|
|
I
These release notes provide information about the Cisco Info Center (CIC) version 1.2 release.
Cisco Info Center is a Service-Level Management (SLM) system that provides a consolidated view of enterprise-wide events and status information. It collects event streams or messages from many different data sources and presents a single, consistent view of the current state of all Cisco Info Center managed systems. It distributes the event information to the operators and administrators responsible for monitoring service levels.
This information can then be:
Cisco Info Center allows diverse management platforms, applications, and Internet protocols to be brought together to provide the administrator a single point of monitoring those platforms and applications. Cisco Info Center does not replace the management platforms. It instead compliments them by providing an enterprise wide event/fault and status exchange. Cisco Info Center can also tie together domain limited network management platforms in remote locations.
Cisco Info Center tracks the state of events in a high performance distributed database and presents information of interest to specific users through individually configurable filters and views. Cisco Info Center Automation functions can be used to perform intelligent processing on the current state of managed objects. Cisco Info Center can build upon existing management systems or applications, therefore, it utilizes existing management skills and minimizes deployment time.
The following documents are available on the Cisco Documentation CD-ROM and are companion documents to this Release Notes:
The following list of documents contains additional information which may help you more fully understand the material described in this manual:
Cisco Info Center Release 1.2 includes the following new features and enhancements.
Cisco Info Center 1.2 operates with SV+ 9.0, 9.1, CWM 9.2.03-9.2.05, IPX 9.1 BPX/IGX release 9.0, 9.1, 9.2. MGX 8220 release 4.0, 4.1, 5.0, and MGX 8850 1.2 for all supported features.
Table 1 summarizes the supported combinations. CIC 1.2 has been tested with CWM version 9.2.03-9.2.05, CiscoView 4.2, IPX 9.1.03, BPX/IGX 9.2, MGX 8220 5.0, and MGX 8850 1.2 with HP Network Node Manager 5.01 in Solaris 2.6 and SV+ 9.1 in Solaris 2.5.1.
| CIC | CWM (SV+) | HPOV | SWSW | MGX 8220 | MGX 8850 | Solaris |
|---|---|---|---|---|---|---|
1.2 | 9.0 | 4.01 | 9.0 | 4.0 | N/A | 2.5.1 |
1.2 | 9.1 | 5.01 | 9.0, 9.1 | 4.0, 4.1 | na | 2.5.1 |
1.2 | 9.2.03-9.2.05 | 5.01 | 9.0,9.1, 9.2 | 4.0, 4.1, 5.0 | 1.2 | 2.6 |
This section describes the system requirements for the Cisco Info Center 1.2 release.
The user can select one of two architectures for installing Cisco Info Center 1.2. The multi-system architecture, a fully distributed architecture, is the recommended architecture. For more information on installation, consult the Cisco Info Center Installation and Configuration manual.
Table 2 summarizes the requirements for the multi-system architecture.
| Application Type | Machine Type | Size of RAM | Hard Disk Drive | OS |
|---|---|---|---|---|
Info Server | Sun Ultra II | 256MB | 200MB | Solaris 2.6 (CWM 9.2) /2.5.1 (SV+ 9.1) |
Info Mediator* | Sun Ultra II or higher | +64MB | +100MB | Solaris 2.6 (CWM 9.2) /2.5.1 (SV+ 9.1) |
Info Admin Desktop** | Sun Workstation | +48MB | +75MB | Solaris 2.6 (CWM 9.2) /2.5.1 (SV+ 9.1) |
Table 3 summarizes the requirements for the single-system architecture.
| Application Type | Machine Type | Size of RAM | Graphic Card Type | Hard Disk Drive | OS |
|---|---|---|---|---|---|
Info Server + Info Mediator* + Info Admin Desktop ** | Sun Ultra II or higher | 512MB | 24 bits | 350MB | Solaris 2.6 |
* Additional requirements for the CWM software. For information on the CWM requirements, refer ti the CWM 9.2 Release Notes or Installation Guide.
** Additional requirements for any products running on that desktop.
In addition, the Sun system must have UNIX/Motif 1.2 or the Common Desktop Environment (CDE) installed.
files before other name services as follows:hosts: files dns nis
| Platform | Version |
IPX | 9.0, 9.1 |
BPX 8600/IGX8400 | 9.0, 9.1,9.2 |
MGX 8220 | 4.0, 4.1, 5.0 |
MGX 8850 | 1.2 |
Note the following points regarding the upgrade procedure.
