{"id":433,"date":"2022-08-06T19:46:12","date_gmt":"2022-08-06T18:46:12","guid":{"rendered":"http:\/\/192.168.1.213:8088\/?p=433"},"modified":"2023-10-13T05:40:14","modified_gmt":"2023-10-13T04:40:14","slug":"model-driven-telemetry-with-cisco-nexus","status":"publish","type":"post","link":"http:\/\/192.168.1.213:8088\/model-driven-telemetry-with-cisco-nexus\/","title":{"rendered":"Model-Driven Telemetry With Cisco Nexus (Using GRPC with SSL on Telegraf)"},"content":{"rendered":"\t\t
When using model-driven telemetry with Cisco Nexus, y<\/span>ou’re probably sending sensitive data across your network without using encryption.<\/p> By not encrypting your traffic, you’re leaving yourself open to attacks from anyone who may be monitoring your traffic.<\/p> Keep on reading to learn how you can implement model-driven telemetry with Cisco Nexus devices and encrypt the traffic.<\/p> Over the last few days, I came across the question of how I can secure the connection between my Telegraf<\/a> instance and my Cisco Nexus device.\u00a0<\/p> The steps are quite simple and in this post, I will walk you through the steps which are needed to configure your Cisco Nexus device and your Telegraf instance.<\/p> When we’re finished, you’ll have working and securely encrypted setup to transmit your telemetry data and monitor your network effectively.<\/p> Before I get started let me explain the Lab setup that I’m working with:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t