What Is Fault Management?
Fault management is the process of locating, diagnosing, and reporting network problems. This is important for increasing network reliability and effectiveness, and for increasing the productivity of network users. Fault management is more than just handling emergencies. It provides functions for managing problems with services and handling customer-facing service problems.
Efficient fault management can:
-
Save repair costs through efficient fault detection, location, and correction
-
Improve customer care through efficient trouble administration
-
Improve service availability and equipment reliability through proactive maintenance and through measurement, review, and corrective action
One responsibility of fault management is to detect faults. A piece of equipment, a transmission medium, a software module, or a database is said to be in a fault state if it cannot perform its intended function and meet all of the requirements placed on that function. The onset of a fault is called a
failure event
and is usually signaled by one or more alarm reports. The termination of a fault state is called a
clear event
.
Fault management is responsible for determining, from a variety of information sources, the root cause of a fault, and for its repair. In certain cases, the root cause of a fault might be in a connecting network. In such cases, fault management is responsible for reporting the problem through appropriate channels.
Service assurance is the overall process of ensuring that the purchased level of service is delivered. The Element Management System (EMS) plays a key role in maintaining the health of both NEs and transmission facilities. This is done in conjunction with other systems, typically at the network management layer and service management layer. The EMS can be the primary repository of detailed history of NE-specific faults and events, technician action, and performance data.
The steps for successful fault management are:
1. Identify a problem by gathering data about the state of the network (polling and trap generation).
2. Restore any services that have been lost.
3. Isolate the cause, and decide if the fault should be managed.
4. Correct the fault if possible.
What the NE Provides
Currently deployed, intelligent NEs provide the management system with the following, which are required for effective fault management:
-
Detection of the four main types of failure:
– Equipment failure—Detected through failure detection mechanisms built into the hardware, and through routine exercises and diagnostics.
– Software failure—Detected through failure of software checks, and through routine audits.
– Communication failure—Detected through defects in the incoming signal or outgoing signal characteristics. Defects include line coding errors, framing bit errors, parity errors, cyclic redundancy check errors, and addressing errors. Signal characteristics include optical or electrical power, analog signal-to-noise ratio, and deviation from required voltage or wavelength.
– Environmental failure.
-
Notification of failure—NEs notify a management system when a failure occurs by generating an alarm report. The NE can also report a summary of current fault states, or replay its log of historical failures and clears.
-
Notification of changes in operational state of the NE components—If a component of the NE is in a fault state, a management system should not receive further alarms, alerts, or scheduled performance data from that component.
Note Prime Optical forwards northbound information and integrates with other third-party management systems to give options that are not directly available in Prime Optical.
Fault Notification and Maintenance
Fault notification and maintenance can be proactive or reactive:
-
Proactive notification—Where
X
contacts
Y
to query
Y
on potential problems in
Y
’s domain.
-
Reactive maintenance—Where
Y
notifies
X
of a problem regarding a service delivered from
Y
to
X
.
Proactive Maintenance
Automated detection tests and surveillance software enable rapid initiation of the repair process, sometimes even before customers have noticed a problem. This is called proactive maintenance and promotes customer satisfaction.
Proactive maintenance consists of functions and processes associated with the detection, analysis, isolation, and resolution of problems by means that are independent of customer trouble reports. The problems might be faults or degradations in equipment or transmission media.
The goals of proactive maintenance are to:
-
Detect and fix service quality problems before the customer calls to establish a trouble report, or at least to start the repair process before the customer calls, thereby minimizing the time, as perceived by the customer, before service is restored.
-
Maintain the transport network at a high level of quality by identifying the facilities that perform relatively poorly and rehabilitating them.
Reactive Maintenance
Reactive maintenance is required when a failure occurs. This type of problem can be time-consuming and costly. It requires accurate administration of trouble reports, rapid analysis and repair of service-affecting faults, and notifications to the customer of restoration of service, all of which also promote customer satisfaction.
Root Cause Analysis
The
root cause
is the most basic reason for an undesirable condition or problem that, if eliminated or corrected, would have prevented the problem from occurring. The outcome of the root cause analysis is not a restatement of the most obvious symptom, but is the result of a methodical analysis of the problem situation, leading to the most basic cause.
Root cause analysis captures additional information about defects for the purpose of identifying preventive actions. Prime Optical includes advanced debugging features that capture additional information about defects.
Where Can I Get Information on Affected Services and Customers?
The first thing to do in fault management is to identify what services and which customers are affected by the fault. Prime Optical provides a number of options for viewing this information.
Table 9-1
describes where to obtain information on affected services and customers.
Table 9-1 Obtaining Information on Affected Services and Customers
|
|
For More Information, See
|
Dashboard
|
Shows useful alarm and NE information in one easily accessible location.
|
Dashboard
|
Tooltips
|
Visible when you position the cursor over a managed object (domain, group, subnetwork, NE, board, link, and so on). The tooltip displays additional information about the selected object.
|
—
|
Domain Explorer
|
Home window; provides a logical view of the network plus alarm, connectivity, and operational status.
|
Domain Explorer
|
Subnetwork Explorer
|
Similar in appearance and function to the
Domain Explorer
. A key difference is that the
Subnetwork Explorer
provides a single-level grouping of NEs based on network partitions and subnetworks.
|
Subnetwork Explorer
|
Network Map
|
Displays a geographical layout of the network.
|
Network Map
|
Alarm Browser
|
Displays standing alarms and conditions in the managed domain that are assigned a severity level of critical, major, minor, or warning. It also shows cleared alarms that are not acknowledged.
|
Alarm Browser
|
Alarm Log
|
Contains alarms that have transitioned from the
Alarm Browser
.
|
Viewing the Alarm Log
|
Alarm Browser
The
Alarm Browser
displays standing alarms and conditions in the managed domain that are assigned a severity level of critical, major, minor, or warning. It also shows cleared alarms that are not acknowledged. The
Alarm Browser
and
Alarm Log
views provide a robust listing of all current and historical alarms and events. See Viewing the Alarm Log for information about the
Alarm Log
.
To display the
Alarm Browser
, select an NE, group, subnetwork, or domain node from the
Domain Explorer
,
Subnetwork Explorer
,
Network Map
, or
NE Explorer
; then, choose
Fault > Alarm Browser
(or click the
Open Alarm Browser
tool from the Dashboard).
Note • No alarms or events are generated in the Alarm Browser if Oracle shuts down.
-
You must not select many groups or a bunch of nodes at a time to view the
Alarm Browser
.
-
CRS alarms for DWDM cards are managed by the
Alarm Browser
.
-
CTC and CPO filter alarms of the PLIM ports connected to the CRS that are VTXP enabled.
-
When you launch the
Alarm Browser
from the
Network Map
, only the alarms related to nodes of the current link are displayed.
-
Refer to the appropriate NE documentation for a list of alarms supported on each NE. See Related Cisco NE Documentation.
-
Use the toolbar icons to manage the alarm display. See Icons and Menus Displayed in Prime Optical for an explanation of each toolbar icon.
-
Read-only users must be able to acknowledge alarms.
Working with Alarm Browser
To perform actions on the
Alarm Browser
, complete the following steps:
1. In the
Domain Explorer
,
Subnetwork Explorer
, or
Network Map
window, select the NE or node and choose Fault > Alarm Browser.
The
Alarm Browser
opens, displaying the following information for the selected NE or node:
-
Alarm ID
-
Perceived Severity (PS)
-
Note
-
Source ID
-
Probable Cause
-
Condition
-
Module Name
-
Physical Location
-
Port Name
-
Affected Object
-
Affected Service
-
EMS Clear Alarm Time stamp
-
NE Alarm Time Stamp
-
Service Affecting
-
Acknowledged
-
EMS Clear Time Stamp
-
NE Clear Time Stamp
-
Acknowledged Time Stamp
-
Acknowledged Username
-
Status
-
Description
-
TL1 Direction
-
TL1 Location
-
Alias ID
2. View the details of the
Alarm Browser
. See Viewing the Properties Data in the Alarm Browser for more information.
3. Set filter criteria in the
Alarm Browser
. See Filtering the Alarm Browser for more information.
4. Configure the custom view settings. See Configuring the Alarm Browser Settings for more information.
5. Create a custom view. See Creating a Custom View for more information.
6. Save a custom view. See Saving an Alarm Browser Custom View for more information.
7. Copy a public custom view. See Copying a Public Custom View for more information.
The following table describes the fields in the Alarm Browser.
Table 9-2 Field Descriptions for the Alarm Browser Window
|
|
Alarm ID
|
Unique number that the system uses to identify a particular alarm.
|
Perceived Severity (PS)
|
Perceived severity of the selected alarm (critical, major, minor, or warning). The background color also indicates the severity, where:
-
Red = Critical
-
Orange = Major
-
Yellow = Minor
-
Blue = Warning
-
Green = Cleared
You can perform alarm operations by selecting a single alarm or multiple alarms.
Note You cannot select more than five alarms.
|
Acknowledged
|
Whether the selected alarm has been acknowledged by the user. Values are Yes and No.
|
Note
|
Any notes that were entered for the selected alarm. If you choose Fault > Show Alarm Note or click the Show Alarm Note tool or Right-click an alarm inside the Alarm Browser table, you can see the login name of the user who entered the note and the time when the note was entered.
By default the note is shown as an icon inside the
Alarm Browser
table.
|
Alias ID
|
Alias name of the NE.
|
Probable Cause
|
Probable cause of the selected alarm. Some possible values include:
-
Not Applicable/Unknown—If no additional information is available
-
Mismatch of equipment and attributes (MEA) alarm—For misconfigured pluggable port modules (PPMs)
-
Link Layer Keep-Alive Failure—When the keepalive frame on the POS port is disabled and the port is shut down
-
Bad Packet Count Exceeds Threshold—When the packets through the front port have CRC errored frames
-
Auto-Negotiation Remote Failure Indication—When a remote Gigabit Ethernet port is shut down from a local port
|
Condition
|
Error message or condition name that is associated with the alarm or event.
|
Affected Service
|
Specifies if any service is affected by the alarm.
|
Affected Object
|
Name of the object where the selected alarm occurred.
|
Module Name
|
Name of the module where the selected alarm occurred.
|
Physical Location
|
Physical location of the equipment where the selected alarm occurred, such as chassis, rack, subrack (shelf), slot, and port numbers.
|
NE Alarm Time Stamp
|
Date and time when the alarm occurred on the NE.
|
Service Affecting
|
Whether the alarm or event is service affecting (SA). Values are:
-
Yes—The alarm is service affecting
-
No—The alarm is not service affecting
-
N/A—No information is provided by the NE
|
Clear Time Stamp
|
Date and time when the alarm was cleared on the server.
|
EMS Clear Alarm Time stamp
|
Date and time when the alarm was cleared.
|
NE Clear Time Stamp
|
Date and time when the alarm was cleared on the NE.
|
Acknowledged Time Stamp
|
Date and time when the user acknowledged the selected alarm.
|
Acknowledged Username
|
Login name of the user who acknowledged the selected alarm.
|
Description
|
Additional information about the selected alarm. If there is no additional information, this field is blank.
|
Source ID
|
Name of the NE where the selected alarm occurred.
|
TL1 Direction
|
TL1 direction for RTRV-ALM-ALL and RTRV-COND-ALL TL1 commands and REPT^ALM/COND autonomous messages. Values are Receive or Transmit.
