EEM can certainly do what you want. However, the counter ED is probably not what you want. You want to use either the timer ED because you will need to check a slew of interfaces at once (I'm assuming). If you want the ability to configure the event parameters using environment variables, a Tcl script will be required.
Essentially, you will run your policy periodically, then check a show command for each interface, then do the math.
You could also use SNMP here as well (still using a timer ED, though). That is, run the command "show snmp mib ifmib ifindex" then for each ifIndex, get the ifSpeed and ifHighSpeed objects. If the interface is a high-speed interface (i.e. ifSpeed > 100 Mbps), then poll the ifHCInOctets and ifHCOutOctets, and build the utilization based on that.
I really want the overhead of the script to be minimum, yet, still react rather quickly to traffic peaks, so start polling and calculating interface loads myself makes me already hesitant to go that direction...
Maybe i can just base myself on the rx and tx load indications (rx/255 and tx/255) in the show interface command. This way i don't have to poll he "ifSpeed" objects and calculate the load myself. Need to make some time free to test it on a lab switch...
Yes, you can do that. However, you will have to adjust your initial environment variables for percentage to reflect the fraction of 255 instead of 100. If that's something you're willing to live with, the policy will be pretty straight forward.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...