Knowledge Documents 0 files
📄
High-Level Design
HLD document (PDF, DOCX)
📋
Low-Level Design
LLD document (PDF, DOCX)
📝
SOPs & Runbooks
Operational procedures
Network Data 0 files
🔢
Subnet & IP Plan
CSV, XLSX — subnet definitions
🗺️
Sites Data
Location, criticality, business function
Declared Tooling Stack From architect intent
LAN · Switching
Aruba CXVSX cores AristaHQ access
WAN · Security · SD-WAN
🔷Fortinetall sites · SD-WAN 🛰ACTcarrier 🛰Airtelcarrier
Wireless · Authentication
📶Aruba WLCHQ 📡Aruba IAPsRemote 🔐ClearPassDC · 802.1X
ITSM · Operations
🎫ServiceNowCMDB · INC · CHG
These devices and services are polled by Layer 02 via vendor APIs. Any divergence between what they declare and what LinkEye observes becomes a drift finding.
Architect Intelligence Chat
AI-guided
LE
Welcome, Architect.
I'm here to help build the onboarding knowledge graph for your network. Let's start with intent — tell me about the network you've designed. What is it built to support, and what are the most critical sites or services?
Design Intent Knowledge Graph building…
0
Sites
0
Services
0
Subnets
0
Relations
Upload documents or chat to build graph
Site Service Business Function Critical Subnet
Polling Engine
Overall collection 0%
0
Devices
0
Sources
0
Metrics/s
0
Events
Active Collection Tasks
Live Topology Graph Building current state… 0 nodes
📡
Polling initializing…
Healthy Warning Critical External Source
Collection Evolution
Phase 1 — Discovery
SNMP/SSH sweep of all declared subnets. Device inventory established.
Phase 2 — Telemetry Expansion
gNMI streaming enabled on supported devices. NetFlow/IPFIX activated on edge routers.
Phase 3 — Controller Integration
Meraki, Cisco DNA Center APIs polled. Wireless client & AP data ingested.
Phase 4 — Extended Sources
APM, SIEM, DDI integrations activated based on discovered services.
External Integrations
Collection Insights
Awaiting data…
Context Sources9 integrated
🎫
ServiceNow
ITSM · CMDB · CHG · INC
LIVE
CMDB CIs synced13 · 8 LAN + 5 FW
Open INCs2 · UC2 + UC3
CHGs (24h)1 · CHG-1107
☁️
LinkEye Data Collector
On-prem · DC Delhi
LIVE
Devices managed13
Config snapshots5min cadence · 24h history
Pre-CHG snapshotpreserved · rollback ready
👁
LinkEye DEX
Endpoint agents · HQ + Remote
LIVE
Agents2 · HQ-Dex + Remote-Dex
ERP synthetic probe1 / min per agent
Auth probeon wired clients
🧭
LinkEye Path Tracer
Hop-by-hop synthetic probes
LIVE
Path pairsHQ-Dex→ERP · Remote-Dex→ERP
Cadence1 / min + on-demand
Aruba CX REST
Switching · 5 Aruba CX + 1 Arista
LIVE
Aruba CX5 · HQ-Core1/2, DC-Core1/2, Remote-Access
Arista (eAPI)1 · HQ-Access · 4.33.1F
VSX pairs2 · HQ + DC
🔷
Fortinet FortiGate API
Firewall · SD-WAN policy
LIVE
Firewalls5 · HQ-FW1/2 + DC-FW1/2 + Remote-FW1
SD-WAN policy pushCHG-1107 detected
IPSec tunnelssite-to-site · all healthy
📶
Aruba WLC
Controller · HQ wireless
LIVE
WLC IP172.25.0.30
AP modecontroller-managed
Affected by CHG-1107?no · HQ path unchanged
📡
Aruba IAP REST
Instant APs · Remote site
LIVE
IAPs2 · 172.25.4.12 + 172.25.4.13
Firmware8.7.1.6
eap-timeout drops / hr~12 · linked to UC3
🔐
ClearPass API
Auth · 802.1X EAP-TLS
LIVE
ClearPass IP172.25.2.30 · DC Delhi
p95 auth time1.8s · regressed from 612ms
Regression linked toCHG-1107
Learned Playbooks4 active
BGP Session Drop
Reset peer → verify timer sync → escalate if persists
WAN Circuit Failover
Verify failover path → notify provider → update NOC
High CPU — Core Router
Check process table → ACL drops → engage TAC
Wireless Client Auth Failure
ISE policy check → RADIUS log → AP reassoc
Operational Knowledge Graph 0 nodes
🔗
Loading operational context…
Site / NOC Device (13 managed) Service / DEX / Tool Finding · CHG · INC Architect (intent owner)
Recent IncidentsServiceNow
CHG-1107
SD-WAN policy push · bandwidth optimization · 3 firewalls
May 18 · 14:42 IST · CAB-approved · closed as successful (but caused 3 findings)
INC0001142
Wi-Fi login slow at Mumbai office · matches UC2
P2 · 2 tickets · 18h after CHG-1107
INC0001148
Wi-Fi keeps disconnecting · Mumbai office · matches UC3
P2 · 4 tickets · 22h after CHG-1107
Team & Ownership
NOC
NOC Bangalore
24×7 single-region NOC · primary on-call rotation
ONCALL
ARC
Network Architect
HLD / LLD owner · declared intent source
CAB
Change Advisory Board
approved CHG-1107 · scope review SOP gap
Operational Memorylearned
Active pattern · CHG-1107 cascade
SD-WAN policy intent drift UC4
ERP latency (HQ + Remote DEX) UC1
ClearPass auth latency (Remote) UC2
IAP roaming drops (Remote) UC3
All four findings traced to a single root change. Auto-rollback path available from pre-CHG snapshot.
