|
|
Threshold Manager provides an easy-to-use interface to access device-specific threshold settings. You can set thresholds for network devices using Cisco-provided, predefined default policies. These policies can be applied automatically to target devices. Threshold Manager also supports detailed customization of threshold settings.
For a list of supported devices refer to Chapter 1, "Introducing CiscoView," or the Readme file and the release note. Threshold Manager also has online help.
This appendix contains the following sections:
A threshold defines the range in which you expect your network to perform. If thresholds exceed or go below the expected bounds, you examine these areas for potential problems. You can create thresholds for a specific device.
A policy is predefined configuration data that specifies the condition for triggering a threshold event. Threshold Manager uses policies to set thresholds in a Cisco router or switch.
A policy file is a collection of one or more policies that defines threshold values for specific MIB variables. Each threshold policy is associated with a single SNMP MIB variable type. If a policy specifies an interface type, Threshold Manager applies the policy to the matching device interface. If the policy does not specify an interface type, the application applies the value to all device interfaces. Multiple policy files can be enforced in a device or against a specific interface on a device.
Two types of policy files are available:
Alarms and events go hand in hand. An event defines the action triggered as a result of an alarm. For example, when the number of collisions on an Ethernet segment exceeds 60 per second, the corresponding event can cause a trap message to be sent to one or more management stations. Events are defined by the RMON event group.
An event is generated by the RMON agent, which could be triggered by a threshold crossing. An event can be signaled as a trap, a new entry in the RMON MIB log table, both, or neither. Threshold Manager displays all events captured from the log table of the RMON agent and correlates threshold-related events to the user-configured threshold policies.
An agent is a process in the device that handles SNMP requests.
Threshold Manager is available only when CiscoView is invoked on devices that support RMON and have a Cisco IOS image with RMON support built into it. The Tools menu is always enabled for non-Cisco IOS devices such as Catalyst switches.
To start Threshold Manager from CiscoView, complete the following steps:
Step 1 Go to CiscoView - Main window.
Step 2 Select File>Open Device.
Step 3 Enter the IP address or host name from where Threshold Manager has to be invoked in the Host field.
Step 4 Enter the Read community string.
Step 5 Enter the Write community string.
Step 6 Click OK.
Step 7 Select Tools>Threshold Manager from the CiscoView menu bar.
The Threshold Manager window events list appears.
To start Threshold Manager from the command line, do one of the following:
where:
-I IP-address or use -n host name | is the IP address of the device you want to monitor.
is the host name of the device. |
-p | is the directory where Threshold Manager is installed. |
-r read_community_string | is an SNMP password. The default is public. |
-w write_community_string | is an SNMP password. The default is private. |
-e retry count | is the number of times Threshold Manager sends a request to an unreponsive device. The default is 3. |
-m timeout | is the amount of time, in seconds, Threshold Manager waits before issuing another retry. The default is 10 seconds. |
-f refresh_interval | is the time, in seconds, the Threshold Manager window events list refreshes. The default is 360 seconds. |
Step 1 Locate TM.EXE in Explorer.
Step 2 Start Threshold Manager and select File>Open.
Step 3 Enter TM.EXE -I IP_Address or TM.EXE -n host_name in the command field
where:
-I IP-address or use -n host_name | is the IP address of the device you want to monitor.
is the host name of the device. The default is the local machine. |
-p | is the directory where Threshold Manager is installed. |
-r read_community_string | is an SNMP password. The default is public. |
-w write_community_string | is an SNMP password. The default is private. |
-e retry count | is the number of times Threshold Manager sends a request to an unreponsive device. The default is 3. |
-m timeout | is the amount of time, in seconds, Threshold Manager waits before issuing another retry. The default is 10 seconds. |
-f refresh_interval | is the time, in seconds, the Threshold Manager window events list refreshes. The default is 360 seconds. |
When you start Threshold Manager, the Threshold Manager window events list appears. The Threshold Manager window events list displays threshold events stored as RMON log records in the managed device. This window also displays the name of the target device as either the host name or IP address. The name depends on how you identified the device when you launched Threshold Manager or CiscoView.
