lt;P&gt;After I posted my question I stumbled across a forum post on solarwinds' site and I believe someone said the SNMP traps can be sent with some detail on Application Server/Processes, it just can't be polled, but now i can't find that forum post, lol.&lt;/P&gt;&lt;P&gt;I noticed you had another post about SNMP traps in ISE 2.7, did you get that sorted, and if so do you know if traps could provide those details? I'm not great with SNMP, would that be in the MIB as well?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 22:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4809107#M580964</guid>
      <dc:creator>mrlorincz</dc:creator>
      <dc:date>2023-04-05T22:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4862582#M582493</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Did you get any progress reg. monitoring the&amp;nbsp;&lt;SPAN&gt;Application Server/Processes?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 15:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/4862582#M582493</guid>
      <dc:creator>Kiilerich</dc:creator>
      <dc:date>2023-06-26T15:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Monitoring Best Practice</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/5126353#M589880</link>
      <description>&lt;P&gt;Hello Craig, let me know which tool using for monitoring.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 09:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-monitoring-best-practice/m-p/5126353#M589880</guid>
      <dc:creator>Villager</dc:creator>
      <dc:date>2024-06-06T09:12:57Z</dc:date>
    </item>
  </channel>
</rss>

