|
|
This chapter alphabetically lists and explains the Control System server process. Of particular interest are the WSA_Dispatcher, WSA_Scheduler, and WSA_WatchDog commands.
The file paramlist.dat must exist in the $WSADIR/tcl/data directory and hold a list of all parameters that WSA is able to configure in the networks under its control. This file is generated automatically and released as part of the default system build. The script $WSADIR/etc/mkpl_dat.sh generates the contents of paramlist.dat and must be run whenever the contents of the database table Param_list change.
In the WatchDog, Scheduler, and Dispatcher servers, the -v flags turn on verbose reporting mode for tracking internal events and errors.
The logfile is in the current working directory from which CSCOwsa was invoked, usually $WSADIR/bin, and holds all the trace files.
Default $WSADIR = /opt/CSCOwsa
This section gives the description, syntax, and arguments (listed alphabetically) for the WSA_Audit command.
WSA_Audit connects to SV+ networks known to WSA via access points defined in the WSA database. It runs the same discovery probe as WSA_Probe to determine what nodes, slots, cards, ports, trunks, and connections exist in these networks.
Once discovery is complete, WSA_Audit compares the information it has found with that in the WSA database and produces errata records in the WSA database that can be viewed with the WSA Graphical Client.
WSA_Audit can also compare the network with a file produced earlier by WSA_Probe, producing only errata information on stdout.
WSA_Audit [-d<database>] [-e] [-i<filename>]
[-L <sev>[:<lev>[<sev>[:<lev>]]] [-n<netname>] [-v] [-x]
| Option | Description | Default |
|---|---|---|
-d<database> | The database to use | DEFAULT $WSADATABASE |
-e | List cards, ports, trunks, conns in missing nodes, cards, and ports |
|
-i<file> | File to use | Use the network |
-L <sev>[:<lev>[<sev>[:<lev>]]] where: <sev> <lev>
| Log messages at or above both of these severity levels INFO, WARN, ERR, or SEV 0 to 10 is for stderr is for logfile |
INFO:10
same as the first pair |
-n<netname> | Network to audit, rename the FILE net | All in the database |
-v | Verbose mode, also show software build, version, and initialization status |
|
-x | Command usage explanation |
|
The WSA_Audit process is triggered based on the audit schedule as entered from the WSA Administration GUI. It is imperative that WSA Discovery Server wsadisc is running on the SV+ Solaris server so that network discovery can be made and compared.
To run WSA_Audit manually, do the following:
Step 1 Log in as user wsa on the WSA Solaris server.
Step 2 Ensure that the WSA Discovery Server wsadisc is running on the SV+ Solaris server (refer to section Starting and Stopping the WSA Discovery Server).
Step 3 Execute WSA_Audit as follows (refer to the information earlier in this section for more details):
WSA_Audit
Launch the WSA Explorer application and invoke the Audit Log window using the Tools menu to view the audit results.
This section gives the description, syntax, and arguments (listed alphabetically) for the WSA_Dispatcher command.
The function of the WSA_Dispatcher is to send messages from a centralized WSA control system to multiple networks, via network access points.
WSA_Dispatcher [-d <database>] [-L <sev> [: <lev> [<sev>[:<lev>]]]] [-v] [-x]
| Option | Description | Default |
|---|---|---|
-d<database> | WSA dispatcher database name | wsadisp |
-L <sev>[:<lev>[<sev>[:<lev>]]] where: <sev> <lev> | Log messages at or above both of these severity levels INFO, WARN, ERR, or SEV 0 to 10 is for stderr is for logfile |
INFO:10
same as the first pair |
-v | Verbose mode, also show software build, version, and initialization status |
|
-x | Command usage explanation |
|
This section gives the description, syntax, and arguments (listed alphabetically) for the WSA_Loader command.
WSA_Loader connects to networks known to WSA via access points defined in the WSA database. It runs the same discovery probe as WSA_Probe to determine what nodes, slots, cards, ports, trunks, and connections exist in these networks.