Threshold Manager correlates the event information with an existing policy by comparing the object identifier (OID) of the event with the value of the alarm variable in the policy configuration file. If a match occurs, Threshold Manager complements the event display fields of the logged entry with information from the policy file. If no match occurs, Threshold Manager displays a value of undefined in those fields that would be completed by the policy.
Each event occupies a single line in the Threshold Manager window events list and is displayed until one of the following situations occurs:
Select View>Retrieve Events.
The Threshold Manager window contains the logged events retrieved from the agent. Threshold Manager retrieves events at startup and again when the refresh timer reaches a specified interval. For more information on the refresh timer, see "Retrieving Events."
Table A-1 shows the fields and associated policy for each threshold entry in the event list.
| Field | Policy |
|---|---|
Capture of Event Priority Icon (Windows only) | |
Time and date the event was logged. The RMON agent in the managed device generates this value. | |
The profile to which the threshold belongs. A profile is a group of policies. There are four profiles: system, interface, rmon_EtherStats, and customize. | |
Description | Threshold policy description. |
Alarm Variable | Name of the MIB variable. |
Event Priority | Priority of the event. Values are 1 (highest) to 3 (lowest). The predefined threshold policies have default priority value, but you can change the value according to the importance of the information to you. If Threshold Manager cannot correlate the event with a policy file, it assigns the event a priority of 3. |
Log Description | Description of the event as defined in the corresponding RMON event entry. |
Event Index | Index of the RMON corresponding event entry. |
Log Index | Index of the RMON log entry. |
Owner Description | A text string that identifies the network management station or person to contact about the associated policy file. |
You can sort the event list by clicking on the field headers. You can also change the width of the columns by clicking on the dividers between the field headers and stretching the column to the desired size. If you are using UNIX, press the Shift key and click the middle mouse button while dragging the divider. If you are using Windows, click the left mouse button while dragging the divider.
The Single Event View dialog box appears, displaying complete information about a specific event. You use the Single Event View dialog box to determine what threshold settings in the RMON agent generated the event.
The Single Event View dialog box is divided into two panes: Profile Identification and Agent Log Information.
The Profile Identification pane contains parameters related to the threshold settings that generated the event. This information helps you determine what conditions triggered the event. Table A-2 shows the parameters and their description.
| Parameter | Description |
|---|---|
Profile | The name of the profile to which the policy file belongs. |
Policy Description | A description of the policy. This is the MIB variable name. |
Alarm Variable | Name of the MIB variable. |
Interval, in seconds, over which the data is sampled and compared with rising and falling thresholds. | |
Threshold for the sampled statistic. When the current sampled value is greater than or equal to this threshold, a single event is generated. A single event is also generated if the first sample after this entry becomes active, is greater than or equal to this threshold, and the associated Startup Alarm is equal to rising. After a rising event is generated, another such event is not generated until the sampled value falls below this threshold and reaches Falling Threshold. See "Creating New Policy Files." | |
|
After a falling event is generated, another such event is not generated until the sampled value rises above this threshold and reaches Rising Threshold. See "Creating New Policy Files." | |
Sampling Type | Method of sampling the selected variable and calculating the value to be compared with the thresholds. If the value is Absolute, the value of the selected variable is compared directly with the thresholds at the end of the sampling interval. If the value is Delta, the value of the selected variable at the last sample is subtracted from the current value, and the difference compared with the thresholds. |
Alarm that can be sent when this entry first becomes active. If the first sample after this entry becomes active, is greater than or equal to Rising Threshold, and Startup Alarm is equal to rising, then a single rising alarm is generated. If the first sample after this entry becomes active or is less than or equal to Falling Threshold, and Startup Alarm is equal to falling, a single falling alarm is generated. | |
Rising Event Type | |
Falling Event Type | |
The priority of the event. |
If the threshold settings were created by a Threshold Manager policy file, the values from that policy file are displayed. If no policy file is associated with the threshold settings, the fields remain blank.
