LAYER 01
Design Intent
0 of 5 inputs processed
Knowledge Documents
0 files
High-Level Design
HLD document (PDF, DOCX)
Low-Level Design
LLD document (PDF, DOCX)
SOPs & Runbooks
Operational procedures
Network Data
0 files
Subnet & IP Plan
CSV, XLSX — subnet definitions
Sites Data
Location, criticality, business function
Declared Tooling Stack
From architect intent
LAN · Switching
⬡Aruba CXVSX cores
⬡AristaHQ access
WAN · Security · SD-WAN
🔷Fortinetall sites · SD-WAN
🛰ACTcarrier
🛰Airtelcarrier
Wireless · Authentication
📶Aruba WLCHQ
📡Aruba IAPsRemote
🔐ClearPassDC · 802.1X
ITSM · Operations
🎫ServiceNowCMDB · INC · CHG
These devices and services are polled by Layer 02 via vendor APIs. Any divergence between what they declare and what LinkEye observes becomes a drift finding.
Architect Intelligence Chat
AI-guided
Design Intent Knowledge Graph
building…
0
Sites
0
Services
0
Subnets
0
Relations
Upload documents or chat to build graph
Site
Service
Business Function
Critical
Subnet
LAYER 02
AI Network Bridge
Initializing polling engine…
Polling Engine
Overall collection
0%
0
Devices
0
Sources
0
Metrics/s
0
Events
Live Topology Graph
Building current state…
0 nodes
Polling initializing…
Healthy
Warning
Critical
External Source
Collection Evolution
Phase 1 — Discovery
SNMP/SSH sweep of all declared subnets. Device inventory established.
Phase 2 — Telemetry Expansion
gNMI streaming enabled on supported devices. NetFlow/IPFIX activated on edge routers.
Phase 3 — Controller Integration
Meraki, Cisco DNA Center APIs polled. Wireless client & AP data ingested.
Phase 4 — Extended Sources
APM, SIEM, DDI integrations activated based on discovered services.
External Integrations
Collection Insights
Awaiting data…
LAYER 03
Onboarding Intelligence
Contextual data sources integrated
Context Sources9 integrated
ITSM · Ticketing
ServiceNow
ITSM · CMDB · CHG · INC
CMDB CIs synced13 · 8 LAN + 5 FW
Open INCs2 · UC2 + UC3
CHGs (24h)1 · CHG-1107
LinkEye-native telemetry
LinkEye Data Collector
On-prem · DC Delhi
Devices managed13
Config snapshots5min cadence · 24h history
Pre-CHG snapshotpreserved · rollback ready
LinkEye DEX
Endpoint agents · HQ + Remote
Agents2 · HQ-Dex + Remote-Dex
ERP synthetic probe1 / min per agent
Auth probeon wired clients
LinkEye Path Tracer
Hop-by-hop synthetic probes
Path pairsHQ-Dex→ERP · Remote-Dex→ERP
Cadence1 / min + on-demand
Vendor APIs · Network devices
Aruba CX REST
Switching · 5 Aruba CX + 1 Arista
Aruba CX5 · HQ-Core1/2, DC-Core1/2, Remote-Access
Arista (eAPI)1 · HQ-Access · 4.33.1F
VSX pairs2 · HQ + DC
Fortinet FortiGate API
Firewall · SD-WAN policy
Firewalls5 · HQ-FW1/2 + DC-FW1/2 + Remote-FW1
SD-WAN policy pushCHG-1107 detected
IPSec tunnelssite-to-site · all healthy
Wireless · Authentication
Aruba WLC
Controller · HQ wireless
WLC IP172.25.0.30
AP modecontroller-managed
Affected by CHG-1107?no · HQ path unchanged
Aruba IAP REST
Instant APs · Remote site
IAPs2 · 172.25.4.12 + 172.25.4.13
Firmware8.7.1.6
eap-timeout drops / hr~12 · linked to UC3
ClearPass API
Auth · 802.1X EAP-TLS
ClearPass IP172.25.2.30 · DC Delhi
p95 auth time1.8s · regressed from 612ms
Regression linked toCHG-1107
Learned Playbooks4 active
BGP Session Drop
Reset peer → verify timer sync → escalate if persists
WAN Circuit Failover
Verify failover path → notify provider → update NOC
High CPU — Core Router
Check process table → ACL drops → engage TAC
Wireless Client Auth Failure
ISE policy check → RADIUS log → AP reassoc
Operational Knowledge Graph
0 nodes
Loading operational context…
Site / NOC
Device (13 managed)
Service / DEX / Tool
Finding · CHG · INC
Architect (intent owner)
Recent IncidentsServiceNow
CHG-1107
SD-WAN policy push · bandwidth optimization · 3 firewalls
INC0001142
Wi-Fi login slow at Mumbai office · matches UC2
INC0001148
Wi-Fi keeps disconnecting · Mumbai office · matches UC3
Team & Ownership
NOC
NOC Bangalore
24×7 single-region NOC · primary on-call rotation
ARC
Network Architect
HLD / LLD owner · declared intent source
CAB
Change Advisory Board
approved CHG-1107 · scope review SOP gap
Operational Memorylearned
Active pattern · CHG-1107 cascade
SD-WAN policy intent drift
UC4
ERP latency (HQ + Remote DEX)
UC1
ClearPass auth latency (Remote)
UC2
IAP roaming drops (Remote)
UC3
All four findings traced to a single root change. Auto-rollback path available from pre-CHG snapshot.