Once discovery is complete, WSA_Loader populates the WSA database with the information it has found, issuing warnings about invalid information from the network and/or in the WSA database.
An alternative method of loading the WSA database is to get WSA_Loader to read an output file from WSA_Probe.
WSA_Loader [-a<ip address> -u<username> -p<password>]-c [<dd/mm/yyyy>][:][<hh:mm:ss>][,[dd/mm/yyyy][:][<hh:mm:dds>]
[] [-d<database>] [-i<file>] [-L<sev>[:<lev>[<sev>[:<lev>]]]] [-n<netname>] [-R<snmp read>] [-T] [-v] [-W<snmp write>] [-x]
| Option | Description | Default |
|---|---|---|
-a<ip address> | ip address of the network access point |
|
-c [<dd/mm/yyyy>][:][<hh:mm:ss>][,[<dd/mm/yyyy>][:][<hh:mm:ss>]] | Calendar slot into which to load objects |
|
-d<database> | Main WSA database to use | DEFAULT $WSADATABASE |
-i<file> | File of network information produced by WSA_Probe |
|
-L <sev>[:<lev>[<sev>[:<lev>]]] where: <sev> <lev>
| Log messages at or above both of these severity levels INFO, WARN, ERR, or SEV 0 to 10 is for stderr is for logfile |
INFO:10
same as the first pair |
-n<netname> | From the database: which network to load From the file: rename all entries to netname | Default_Network |
-p<password> | Command line password at the network access point |
|
-R<snmp read> | snmp read mode | public |
-T | Create card types for unknown card types |
|
-u<username> | Command line user name at the network access point |
|
-v | Verbose mode, also show software build, version, and initialization status |
|
-W<snmp write> | snmp write mode | private |
-x | Command usage explanation |
|
This section gives the description, syntax, and arguments (listed alphabetically) for the WSA_Probe command.
WSA_Probe gains access to a network via a nominated node, and runs a discovery probe to determine what nodes, slots, cards, ports, trunks, and connections exist in this network.
Once discovery is complete, WSA_Probe dumps its findings into flat files for import to spread sheets or loading into a WSA main database using the WSA_Loader utility.
WSA_Probe -n<netname> -u<username> -p<password> [-a<ip address>] [-L<sev>[:<lev>[<sev>:<lev>]]] [-o<filename>][-R<snmp read>] [-v] [-W<snmp write>] [-x]
| Option | Description | Default |
|---|---|---|
-a<ip address> | Hostname of machine on which SV+ is running |
|
-L <sev>[:<lev>[<sev>[:<lev>]]] where: <sev> <lev> | Log messages at or above both of these severity levels INFO, WARN, ERR, or SEV 0 to 10 is for stderr is for logfile |
INFO:10
same as the first pair <sev>:<lev> |
-n<netname> | What to name the network | Default_Network |
-o<filename> | Name of file in which the probe data is dumped. Note: WSA_Probe creates a file containing the data. The name is appended to the file name. | use stdout |
-p<password> | SV+ user password |
|
-R<snmp read> | snmp read community string | public |
-u<username> | SV+ user name |
|
-v | Verbose mode, also show software build, version, and initialization status |
|
-W<snmp write> | snmp write mode | private |
-x | Command usage explanation |
|
This section gives the description, syntax, and arguments (listed alphabetically) for the WSA_Scheduler command.
WSA_Scheduler scans the table of tasks to be actioned, that is add_conns and del_conns (as created by WSA_Watchdog), and sends them to its WSA_Dispatcher early enough for them to be sent to the networks with the required time accuracy. Periodically it asks its WSA_Dispatcher for notification of ended tasks and marks their status in the WSA database.