/opt/Omnibus/log/upgrade.log after running the upgrade script to ensure proper upgrade from 1.1 to 1.2.
To remove the CIC installation you must be root. Complete these steps to remove the installation.
Step 1 Stop the CIC Desktop by selecting Exit from the Conductor.
Step 2 Issue the following command to stop all CIC Server and Mediator(s) processes:
/opt/Omnibus/bin/nco_pa_shutdown
Step 3 To identify all current CIC packages, issue the following command:
pkginfo | grep Info-Center
Step 4 Issue the following command to remove the CIC components:
pkgrm <all current CIC package names>
where the names can be all or some of the following: CICcom, CICdsk, CICgtw, CICjel, CIClic, CICmed, CICpad, CICsrv.
Step 5 Issue the following commands:
rm /etc/init.d/nco rm /etc/rc2.d/S81nco rm /etc/rc1.d/K65nco rm -rf /.omnibus rm -rf /opt/Omnibus
Complete these steps to stop the current CIC processes:
Step 1 Issue the following commands:
setenv OMNIHOME /opt/Omnibus
cd /opt/Omnibus/bin
/nco_pa_shutdown
Step 2 Issue the command /usr/bin/ps -ef | grep nco to make sure that none of the following processes are running:
/opt/Omnibus/bin/solaris2/nco_objserv
/opt/Omnibus/probes/solaris2/nco_p_rttrapd
/opt/Omnibus/probes/solaris2/nco_p_nnm5
/opt/Omnibus/bin/solaris2/nco_pad
/opt/Omnibus/probes/solaris2/nco_p_syslog
Otherwise use kill -9 <pid> to stop any nco processes that are still running.
To start the CIC process, complete these steps.
Step 1 Issue the following commands:
setenv OMNIHOME /opt/Omnibus
cd /opt/Omnibus/bin
./nco_pad
Step 2 Issue the command /usr/bin/ps -ef | grep nco to make sure that the processes shown in Table 5 are running, if installed.
| CIC 1.2 Services | Process Name |
|---|---|
Object Server | /opt/Omnibus/bin/solaris2/nco_objserv |
Process Control | /opt/Omnibus/bin/solaris2/nco_pad |
CWM 9.2.04-9.2.05 Mediator | /opt/Omnibus/probes/solaris2/nco_p_rttrapd |
HPOV Mediator | /opt/Omnibus/probes/solaris2/nco_p_nnm5 |
Syslog Mediator | /opt/Omnibus/probes/solaris2/nco_p_syslog |
Complete these steps to start the license server.
Step 1 Issue the following commands to start the license server:
setenv OMNIHOME /opt/Omnibus
cd /opt/Omnibus/bin
./nco_start_license
Step 2 Issue the following command to make sure that the license server is running
/usr/bin/ps -ef | grep elmd
The following Solaris patches should be installed.
CiscoView should be installed in /opt/CSCOcv and integrated with CWM 9.2.03-9.2.05. Consult the CiscoView documentation for a detailed description.
The CWM Informix Database name should be "stratacom."
The network configuration should include:
<host>@SV+, <host>@NNM5 or <host>@syslog.Discrepancies are reported between the severity level assignments of the HPOV 4.1, 5.01 and CIC 1.x.
CIC 1.x maps MGX alarms to a severity level according to the value of the MGX SNMP varbind: moduleTrapAlarmSeverity. The following table provides the mapping details as used.
| MGX: | CIC Severity Level |
|---|---|
minor (1) | Minor (3 - Yellow) |
major (2) | Major (4 - Mustard) |
dontCare (3) | Warning (2 - SkyBlue) |
N/A | Indeterminate - (1 - Purple) |
HPOV maps the MGX alarms to a severity level according to a static file:
/etc/opt/OV/share/conf/C/StrataCom_trapd.conf
Info Center Release 1.2 works with HP Openview Release 5.01 for Solaris 2.6.