Because the Agent Log Information pane contains information from the RMON agent log in the managed device, these values display whether a Threshold Manager policy file can be associated with the event.
Table A-3 describes the action buttons.
| Button | Action |
|---|---|
Description | Click to see more details of the event. |
Delete | Click to delete the event from the event log. This has the same effect as selecting the event in the Threshold Manager window events list and selecting Delete>Selected Events. You might want to delete events after you have finished analyzing a particular event type and no longer need to view it or you want to decrease the number of events displayed in the Threshold Manager window events list. |
Cancel | Click to close the window. |
Help (Windows only) | Click to get online help about this window. |
Figure A-1 shows when rising and falling events occur with the Startup Alarm set to Rising and Falling.
Select View>Retrieve Events to force a retrieve event action from the Threshold Manager window events list.
Threshold Manager retrieves events from the RMON agent log in the following situations:
When the application is operational, Threshold Manager automatically retrieves events from the RMON log at regular intervals. This interval is defined by the refresh timer parameter associated with that instance of Threshold Manager. This parameter is defined when you initiate a Threshold Manager session. The default is 360 seconds. If the refresh timer is set to 0, the Threshold Manager will not automatically retrieve events from the RMON agent.
Threshold Manager allows you to change the order in which you view events in the Threshold Manager window events list. This capability permits you to view events in a manner that is most meaningful to you. You can reorder the following fields:
Because events can be deleted from the log, printing lets you maintain a history log of device activity. This log helps you accumulate data to determine your network baselines and performance trends. The printed version of the Threshold Manager window events list contains the information described in "Viewing Threshold Events."
You can remove events from the RMON log in the managed device. You delete events in the following cases:
Because events are physically removed from the RMON agent log, deleting events also improves the performance of Threshold Manager when it retrieves and displays new events.
To delete a selected event from the RMON agent log:
Step 1 Highlight the event to be deleted by selecting it from any field within the Threshold Manager window events list.
Step 2 Select Delete>Selected Events.
To delete all events from the RMON agent log, select Delete>All Events.
You can also delete selected events from the Single Event View dialog box.
Any user who has launched an instance of Threshold Manager against a device can delete events from that RMON agent log. This means that your Threshold Manager window events list might not display the current contents of the RMON agent log of a device if that device is being managed by more than one Threshold Manager. Your Threshold Manager window events list reflects the change when
Threshold Manager allows you to delete selected events or all events in the log. When you delete a selected event, all events with the same EventIndex value are removed from the RMON log.
Table A-4 shows examples of event tasks that you can use to help manage your network.
| Task Description | Solution | Operations |
|---|---|---|
Diagnose a network segment that has congestion problems. | Check whether any threshold events have occurred in the device close to the segment. | Step 1 Open the Threshold Manager window. Step 2 Select View>Retrieve Events. Step 3 View all of the displayed events. Step 4 Click on the header of any column in the main window to sort the events to investigate the correlation between threshold events and the network problem. Step 5 Double-click on an interesting event to bring up the Single Event View dialog box to investigate the threshold setting that caused the event to occur. Step 6 Click Description to read the description of why this event was generated. |
Sort the tasks by priority. | N/A | Step 1 Open the Threshold Manager window. Step 2 Sort the events by priority by clicking on the header of the Priority column. |
Finish investigating the displayed events. | Delete some events in the box to reduce memory use in the agent. | Step 1 Open the Threshold Manager window. Step 2 Select the events and use Delete> Delete Selected Events to delete the selected ones or Delete>Delete All Events to delete all the events. |
With Threshold Manager, you can manage existing threshold settings and policies or create new policies. This capability allows you to tailor alarms and events to your specific network needs. The Configure Thresholds dialog box provides you with the tools to do the following:
To access the Configure Thresholds dialog box, select Config>Thresholds.
