- About This Book
-
- Getting Started
- Setting Up the Prime Fulfillment Services for L2VPN
- Creating a FlexUNI/EVC Ethernet Policy
- Creating a FlexUNI/EVC Ethernet Service Request
- Creating a FlexUNI/EVC ATM-Ethernet Interworking Policy
- Creating a FlexUNI/EVC ATM-Ethernet Interworking Service Request
- Creating an L2VPN Policy
- Creating an L2VPN Service Request
- Creating a VPLS Policy
- Creating a VPLS Service Request
- Deploying, Monitoring, and Auditing Service Requests
- Using Auto Discovery for L2 Services
- Sample Configlets
- Setting Up VLAN Translation
-
- Getting Started with MPLS VPN
- Setting Up the Prime Fulfillment Services
- Independent VRF Management
- IPv6 and 6VPE Support in MPLS VPN
- MPLS VPN Service Policies
- MPLS VPN Service Requests
- Provisioning Regular PE-CE Links
- Provisioning Multi-VRFCE PE-CE Links
- Provisioning Management VPN
- Provisioning Cable Services
- Provisioning Carrier Supporting Carrier
- Provisioning Multiple Devices
- Spanning Multiple Autonomous Systems
- Sample Configlets
- Troubleshooting MPLS VPNs
Generating TEM Reports and Logs
All deployment and collection tasks are monitored and the details of the tasks are logged. The information can be viewed using the task monitoring pages.
This chapter includes the following sections:
–Logs Created from Task Manager
TE Task Logs
The TE task logs are used to view the result of running one or more TE tasks. Different task logs are generated by different events:
•SR deployment logs
•Logs generated by tasks issued from the Task Manager, such as:
–TE Discovery
–TE Functional Audit
–TE Interface Performance.
SR Deployment Logs
When any service request is deployed, whether a managed or unmanaged primary tunnel or a backup tunnel, a log is generated. For tunnel SRs, deployment takes place in multiple phases depending on the type of SR and the task logs are created similarly:
•Primary tunnel SR—a three-phase logging process corresponding to a three-phase deployment
•Protection SR—a two-phase logging process corresponding to a two-phase deployment
In addition to the deployment logs, a ConfigAudit log is created regardless of the type of SR deployment, providing the deployment was successful.
Logs Created from Task Manager
Specific instructions for how to generate and view a task log for a TE Discovery task are found in Task Logs, page 36-7.
Instructions for how to generate and view a task log for the TE Functional Audit and TE Interface Performance tasks are found in Creating a TE Task, page 42-5.
Viewing a Task Log
A task log can be accessed from two different locations:
•The Tasks window
•The Service Requests window.
From the Tasks Window
To view the task log for a TE task, you need to:
1. Access the Task Logs window.
2. Select the desired log and open it.
To view the task logs, use the following steps. A task log from the deployment of a managed primary tunnel has been used as an example.
Step 1 Choose Operate > Task Logs.
The Task Logs window appears.
The Task Logs window includes the following:
•Runtime Task Name—Automatically attributed task name specifying when the runtime task was created.
•Action—Type of task, for example TE Discovery, TE Functional Audit, or TE Interface Performance.
•Start Time—The date and time when the runtime task was started.
•End Time —The date and time when the runtime task ended.
•Status—Indicates the present status of the runtime task.
Step 2 Select a Task Log for viewing.
A task that has been scheduled for multiple runs might have multiple instances to view.
Step 3 Click the desired task in the Action column.
The corresponding Task Log window appears. The GUI elements in this window are also found in the Service Request Manager window.
The logged messages are shown in a table. This includes the time the log message was created and the severity level assigned to the log message.
There is a filter setting for the logging, which defaults to SEVERE. This means that only SEVERE messages in the log are shown. There are several different filter settings that can be selected according to the desired level of detail. To change the filter level, select the one that is required and click Filter.
How the log is structured depends on the type of task that was run.
Step 4 Click Return to Logs to close the log window.
This takes you back to the main Task Logs window.
Step 5 To see the task SR, which in some cases is associated with a particular task log, select the desired task log and click the Service Requests button.
The Task SRs window appears.
From the Service Requests Window
To access the logs from the Service Requests window:
Step 1 Choose Operate > Service Request Manager.
Step 2 Select a service request (only one).
Step 3 Click the Status button and select Logs.
Step 4 Select the log to view and click View Log.
The Task Log window appears.
Step 5 Select the log level from the drop-down menu and click Filter.
The log levels are All, Severe, Warning, Info, Config, Fine, Finer, and Finest.
TE Performance Reports
A TE Performance Report is created when you run a TE Interface Performance task as described in Creating a TE Interface Performance Task, page 42-6.
It shows the traffic data collected from the TE Interface Performance task for selected tunnels and/or links. The TE Interface Performance task can run multiple times.
To view a TE Performance Report, use the following steps:
Step 1 Choose Monitoring > TE Performance Report.
The TE Performance Report Table appears.
The TE Performance Report Table window includes the following GUI elements:
•Report table—The table shows a list of Interface Performance tasks:
–Start Time—The date and time when the runtime task was started.
–End Time—The date and time when the runtime task ended.
–Device Name—Name of the device.
–Interface Name—IP addresses of the interfaces on the link.
–Octets In—Number of inbound octets of traffic.
–Octets Out—Number of outbound octets of traffic.
–Speed—Speed of the interface.
–Util In—Interface utilization for inbound traffic.
–Util Out—Interface utilization for outbound traffic.
•Reconcile Data—When an Interface Performance task has been run multiple times on an interface, you can choose to reconcile the data according to the following criteria:
–Peak—Select the highest interface utilization.
–Valley—Select the lowest interface utilization.
–Average—Select the average interface utilization.
–First—Select the first occurrence of interface utilization.