For HP OpenView installation requirements and procedures, please refer to the HP OpenView Network Node Manager Products, Installation Guide
Xnmgraph occasionally gives "no such name" or "wrapped (0->0). Waiting for next" even though the data is available for get as tested by xnmbrowser.
Xnmgraph shows an incremental statistics value that is not consistent with the Text counter display.
CIC 1.2 has been tested with CWM 9.2.03-9.2.05, IPX 9.1, BPX/IGX 9.2 and MGX 8850 1.2 and MGX 8220 5.0 on a Solaris 2.6 setup installed with HPOV 5.01. The following are the known issues in this release:
Table 7 indicates the new alarms that are supported with release 1.2.
| Trap ID | Trap Name | Description |
|---|---|---|
20021 | cpuUtilizationAboveNormal | This trap is generated whenever a BPX/IGX/IPX processor's CPU utilization is above the threshold. The alarm is reported from the node based on an existing interval statistic that is collected for profiling the performance of the node. |
20022 | cpuUtilizationNormal | This trap is generated whenever a BPX/IGX/IPX processor's CPU utilization falls back below the threshold. The alarm is reported from the node based on an existing interval statistic that is collected for profiling the performance of the node. |
20023 | memoryUtilizationAboveNormal | This trap is generated whenever a BPX/IGX/IPX processor's dynamic memory utilization exceeds a fixed threshold. the alarm is reported from the node based on existing statistics that are collected for profiling the performance of the node. |
20024 | memoryUtilizationNormal | This trap is generated whenever a BPX/IGX/IPX processor's dynamic memory utilization falls below a lower threshold indicating the memory allocation has returned to a safe level. The alarm is reported from the node based on existing statistics that are collected for profiling the performance of the node. |
20025 | busFailure | This trap is generated whenever a BPX/IGX/IPX bus fails. |
20026 | busNormal | This trap is generated whenever a BPX/IGX/IPX bus failure clears. |
20050 | nodeAdded | This trap is generated whenever a node is added to the network. |
20051 | nodeDeleted | This trap is generated whenever a node is deleted from the network. |
20052 | nodeNameChanged | This trap is generated whenever a node name is changed. |
20053 | nodeIpAddressChange | This trap is generated whenever a node IP address is changed. |
20054 | nodeStatusChange | This trap is generated whenever a node alarm status changes in the network. |
20055 | cardAdd | This trap is generated whenever a card is added to IGX/IPX/BPX nodes. |
20056 | cardDeleted | This trap is generated whenever a card is deleted from IGX/IPX/BPX nodes. |
20057 | peripheralAdded | This trap is generated whenever a peripheral is added to IGX/IPX/BPX nodes. |
20058 | peripheralDeleted | This trap is generated whenever a peripheral is deleted from IGX/IPX/BPX nodes. |
20059 | trunkAdded | This trap is generated whenever a trunk is added to IGX/IPX/BPX nodes. |
20060 | trunkDeleted | This trap is generated whenever a trunk is deleted from IGX/IPX/BPX nodes. |
20061 | lineAdded | This trap is generated whenever a line is added to IGX/IPX/BPX nodes. |
20062 | lineDeleted | This trap is generated whenever a line is deleted from IGX/IPX/BPX nodes. |
20063 | portAdded | This trap is generated whenever a port is added to IGX/BPX/IPX nodes. |
20064 | portDeleted | This trap is generated whenever a port is deleted from IGX/BPX/IPX nodes. |
20065 | cardModified | This trap is generated when a card is modified on a BPX/IGX/IPX node. If the back card (bc_type field in the CWM `card' database table) is changed, this trap is generated. |
20066 | trunkModified | This trap is generated whenever a trunk is modified on a BPX/IGX/IPX node. |
20067 | portModified | This trap is generated whenever a port is modified from IGX/BPX/IPX nodes. |
20100 | apsClearAlarm | Indicates the APS alarm is cleared. |
20101 | apsActivatedAlarm | APS is enabled on the line. |
20102 | apsDeactivatedAlarm | APS is disabled on the line. |
20103 | apsCardFailedAlarm | APS card is in alarm. |
20104 | apsLineFailedAlarm | APS configured line is in alarm. |
20105 | apsLineSwitchedAlarm | APS lines are switched. |
20106 | apsLineSwitchFailedAlarm | APS line switch failed. |
20107 | apsStbyLineFailAlarm | APS standby line is in alarm. |
25302 | svNodeIpUnreachable | CWM finds a given node to be IP unreachable. |
25303 | svNodeIpReachable | CWM finds a given node to be IP reachable |
28000 | svProcessRestarted | This trap is sent when a process within CWM with the name trapSvProcessName is restarted. |
28001 | svProcessNotRestarted | CWM process terminated. |
28002 | svDatabaseFull | CWM database full. |
28003 | svDatabaseNormal | CWM database is not full. |