The Configure Thresholds dialog box defaults to the Config Threshold tab. The Config Threshold tab is divided into two panes. The upper pane is called the Policies pane. The lower pane is called the Current Threshold Settings pane.
The content of this pane is specific to the instance of Threshold Manager and is visible only at your local machine.
This pane also allows you to do the following:
For more information on the policies, see "Using Policy Files" later in this chapter.
If Threshold Manager created the threshold settings, the fields displayed in the Current Threshold Settings pane will contain data provided by the policy file. If Threshold Manager did not create the policy or Threshold Manager cannot associate a policy with an event, only the information provided by the RMON agent will be displayed.
To access the Configure Thresholds dialog box, select Config>Thresholds.
Table A-5 describes the fields in the Device Summary dialog box.
Click Retrieve to get the latest Interface/Port List information.
| Field | Description |
|---|---|
Device Class | |
Last Refresh Time | Last time events were retrieved by the agent. |
Log Entries | |
System Name | |
Interface/Port List |
The list of ports and interfaces for the device provides you with information about individual interfaces. This is helpful when you are designing and applying policies to specific interfaces. You can sort on the fields in this dialog box to present the information in a meaningful manner. |
There is a one-to-one relationship between a single instance of Threshold Manager and the managed device. Also, when Threshold Manager is launched from CiscoView, the application receives default run-time arguments used for operations. Threshold Manager allows you to alter both the target device and the run-time parameters from within the application. This is particularly useful if you want to use a single instance of Threshold Manager to apply threshold settings in multiple devices or if you started the application with the wrong run-time parameters.
This device information is changed from the Properties dialog box. The Properties dialog box allows you to do the following:
To access the Properties dialog box on a Windows platform, click the Properties tab from the Configure Thresholds dialog box. On a UNIX platform, select Config>Properties from the Threshold Manager window.
This dialog box consists of two panes: the Policies pane and the Current Threshold Settings pane, which are described in "Managing Thresholds." For information on changing policies, see "Using Policy Files" later in this chapter. When Threshold Manager is installed, 18 policy files appear in this dialog box. You can select one or all to use as thresholds.
Before you can set a threshold in the RMON agent, you must add the settings to the Current Threshold Settings pane. You can add all policies as threshold settings or you can add specific policies. A policy can result in multiple threshold settings in the Current Threshold Settings pane. The number of times Threshold Manager adds the policy to the Current Threshold Settings pane depends on the target type and number of interfaces defined in the policy file.
To add all policies in the Policies pane to the Current Threshold Settings pane, click Add All Policies.
To add selected policies to the Current Threshold Settings pane:
Step 1 Click on the selected policy.
Step 2 Click Add Selected Policies.
To add multiple selected policies to the Current Threshold Settings pane while using UNIX:
Step 1 Click on the selected policies.
Step 2 Click Add Selected Policies.
To add multiple selected policies to the Current Threshold Settings pane while using Windows:
Step 1 Hold down the Shift key and click on the policy at the beginning of the desired range.
Step 2 Hold down the Shift key and click on the policy at the end of the desired range.
Step 3 Click Add Selected Policies.
A policy added to the Current Threshold Settings pane retains a pending status. This status does not change until you enforce the threshold settings to the RMON agent. Threshold settings with a pending status are viewable only from local machines.
Step 1 Select Config>Thresholds.
The Configure Thresholds dialog box appears.
Step 2 In the Current Threshold Settings pane, double-click on the selected threshold setting.
The Modify Threshold Settings dialog box appears. From this dialog box, you can do the following:
Threshold Manager lets you temporarily alter threshold settings for an alarm object instance. This is useful when you want to monitor network performance for a specific period of time or fine-tune threshold settings before applying them permanently. Changes to existing threshold settings are not saved in the associated policy file. Therefore, if the device loses power or is shut down, the modifications are lost. To make permanent changes to the threshold settings, alter the associated policy file, and add the new threshold settings to the Current Threshold Settings pane.
