Installing Enterprise Agents on Cisco Routers with Docker
This article provides an overview of the steps to install a ThousandEyes Enterprise Agent on a supported Cisco router using Docker. The Docker agent is a signed ThousandEyes Docker image that can be quickly launched using Cisco application hosting.
As a part of container package best practices, we recommend updating your container regularly.
Prerequisites
To review the supported Cisco routers and hardware requirements, see the Support Matrix.
Both SD-WAN and Autonomous mode are supported.
Installation Steps
Deploying an Enterprise Agent on a Cisco router requires the completion of three steps. These steps are detailed in the sections below:
Install the Enterprise Agent on the Cisco router, using one of three available methods (bootflash, direct, via local machine).
Configure the container's networking and account information.
Verify the agent is running.
For Cisco routers purchased before August 15th, 2021, the Docker image can be installed either directly from the ThousandEyes download servers, or by downloading the container image to a local machine and uploading it to the router via SCP, FTP, TFTP, or USB storage, depending on whether the router has direct Internet access or not.
Routers purchased after August 15th, 2021, can, in addition to the previous methods, install the Enterprise Agent via bootflash.
Install the Docker Image from Bootflash
If the router was purchased after August 15th, 2021, the router has the ThousandEyes Enterprise Agent available in bootflash.
To verify if it is available, use the following command: Dut1#dir bootflash:/apps
.
The filename structure for ThousandEyes agent images is thousandeyes-enterprise-agent-<ARCH>-<VERSION>.cisco.tar
. The two versions available and their corresponding md5 checksums are:
thousandeyes-enterprise-agent-x86_64-5.0.1.cisco.tar
md5sum: e8e04b77483d1338d15b4acbb88f9761
thousandeyes-enterprise-agent-aarch64-5.0.1.cisco.tar
md5sum: 773fb8b365ec37fd36d6809c8ce81199
Older routers may have multiple image files installed in the bootflash:/apps
folder, including 4.x images that use a different file structure. Make sure that the image file you use in the commands below is the newest one.
ThousandEyes also recommends deleting older agent images to free up additional bootflash space.
Run the following command to install via bootflash, replacing
<app-name>
with your application identifier and<ARCH>-<VERSION>
with the router architecture and the current agent version:
Install the Docker Image to the Router Directly
If the Cisco router has direct internet access, follow the steps below to install the Enterprise Agent:
Run the following command to install the image, replacing
<app-name>
with your application identifier and<ARCH>-<VERSION>
with the router architecture and the current agent version:Your application should now be installed. You can check on it by running the following:
The output looks like:
Install the Docker Image via a Local Machine
If the Cisco router does not have direct access to the Internet, follow the steps in the sections below to install the Enterprise Agent.
Download the Docker Image to a Local Machine
Download the Docker image from the ThousandEyes dashboard and copy it to your Cisco router using SCP, FTP, TFTP, or USB storage.
On your local machine, log into the ThousandEyes platform using a login belonging to the account group that will be associated with the appliance.
Navigate to Cloud & Enterprise Agents > Agent Settings and click Add New Enterprise Agent; then navigate to Cisco Application Hosting > Routers.
Download the .tar file matching the router architecture.
Use SCP, FTP, TFTP, or USB storage to copy the signed Docker image to the router's flash: directory.
Run the following command, replacing
<ARCH>-<VERSION>
with the router architecture and the current agent version:
If the router is behind a http proxy, configure the following to allow the image to be downloaded and installed: ip http client proxy-server <name> proxy-port <port>
Run a checksum (md5) command to verify that the package transfer was successful, replacing
<ARCH>-<VERSION>
with the router architecture and the current agent version. The md5 output should match the latest md5sum. For example, the checksum for version 5.0.1 ise8e04b77483d1338d15b4acbb88f9761
.
Install the Docker Image from a Local Machine
Enable the IOx framework on the router. Enter one configuration command per line, and end with CNTL/Z:
Wait until all the services are running:
Run the installation command, replacing
<app-name>
with your desired app name,<ARCH>-<VERSION>
with the router architecture and the current agent version, and specifying the location of the image file you want to use. In this example, we use thousandeyes_enterprise_agent:If the image is hosted on an HTTPS server, you can run the following command to download the image, replacing
<ARCH>-<VERSION>
with the router architecture and the current agent version:Your application should now be installed. You can check on it by running the following:
Configuration
Docker supports both static IP address assignment and dynamic IP address assignment. You must configure a single virtual network interface card (vNIC) for the appliance using either a management interface or virtual port group interface.
There are two available configuration paths, detailed in the sections below:
Option One: VirtualPortGroup Interface
Configure the VirtualPortGroup interface with a private IP address and use as NAT inside:
Configure NAT outside on the physical port interface:
Create NAT rule:
Configure the application, either with a static IP or with DHCP IP:
a. Configuration with Static IP:
Use a guest IP address to assign a static IP address. In this example, assign 10.100.152.120/24 from VirtualPortGroup 0 and use Google resolver:
Next, set up the required Docker run options to specify account token. If you want to specify a hostname other than the router's name, do this here as well:
b. Configuration with DHCP IP:
Make sure the DHCP server is running on the VirtualPortGroup interface.