28004 | svDiskSpaceLow | CWM detects that the free disk space is running low. |
28005 | svDiskSpaceNormal | CWM detects that the free disk space is no longer low. |
28006 | svTftpError | This trap is sent when a CWM process encounters a TFTP error received from a node. |
28007 | svRtmMaxMgrsRegistered | This trap is sent when CWM RTM process cannot register with an agent (like MGX/VNS node) because the limit for the maximum number of managers to register has been reached. The default limit is 8 managers. |
28008 | svStatisticsParsingError | This trap is sent when the CWM statsparser process encounters an error in parsing a statistics file received from a node. |
28075 | svDatabaseInSync | This trap is sent when a process within CWM has completed synchronizing its database with the configuration in the network. CWM generates network configuration change traps to the external clients after this synchronization is complete. |
30000 | controllerAdded | This trap is generated whenever a virtual switch (VSI controller) is added to the network. |
30001 | controllerDeleted | This trap is generated whenever a virtual switch (VSI controller) is deleted from the network. |
30002 | controllerModified | This trap is generated whenever a VSI controller is modified in the network. |
30100 | vsiInterfaceAdd | This trap is generated whenever a virtual logical interface is added. |
30101 | vsiInterfaceDeleted | This trap is generated whenever a virtual logical interface is deleted |
30102 | vsiInterfaceModified | This trap is generated whenever a virtual logical interface is modified. |
50024 | shelfPowerOverLoadTrap | Indicates that the functionModuleType when inserted raised the total power consumption of the shelf beyond threshold value. functionModuleType value other(1) indicates that a fan tray has been removed, which increases the power consumption value beyond the capacity of remaining fan tray. shelfIntegeratedAlarm is set to the value major(3). When the alarm condition is cleared, the same trap is sent with shelfIntegratedAlarm value set to clear (1). |
50033 | cardResPartTypeChangeTrap | This trap is sent out when the resource partition type is changed. |
50035 | secLineModuleRemovedTrap | Indicates whether or not a particular secondary (bottom) line module has been removed. This is applicable to MGX 8850 only, in a case where the front card (functionModuleType) is a full height card with 2 half height back cards. |
50036 | secLineModuleInsertedTrap | Indicates whether or not a particular secondary (bottom) line module has been inserted. This is applicable to MGX 8850 only, in a case where the front card (functionModuleType) is a full height card with 2 half height back cards. |
50037 | secLineModuleMismatchTrap | Indicates that the front card does not support the secondary (bottom) line module. This is applicable to MGX 8850 only, in a case where the front card (functionModuleType) is a full height card with 2 half height back cards. |
50044 | functionModuleHoldTrap | Indicates that a function module is in the Hold state. |
50052 | atmLineCellFormatTrap | This trap is sent out when the line cell format is changed. PXM lines can be configured to either UNI or NNI cell formats. The STI format is not supported in the MGX 8850 PXM. |
50064 | coreCardSwitchInProgress | This indicates that the switchcc process is in progress, that all the initial checks for switchcc to happen were successful. |
50065 | coreCardSwitchBlocked | This indicates that the switchcc process cannot happen due to the checks failing. Hence a switchcc blocked trap is being sent. This is more like a failure trap. |
50120 | dsx1LineNoAlarmTrap | Indicates no line alarm. Note: for FRSM-2CT3, there can be T1 line within each T3 (28 T1s). |
50121 | dsx1LineInAlarmTrap @Severity=Major, Minor, Warning | Note: for FRSM-2CT3, there can be T1 line within each T3 (28 T1s). |
50122 | dsx1LineLpbkEnableTrap @Severity=Major, Minor, Warning | Note: for FRSM-2CT3, there can be T1 line within each T3 (28 T1s). |
50123 | dsx1LineLpbkDisableTrap @Severity=Major, Minor, Warning | Note: for FRSM-2CT3, there can be T1 line within each T3 (28 T1s). |
50135 | pxmCurClkSourceTrap @Severity=Major, Minor, Warning | Indicates that the current clock source has changed. |
50191 | trapRpmPortAdd | Indicates that a sub interface is added. |
50192 | trapRpmPortDelete | Indicates that a sub interface is deleted. |
50193 | trapRpmPortModify | Indicates that a sub interface is modified. |
50194 | trapRpmPortActive | Indicates that a sub interface is Active. |
50196 | trapRpmChanAdd | Indicates that a RPM channel is added. |
50197 | trapRpmChanDelete | Indicates that an RPM channel is deleted. |
50198 | trapRpmChanModify | Indicates that an RPM channel is modified. |
50199 | trapRpmChanActive | Indicates that an RPM channel is active.