This field is blank for non-TL1 alarms.
|
TL1 Location
|
TL1 location for RTRV-ALM-ALL and RTRV-COND-ALL TL1 commands and REPT^ALM/COND autonomous messages. Values are Near End or Far End.
This field is blank for non-TL1 alarms.
|
Viewing the Properties Data in the Alarm Browser
You can view a single or multiple
Alarm Browser
details at a time. To view the
Alarm Browser
properties, select one single alarm to view the details on the right. You can navigate to the property tabs to view the details one by one.
Viewing Demoted Alarms in the Alarm Browser
You can view demoted alarms in the
Alarm Browser
.
To view demoted alarms in the
Alarm Browser
, select an alarm, click the Toggle Frames Visibility button, and choose Demoted Alarms. You can navigate to the Demoted Alarm tab to view the details of individual demoted alarms.
Table 9-3
describes the fields in the Demoted Alarms tab.
Table 9-3 Field Descriptions for Demoted Alarms
|
|
Sync button
|
Synchronizes the contents of the table with the current selection.
|
Auto-Refresh button
|
Check the Auto-Refresh check box to refresh the window.
|
Filter button
|
Click the Filter button to filter the data displayed in the table.
|
Export to CSV button
|
Click the Export to CSV button to transfer the table contents into an excel file
|
NE Explorer
|
Opens the
NE Explorer
.
|
PS
|
Severity of the alarm before it was cleared. Perceived Severity is listed as:
-
Critical (CR)
-
Major (MJ)
-
Minor (MN)
-
Warning (WR)
-
Indeterminate (IN)
The background color of the column indicates the alarm status, where:
-
Green = Cleared alarms
-
Purple = Indeterminate events
Note Indeterminate events are transient events that do not have a severity indicated by the source NE. Indeterminate events do not have a cleared condition.
|
SA
|
Whether the alarm or event is service affecting. Values are:
-
Yes if the alarm is service affecting
-
No if the alarm is not service affecting
-
N/A if no information is provided by the NE
|
Probable Cause
|
Probable cause of the selected alarm or event.
|
Condition
|
Error message or condition name that is associated with the alarm or event.
|
Source ID
|
Name of the NE or EMS where the selected alarm or event occurred.
|
Module Name
|
Name of the module where the selected alarm or event occurred.
|
Physical Location
|
Physical location of the equipment where the selected alarm or event occurred, such as rack, subrack (shelf), slot, and port numbers.
|
Port Name
|
Name of the port.
|
Affected Object
|
Name of the object where the selected alarm or event occurred. For NE-specific alarms, the affected object field displays “CTM.” For the non-NE specific alarms:
-
Maximum number of login attempts exceeded alarm—The
affected object
field displays the user ID associated with the alarm.
-
Prime Optical self-monitor alarm—The
affected object
field displays the threshold parameter associated with the alarm.
|
NE Alarm Time Stamp
|
Date and time when the alarm or event occurred on the NE.
|
Status
|
Status of the demoted alarms.
|
TL1 Direction
|
TL1 direction for RTRV-ALM-ALL and RTRV-COND-ALL TL1 commands and REPT^ALM/COND autonomous messages. Values are Receive or Transmit.
This field is blank for non-TL1 alarms.
|
TL1 Location
|
TL1 location for RTRV-ALM-ALL and RTRV-COND-ALL TL1 commands and REPT^ALM/COND autonomous messages. Values are Near End or Far End.
This field is blank for non-TL1 alarms.
|
Alias ID
|
Alias name of the NE.
|
Adding/Modifying Alarm Notes
Use the
Alarm Note
dialog box to read any comments that have been entered for the selected alarm and to enter additional comments. In the
Alarm Browser
window, select an alarm and choose
Fault > Add/Modify Note
(or click the
Add/Modify Note
tool, or right-click and select the Add/Modify Note).
Table 9-4
provides descriptions.
Table 9-4 Field Descriptions for the Alarm Note Dialog Box
|
|
Note
|
Provides space to type comments about the selected alarm. You can enter up to 1,900 characters in the
Note
field.
To add your comments to the previous comments, click the
Append
radio button. To overwrite the previous comments, click
Replace
. To delete the comments, click
Delete
.
Note You can enable and disable the ability to overwrite or delete alarm notes in the Control Panel > UI Properties pane.
|
History
|
Comments that were entered by previous users. This field also shows the login name of the user who entered the note and the time when the note was entered.
|
Configuring the Alarm Browser Settings
To configure the
Alarm Browser
settings, do the following:
Step 1 Click the Alarm Browser Settings icon in the top-right corner of the window. The
Settings
dialog box is displayed.
Step 2 Make the necessary settings as required. See
Table 9-5
for the field descriptions.
Step 3 Click OK.
Note You must check the Auto-Refresh check box to refresh the window.
Table 9-5 Alarm Browser Settings Dialog Box
|
|
Default Views
|
Displays the view or custom view that is applied default for the user. Any built-in view or custom view can be selected as default for the user.
|
Show Text for Notes
|
Displays the message of the Note column instead of the icon.
|
Show PS Icons
|
Displays the icons along with the state.
|
PS Coloring
|
Displays different colors for different states. You can select the coloring to be for the Cell, Entire Row, or No Color.
|
Refresh period in minutes
|
Select the time interval (in minutes) that the data is automatically refreshed. You can select to have the data automatically refreshed every 5, 15, or 30 seconds. The default is 15 seconds.
Note You must check the Auto-refresh check box to refresh the window.
The status bar at the bottom of the
Alarm Browser
window displays:
-
Current page number
-
Total number of pages in the report
-
Number of records displayed
-
Number of records selected
-
Total number of records in the report
If there is any change or edit in the alarm details, it will automatically update the changes in the next refresh.
|
Records per Page
|
Displays the number of records shown in a single page. The default is 100.
|
Filtering the Alarm Browser
To filter the records in the
Alarm Browser
, do the following:
Step 1 In the
Domain Explorer
,
Subnetwork Explorer
, or
Network Map
window, select the NE and choose Fault > Alarm Browser.
Step 2 Click the Show drop-down list in the
Alarm Browser
window. The list displays the various filtering options available in the list, and by default its Active. You can do one of the following:
Table 9-6 Alarm Browser Filters
|
|
All
|
Displays all records.
|
Active
|
Displays only the active alarms.
|
EMS
|
Displays the EMS alarms.
|
Not Acknowledged
|
Displays the not acknowledged alarms.
|
Critical Severity
|
Displays the critical severity alarms.
|
Minor Severity
|
Displays the minor severity alarms.
|
Major Severity
|
Displays the major severity alarms.
|
Warning Severity
|
Displays the warning severity alarms.
|
Simple Filter
|
Displays all records that contain the text you entered.
|
Custom View
|
Creates a custom view with selected criterion.
|
Manage Custom Views
|
Edits or deletes a custom view.
Note You can only edit or delete a custom view you created.
|
-
Choose All, Active, EMS, Not Acknowledged, Critical Severity, Minor Severity, Major Severity, or Warning Severity from the drop-down list. The alarms are displayed regardless of any custom view configuration.
Note The number of records that are displayed on each page can be configured in the Alarm Browser Settings window. For more information on Alarm Browser Settings, see Configuring the Alarm Browser Settings.
Performing a Simple Filter
To perform a simple filter, do the following:
1. Choose Simple Filter from the drop-down list.
2. Enter the search text in the Enter Search Text text box to filter the report.
3. Click Apply or press Enter.
The
Alarm Browser
is displayed with the filtered data.
Note The Simple Filter looks out for the search text in all the columns and displays all the records in the window. It does not restrict the filtered data in a single column.
Note To only search text within the records of the current page, check the Quick Filter check box from the Alarm Browser toolbar and enter the search criteria. Quick Filter filters only the current page records based on the search text.
Creating a Custom View
To create a custom view, do the following:
Step 1 Choose the Custom View from the drop-down list.
Step 2 Set the match rules as needed for a custom view. See
Table 9-7
for the field descriptions.
1. Click the All link and select Any from the pull-down list to match any one condition in the custom view configuration or click the Any link and select All from the pull-down list to match all the conditions in the custom view configuration.
2. Click the no order link and select the column name from the pull-down list to order the custom view. After selecting the column name, you can sort the data in ascending or descending order by clicking on the Ascending and Descending.
3. Click the Showing Columns link. A window is displayed with Available and Visible columns. See
Table 9-7
for the field descriptions.
a. Make the necessary changes as required.
b. Click Done.
Table 9-7 Match Rules
|
|
All/Any
|
Matches the conditions in the configuration to filter and display the data. Options are:
-
All—Matches all the conditions.
-
Any—Matches any one of the conditions.
|
Order Rule
|
Enables you to order the filtered data. The default value displayed is No Order. Click No Order link to view the order rule values in ascending and descending order.
|
Showing Columns
|
Displays the column names. Options are:
-
Available—Displays all the column names that the Circuit Report contains. You can move the column name from left to right and vice versa using the navigational buttons.
Note Double-click the column name to move the column name from Available text box to Visible text box and vice versa.
-
Visible—Displays the column names that you want to display in the customized configuration view.
|
4. Choose the column name from the drop-down list.
5. Choose the filtering condition from the drop-down list.
6. Enter the search text in the text box to filter the records.
7. Click the Browse button to select the options. The pull-down menu is displayed.
– Check the check boxes of your choices from the list. The selected options are listed under the Selected items text box.
– Click Done.
Note The Browse button is displayed only for the Circuit Size, Discovery State, Service State, Direction, Protection, and Wavelength column names.