You can alter a threshold setting that has a pending or active status. A threshold setting with a failed status means the threshold setting was rejected by the RMON agent and cannot be altered.
To delete a threshold setting, regardless of status:
Step 1 Click on the threshold setting.
Step 2 Click Delete Selected.
To delete more than one threshold setting, regardless of status, while using UNIX:
Step 1 Click on the selected policies.
Step 2 Click Delete Selected.
A Threshold Manager Warning popup window appears. Click OK, or click Cancel to cancel delete.
Step 3 Click Delete All to remove all threshold settings, regardless of status.
To delete more than one threshold setting, regardless of status while using Windows:
Step 1 Hold down the Shift key and click on the threshold setting at the beginning of the desired range.
Step 2 Hold down the Shift key and click on the threshold setting at the end of the desired range.
Step 3 Click Delete Selected.
A Threshold Manager Warning popup window appears. Click OK, or click Cancel to cancel delete.
Step 4 Click Delete All to remove all threshold settings, regardless of status.
Threshold settings with a pending status are removed from the Current Threshold Setting pane when you do the following:
Table A-6 describes common Threshold Manager tasks.
| Task Description | Operations |
|---|---|
Modify the number of occurrences of a particular kind of event that are reported. | Modify the threshold parameters because they are set too low or too high with respect to the network baseline by performing the following steps: Step 1 Open the Threshold Manager window. Step 2 Double-click on the threshold. The Single Event View dialog box appears. Step 3 Modify the rising and/or falling threshold parameter(s) to adjust to network baseline so that the events are generated only on exceptions. |
Delete some thresholds to reduce load added by threshold monitoring. | Step 1 Open the Threshold Manager window. Step 2 Select Config>Thresholds to open the Configure Thresholds dialog box. Step 3 Click Retrieve Thresholds in the Current Threshold Settings pane to retrieve the current active thresholds from the managed agent. Step 4 View the count of the current thresholds to learn how many thresholds are active. Step 5 Select the threshold rows that are less critical to monitor. Step 6 Click Delete Selected to delete the thresholds from the agent. The events associated with these deleted thresholds are removed as well. |
Step 1 Open the Threshold Manager window. Step 2 On a Windows platform, select Config>Thresholds to open the Configure Thresholds dialog box. On a UNIX platform, select Config>Properties to access the Properties dialog box. Step 3 Double-click on a threshold row in the Current Threshold Setting pane. Step 4 Modify the threshold parameters in the Modify Threshold Settings dialog box. Step 5 Click Enforce to enforce to the agent. Step 6 Double-click on another threshold, and repeat the steps until the threshold setting for each interface is configured properly. | |
Step 1 Open the Threshold Manager window. Step 2 On a Windows platform, select Config>Thresholds and click the Properties tab. On a UNIX platform, select Config>Properties to access the Properties dialog box. Step 3 Set the Refresh Timer to a larger number. Step 4 Click OK. |
A policy file is an ASCII file; it is defined by keywords used by Threshold Manager to scan the file. Each policy file defines an alarm variable to be monitored by a device RMON agent and one or more threshold policies to be sent to the device agent for monitoring purposes.
To understand the meaning of policies and to simplify file parsing, Threshold Manager imposes strict rules whenever a policy file is created either manually or through the Create Threshold Policy dialog box. It is strongly recommended that you customize policy files by using the Threshold Manager graphical user interface (GUI).
A policy file is composed of many keyword-value pairs. A keyword and its value are separated by an equal sign (=). If the keyword requires more than one value, each value is separated by a colon (:). Each line of a policy profile contains only one keyword-value pair, for example:
Target_Type = etherStats
Rising_Threshold = 200
Falling_Threshold = 20
Sample_Interval = 60:0:300
The order of the keyword-value pair is not important. All white spaces are ignored during file parsing. If a keyword appears more than once, the last keyword-value pair takes effect. The only exception to this rule is keyword Interface_Threshold.
