Scenario 6: The Tenant That Ate the Spine

Executive summary:
In multi-tenant cloud fabrics, a single tenant can trigger shared-resource contention that looks like a fabric-wide failure. Alarms fire across domains (network, app, tenant portals). Tickets cluster. The default response is broad throttling or risky fabric changes.

This scenario shows why LLM-assisted approaches often stall at plausible narratives, and why a topology-aware GNN approach can attribute the source with explainable evidence, recommend the narrowest effective containment, and validate the fix.

MTTR comparison: LLM-assisted 2 to 8 hours vs GNN-based 10 to 30 minutes.

The setup: noisy neighbor meets shared infrastructure

Network context: cloud provider fabric.
Hidden cause: a single tenant’s abnormal traffic causes shared-resource contention (buffers, spine CPU, control-plane churn).

Typical triggers include:

  • Broadcast storm
  • Misconfigured overlay
  • Reflection loops

The operational trap is that symptoms appear everywhere:

  • Multiple tenants see latency
  • Shared fabric shows congestion
  • Spine buffers fill
  • Spine CPU rises

Without a causal model, the incident gets framed as “everything is broken.”

Timeline walkthrough (what actually happens)

T+0s: Abnormal tenant traffic begins
Network reality: One tenant begins abnormal traffic (broadcast storm, misconfigured overlay, reflection).
LLM-assisted behavior: No action until alarms/logs accumulate.
GNN-based behavior: Detects anomaly in flow patterns and buffer utilization on specific edge ports tied to a tenant context.
Outcome: Early suspicion formed.

T+30s: Shared resources start showing pressure
Network reality: Leaf switches see rising broadcast/unknown-unicast; spine buffers start filling.
LLM-assisted behavior: Ingests device logs; summarizes “high traffic, buffer pressure.”
GNN-based behavior: Correlates telemetry to the dependency graph: tenant VNI/VRF -> leaf ports -> uplinks -> spine resources.
Outcome: Establishes tenant-to-resource mapping.

T+1m: Multiple tenants feel it
Network reality: Multiple tenants experience latency; shared fabric shows congestion symptoms.
LLM-assisted behavior: Clusters tickets and alarms; may treat as “fabric-wide congestion.”
GNN-based behavior: Distinguishes shared-resource symptoms from single-source cause using propagation patterns.
Outcome: Avoids “everything is broken” framing.

T+2m: Control-plane churn appears
Network reality: Spine CPU rises due to control-plane churn; MAC moves and ARP storms possible.
LLM-assisted behavior: Summarizes control-plane events; suggests generic mitigations (restart processes, reboot).
GNN-based behavior: Identifies the minimal set of nodes/edges where the storm originates and the exact propagation path.
Outcome: Pinpoints origin segment.

T+3m: Monitoring tools fire across domains
Network reality: Monitoring tools fire across domains (network, app, tenant portals).
LLM-assisted behavior: Produces multiple plausible narratives; cannot safely accuse a tenant.
GNN-based behavior: Produces explainable evidence: “Tenant X traffic signature -> leaf Y -> spine Z contention -> impacted tenants A/B/C.”
Outcome: Confident attribution.

T+5m: High-risk containment options considered
Network reality: NOC considers broad rate limits or fabric changes (high risk).
LLM-assisted behavior: Suggests broad throttling; cannot quantify collateral impact.
GNN-based behavior: Computes targeted containment options and predicts blast radius per option.
Outcome: Safer containment.

T+7m: Containment action chosen
Network reality: Containment action chosen (rate-limit, isolate port/VNI, ACL).
LLM-assisted behavior: Advises “try rate limiting” but cannot validate correctness.
GNN-based behavior: Recommends the narrowest effective control with validation criteria (which metrics should drop first).
Outcome: Controlled mitigation.

T+9m: Recovery begins
Network reality: After containment, shared congestion starts to clear.
LLM-assisted behavior: Summarizes “improving,” may misattribute cause to unrelated actions.
GNN-based behavior: Confirms recovery order matches the dependency model (source edge metrics normalize first).
Outcome: Validated fix.

T+12m to T+1d: Recurrence and prevention
Network reality: Tenant continues attempts; recurrence risk remains. Customer comms needed: who was impacted and why. Preventive controls: guardrails, anomaly thresholds, policy.
LLM-assisted behavior: Requires humans to watch and repeat actions; generates generic incident text; suggests generic best practices.
GNN-based behavior: Flags recurrence signatures and can auto-trigger the same validated containment playbook; outputs impacted tenants/services list with time window and causal graph evidence; recommends guardrails targeted to the exact failure mode and high-centrality edges.
Outcome: Higher autonomy, stronger customer trust, reduced recurrence.

Why LLM-only approaches struggle in multi-tenant attribution

This is not a write a summary problem. It is an attribution problem under shared symptoms.

When alarms fire everywhere, LLMs tend to:

  • Cluster symptoms into a fabric-wide incident.
  • Offer plausible causes without a defensible causal chain.
  • Recommend broad mitigations that reduce pain but increase collateral risk.

The missing ingredient is a dependency model that ties tenant context to physical and logical resources.

Why topology-first GNN RCA wins

A GNN-based approach can reason over the fabric graph and tenant mappings to:

  • Identify the minimal origin set and propagation path.
  • Quantify blast radius for containment options.
  • Provide explainable evidence suitable for internal and customer-facing comms.
  • Validate closure deterministically via expected recovery ordering.

What to take away

In multi-tenant networks, “congestion” is often a symptom, not a diagnosis.

If your tooling cannot attribute noisy neighbors with evidence, you will:

  • Over-throttle the fabric.
  • Make risky changes under uncertainty.
  • Pay SLA credits while the real source keeps retrying.

Topology-aware, deterministic RCA shortens MTTR and improves trust.