8. If necessary, add or delete filter criterion by clicking the + or - icon.
Step 3 Click Apply. See Action Buttons for more information.
If the report has more than one page, the
Previous Page
and
Next Page
arrows at the top-right corner of the
Alarm Browser
window are enabled.
If you want to move to a specific page, you can enter the page number in the Page text box and press Enter.
Saving an Alarm Browser Custom View
To save a custom view, do the following:
Step 1 If you need to save the custom view for later use, click Save. The
Save a Custom View
dialog box is displayed.
Step 2 Enter the custom view name in the Name text box.
Step 3 Choose Visibility from the drop-down list. The custom views are stored in the following two folders:
-
Public—Contains the customized view reports that the SuperUser created. It also has the custom views that the other users created with read/write privileges. You can make a copy of the other users’ custom views using the Save As button.
-
Private—Contains the customized view reports that you created.
Note The Custom view name is unique in Public and Private folders, but you can create a custom view name that the SuperUser has created.
Step 4 Click Save.
Editing or Removing a Custom View Configuration
To edit or remove a custom view configuration, do the following:
Step 1 Choose Manage Custom View from the drop-down list. The
Manage Custom Views
dialog box is displayed.
Step 2 Choose Select a Custom View from the drop-down list and do one of the following:
-
Click Edit and modify the Name and Visibility as required. Click Save.
-
Click Remove. Click OK to confirm that you want to delete the custom view. The selected custom view is deleted from the Manage Custom View list.
Note Users who have read/write privileges for public filter management operations can edit or remove public custom views. However, private custom views can only be managed by the user who created them.
Copying a Public Custom View
To copy a public custom view, do the following:
Step 1 Select the custom view from the public or private folder.
Step 2 Click Save As. The
Save a Custom View
dialog box is displayed.
Step 3 Enter the custom view name in the Name text box.
Step 4 Choose Visibility from the drop-down list.
Step 5 Click Save. The custom view is saved in a different name.
Note You can make a copy of an existing custom view using the Save As button when you do not have the public privileges.
In the
Alarm Browser
window, if the Auto-Refresh check box is checked, the window contents are updated according to the selected view (custom or built-in), with the frequency set in the
Settings
dialog box. When the Auto-Refresh check box is not checked, a notification bar appears at the top of the
Alarm Browser
window stating that the reported data has changed. You can click the Refresh tool to refresh the report.
Viewing the Alarm Log
The
Alarm Log
contains alarms that have transitioned from the
Alarm Browser
. Cleared alarms are transitioned when you acknowledge them or when automatic acknowledgment has been enabled (in the
Control Panel
>
UI Properties
pane). In addition, the
Alarm Log
shows a history of cleared and acknowledged alarms and all transient conditions (also known as events or autonomous nonalarmed messages). Events are placed directly into the
Alarm Log
; they do not appear in the
Alarm Browser
. By default, the
Alarm Log
shows alarm information that occurred during the last 6 hours.
To view the
Alarm Log
, select a node in the
Domain Explorer
tree and choose
Fault
> Alarm Log
(or click the
Open Alarm Log
tool).
Table 9-8
provides descriptions.
Table 9-8 Field Descriptions for the Alarm Log Window
|
|
ID
|
Unique number that the system uses to identify a particular alarm or event.
|
Alias ID
|
Alias name of the NE.
|
Affected Object
|
Name of the object where the selected alarm or event occurred. For NE-specific alarms, the
affected object
field displays “CTM.” For the non-NE specific alarms:
-
Maximum number of login attempts exceeded alarm—The
affected object
field displays the user ID associated with the alarm.
-
Prime Optical self-monitor alarm—The
affected object
field displays the threshold parameter associated with the alarm.
|
Module Name
|
Name of the module where the selected alarm or event occurred.
|
Physical Location
|
Physical location of the equipment where the selected alarm or event occurred, such as rack, subrack (shelf), slot, and port numbers.
|
Note
|
Any notes that were entered for the selected alarm. If you choose
Fault
>
Show Alarm Note
or click the Show Alarm Note tool or Right-click an alarm inside the Alarm Browser table. You can see the login name of the user who entered the note and the time when the note was entered.
By default the note is shown as an icon inside the
Alarm Browser
table.
|
Probable Cause
|
Probable cause of the selected alarm or event.
|
Condition
|
Error message or condition name that is associated with the alarm or event.
|
Perceived Severity
|
Severity of the alarm before it was cleared. Perceived Severity is listed as:
-
Critical (CR)
-
Major (MJ)
-
Minor (MN)
-
Warning (WR)
-
Indeterminate (IN)
The background color of the column indicates the alarm status, where:
-
Green = Cleared alarms
-
Purple = Indeterminate events
Note Indeterminate events are transient events that do not have a severity indicated by the source NE. Indeterminate events do not have a cleared condition.
|
Service Affecting
|
Whether the alarm or event is service affecting. Values are:
-
Yes if the alarm is service affecting
-
No if the alarm is not service affecting
-
N/A if no information is provided by the NE
|
Time Stamp (
time zone
)
|
Date and time when the alarm or event occurred on the Prime Optical server.
|
Clear Time (
time zone
)
|
Date and time when the alarm was cleared on the Prime Optical server.
|
Duration
|
Amount of time required to clear an alarm (Prime Optical clear time – Prime Optical time) in
dddd:hh:mm:ss
format.
|
NE Time Stamp (
time zone
)
|
Date and time when the alarm or event occurred on the NE.
|
NE Clear Time (
time zone
)
|
Date and time when the alarm or event was cleared on the NE.
|
Description
|
Brief description of the selected alarm or event. If no description is entered, this field is blank.
|
Acknowledged Username
|
Login name of the user who acknowledged the alarm or event.
Note If the alarm acknowledgement is set to Automatic and you can manually acknowledge an alarm, the Acknowledged Username is not overwritten when the alarm clears.
|
Acknowledged Time
|
Date and time when the alarm or event was acknowledged.
Note If the alarm acknowledgement is set to Automatic and you can manually acknowledge an alarm, the Acknowledged Time is not overwritten when the alarm clears.
|
Note
|
Any notes that were entered for the selected alarm or event. This field also shows the login name of the user who entered the note and the time stamp when the note was entered.
|
Source ID
|
Name of the NE or EMS where the selected alarm or event occurred.
|
TL1 Direction
|
TL1 direction for RTRV-ALM-ALL and RTRV-COND-ALL TL1 commands and REPT^ALM/COND autonomous messages. Values are Receive or Transmit.
This field is blank for non-TL1 alarms.
|
TL1 Location
|
TL1 location for RTRV-ALM-ALL and RTRV-COND-ALL TL1 commands and REPT^ALM/COND autonomous messages. Values are Near End or Far End.
This field is blank for non-TL1 alarms.
|
Filtering Data in Alarm Log
To filter the records in the alarm log, do the following:
Step 1 In the
Domain Explorer
,
Subnetwork Explorer
, or
Network Map
window, select the NE and choose Fault > Alarm Log.
Step 2 Click the Show drop-down list in the
Alarm Browser
window. It displays the various filtering options available in the list and by default its Active. You can do one of the following:
Table 9-9 Alarm Browser Filters
|
|
Past 6 hours
|
Displays the last 6 hours.
|
Past 6 hours alarms
|
Displays the last 6 hours alarms only.
|
All
|
Displays all records.
|
Simple Filter
|
Displays all records that contain the text you entered.
|
Custom View
|
Creates a custom view with selected criterion.
|
Manage Custom Views
|
Edits or deletes a custom view.
Note You can only edit or delete a custom view you created.
|
-
Choose Past 6 hours or All from the drop-down list. The Alarms is displayed regardless of any custom view configuration.
Note The number of records that are displayed on each page can be configured in the Alarm Log Settings window. For more information on Alarm Log Settings, see Configuring the Alarm Log Settings.
Performing a Simple Filter
To perform simple filter, do the following:
1. Choose Simple Filter from the drop-down list.
2. Enter the search text in the Enter Search Text text box to filter the report.
3. Click Apply or press Enter.
The
Alarm Browser
is displayed with the filtered data.
Note The Simple Filter looks out for the search text in all the columns and displays all the records in the window. It does not restrict the filtered data in a single column.
Note To only search text within the records of the current page, check the Quick Filter check box from the Alarm Log toolbar and enter the search criteria. Quick Filter filters only the current page records based on the search text.
Creating a Custom View
To create a custom view, do the following:
Step 1 Choose the Custom View from the drop-down list.
Step 2 Set the match rules as needed for a custom view. See
Table 9-10
for the field descriptions.
1. Click the All link and select Any from the pull-down list to match any one condition in the custom view configuration. Or click the Any link and select All from the pull-down list to match all the conditions in the custom view configuration.
2. Click the no order link and select the column name from the pull-down list to order the custom view. After selecting the column name, you can sort the data in ascending or descending order by clicking on the Ascending and Descending.
3. Click the Showing Columns link. A window is displayed with Available and Visible columns. See
Table 9-7
for the field descriptions.
a. Make the necessary changes as required.
b. Click Done.
Table 9-10 Match Rules
|
|
All/Any
|
Matches the conditions in the configuration to filter and display the data. Options are:
-
All—Matches all the conditions.
-
Any—Matches any one of the conditions.
|
Order Rule
|
Enables you to order the filtered data. The default value displayed is No Order. Click No Order link to view the order rule values in ascending and descending order.
|
Showing Columns
|
Displays the column names. Options are:
-
Available—Displays all the column names that the Circuit Report contains. You can move the column name from left to right and vice versa using the navigational buttons.
Note Double-click the column name to move the column name from Available text box to Visible text box and vice versa.
-
Visible—Displays the column names that you want to display in the customized configuration view.
|
4. Choose the column name from the drop-down list.
5. Choose the filtering condition from the drop-down list.
6. Enter the search text in the text box to filter the records.
7. Click the Browse button to select the options. The pull-down menu is displayed.
– Check the check boxes of your choices from the list. The selected options are listed under the Selected items text box.
– Click Done.
Note The Browse button is displayed only for the Circuit Size, Discovery State, Service State, Direction, Protection, and Wavelength column names.
8. If necessary, add or delete filter criteria by clicking the + or - icon.
Step 3 Click Apply. See Action Buttons for more information.
If the report has more than one page, the Previous Page and Next Page arrows at the top-right corner of the
Alarm Browser
window are enabled.
If you want to move to a specific page, you can enter the page number in the Page text box and press Enter.