|
50250 | trapImaGTSMchange | Indicate the failure status of the IMA group (GTSM goes UP/DOWN). |
50251 | trapImaCellRateChange | Indicates that the bandwidth of an IMA group changed due to addition/deletion of links to/from the IMA group. |
50311 | trapChanOamLpbkStatus | Sent when the channel Ras_Oam_Loopback_state changes from Failed to Ok or Ok to Failed. It will carry status for a chunk of 256 channels as bitmaps. If the status of only 1 channel belonging to the chunk of 256 changes, trap is seen only for that chunk of 256 channels and not for any other chunk. For e.g., suppose if channel 500 fails the RAS loopback test, trap is sent for the second chunk of 256 channels spanning channel nos 257 to 512. |
50312 | rasDskChksumStatusTrap | Indicates the Status of the SM configuration and FirmWare files. The Trap shows the number of corrupted PRI and Firmware files in the ASC from where it is sent. This trap is sent every time the diagnostics is completed. |
50313 | rasDskBadSectorsTrap | Indicates the number of Bad Sectors in the ASC Hard Disk. If the number of Bad Sectors exceeds the threshold value, the rasDskHealth is set to FAIL. The threshold value is 30% of the total number of Sectors. This Trap is sent every time the diagnostics is completed. |
50315 | pxmCurClkSourceTrap | Indicates that the current clock source has changed. |
50381 | trapGenFrPortActive | Trap that is generated to indicate that a FR logical port has become active. Currently, this trap is used only in all flavors of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50382 | trapGenFrPortFailed | Trap that is generated to indicate that a FR logical port has failed. Currently, this trap is used only in all favors of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50383 | trapGenFrPortDelete | Trap that is generated to indicate that a FR logical port has been deleted. Currently, this trap is used only with the various types of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50384 | trapGenFrPortLoopbackEnabled | Trap that is generated to indicate that loopback on a FR logical port has become active. Currently, this trap is used only in all flavors of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50385 | trapGenFrPortLoopbackDisabled | Trap that is generated to indicate that loopback on a FR logical port has become disabled. Currently, this trap is used only in all flavors of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50386 | trapGenFrPortOvrSubscribed | Trap that is generated to indicate that a FR logical port has become oversubscribed. Currently, this trap is used only in all flavors of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50387 | trapGenFrChanActive | Sent when a FR logical channel becomes active: this trap is currently used only in all flavors of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50388 | trapGenFrChanFailed | Sent when a FR logical channel fails: this trap is currently used only in all flavors of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50389 | trapGenFrChanDelete | Sent when a FR logical channel is deleted: this trap is currently used only in all flavours of FRSM-VHS card (FRSM-2CT3/T3/E3/HS2). |
50713 | trapVismPortFailed | Indicates port Failed. |
50926 | trapCesmChanActiveGeneric | Sent when a CESM Channel becomes active. |
50927 | trapCesmChanDeleteGeneric | Sent when a CESM Channel is deleted. |
50928 | trapCesmChanUnderflowGeneric | Sent when a CESM Channel egress underflows. |
50929 | trapCesmChanOverflowGeneric | Sent when a CESM Channel egress overflows. |
50930 | trapCesmChanCellLossGeneric | Sent when a CESM Channel Egress cell loss occurs. |
50931 | trapCesmChanIdleSuppStartGeneric | Sent when Idle suppression starts on this connection. |
50932 | trapCesmChanIdleSuppStopGeneric | Sent when Idle suppression stops on this connection. |
50933 | trapCesmPortAddedGeneric | Indicates port added (enabled). |
50934 | trapCesmPortActiveGeneric | Indicates port active. |
50935 | trapCesmPortFailedGeneric | Indicates port is failed. |
50936 | trapCesmPortDeleteGeneric | Indicates port is deleted. |
50980 | trapBbIfAdded | Indicates that Broadband Interface on PXM is Added. |