L01 · Design Intent Graph · 24 nodes L02 · Telemetry Graph · 16 nodes L03 · Onboarding Intelligence · 16 nodes TESSERACT · 0 SEMANTIC ENTITIES 0 semantic edges
One entity · eight dimensions · everything connected
The three lower-layer graphs (declared intent, live telemetry, operational state) are fused into a single semantic model. Each entity — a device, site, service, person — is viewable across 8 dimensions simultaneously. Click any node to see what it was designed to be, what it's doing right now, who owns it, what depends on it, and what's gone wrong before — all in one view. This is what makes agentic reasoning possible.
⌘K
CORE-RTR-01 ERP Service HQ Site Rajesh Kumar BGP Flap Pattern BGP Protocol
Semantic Dimensions 8
Tesseract Graph Overall view · all dimensions fused 0 entities
Initializing semantic fusion across Design Intent, Telemetry, and Onboarding Intelligence graphs…
Device Site Service Person/Team Business Fn Click any node to explore across 8 dimensions
Entity — Tesseract View select entity
Search or click any entity in the graph to view it across all 8 semantic dimensions — Design, Telemetry, Operational, Protocol, Dependency, Risk, History, and Business meaning.
0
Requests / min
6
Active Consumers
14
Tools Exposed
42ms
p50 Latency
MCP Tools Exposed 14
MCP Gateway — Live Traffic Semantic Tesseract → Consumers
Live Request Log
0 req/s
Active Consumers 6
Access Governance policy
Authentication OAuth 2.1 + mTLS
Rate limit 100 req/min per client
Audit logging Enabled
PII redaction Enabled
Scope enforcement RBAC + tenant-scoped
Write operations Require approval
Agent Operations 16
Outcomes & RCA 4
Network Timeline 1
6
Active Agents
running on CHG-1107
Current investigation
active
A2A collaboration
3
Pending Approvals
Use-Case Agents Purpose-built 16 agents
LLM Pool Model routing 11 models
Agent Orchestrator Live workflow RUNNING
Agent-to-Agent Communication Live inter-agent traffic
Shared Context Via MCP live
Current Incident
INC-0012458 · P1
BGP session flap · CORE-RTR-01 ↔ ISP-A
Context Shared Across Agents
entity.focus CORE-RTR-01
semantic.dim protocol, risk
blast_radius 47 endpoints
owner Rajesh Kumar
pattern.match BGP-flap-×8
Human Approvals Required
Execute BGP clear neighbor on CORE-RTR-01 — awaiting on-call engineer approval via Slack.
4
Active Findings
all chained to CHG-1107
1
Intent Drift
root cause · explains the others
3
User-visible Symptoms
ERP latency · auth · wireless
3
Auto-resolvable
pre-CHG snapshot enables rollback
8.4
Aggregate Risk Score
UC4 root cause · see Risk Composition
Category
Status All20 Active Drift12 Predicted5 Pattern3
Severity All Critical High Medium
Select a failure mode on the left to see the expected outcome, cause chain, and recommended resolution path.
OUTCOME → CAUSE → FIX
Scope All Sites AMER EMEA APAC Data Centers
Window 24h 7d 30d
Layers Config Changes Drifts Network Pulse Issues
1
Config changes · CHG-1107
1
Active drifts · UC4
3
DEX anomalies · ERP + auth + wireless
2
Open ServiceNow INCs
29m
Time-to-detect CHG-1107
Network event timeline Last 7 days · all sites
Config change
Drift
Pulse anomaly
Issue / ticket
Site
REGIONUsers · Detail
Network Score
Executing fix plan…
· 0 of 0 steps
RUNNING
Chain of events 0s elapsed
Agent activity log 0 entries