Saving an Alarm Log Custom View
To save a custom view, do the following:
Step 1 If you need to save the custom view for later use, click Save. The
Save a Custom View
dialog box is displayed.
Step 2 Enter the custom view name in the Name text box.
Step 3 Choose Visibility from the drop-down list. The custom views are stored in the following two folders:
-
Public—Contains the customized view reports that the SuperUser created. It also has the custom views that the other users created with read/write privileges. You can make a copy of the other users’ custom views using the Save As button.
-
Private—Contains the customized view reports that you created.
Note Custom view name is unique in Public and Private folders. But you can create a custom view name that the SuperUser has created.
Step 4 Click Save.
Editing or Removing a Custom View Configuration
To edit or remove a custom view configuration, do the following:
Step 1 Choose Manage Custom View from the drop-down list. The
Manage Custom Views
dialog box is displayed.
Step 2 Choose Select a Custom View from the drop-down list and do one of the following:
-
Click Edit and modify the Name and Visibility as required. Click Save.
-
Click Remove. Click OK to confirm that you want to delete the custom view. The selected custom view is deleted from the Manage Custom View list.
Note Users who have read/write privileges for public filter management operations can edit or remove public custom views. However, private custom views can only be managed by the user who created them.
Copying a Public Custom View
To copy a public custom view, do the following:
Step 1 Select the custom view from the public or private folder.
Step 2 Click Save As. The
Save a Custom View
dialog box is displayed.
Step 3 Enter the custom view name in the Name text box.
Step 4 Choose Visibility from the drop-down list.
Step 5 Click Save. The custom view is saved in a different name.
Note You can make a copy of an existing custom view using the Save As button when you do not have the public privileges.
In the
Alarm Log
window, if the Auto-Refresh check box is checked, the window contents are updated according to the selected view (custom or built-in), with the frequency set in the
Settings
dialog box. When the Auto-Refresh check box is not checked, a notification bar appears at the top of the
Alarm Browser
window stating that the reported data has changed. You can click the Refresh tool to refresh the report.
Configuring the Alarm Log Settings
To configure the
Alarm Browser
settings, do the following:
Step 1 Click the Alarm Log Settings icon in the top-right corner of the window. The
Settings
dialog box is displayed.
Step 2 Make the necessary settings as required. See
Table 9-11
for the field descriptions.
Step 3 Click OK.
Note You must check the Auto-Refresh check box to refresh the window.
Table 9-11 Alarm Log Settings Dialog Box
|
|
Default Views
|
Displays the built-in view or custom view by default. You can select either the built-in view or custom view, as a default view.
|
Show Text for Notes
|
Displays the message of the Note column instead of the icon.
|
Show PS Icons
|
Displays the icons along with the state.
|
PS Coloring
|
Displays different colors for different states. You can select the coloring to be for the Cell, Entire Row, or No Color.
|
Refresh period in minutes
|
Select the time interval (in minutes) that the data is automatically refreshed. You can select to have the data automatically refreshed every 1, 3, 5, or 10 seconds. The default is 1 minute.
Note You must check the Auto-refresh check box to refresh the window.
The status bar at the bottom of the
Alarm Browser
window displays:
-
Current page number
-
Total number of pages in the report
-
Number of records displayed
-
Number of records selected
-
Total number of records in the report
If there is any change or edit in the alarm details, it will automatically update the changes in the next refresh.
|
Records per Page
|
Displays the number of records shown in a single page. The range is from 100 to 500. The default is 100.
|
Exporting All Data in the Alarm Log or Alarm Browser
You can export the entire contents of the
Alarm Browser
or
Alarm Log
to a text file. You can export all of the data in the
Alarm Browser
or
Alarm Log
, as long as the window is not in automatic refresh mode. It might take longer to open the Alarm Browser or Alarm Log with the export entire table feature enabled.
The entire-table export writes the data to a user-specified text file and retains the user-selected table customizations. For example, if you customized the table to make a column invisible, that column does not appear in the exported file.
Step 1 From Alarm browser or Alarm Log windows, select Export to CSV icon.
The
Export to CSV
dialog appears.
Step 2 Enter the following in the Export to CSV dialog box:
-
Separator Character—Choose the Separator Character from the drop-down list. Options are comma, tab, and other.
-
Data to Export—Select Entire table (only if Auto Refresh is disabled) radio button.
-
Export File—specify a location for the exported file. Click Browse to change the file location.
Note This option is disabled if the window is in Auto Refresh mode.
Step 3 Click
OK
. A progress bar tracks the export progress.
Using the Data Exporter Wizard
This section describes how to use the Cisco Prime Optical 10.7
Data Exporter
wizard to export pruned PM and Alarm data from CPO in binary format. With the help of
Data Exporter
wizard, the binary data exported, can be converted into human readable format.
This sections consists the following topics:
Enabling or Disabling the Historical Export of ALARM and PM Data
Exporting the data for Alarm and PM can be enabled or disabled and you can also check the status for the same whether the export feature is enabled or disabled.
To enable or disable the historical export, follow these steps:
For Alarm:
Step 1 Go to /opt/CiscoTransportManagerServer/bin/ as root user:
cd /opt/CiscoTransportManagerServer/bin/
Step 2 Execute the following command to enable the historical alarm export
:
/alarm_historical_export.sh -enable
Step 3 Execute the following command to disable the historical alarm export:
/alarm_historical_export.sh -disable
Step 4 Execute the following command to view the status of the alarm backup whether the feature is enabled or disabled:
alarm_historical_export.sh -status
For PM:
Step 1 Go to /opt/CiscoTransportManagerServer/bin/ as root user.
cd /opt/CiscoTransportManagerServer/bin/
Step 2 Execute the following command to enable the historical alarm export
:
/pm_historical_export.sh -enable
Step 3 Execute the following command to disable the historical alarm export:
/pm_historical_export.sh -disable
Step 4 Execute the following command to view the status of the PM backup whether the feature is enabled or disabled:
/pm_historical_export.sh -status
Note
-
Displays the status of the feature whether it is enabled or disabled for the PM data export.
-
Different argument can be passed with the script name as per the requirement.
-
Status of Alarm Historical Export and PM historical export feature is also displayed in the Control Panel under Database Properties.
Installing the Data Exporter Wizard
As a root user, do the following:
Step 1 Copy the CPO tarball in
/ctm_backup
directory.
Step 2 Untar the CPO tarball (PRIME_OPTICAL_10.7.0.0_XXX.tar) in
/ctm_backup
.
Step 3 Navigate to the DataExporter directory and copy the Data Exporter tar file to a local folder.
Step 4 Enter the following commands to extract the .tar archive contents:
cd local-folder/DataExporter tar -xvf DataExporter.tar
Step 5 Enter the following commands to run the installer:
Step 6 At the
Introduction
screen, click
Next
.
Step 7 At the
Choose Installation Folder
screen, specify where you want to install the
Data Exporter
wizard. The default folder is $HOME/DataExporter. You can click
Choose
to choose a different destination. After you specify your destination, click
Next
.
Step 8 The
Pre-installation Summary
screen shows the items that will be installed and the disk space required. Click
Install
.
Step 9 The
Installing Data Exporter
screen tracks the progress of the installation.
Step 10 The Installation Complete screen summarizes the results of the installation.Click
Done
.
After installation, the directory structure contains a folder with the DataExporter executable script.
Using the Data Exporter Wizard to Export the Historical Alarm Data
The
Data Exporter
GUI can be used to export the data for the Alarm corresponding to the date. With the selection of the date, respective Alarm data can be export.
To export the alarm data, follow these steps:
Step 1 Navigate to the installation folder (for example, /tmp/DataExporter/bin) and run the DataExporter.sh executable.s
Step 2 The Data Exporter wizard opens. Do the following-
a. Select ALARM from the
Export Mode
drop-down list, to export the data from the database and then click
OK
.
b. In the Alarm Export Wizard, select the date for which you want to export the alarm data, then click
Export
.
Step 3 In the Alarm Export screen, alarm data will be displayed in human readable format in a tabular format after conversion.
Step 4 Click
Exit
.
Using the Data Exporter Wizard to Export the Historical PM Data
Step 1 Navigate to the installation folder (for example, /tmp/DataExporter/bin) and run the DataExporter.sh executable.
Step 2 The Data Exporter wizard opens, select the PM from the Export Mode drop-down list, to export the data from the database and then click
OK
.
Step 3 In the PM Export Wizard, select the PM category and then select the corresponding date for which you want to export the PM data, then choose
Export
.
Step 4 In the PM Export screen PM Data will be displayed in human readable format in tabular format after conversion.
Step 5 Click
Exit
.
HTML Listing for Viewing the Alarm and PM Exported Human Readable Data
Step 1 Data Exporter exports exported Binary Format Data for Alarm and PM into human Readable format. HTML files are also created when you export data from Data Exporter which can be viewed using HTTP Directory Listing.
Step 1 Open the Internet browser (either Internet Explorer or Firefox).
Step 2 Type the html link as -
For Alarm
https://server-name/alarm
For example,
https://blr-nmtg-cpo17/alarm
For PM:
https://server-name/pm
For example,
https://blr-nmtg-cpo17/pm
You can now fetch the alarm and PM data easily from the browser.
Note HTTP listing for Alarm works only when Alarm Historical Export is enabled for alarm and PM Historical Export is enabled for PM.
Deleting Exported Alarm and PM Backup Data
For deleting Alarm Export Backup Data, follow these steps:
Step 1 As a root user, execute the following command:
cd /opt/CiscoTransportManagerServer/bin/
Step 2 Execute the following commands:
/prune_historical_alarm_data.sh pruneDate(yyyy-mm-dd)
For example,./prune_historical_alarm_data.sh 2015-07-17
All the exported Alarms data prior to 2015-07-17 will be deleted.
Step 3 For deleting the PM Export Backup Data:
a. As root user execute the following command:
cd /opt/CiscoTransportManagerServer/bin/
b. Execute the following commands:
/prune_historical_pm_data.sh pruneDate(yyyy-mm-dd)
For example,./prune_historical_pm_data.sh 2015-07-17
All the exported PM data prior to 2015-07-17 will be deleted.
Uninstalling the Data Exporter Wizard
To uninstall the
Data Exporter
wizard, delete the folder where you installed the wizard. The default folder is $HOME/DataExporter.
Is the Service Working?