50981 | trapBbIfActive | Indicates that Broadband Interface on PXM is Active. |
50982 | trapBbIfDelete | Indicates that Broadband Interface on PXM is Deleted. |
50983 | trapBbIfFailed | Indicates that Broadband Interface on PXM is Failed (In alarm). |
50984 | trapBbIfCnfChange | Indicates that Broadband Interface on PXM configuration has been modified. |
50985 | trapBbIfRscAlloc | Indicates that Broadband Interface on PXM Resource has been allocated to a network controller (for e.g. PAR). |
50990 | trapBbChanAdded | Indicates that Broadband Channel on user port of PXM is Added. |
50991 | trapBbChanActive | Indicates that Broadband Channel on user port of PXM is Active and no alarms exist. |
50992 | trapBbChanDelete | Sent when a Channel is deleted. |
50993 | trapBbChanFailed | Sent when a Channel fails (In alarm). |
51201 | parNodeStatusChange | This trap is generated when a alarm status of the node (parnNodeId) changes. |
51202 | parNodeParmsChange | This trap is generated when a node (parnNodeId) parameters change. |
51203 | parTrunkAdd | This trap is generated when a new trunk is added in the network |
51204 | parTrunkStatusChange | This trap is generated when the status of the trunk changes or the type of alarm changes. |
51205 | parTrunkDelete | This trap is generated when the trunk is deleted from the network. |
51206 | parTrunkConfig | This trap is generated when the trunk parameters are configured. |
51207 | parConnRouteStateChange | This trap is generated only by the node that masters the connection. |
51208 | parDownConnStateChange | This trap is generated when a connection is downed. This trap is generated only by the node that masters the connection |
During development of Cisco version 1.2, a new rules file was developed to parse Syslog messages from Cisco IOS devices (mainly routers, but any platform that runs IOS). This rules file is an enhancement of previous rules files that did only limited parsing of Cisco IOS messages.
This rules file was developed using messages from IOS version 12.0. The messages in this version should be a superset of previous software versions, so they should be backward compatible with previous versions of the Cisco IOS. Please note that Cisco IOS devices include ATM line cards on the Catalyst devices. Also, note that Cisco IOS messages are mainly platform independent---there are only a small number of facilities that are specific to certain platforms. There is also no way to determine from the messages themselves what hardware platform they came from (unless they are a hardware specific message). Hardware specific message facilities are marked a table that is included in the online CCO documentation.
The rules file was developed with the following information found on CCO.
The "Table of Contents" for Cisco IOS error messages is at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12supdoc/12sems/
index.htm
The structure and format of Cisco IOS error messages is described at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12supdoc/12sems
/emover.htm
Cisco IOS messages are in a specific format:
"FACILITY-SEVERITY-MNEMONIC: Message Text"
For example, "LINEPROTO-5-UPDOWN: Link on Interface eth0 changed state to down".
The SEVERITY field is a number from 0 to 7, with 0 being the most critical. Severity mappings from Cisco Severity to NetCool severities (0-5) are shown in Table 8 below.
By default, the rules file discards any messages set to level "Indeterminate" (which matches Cisco levels 6 and 7). This default can be changed very simply in the rules file.
Each facility has multiple messages associated with it. Many facilities have additional configuration (such as Type 1 and Type 2 settings for generic clears) associated with them, while the majority have no additional configuration past the default. These facilities are still, however, left in the rules file to assist future customer configuration.
Some facilities (especially the CMCC/CIP messages) are preceded with "CARD-SEVERITY-MSG:SLOT" (e.g. "CIP-5-MSG:SLOT7"). This information is stored in Info Server fields (the card is stored in Object Type, and the slot in Slot).