An interface-specific policy is defined by the keyword Interface_Threshold. There can be multiple Interface_Threshold keyword-value pairs in a policy profile, each of which defines a specific threshold policy (value) for a particular interface type, for example:
Interface_Threshold = ethernetCsmacd:375000000:187500000:100000000
Interface_Threshold = ethernetCsmacd:37500000:18750000:10000000
The syntax of this special keyword-value pair is as follows:
Interface_Threshold=interface_type:rising_thresh_value:falling_thres
h_value:interface_speed
where interface_speed is optional.
Threshold Manager uses interface-specific policies to set specific interface thresholds. If the interface speed is specified in the policy, the policy is applied to interfaces that match both the interface type and speed. If interface speed is not present, the policy is applied to the interface that matches the specified interface type, regardless of speed. The default policy is used to set thresholds for interfaces without an interface-specific policy defined.
Policy files are grouped into three types: global, device class, and host. All policy files are saved under the config directory of the Threshold Manager. Policy files under the config directory are global policy files and are used for all devices. Policy files under the device class subdirectory apply to devices that belong to the same device class family. Policy files that are saved in the host subdirectory are used to set thresholds against only the specific host.
When reading policies for a given device, Threshold Manager searches that host subdirectory to locate any host-specific policy files defined for that device. It then scans the device class subdirectory for policy files defined for that device class. Last, it picks up any policy files not defined elsewhere.
Threshold Manager policy files require specific naming conventions to simplify file parsing for existing policies and when a new policy file is created. The two Threshold Manager policy file naming conventions are described below.
Table A-7 contains a brief description of the policy files.
| Policy File | Description | Default Threshold |
|---|---|---|
Average CPU busy in the last 5 minutes. See the description in the next entry. | 90% | |
Average CPU busy in the last minute. Both policies 1 and 2 are used so that the user gets at least 2 events (traps and/or logs) in case the CPU load keeps increasing. | 70% | |
Ethernet segment utilization (RMON Ethernet statistic group). | 50% | |
Free memory. | Falling threshold (absolute): 500 KB | |
Interface input utilization. | 50% | |
Interface output utilization. | 50% | |
Carrier transitions. | 10/minute | |
Reliability of the interface. | Falling threshold: 240 | |
Number of resets. | 10/minute | |
Number of restarts. | 10/minute | |
Buffer allocating failures. | 5/30 seconds | |
Buffer creation failures. | 5/30 seconds | |
Ethernet segment utilization (RMON Ethernet statistic group). | 500/second | |
etherStatsCRCAlign | Ethernet segment alignment error (RMON Ethernet statistic group). | 50/minute |
Ethernet segment collision errors (RMON Ethernet statistic group). | 50/minute | |
Ethernet segment size errors (RMON Ethernet statistic group). | 50/minute | |
Ethernet segment size errors (RMON Ethernet statistic group). | 50/minute | |
Ethernet fragmentation errors (RMON Ethernet Statistic group). | 50/minute |
Double-click the selected policy in the Policies pane of the Configure Thresholds dialog box to display the Modify Threshold Policy dialog box. From this dialog box, you can do the following:
When you complete your modifications, you can save the changes in the host-specific, device class, or global directories. Saving a policy file automatically updates the existing policy file in the Policies pane. Clicking Continue applies the altered policy directly to the Current Threshold Settings pane without saving the changes.
You create new threshold policies to do the following:
Cisco maintains a list of all SNMP MIBs supported by Cisco IOS Release 10.2 and later. This list is located at
The SNMP MIBs are organized by device class for both routers and switches.