Network devices report symptoms of problems by generating events. An event in this context is a message indicating that a device or application in your network has discovered something of note. The network devices generate many types of events automatically. In addition, you can use thresholds to define or modify the conditions under which events are generated. A
threshold
is a trigger, set up on a continuous data stream, that is a point of interest that generates events when that point is satisfied.
The events generated need to be analyzed to determine whether they represent a fault condition or a problem in your network.
It is important to generate events when there is a problem. It is also important to limit the number of events generated to prevent an excessive load on the network. Prime Optical performs a number of self-monitoring tasks where threshold limits can be set. The threshold limits are set in the Self Monitor table. (See Using the Self Monitor Table.) If a threshold is crossed, an EMS alarm is generated.
You can obtain information regarding how the system is performing and how long certain tasks are taking to complete by selecting
Administration > Control Panel
, then
Alarm Configuration > Threshold EMS Alarms
or
Alarm Configuration > Nonthreshold EMS Alarms
. (See Setting Up and Viewing Alarm Configuration Parameters.) By monitoring this data, you can identify potential system problems before they become critical in the operation of the EMS. Associated with each parameter that is monitored are three alarm thresholds. The administrator can set a minor, major, and critical threshold value for each parameter. If any of these thresholds are crossed, then an alarm will be raised to provide notification of the situation.
Threshold alarms are raised when their limit exceeds the value set for critical, major, minor, or warning thresholds. For example, you can set threshold alarms for disk usage for 90%, 80%, 70%, and 60%, meaning a warning alarm is raised when the disk becomes 61% full and a critical alarm is raised when the disk becomes 91% full. The server checks these parameters at every polling interval that is set in the
Poll Frequency
field.
Nonthreshold alarms do not have an alarm threshold. Instead, nonthreshold alarms occur when a condition occurs, such as loss of connectivity to an NE. Use the Nonthreshold EMS Alarms tab to set the severity level (critical, major, minor, or warning) for which a nonthreshold alarm should be raised when that condition occurs.
Caution Changing the EMS alarm severities can affect the alarm status seen by listeners on the EMS’s OSS interfaces.
The following sections provide information on NEs:
These tasks allow you to manage the alarm profiles features:
This task allows you to mark a service as critical for process monitoring purposes:
Locating Alarms
The
Alarm Browser
has a specific selection context, which means that it displays alarm information that corresponds to the view where it was launched. If you launch the
Alarm Browser
from the management domain node, the browser shows all NE alarms and all EMS alarms (if you have permission to see EMS alarms). If you launch the
Alarm Browser
from a group or NE node, the browser shows only NE alarms for that group or NE node. If you launch the
Alarm Browser
from the Dashboard, the browser shows all NE alarms for the domain.
You can locate the equipment for an existing alarm from the
Alarm Browser
.
Step 1 In the
Domain Explorer
, choose
Fault > Alarm Browser
(or click the
Open Alarm Browser
tool).
Step 2 In the
Alarm Browser
, click an alarm condition and choose
Fault > NE Explorer.
The NE Explorer opens and displays the property sheet of the alarmed equipment.
Note Refer to the appropriate NE documentation for a list of alarms supported on each NE. See Related Cisco NE Documentation.
Viewing Affected Circuits
You can view the circuits affected by a given alarm.
Step 1 In the
Domain Explorer
, choose
Fault > Alarm Browser
(or click the
Open Alarm Browser
tool).
Step 2 Select the alarm for which to view affected circuits, and choose Fault > Affected Circuits.
The Circuit Table appears, displaying all the circuits affected by the selected alarm.
Setting Up and Viewing Alarm Configuration Parameters
Use the
Alarm Configuration
pane to configure and view alarm severities for system parameters.
Caution Changing the EMS alarm severities can affect the alarm status seen by users on the EMS’s OSS interfaces.
Complete the following steps to set up and view alarm configuration parameters:
Step 1 In the
Domain Explorer
window, choose
Administration
>
Control Panel
.
Step 2 Click
Alarm Configuration
to open the
Alarm Configuration
pane.
Table 9-13
provides descriptions.
Step 3 In the Nonthreshold EMS Alarms tab, you can select the severity level that will be assigned to the nonthreshold alarm parameter.
Note Nonthreshold alarms do not have an alarm threshold. These types of alarms occur when an error condition occurs, such as loss of connectivity to an NE. Use the Nonthreshold EMS Alarms tab to set the severity level for which a nonthreshold alarm should be raised when that condition occurs.
Step 4 After making your selections, click
Save
.
Note • If an alarm is outstanding when you disable it, the system clears the alarm.
-
If an alarm has been manually cleared in the
Alarm Browser
and a clear alarm is sent, the request will still be processed but it will not have any impact on the alarm.
-
To recover from an alarm condition, see Troubleshooting for information.
-
All alarms on an NE are cleared when the NE is marked as Out of Service.
Table 9-13 Field Descriptions for the Alarm Configuration Pane
|
|
|
Poll Frequency
|
Threshold alarms are raised when their limit exceeds the value set for critical, major, minor, or warning thresholds. For example, you can set threshold alarms for disk usage for 90%, 80%, 70%, and 60%, meaning a warning alarm is raised when the disk becomes 61% full and a critical alarm is raised when the disk becomes 91% full. The server checks these parameters at every polling interval that is set in the
Poll Frequency
field. The Poll Frequency value affects only the following parameters:
-
CPU Usage
-
Memory Usage RAM
-
Memory Usage SWAP
-
Disk Usage
-
Database Tablespace Usage
Note Major and critical alarms are introduced for Database Tablespace Usage. You can set threshold alarms as 95%, and 70%, meaning a critical alarm is raised when the database becomes 96% full and a major alarm is raised when the database becomes 71% full.
|
Parameter Name
|
-
Base Circuit Creation Time (seconds)—Time it takes to create a base circuit.
-
CPU Usage (%)—Percentage of CPU time used for executing user, system, and I/O tasks.
-
Circuit Creation Time Per Hop (seconds)—Time it takes for Prime Optical to create an end-to-end circuit.
-
Config Resynch Time (seconds)—Time it takes for Prime Optical to collect alarm and inventory information from the NE.
-
Disk Usage (%)—Percentage of disk space used in a particular partition. Prime Optical database and partitions are monitored separately.
-
Memory Usage RAM (%)—Percentage of RAM memory used for all system processes.
-
Memory Usage SWAP (%)—Percentage of SWAP memory used for all system processes.
-
Database Tablespace Usage (%)—Percentage of database totally used. Each Prime Optical database tablespace is monitored separately.
-
NE Synch Time (seconds)—Time it takes to synchronize the Prime Optical server with the NEs.
-
Prune Time 15 min PM (seconds)—Time it takes to prune 15-minute PM data.
-
Prune Time 1 day PM (seconds)—Time it takes to prune 1-day PM data.
-
Prune Time Audit Log (seconds)—Time it takes to prune Audit Log data.
-
Prune Time Audit Trail Log (seconds)—Time it takes to prune Audit Trail Log data.
-
Prune Time Error Log (seconds)—Time it takes to prune Error Log data.
-
Prune Time FM (seconds)—Time it takes to prune FM data.
-
Prune Time Job Monitor (seconds)—Time it takes to prune job monitor data.
-
Prune Time Purge NE (seconds)—Time it takes to prune NE purge data.
-
Prune Time Server Monitor (seconds)—Time it takes to prune server monitor data.
|
Enable
|
Whether or not the corresponding parameter in the Parameter Name column is enabled (checked) or disabled (unchecked). When checked, it enables monitoring for the selected parameter. If an EMS threshold alarm is outstanding when you disable monitoring, Prime Optical clears the alarm.
|
Critical
|
Threshold that triggers a critical alarm.
|
Major
|
Threshold that triggers a major alarm.
|
Minor
|
Threshold that triggers a minor alarm.
|
Nonthreshold EMS Alarms Tab
|
Parameter Name
|
-
A critical process is hanging; server will be shut down in 5 minutes.
-
A process is hanging or terminated.
-
Alarm resync unsuccessful—The alarm resynchronization could not be completed on the node.
-
Communication through secondary IP address.
-
Config resync unsuccessful—Prime Optical could not synchronize with the node.
-
Failed authentication by NE—This is a major alarm. An incorrect username or password was provided for login. This alarm applies to CTC-based NEs and is cleared when you provide the correct username or password and mark the NE as Out of Service, then as In Service.
-
Loss of communication—This is a critical alarm. Prime Optical cannot communicate with the node, possibly because the node was disconnected from the network. This alarm applies to all NEs and is cleared when Prime Optical regains connectivity to the NE.
-
Maximum login attempts exceeded—Prime Optical raises this alarm when you try to connect to the Prime Optical server several times with the wrong username and password.
-
Memory auto or manual backup failure—This is a minor alarm. Memory backup on the node failed. This alarm applies to CTC-based NEs and is cleared when a subsequent memory backup succeeds.
-
NE out of Sync—Prime Optical raises this EMS alarm when the health poll of an NE fails because the server is no longer registered on the node to receive event notifications. This alarm is cleared once the initial poll is executed successfully.
-
PM fail EMS alarm—This is a warning alarm. Prime Optical cannot retrieve performance statistics from the node even though robust PM data collection is enabled and the node has PM buckets that were not retrieved. This alarm applies to CTC-based NEs and is cleared when a subsequent PM collection cycle succeeds. If PM collection is unsuccessful after subsequent retries, the FAIL alarm is cleared and the PM lost EMS alarm is generated.
-
PM lost EMS alarm—This is a major alarm. Prime Optical cannot retrieve performance statistics from the node when robust PM data collection is not enabled or when robust PM data collection is enabled but the node has overwritten the PM buckets that were not retrieved. This alarm applies to CTC-based NEs and is cleared when the user clears it manually from the
Alarm Browser
.
-
PoS port shut down; L2 topology in wrapped state—This alarm is generated when one or more PoS ports related to an L2 topology are shut down. This alarm is cleared when all the PoS ports related to the topology are enabled.
-
Template manager event.
-
Unable to change database password—This alarm is generated after a failed attempt to change the database password in the
Control Panel
>
Database Properties
pane.
|
Enable
|
Whether or not the corresponding parameter in the Parameter Name column is enabled (checked) or disabled (unchecked). When checked, it enables monitoring for the selected parameter. If an EMS nonthreshold alarm is outstanding when you disable monitoring, Prime Optical clears the alarm.
|
Severity
|
Click the appropriate cell and select the alarm severity level from the available options (Critical, Major, Minor, or Warning) for each of the parameters listed in the Parameter Name column.