The event format is documented in detail in the Cisco IOS message URL shown above.
Table 8 indicates the severity level mapping between Cisco severity levels and NetCool severity levels.
| Cisco Defined Level | Cisco Description | Info Center Severity |
|---|---|---|
0 - emergency | System unusable | 5 -Critical |
1 - alert | Immediate action needed | 5 - Critical |
2 - critical | Critical condition | 4 - Major |
3 - error | Error condition 3 - | 3 - Minor |
4 - warning | Warning condition | 2 - Warning |
5 - notification | Normal, but significant, condition | 2 - Warning |
6 - informational | Informational message only | 1 - Indeterminate (discarded) |
7 - debugging | Appears during debugging only | 1 - Indeterminate (discarded) |
The properties file should have the "Manager" variable set to Syslog@host where "host" is the name of the host running the syslog probe. This can also be set in the command line. The install script should be set up to configure this when installing the syslog probe.
Routers should be configured to send logging messages to the host where syslog is running. This can be configured with the command "logging IPAddress" where IPAddress is the IP address of the host running the syslog probe.
The /etc/syslog.conf file should be set to forward events to the syslog probe, as documented in the installation manual.
For de-duplication (and any other correlation) to work correctly, Syslog messages from a router should all come from the same source IP address. Ideally, this IP address should be resolvable (either through DNS or /etc/hosts) from the machine running the Syslog Mediator. Cisco recommends that routers have a "loopback" interface, and that you assign an address to the loopback interface.
If Syslog messages are set to come from the loopback interface (using the command logging-source interface loopback0), then the hostname of the router will resolve to the same name. This is necessary, because if not set, the source address of the message will be the router interface of message egress. This may change in a dynamic environment.
If loopback addresses are not used, the command logging-source interface interface should still be used, with an interface chosen that is least likely to go down.
Because there is no way to determine from event messages what type of router or switch is sending messages, the following Classes and NEType have been assigned to Cisco routers and Catalyst switches in the Rules file.
The Syslog rules file does the following:
1. Determines whether the event is a Cisco IOS message by looking for an event preceded by a "%" and followed by some text, followed by a dash and then a number between 0 and 7.
2. Sets @Agent to "CiscoIOS" and the @Summary to $Details past the "%," and jumps in a switch statement to the "CiscoIOS' section.
3. Extracts the Facility, Severity, Mnemonic, and Message Text. If the message is prepended with slot and card information, this is extracted as well, and the slot is placed in @Slot, while the card type is placed in @ObjectType.
4. By default, the Identifier is set to "Node-> Summary," and the AlertGroup to the Facility.
5. The severity is set from the Cisco Severity, based on Table 8.
6. There is then a long switch statement that performs a switch on the Facility. Most entries are blank, as the default behavior is sufficient, but they are left in the statement for future enhancements.
7. In some of the cases (see Table 9 for information on which have been modified) certain events are discarded (for example, those with BRI for interfaces) and others have generic automations (Type 1 and 2) set.
8. After the switch statement, events that still have severity = 1, "Indeterminate" are discarded, except for those that have Type 2 set.
Table 9 summarizes the variables that are set by the rules file.
| Variable/Setting | Comment |
|---|---|
@Manager = syslog@host | Not set by rules file, should be set in syslog.props. |
@Node = $Token4 | This is the name of the router sending the message. |
@Anemone = $Token 4 | Same as @Node. |
@NEAddress = $Token4 | This is only set if $Token4 is an IP address. |
@Agent = "CiscoIOS" | This is the normal setting. |
@AlertGroup = $Facility | This is the facility of the message. |
@Severity = | Set from the Cisco Severity, extracted from message. |
@Summary= | Whole Message, FAC-SEV-MNE: Message Text. |
@Identifier = | @Node à @Summary. This is changed in a few places. |
@AlertKey = | By default, not set. If set, is normally set to interface value. |
@Slot = | Only set if prepended message available. Set to slot number. |
@ObjectType = | Set to the card type (CIP, FEIP, etc). |
Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.
Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.
CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.
You can access CCO in the following ways:
For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Mon Sep 27 18:05:50 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.