The Create Threshold Policy dialog box contains the following fields:
The Create Threshold Policy dialog box lets you define the following fields:
The policy configuration file is a text file that sets the parameters of the threshold for a specific MIB variable. The data in the configuration file is composed of keyword-value pairs in the form of <item name> = <item value>. The keywords contained in the configuration file are as follows:
Interface_Threshold = ethernet Csmacd:375000000:187500000:100000000
Policy configuration files are secured using the standard file security procedures in the host operating system.
After you create a policy file, you can do the following:
You can save a threshold policy file in the host-specific, device class, or global directory. Remember that the host-specific directory takes on the name of the managed device. This name can be the host name or IP address of the device, depending on how you identified the device when you launched Threshold Manager. Policy files previously saved under the host name of a device will not appear in the Policies pane if you specify the IP address of the managed device when you launch Threshold Manager.
You cannot save a policy file that has a customized target type.
If the policy file is of an interface variable type, you can apply the threshold settings to one or more interfaces.
You can also add a policy file directly as a threshold setting without saving it to disk. This feature lets you create and add temporary threshold settings. However, there is no permanent record of these policies. They are lost when the managed device is turned off or goes down or when you delete the threshold settings from Threshold Manager.
After creating the policy file, click Continue to add it to the Current Threshold Settings pane. The new threshold setting will have a status of pending.
To add multiple interface threshold settings within a single policy file:
Step 1 Define the first set of threshold parameters.
Step 2 Select the interface type of the target interface.
Step 3 Click Add to add the interface type with its configured threshold settings to the Interface List.
Step 4 Define the next set of threshold parameters.
Step 5 Select the target interface type and add it to the interface list.
Repeat Step 3 and Step 4 as many times as necessary to add interface threshold settings.
After you have defined each specific threshold setting, you can apply it to one or more physical interfaces. Click Continue to access the Interface Selection dialog box. This dialog box displays all available interfaces in an up state for that device. Select the desired interfaces, and click OK to apply the threshold settings to the physical interfaces. This action also places the threshold settings in the lower pane of the Configure Threshold dialog box with a status of pending.
The policies are located in the Threshold-Mgr/Config directory. Depending on how you saved the policy file, it can be found in one of the following subdirectories:
All default policies in this release of Threshold Manager are found in the global directory.
Table A-8 describes common Threshold Manager policy tasks.
| Task Description | Operations |
|---|---|
Step 1 Open the Threshold Manager window. Step 2 Select Config>Thresholds to bring up the Configure Thresholds dialog box. Step 3 Click Add All Policies in the Policies pane. The thresholds are populated in the Current Threshold Settings pane based on the device configuration. Step 4 Click Enforce All. All pending thresholds are downloaded to the agent and become active thresholds. | |
Do not want to overload the agent with too many active thresholds by leveraging only the interface profiles. | Step 1 Open the Threshold Manager window. Step 2 Select Config>Thresholds to display the Configure Thresholds dialog box. Step 3 Click the column title, Profile, in the Policies pane to sort the policies by profile name. Step 4 Select all of the policy rows in the interface profile to be monitored. Step 5 Click Add Selected Policies. The selected thresholds are populated in the Current Threshold Settings pane for all Up interfaces and are marked "Pending" in the Status column. Step 6 Click Enforce All. All pending thresholds are downloaded to the agent and become active thresholds, marked "Active" in the Status column. |
Step 1 Open the Threshold Manager window. Step 2 Select Config>Thresholds to display the Configure Thresholds dialog box. Step 3 Click Create New Policy in the Policies pane. Step 4 Choose the appropriate target type for the threshold to be defined. Step 5 Set up all parameters for this customized threshold policy. Step 6 Save this policy to the desired location by clicking the button representing the destination (global, device class, or host) on the right side of the dialog box. | |