Note If an EMS alarm is outstanding when you change its severity level, the outstanding alarm’s severity level remains the same and the new severity level takes effect the next time the alarm is raised.
|
Creating Alarm Profiles—CTC-Based NEs
Use the
Create Alarm Profile
dialog box to create new alarm profiles for CTC-based NEs.
Step 1 In the
Domain Explorer
tree, select a CTC-based NE and choose
Configuration > NE Explorer
.
Step 2 In the node properties sheet, click the
Alarm
tab.
Step 3 In the
Profile
tab, click the
Create
button. The
Create Alarm Profile
dialog box opens. The following table provides descriptions.
Step 4 After making your selections, click
OK
.
Table 9-14 Field Descriptions for the Create Alarm Profile Dialog Box
|
|
Enter the Profile Name
|
Enter the name of the new alarm profile.
|
Condition
|
Condition of the alarm.
|
Severity
|
Select a severity for the new alarm from the list. Alarm severities include:
-
Not Reported (NR)—A raise or clear of the condition is not sent to clients, but is tracked on the NE. You can retrieve a complete list of all raised conditions, including Not Reported as well as Not Alarmed, Critical, Major, and Minor, by using the RTRV COND TL1 command, or its equivalent.
-
Not Alarmed (NA)—A raise or clear of the condition is sent to clients as a nonalarmed TL1 message (REPT EVT). The message has no severity and no service affecting flag.
-
Minor (MN)—The alarm is a minor alarm.
-
Major (MJ)—The alarm is a major alarm.
-
Critical (CR)—The alarm is a critical, traffic-affecting alarm.
Note For critical, major, and minor alarms, a raise or clear of the condition is sent to clients as an alarmed message (REPT ALM). This message includes a service affecting flag, which is On or Off. If a normally service affecting condition is raised in a nonservice affecting situation (for example, the nontraffic-bearing side of a protect pair), the condition is sent as minor even if the profile says major or critical.
-
UNSET—The value of this alarm corresponds to the value of the default alarm profile on the node. UNSET is useful when transferring alarm profiles between different versions of software.
-
Inherited—The alarm behaves according to its parent object:
– If you set an alarm as Inherited on a port, it uses the card profile.
– If you set an alarm as Inherited on a card, it uses the node profile.
– If you sent an alarm as Inherited on a node, it uses the default profile.
|
Applying Alarm Profiles—CTC-Based NEs
The alarm profiles feature allows you to change default alarm severities by creating unique alarm profiles for individual CTC-based NEs. A profile can be applied to any node on the network. Alarm profiles must be stored on a node before they can be applied to a node, card, or port.
The two reserved profiles include the Default profile, which sets severities to standard Telcordia GR-253 settings, and the Inherited profile, which sets all alarm severities to inherited. If an alarm has an Inherited profile, it inherits (copies) its severity from the same alarm at the next level. For example, a card with an Inherited alarm profile copies the severities used by the node that contains the card. The Inherited profile is not available at the node level.
In the card view, the Alarm Behavior tab displays the alarm profiles of the selected card. In the node view, the Alarm Behavior tab displays the alarm profiles for the node. Alarms form a hierarchy. A node-level alarm profile applies to all cards in the node, except those that have their own profiles. A card-level alarm profile applies to all ports on the card, except those that have their own profiles.
At the node level, apply profile changes on a card-by-card basis or set a profile for the entire node. At the card level, apply profile changes on a port-by-port basis or set the profiles for all ports on that card simultaneously.
Step 1 In the
Domain Explorer
window, click a CTC-based NE and choose
Configuration
>
NE Explorer
.
Step 2 In the node properties sheet, click the
Alarm
tab >
Alarm Behavior
tab. In the card properties sheet, click the
Alarm Behavior
tab.
Step 3 Click
Update
to view the latest Alarm Profile list.
Step 4 To apply an alarm profile at the card view, click the appropriate row in the Alarm Profile column for the port desired. To apply an alarm at the node view, click the appropriate row in the Profile column for the card desired.
Step 5 Choose the appropriate alarm profile from the drop-down list.
Step 6 Repeat these steps for each port that is being assigned a profile.
Step 7 Click
Apply
.
Note • In the Alarm Behavior tab > Alarm Profile drop-down list, you can choose any profile and click Force to all ports to apply this profile to all ports. But when the profile is saved, the Alarm Profile value returns to Inherited. This is expected behavior, because the drop-down list does not represent a value on the NE. After setting the alarm profile value on the ports, the Alarm Profile field returns to the first chosen value in the drop-down list.
-
The alarm profile is not applied for ONS 15600 SONET or ONS 15600 SDH NEs if the profile was edited outside of the
Alarm Profiles Management
wizard.
Managing Alarm Profiles—CTC-Based NEs
Use the
Alarm Profiles Management
wizard to download an alarm profile from either an NE or from a local file.
Note This feature is available for CTC-based NEs with software release 3.4 or later.
Step 1 In the
Domain Explorer
window, choose
Configuration > CTC-Based SONET NEs
or
CTC-Based SDH NEs > Alarm Profiles Management
. The
Alarm Profiles Management wizard
opens. The following table provides descriptions.
Step 2 Select an available profile from the NE by clicking the
From NE
radio button or from a file by clicking the
From File
radio button.
Step 3 Complete one of the following options:
-
If you clicked the
From NE
radio button, select the NE and alarm profile from the lists.
-
If you clicked the
From File
radio button, specify the file from a local drive by clicking the
Local
radio button, or from a server by clicking the
Server
radio button.
Step 4 Click
Next
.
Step 5 Edit the alarm severity for each alarm condition by clicking a row in the Alarm Severity column.
Step 6 Click
Next
.
Step 7 Enter the profile name and save the new alarm profile to the NE by clicking the
Save to NE(s)
radio button, or to a file by clicking the
Save to File
radio button.
Step 8 Complete one of the following options:
-
If you clicked Save to NE(s), select the NE(s) on which to apply the new alarm profile. Check the
Apply to Selected NE(s)
check box if you want to set the alarm profile as the current profile.
Note If you clicked the From File radio button in Step 2, the Available NE(s) list includes all the NEs that Prime Optical currently manages.
-
If you clicked Save to File, you can either save the file locally by clicking the
Local
radio button and specifying the directory path, or save it to a server by clicking the
Server
radio button and specifying the server name.
Step 9 Click
Finish
.
Prime Optical schedules a job for this action. The alarm profile is downloaded to each selected NE and set, if so selected. This is tracked as a separate task in the Job Monitor table.
Table 9-15 Field Descriptions for the Alarm Profiles Management Wizard
|
|
|
From NE
|
Choose
From NE
if the alarm profile is on an NE. If you select From NE, the From File options are not accessible.
|
Select NE
|
Select the NE where the alarm profile exists.
|
Select Profile
|
Select an alarm profile from the list.
|
From File
|
Choose
From File
if the alarm profile file is on your PC or a server. If you select From File, the From NE options are not accessible.
|
Local
|
Choose
Local
if the alarm profile file is on your PC. Enter the path for the file, or click
Browse
to search for it.
|
Server
|
Choose
Server
if the alarm profile file is located on a server. Use the drop-down list to choose a server.
|
|
Alarm Condition
|
List of alarm conditions for the selected alarm profile.
|
Alarm Severity
|
Click the field to select a new alarm severity for the alarm condition. Severities are:
-
Not Reported (NR)—A raise or clear of the condition is not sent to clients, but is tracked on the NE. You can retrieve a complete list of all raised conditions, including Not Reported as well as Not Alarmed, Critical, Major, and Minor, by using the RTRV COND TL1 command, or its equivalent.
-
Not Alarmed (NA)—A raise or clear of the condition is sent to clients as a nonalarmed TL1 message (REPT EVT). The message has no severity and no service affecting flag.
-
Minor (MN)—The alarm is a minor alarm.
-
Major (MJ)—The alarm is a major alarm.
-
Critical (CR)—The alarm is a critical, traffic-affecting alarm.
Note For critical, major, and minor alarms, a raise or clear of the condition is sent to clients as an alarmed message (REPT ALM). This message includes a service affecting flag, which is On or Off. If a normally service affecting condition is raised in a nonservice affecting situation (for example, the nontraffic-bearing side of a protect pair), the condition is sent as minor even if the profile says major or critical.
-
Unset—The value of this alarm corresponds to the value of the default alarm profile on the node. Unset is useful when transferring alarm profiles between different versions of software.
-
Inherited—The alarm behaves according to its parent object:
– If you set an alarm as Inherited on a port, it uses the card profile.
– If you set an alarm as Inherited on a card, it uses the node profile.
– If you sent an alarm as Inherited on a node, it uses the default profile.
|
|
Profile Name
|
Name of the selected alarm profile.
|
Save to NE(s)
|
To save the alarm profile to one or more NEs, choose
Save to NE(s)
. If you choose Save to NE(s), the Save to File options are not accessible.
|
Available NE(s)
|
Select one or more NEs in the Available NE(s) list and click
Add
to move them to the Selected NE(s) list. The contents of the Available NE(s) list depends on the following conditions:
-
If you selected a profile from a file, the Available NE(s) list includes all the NEs that Prime Optical currently manages.
|
Selected NE(s)
|
Select one or more NEs in the Selected NE(s) list and click
Remove
to move them to the Available NE(s) list.
|
Apply to Selected NE(s)
|
When checked, applies the alarm profile as the node-level alarm profile.
|
Overwrite the Profile
|
If a profile of the same name already exists, check this check box to overwrite the profile with the new profile.
|
Save to File
|
To save the defaults to a file on your PC or a server, choose
Save to File
. If you choose Save to File, the Save to NE(s) options are not accessible.
|
Local
|
Choose
Local
to save the file on your PC. Enter the path for the file, or click
Browse
to search for it.
|
Server
|
Choose
Server
to save the file on a server. Enter a server path in the field.
|
Managing Custom Alarm Types—CTC-Based NEs
You can add up to 50 custom environmental alarms on the following nodes and cards:
-
AIC and AIC-I cards on ONS 15454 SONET and ONS 15454 SDH NEs
-
CTX-CL600 cards on ONS 15310 CL NEs
-
ONS 15600 SONET NEs
-
ONS 15600 SDH NEs
-
ONS 15310 MA SONET NEs
-
ONS 15310 MA SDH NEs
-
CRS-1/3 NEs
Adding Alarm Types
Custom environmental alarms are reported in the Condition column in the
Alarm Log
and
Alarm Browser
windows.