Next, set up the required Docker run options to specify the account token same as the static IP assignment example above.
For a full list of the Docker configuration options, see Docker Agent Configuration Options.
Exit three times to completely exit out of config mode.
Use wr mem to ensure that your configuration changes have persisted across reboots:
Option Two: Management Interface Configuration
Configure the management interface:
Configure the application, either with a static IP or with DHCP IP:
a. Configuration with Static IP:
Use a guest IP address to assign a static IP address. In this example, assign
10.82.139.211/24
from GigabitEthernet 0 and use the Google resolver:Set up the required Docker run options to specify the account token. If you want to specify a hostname other than the router's name, do this here as well:
For a full list of the Docker configuration options, see Docker Agent Configuration Options.
b. Configuration with DHCP IP:
Make sure the DHCP server is running on the management interface:
Set up the required Docker run options to specify the account token. If you want to specify a hostname other than the router's name, do this here as well:
Exit three times to completely exit out of config mode.
Use wr mem to ensure that your configuration changes have persisted across reboots:
Verification
With the (config-app-hosting)#start
command, the Docker container should have been started and should be running. You can verify this through the following options:
Verify the Docker container’s details:
In the ThousandEyes platform, go to Cloud & Enterprise Agents > Agent Settings and verify the Docker container’s IP address.
Modify the Docker Container
Stop the application:
De-activate the application:
Modify the Docker options, and exit three times:
Reactivate the application, and confirm that it’s activated:
Start the application, and confirm that it is running:
Frequently Asked Questions
What is the expected NTP behavior for a Catalyst 8000 series deployed Enterprise agent?
The enterprise agent on a Catalyst 8000 series switch uses the host system kernel clock. It also sends packets to pool.ntp.org to determine any clock offset. It does not try to adjust the host or container clock but will adjust measurement timestamps based on the clock offset.
Can the default external NTP source (pool.ntp.org) be changed to a customer's internal NTP source?
No. The agent uses pool.ntp.org to determine clock offset by default; this is currently not configurable.
How do I connect to the agent shell for Cisco agents?
To access the agent shell of a Cisco Enterprise Agent that is actively running, use the following command, replacing <app-name>
with your application identifier:
Once inside the agent shell, you can refer to the agent log for any further troubleshooting:
If connection or DNS resolution errors are found in the log file, your agent cannot connect to the ThousandEyes platform. Check your app-vnic configuration and make sure the agent IP can reach the internet.
For more information on configuration options, see Docker Agent Config Options.
Can I use ThousandEyes troubleshooting utilities?
From Agent 4.0.2 onwards, te-agent-utils
are pre-installed on Cisco Enterprise Agents. For more information on the available utilities, see CLI Network Troubleshooting Utilities.
What are the default trusted default root certificates used by the Enterprise Agent Docker container when communicating with ThousandEyes services?
issuer=O = Cisco, CN = Cisco Licensing Root CA
issuer=O = Cisco, CN = Cisco Basic Assurance Root CA 2099
issuer=O = Cisco, CN = Cisco ECC Root CA
issuer=O = Cisco Systems, CN = Cisco Root CA 2048
issuer=O = Cisco, CN = Cisco Root CA 2099
issuer=O = Cisco, CN = Cisco Root CA M1
issuer=O = Cisco, CN = Cisco Root CA M2
issuer=C = US, O = Cisco Systems, CN = Cisco RXC-R2
issuer=C = US, O = Amazon, CN = Amazon Root CA 1
issuer=C = US, O = Amazon, CN = Amazon Root CA 2
issuer=C = US, O = Amazon, CN = Amazon Root CA 3
issuer=C = US, O = Amazon, CN = Amazon Root CA 4
issuer=C = NO, O = Buypass AS-983163327, CN = Buypass Class 2 Root CA
issuer=C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
issuer=C = US, O = Internet Security Research Group, CN = ISRG Root X1
issuer=C = US, O = IdenTrust, CN = IdenTrust Commercial Root CA 1
issuer=C = BM, O = QuoVadis Limited, CN = QuoVadis Root CA 2
issuer=C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust ECC Certification Authority
issuer=C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority
issuer=C = US, O = Google Trust Services LLC, CN = GTS Root R1
issuer=C = US, O = Google Trust Services LLC, CN = GTS Root R2
issuer=C = US, O = Google Trust Services LLC, CN = GTS Root R3
issuer=C = US, O = Google Trust Services LLC, CN = GTS Root R4
How do I install CA certificates on Cisco devices?
For CA certificate installation instructions, see Installing CA Certificates on Enterprise Agents.
Last updated