LAYER 04
Semantic Tesseract
Fusing three knowledge graphs…
L01 · Design Intent Graph · 24 nodes
L02 · Telemetry Graph · 16 nodes
L03 · Onboarding Intelligence · 16 nodes
⟹
TESSERACT · 0 SEMANTIC ENTITIES
0 semantic edges
One entity · eight dimensions · everything connected
The three lower-layer graphs (declared intent, live telemetry, operational state) are fused into a single semantic model. Each entity — a device, site, service, person — is viewable across 8 dimensions simultaneously. Click any node to see what it was designed to be, what it's doing right now, who owns it, what depends on it, and what's gone wrong before — all in one view. This is what makes agentic reasoning possible.
⌘K
CORE-RTR-01
ERP Service
HQ Site
Rajesh Kumar
BGP Flap Pattern
BGP Protocol
Semantic Dimensions
8
Tesseract Graph
Overall view · all dimensions fused
0 entities
Initializing semantic fusion across Design Intent, Telemetry, and Onboarding Intelligence graphs…
Device
Site
Service
Person/Team
Business Fn
Click any node to explore across 8 dimensions
Entity — Tesseract View
select entity
◇
Search or click any entity in the graph to view it across all 8 semantic dimensions — Design, Telemetry, Operational, Protocol, Dependency, Risk, History, and Business meaning.
LAYER 05
MCP Layer — Intelligence Delivery
Exposing semantic intelligence to external agents
0
Requests / min
6
Active Consumers
14
Tools Exposed
42ms
p50 Latency
MCP Tools Exposed
14
MCP Gateway — Live Traffic
Semantic Tesseract → Consumers
Live Request Log
0 req/s
Active Consumers
6
Access Governance
policy
Authentication
OAuth 2.1 + mTLS
Rate limit
100 req/min per client
Audit logging
Enabled
PII redaction
Enabled
Scope enforcement
RBAC + tenant-scoped
Write operations
Require approval
LAYER 06
Agentic Layer — Autonomous Network Operations
Multi-agent orchestration over LinkEye MCP
Agent Operations
16
Outcomes & RCA
Network Timeline
6
Active Agents
running on CHG-1107
Current investigation
active
A2A collaboration
3
Pending Approvals
Use-Case Agents
Purpose-built
16 agents
LLM Pool
Model routing
11 models
Agent Orchestrator
Live workflow
RUNNING
Agent-to-Agent Communication
Live inter-agent traffic
Shared Context
Via MCP
live
Current Incident
INC-0012458 · P1
BGP session flap · CORE-RTR-01 ↔ ISP-A
Context Shared Across Agents
entity.focus
CORE-RTR-01
semantic.dim
protocol, risk
blast_radius
47 endpoints
owner
Rajesh Kumar
pattern.match
BGP-flap-×8
Human Approvals Required
Execute BGP clear neighbor on CORE-RTR-01 — awaiting on-call engineer approval via Slack.
4
Active Findings
all chained to CHG-1107
1
Intent Drift
root cause · explains the others
3
User-visible Symptoms
ERP latency · auth · wireless
3
Auto-resolvable
pre-CHG snapshot enables rollback
8.4
Aggregate Risk Score
UC4 root cause · see Risk Composition
Category
Status
All20
Active Drift12
Predicted5
Pattern3
Severity
All
Critical
High
Medium
Select a failure mode on the left to see the expected outcome, cause chain, and recommended resolution path.
OUTCOME → CAUSE → FIX
Scope
All Sites
AMER
EMEA
APAC
Data Centers
Window
24h
7d
30d
Layers
Config Changes
Drifts
Network Pulse
Issues
1
Config changes · CHG-1107
1
Active drifts · UC4
3
DEX anomalies · ERP + auth + wireless
2
Open ServiceNow INCs
29m
Time-to-detect CHG-1107
Network event timeline
Last 7 days · all sites
Config change
Drift
Pulse anomaly
Issue / ticket