Step 1 In the
Domain Explorer
window, click one of the CTC-based NEs in the preceding list and choose
Configuration
>
NE Explorer
.
Step 2 Do one of the following:
-
In the node properties sheet, click the
Alarm Extenders
tab >
User-Defined Alarms
tab.
-
In the AIC, AIC-I, or CTX-CL600 card properties sheet, click the
Alarm Extenders
tab >
User-Defined Alarms
tab.
Step 3 In the
Alarm Types
area, click
Add
. The
Add Alarm Type
dialog box opens.
Step 4 In the
New Alarm Type
field, enter a unique alarm type name that contains 20 characters or fewer. Only the following characters are valid: 0-9, A-Z, a-z, and hyphen (-).
Step 5 Click
OK
. The new custom alarm appears in the
Alarm Types
area.
Step 6 To delete a custom alarm type, select the alarm in the
Alarm Types
area and click
Delete
. Click
OK
in the confirmation dialog box.
Using the Recovery Properties Pane
You can use the
Recovery Properties
pane in the
Control Panel
window to mark a service as critical for process monitoring purposes. If a critical process stops running or fails to poll monitoring services for a long time, the server shuts down and the client generates an alarm.
You can also use the
Recovery Properties
pane to list the servers that clients will log in to if access to the primary server is disrupted.
Step 1 In the
Domain Explorer
window, choose
Administration
>
Control Panel
.
Step 2 Click
Recovery Properties
to open the
Recovery Properties
pane. The following table provides descriptions.
Step 3 Complete the following substeps to set a process as critical:
a. Click the Process Monitoring tab.
b. Check the Critical check box beside each service to indicate that the service is critical.
c. Click
Save
.
Table 9-16 Field Descriptions for the Recovery Properties Pane
|
|
|
Service Name
|
Displays the process monitoring service name.
|
Critical
|
If checked, the selected service is designated as critical for process monitoring.
Note CORBA ImR, Oracle Service, and Service Manager are permanently critical. You cannot uncheck the Critical check boxes for these services.
The Prime Optical server may take up to 30 minutes to shut down when a critical process stops running or does not respond to poll monitoring.
|
Where Is the Fault?
You need to be able to quickly troubleshoot problems in the network, identify when network capacity is being reached, and provide information to management on the number and types of devices in use. If the network goes down, one of the first things you will need to know is what devices are running on the network. You will want to know the names, addresses, and interfaces associated with each device in order to begin troubleshooting the problem. The more information you have in one central place about all of the devices, the easier it is to locate the necessary information, resolve problems quickly, and provide detailed information to interested parties.
Sources of Information
Fault management receives and processes information from the following sources:
-
Autonomous reports of failures from NEs
-
Trouble reports from customers and peer systems
-
Results of diagnostics, exercises, and audits from NEs
-
Impairment indications from performance management
-
Network configuration data from configuration management
Prime Optical constantly updates the alarm status of the network based on the alarm and event notifications sent by the monitored NEs and generated by the EMS itself. It performs alarm synchronization with the NE each time the connection to the NE is established or re-established and the NE is in service.
Identifying and Monitoring Alarms
To identify and monitor alarms on groups of NEs:
Step 1 In the
Domain Explorer
tree, select the management domain node or a group node. If it shows a critical, major, minor, or warning alarm icon, it means that one or more NEs within the management domain or group are experiencing an alarm.
Step 2 Select the management domain node or group node and choose
Fault
>
Alarm Browser
(or right-click the node and choose
Alarm Browser
in the popup menu). This opens the
Alarm Browser
window, which shows all the NEs in the management domain or group that are experiencing an alarm.
To identify and monitor alarms on a specific NE:
Step 1 Select an in-service NE in the
Domain Explorer
tree that shows an alarm icon.
Step 2 Choose
Fault > Alarm Browser
(or right-click the NE and choose
Alarm Browser
in the popup menu).
Step 3 For ONS 15216 and CTC-based NEs, you can also choose
Configuration > NE Explorer
to view alarms on the NE or on specific modules. The Module View tab displays a graphic of the module that is installed in the slot. The number of critical, major, minor, and warning alarms for the module is displayed under Alarm Status. (Alarms also display when you move the mouse pointer over the graphic.)
Using Visual and Audible Alarm Notifications
Step 1 In the
Domain Explorer
window, choose
Edit
>
User Preferences
. The
User Preferences
dialog box opens.
Step 2 In the Event Notification tab, in the Show Notification Dialog For area, select whether or not an alert popup opens when a specific alarm or informational event occurs on NEs in the management domain or in the application.
The Event Notification dialog box opens whenever a new alarm or event occurs. According to your User Preferences selection, you will receive popup notification about alarms by severity and information on events from the NE or from Prime Optical. The Event Notification popup remains open until one of the following occurs:
-
You click OK to close the dialog box.
-
It is replaced by an
Event Notification
dialog box with a higher severity.
-
You click
Disable
on the popup window itself to disable additional popups.
Table 9-17
describes the fields in the Event Notification dialog box.
Step 3 In the
Play Audible Notification For
area, select whether or not an audible alert is sounded when a specific alarm or informational event occurs on the NE or in the application. You can also select whether or not a continuous audible alert is sounded when there is an update in the Dashboard. Check the
Continuous Alarm for Dashboard Notifications
check box.
Note To stop the continuous audible alert, choose Fault > Stop Continuous Beep in the Domain Explorer.
Step 4 Check the
Save current settings
check box and click
OK
.
Table 9-17 Field Descriptions for the Event Notification Dialog Box
|
|
Source
|
Name of the source where the alarm or event originated.
|
Time
|
Date and time that you received the Event Notification popup.
|
Category
|
Category of alarm or event. Alarm categories include Critical, Major, Minor, or Cleared. Event categories include NE event (if the event occurred on an NE) or EMS event (if the event occurred on Prime Optical).
|
Probable Cause
|
Probable cause of the alarm or event.
|
Affected Object
|
Object that is affected by the alarm or event.
|
Description
|
Description of the alarm or event.
|
Service Affecting
|
Whether the alarm or event affects service.
|
EMS-Generated Alarms
In addition to reporting NE-generated alarms, the EMS monitors and reports alarms and events on the EMS itself; for example, loss of connectivity to NE, and so on.
The EMS monitors and reports the NE-specific alarms and events (see
Table 9-18
) and non-NE-specific alarms and events (see
Table 9-19
).
Note NE-specific alarms and events can be viewed and accessed by users who are assigned to the particular NE.
Table 9-18 NE-Specific Alarms and Events
NE-Specific Alarms and Events
|
|
Loss of communication to an NE
|
When the system detects loss of connectivity to an NE, an EMS alarm is generated in the
Alarm Browser
. This EMS alarm is cleared when the system re-establishes connectivity to the NE or when the NE is marked as Out of Service. These alarms cannot be cleared manually.
|
Automatic or manual memory backup failure
|
If an automatic or manual memory backup job fails, an EMS alarm is generated in the
Alarm Browser
. An individual EMS alarm is generated for each memory backup failure that occurs. All instances of the backup-related EMS alarms are cleared (for that particular NE) when the memory backup succeeds or when the NE is marked as Out of Service. These alarms cannot be cleared manually.
|
Prime Optical-to-NE authentication failure
|
If the system attempts to log in to an NE and fails, an alarm is generated. This alarm indicates that the username and password are no longer valid. These alarms cannot be cleared manually.
|
Failed PM data retrieval
|
For CTC-based NEs, an alarm is generated for every PM data retrieval failure. PM 15-minute retrieval fail alarms are generated if the system has not retrieved 15-minute PM data after the number of times to retrieve PM data has been reached. These alarms can be cleared manually or cleared automatically if a PM lost alarm is generated or if PM data is retrieved (PM collection should be set to 15 Min Robust).
|
Lost PM data
|
For CTC-based NEs, an alarm is generated for all PM lost data. A lost PM alarm is generated when:
-
The EMS cannot collect PM data for 15 minutes or 1 day and the NEs PM collection is set to either 15 Min or 1 Day.
-
The EMS cannot collect 15-minute PM data after 8 hours or 1-day PM data after 2 days and the NEs PM collection is set to 15 Min Robust or 1 Day Robust. If there are outstanding PM retrieval fail alarms, these alarms are cleared and the PM lost alarm is generated.
These alarms can be cleared manually.
|
Table 9-19 Non-NE-Specific Alarms and Events
Non-NE-Specific Alarms and Events
|
|
Maximum number of login attempts exceeded
|
By default, users have a maximum of five login attempts. The user account is locked after the fifth unsuccessful login attempt and an EMS alarm is generated in the
Alarm Browser
. The alarm is cleared once the user account is unlocked or the account is deleted. These alarms cannot be cleared manually.
|
System self-monitor alarm
|
Threshold parameters such as CPU usage, memory usage, disk usage, circuit creation time, and resynchronization time are collected and evaluated to monitor the server performance. An alarm is generated if any of these parameters cross their threshold values with their corresponding severity level. The alarms are cleared only after the corresponding parameter value falls below the minor threshold. Subsequent threshold crossings for the same parameter do not generate additional alarms. Only the severity level is changed to indicate the current severity level for the specific parameter.
Note Alarms associated with circuit creation, configuration resynchronization, NE synchronization, and PM data collection indicate that the load on the system is high. Reduce the load on the system before proceeding. Alarms associated with pruning times also indicate that the load on the system is high. Reschedule pruning at a time when the system has less activity. These alarms cannot be cleared manually.
|
Enabling Fault Synchronization—CTC-Based NEs
Fault synchronization allows the system to collect the alarm history of an NE that has been marked as Out of Service for some time and is marked as In Service again. Alarm history is displayed in the
Alarm Browser
.
Step 1 In the
Domain Explorer
window, choose
Administration > Control Panel
and expand
NE Service
.
Step 2 Choose
CTC-Based SONET NEs
or
CTC-Based SDH NEs
.
Step 3 In the Robust Fault Synchronization area, check the appropriate check box:
-
Enable ONS 15310 CL
-
Enable ONS 15310 MA
-
Enable ONS 15310 MA SDH
-
Enable ONS 15327
-
Enable ONS 15454
-
Enable ONS 15600
-
Enable ONS 15454 SDH
-
Enable ONS 15600 SDH
-
Enable CPT 200
-
Enable CPT 600
Step 4 Click
Save
.
How Can I Find the Root Cause of the Fault?
Root cause analysis captures additional information about defects for the purpose of identifying preventive actions.