The sequence of events on it is:
WSA_Scheduler [-.<#1><#2>] [-:<secs1><secs2>] [-c<secs>] [-C<secs>][-d] [-E<secs>] [-i] [-L <sev>[:<lev>[<sev>[:<lev>]]][-m<#>] [-r<secs>] [-s<+><hostnm>] [-v] [-x]
| Option | Description | Default |
|---|---|---|
-.<#1><#2> | #1: Maximum number of task retries #2: Maximum number of task deferrals | DEFAULT 2 DEFAULT 2 |
-:<secs1><secs2> | secs1: Maximum number of task delay seconds for retry secs2: Maximum number of task delay seconds for deferrals | DEFAULT 2 secs DEFAULT 60 secs |
-c | Interval between task progress checks | DEFAULT 20 |
-C | Seconds to allow tasks to complete | DEFAULT 720 |
-d | dbname_database name |
|
-E | secs by which to dispatch tasks early | DEFAULT 20 |
-i | Reconfigure the dispatcher for new access points |
|
-L <sev>[:<lev>[<sev>[:<lev>]]] where: <sev> <lev> | Log messages at or above both of these severity levels INFO, WARN, ERR, or SEV 0 to 10 is for stderr is for logfile |
INFO:10
same as the first pair |
-m<#> | Maximum number of contiguous message sends | DEFAULT 20 |
-r<secs> | Interval between scanning for tasks | DEFAULT 60 |
-s<+><hostnm> | Scheduler name to dispatcher | DEFAULT sched1 Note: The + means re-create the virtual scheduler |
-v | Verbose mode, also show software build, version, and initialization status |
|
-x | Command usage explanation |
|
This section gives the description, syntax, and arguments (listed alphabetically) for the WSA_WatchDog command.
WSA_WatchDog does the following three things:
All of the three previously listed items can either not be done at all, be done once, or be done periodically, and the WSA_WatchDog itself can run continuously or periodically, as defined by the user in the CSCOwsa script.
The generation of tasks must de done in advance of the task's required action-date and time to ensure that the Scheduler can accurately schedule tasks at the appropriate date and time.
WSA_WatchDog -u -l [-a <secs>] [-A]-c [<dd/mm/yyyy>][:][<hh:mm:ss>][,[dd/mm/yyyy][:][<hh:mm:dds>]
[] [-d] [-i<secs> [@<secs>]-L
[<sev>[:<lev>[<sev>[:<lev>]]] [-m<secs> [@<secs>]] [-n] [-s<secs>] [-v] [-x] [-z<secs>]
| Option | Description | Default |
|---|---|---|
-a<secs> | Seconds in advance to prepare tasks Note: Pick up all tasks up to -a seconds in advance of required live time. | DEFAULT 1800 (30 mins) |
-A | aid---Identifier of Audit_Result to use | DEFAULT latest |
-c [<dd/mm/yyyy>][:][<hh:mm:ss>][,[<dd/mm/yyyy>][:][<hh:mm:ss>]] | Calendar slot into which to load objects |
|
-d | database---Main WSA database to use | DEFAULT $WSADATABASE |
-i<secs> | Interval between task creates | DEFAULT 20*60 (20 mins) |
-l | Lenient mode Note: Allow becoming live when the cease_date is expired |
|
-L <sev>[:<lev>[<sev>[:<lev>]]] where: <sev> <lev> | Log messages at or above both of these severity levels INFO, WARN, ERR, or SEV 0 to 10 is for stderr is for logfile |
INFO:10
same as the first pair |
-n | network---Network to use | DEFAULT all |
-s<secs> | Ignore tasks that are more than <secs> seconds late Note: Do not pick up tasks more than <secs> seconds old | DEFAULT 64800 (18 hours) |
-u | Allow becoming live when the authorized flag is not set Note: If this -u argument is not supplied, ensure that the connection request is authorized using the connection properties in WSA GUI. |
|
-v | Verbose mode, also show software build, version, and initialization status |
|
-x | Command usage explanation |
|
| Option | Description | Default |
|---|---|---|
-m<secs>[@<secs>] | Interval between mending attempts | DEFAULT 0 (Don't Mend) |
| Option | Description | Default |
|---|---|---|
-z<secs> | Interval between checking for completed tasks | DEFAULT 300 seconds |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Fri Apr 23 14:10:58 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.