Customize the threshold parameters for predefined thresholds. | Step 1 Open the Threshold Manager window. Step 2 Select Config>Thresholds to display the Configure Thresholds dialog box. Step 3 Double-click on the threshold policy you want to modify in the Policies pane. Step 4 Set up the parameters to fit your network baseline. Step 5 Save the changes to disk. The changes can be saved at the global level, which can be used by all devices; at the device class level, which can be used by all devices of the same device type; or at the device instance level, which can be used again only for this particular device. |
Step 1 Open the Threshold Manager window. Step 2 Select Config>Thresholds to display the Configure Thresholds dialog box. Step 3 Double-click on a threshold policy that you want to learn more about. Step 4 Click Description in the Modify Threshold Settings dialog box. Threshold Manager provides help text on what this policy means. | |
Apply an interface-specific threshold only to a particular interface, instead of all interfaces. | Step 1 Open the Threshold Manager window. Step 2 Select Config>Thresholds to display the Configure Thresholds dialog box. Step 3 Double-click on the threshold policy you wish to enforce to the agent. Step 4 Click Continue in the Modify Threshold Policy dialog box. Step 5 Select the interface for setting the threshold from the Interface Selection dialog box. Step 6 Click OK to push it to the staging area. Step 7 Click Enforce All to download the changes to the agent. |
Step 1 Open the Threshold Manager window. Step 2 Select Config>Profiles to hide profiles other than system. Step 3 In the Show Profile box, select profiles other than system, and click on the arrow to move the profiles to the Hide Profile box. Step 4 From the Threshold Manager window, select Config>Thresholds to display the Configure Thresholds dialog box. The Policies pane now shows only the system policies. |
You can run multiple instances of Threshold Manager simultaneously so as to manage thresholds on several devices. From the pull-down menu, select File>New Threshold Manager to open the Start a New Threshold Manager dialog box.
The defaults in this dialog box apply to the current device configuration. You need to set the IP address of the device to be managed. You also need to specify the Threshold Manager Directory if it is not installed in the default location. The Threshold Manager directory is under the Threshold directory called Threshold-Mgr. For example:
/CWW/etc/cview/devices/Threshold-Mgr/
For descriptions of the other input fields in this dialog box, see "Troubleshooting Threshold Manager" later in this chapter.
To filter one or more profiles:
Step 1 Select Config>Profiles to access the Filter Profiles dialog box.
Step 2 Highlight the desired profiles in the Show Profile pane.
Step 3 Click the right arrow.
Profiles appearing in the Hide Profile pane are no longer available to this version of Threshold Manager, and policy files contained in these profiles will not be displayed in the Policies pane of the Configure Thresholds dialog box. However, any threshold settings active in the RMON agent that belong to the filtered profile are not affected.
Table A-9 describes known problems and how to correct them.
| Problem | Explanation |
|---|---|
Threshold Manager does not show up in Cisco View Tools pull-down menu. | Check the IOS version of the device. It must be 11.1 or above. |
Cisco 7000 devices do not display Threshold Manager in the CiscoView pull-down menu. | You might be using an older version of 7000 packages. If so, edit the c7com.dd file located in $NMSROOT/etc/cview/devices/7000/dd/c7com.dd Change: source $Cv_Path/devices/Router-share/CRTOOLBR.ddsource $Cv_Path/devices/Router-share/C47CH.ddTo: source $Cv_Path/devices/Router-share/C47CH.ddsource $Cv_Path/devices/Router-share/CRTOOLBR.ddChange: set DD(menubar.menu) {{{} "Admin" admin}}To: lappend DD(menubar.menu) {{} "Admin" admin} |
Threshold Manager shows undefined fields in the Threshold Manager window events list. | The Threshold Manager directory is incorrect. Go to the directory where the policy files that you want to use are defined. |
Duplicate global/device/host policies may be allowed, depending on which window is used. | When creating a custom policy, you can save it only once, as either global, device, or host. After saving the policy, you can use the Modify Threshold Settings dialog box to modify the saved custom policy and save it as all three. |
The policy that you are using was not created by this Threshold Manager. | Create the policy on this instance of Threshold Manager or copy it from the Threshold Manager where it is defined. |
|
|