In some cases, the alarm report or set of alarm reports generated by a fault are sufficient to indicate the root cause. But often, the information in the alarm messages must be supplemented or confirmed by information from customer trouble reports, diagnostics and exercises of equipment, audits of software and databases, and testing of circuits. Tests of equipment are called
diagnostics
, which are designed to identify the root cause of a fault;
exercises
, which isolate a unit or subsystem and verify that it can perform its intended function; and
audits
, which verify the integrity of software.
The EMS should correlate events and determine the faults that exist in the network. To correlate events means to look for relationships between them.
Viewing the Error Log
The
Error Log
shows Prime Optical server error information that is useful for debugging purposes. In most cases, the
Error Log
is requested by service personnel for debugging a problem on the Prime Optical server. The
Error Log
captures abnormal and significant events based on severity level.
As the default, the
Error Log
displays information about significant events that occurred during the last four hours. You can change the default time period in the
User Preferences
dialog box.
To open the
Error Log
, choose
Administration
>
Error Log
in the
Domain Explorer
. The following table describes the fields in the
Error Log
.
Table 9-20 Field Descriptions for the Error Log
|
|
Time Stamp
|
Date and time when the error occurred on the Prime Optical server.
|
Module
|
Name of the module where the error occurred.
|
Severity
|
Severity level of the error:
-
Critical, Major, Minor, or Informational—When set to any of these severity levels, all messages corresponding to critical, major, and minor severity levels are logged to the database and all informational messages are stored in the log file.
-
Debug or Trace—When set to debug or trace, all informational and higher messages are logged to the database. All debug and trace messages are logged to the log files.
|
Submodule
|
Name of the submodule where the error occurred.
|
Filename
|
Name of the file where the error occurred. Cisco technical support engineers use this information for troubleshooting.
|
Line
|
Exact line where the error occurred. Cisco technical support engineers use this information for troubleshooting.
|
Message
|
Text of the error message.
|
By default, all messages are logged to the following files in the /opt/CiscoTransportManagerServer/log directory:
-
CTMServerError.log
-
CTMerror.log
-
ONS15216NEService-
number-time-stamp
.log
-
ONS15305NEService-
number-time-stamp
.log
-
ONS1530xPMService-
number-time-stamp
.log
-
ONS15454NEService-
number-time-stamp
.log
-
ONS15454SDHNEService-
number
-
time-stamp
.log
-
ONS15454SDHPMService-
number-time-stamp
.log
-
ONS15454PMService-
number-time-stamp
.log
-
ONS15600SDHPMService-
number-time-stamp
.log
-
ONS15600PMService-
number-time-stamp
.log
-
UnmanagedNEService-
number-time-stamp
.log
-
SMService-0
-time-stamp
.log
-
SnmpTrapService-2-
time-stamp
.log
-
CORBAGWService-1-
time-stamp
.log
By default, all Syslog Service messages are logged to the SyslogService.log file in the /opt/CiscoTransportManagerServer/log directory.
Note The default directory /opt/CiscoTransportManagerServer might have been changed during installation of the Prime Optical server.
Filtering Data in the Error Log
Step 1 In the
Error Log
, choose
File > Filter
(or click the
Filter Data
tool). The
Filter
dialog box opens.
Step 2 Specify the filter parameters described in the following table.
Step 3 After making your selections, click
OK
to run the filter.
Table 9-21 Field Descriptions for the Error Log Filter Dialog Box
|
|
Time Stamp (
time zone
)
|
Allows you to filter
Error Log
data for a specified time period, ranging from the past hour to the past 6 months. Click the
User Specified
radio button to specify exact filter start and end times by date and hour. The time zone can be GMT, a user-defined offset from GMT, or local time, depending on what is specified in the
User Preferences
dialog box. Use the calendar tool to choose the year, month, and day:
-
Year—Click the year combo box or the double arrow (<<, >>) at the bottom of the calendar.
-
Month—Click the month combo box or the single arrow (<, >) at the bottom of the calendar.
-
Day—Click the day number on the calendar. The current date is shown in blue.
If you want to filter
Error Log
data and the time period is not important, click
No Time Specified
.
|
Modules
|
Allows you to filter
Error Log
data by Prime Optical module.
|
Submodules
|
Allows you to select Prime Optical server submodules to filter
Error Log
data.
|
Severity
|
Allows you to filter
Error Log
data based on severity level: Critical, major, minor, and informational.
|
Managing the NE Audit Trail—CTC-Based NEs
The Audit Trail table is a security tool used to investigate unauthorized activities after they occur so that proper remedial action can be taken. It displays audit trail information for CTC-based NEs.
Audit trail entries might be missing from the Audit Trail table because of the following reasons:
-
There is heavy provisioning activity on the NE that the local audit trail log on the NE might wrap between polling intervals, and records will be missed for collection.
-
The server is down or communications to the NE are unavailable for an extended period. There is a greater likelihood that the log on the NE will wrap before the system can collect the records.
Note • The audit trail collection interval can be set in the applicable NE Service pane in the Control Panel. See Changing the Audit Trail Collection Interval.
-
To collect the latest and most reliable audit trail information for a specific NE, the time must be synchronized with the SNTP server. Do not manually set the clock on CTC-based NEs.
Viewing the Audit Trail Table
To view the Audit Trail table, choose
Administration > CTC-Based NEs > Audit Trail Table
. The following table provides descriptions.
Table 9-22 Field Descriptions for the Audit Trail Table
|
|
Alias ID
|
Alias name of the NE.
|
Sequence Number
|
NE-generated record ID.
|
NE Username
|
NE user ID.
|
Time Stamp
|
Date and time.
|
Description of Operation
|
Description of the audit trail operation.
|
Status of Operation on NE
|
Status of the audit trail operation. Statuses are Passed, Failed, and Aborted.
|
NE ID
|
ID of the selected NE.
|
Filtering Data in the Audit Trail Table
Step 1 In the Audit Trail table, choose
File > Filter
(or click the
Filter Data
tool). The Filter dialog box opens.
Step 2 Specify the filter parameters described in the following table.
Step 3 After making your selections, click
OK
to run the filter.
Table 9-23 Field Descriptions for the Audit Trail Table Filter Dialog Box
|
|
Time Stamp (
time zone
)
|
Allows you to filter audit trail data for a specified time period, ranging from the past hour to the past 6 months. Additionally, you can click the
User Specified
radio button to specify exact filter start and end times by date and hour. The time zone can be GMT, a user-defined offset from GMT, or local time, depending on what is specified in the
User Preferences
dialog box. Use the calendar tool to choose the year, month, and day:
-
Year—Click the year combo box or the double arrow (<<, >>) at the bottom of the calendar.
-
Month—Click the month combo box or the single arrow (<, >) at the bottom of the calendar.
-
Day—Click the day number on the calendar. The current date is shown in blue.
Click
No Time Specified
if you want to filter audit trail data and the time period is not important.
|
NE ID
|
Allows you to move NEs back and forth between the list of available NEs and selected NEs. The filter runs on the NEs in the Selected NE ID list.
|
Username
|
Allows you to move users back and forth between the list of available users and selected users. The filter runs on the users in the Selected Users list.
|
Sequence Number
|
Allows you to enter a starting and ending sequence number for filtering. Check the
Disregard All Other Filter Criteria
check box to base the filter on only the starting and ending sequence number.
Note If the sequence number reaches 59999, Prime Optical collects audit records starting with 1 in the next collection interval.
|
Operation Status
|
Select an operation status for filtering. Operation statuses are Passed, Failed, and Aborted.
|
Enabling or Disabling Audit Trail Collection
Step 1 In the
Domain Explorer
tree, select a CTC-Based NE.
Step 2 In the Network Element Properties pane > Status tab > Audit Trail State field, choose
Enabled
or
Disabled
from the drop-down list.
Note By default, the Audit Trail State field is set to Disabled.
Step 3 Click Save.
Changing the Audit Trail Collection Interval
Step 1 In the
Domain Explorer
, choose
Administration > Control Panel
.
Step 2 In the
Control Panel
, expand
NE Service
and choose
CTC-Based SONET NEs
or
CTC-Based SDH NEs
.
Step 3 In the Status tab > Audit Trail Collection Interval field, enter the collection interval time. The default is 30 minutes.
Step 4 Click
Save
.
Setting Debug Options
In Prime Optical, the debug option gives you information to investigate, diagnose, and fix a problem.
Specifying debug options allows you to choose parameters to display in the Debug Log.
Step 1 In the
Domain Explorer
, choose
File > Debug Options
.
Step 2 Specify the debug options.
Table 9-24
provides descriptions.
Step 3 After making your selections, click
Apply
.
Table 9-24 Field Descriptions for the Debug Options Dialog Box
|
|
|
Available, Selected
|
Select modules that will display debug messages. Use the
Add
and
Remove
buttons to move modules to the Selected list or remove modules from the list.
|
|
Fatal
|
Instructs the Debug Log to display messages with a severity level of at least Fatal.
|
Warning
|
Instructs the Debug Log to display messages with a severity level of at least Warning.
|
Info
|
Instructs the Debug Log to display messages with a severity level of at least Info.
|
Debug
|
Instructs the Debug Log to display messages with a severity level of at least Debug.
Caution Prime Optical performance will degrade if the Debug option is left on. All operations will slow down, and you might lose alarm and event notifications. Use Debug only when troubleshooting with a Cisco customer support engineer.
|
Trace
|
Instructs the Debug Log to display messages with a severity level of Trace.
Caution Prime Optical performance will degrade if the Trace option is left on. All operations will slow down, and you might lose alarm and event notifications. Use Trace only when troubleshooting with a Cisco customer support engineer.
|
|
File
|
Check the
File
check box to write the Debug Log to a specific file. You can click
Browse
to browse for a local client directory for the Debug Log. After you specify the filename, the log is stored in
filename
0.log, and then in
filename
1.log when
filename
0.log reaches its maximum size.
By default, the Debug Log is saved at C:\Cisco\TransportManagerClient
version-number
\debug\CTMC-debug0.log or /opt/CiscoTransportManagerClient
version-number
/debug/CTMC-debug0.log. The dialog box shows the filename without the number 0 or 1, which is appended by default by the Java debugging APIs.
Note version-number is replaced by the version number of the installed Prime Optical client.
|
Max File Size
|
Enter the maximum file size for the Debug Log, in bytes.
|
Console
|
Check the
Console
check box to write the Debug Log to the console.
|