BW EMSAdminGuide R19.Sp1
BW EMSAdminGuide R19.Sp1
Release 19.sp1
Version 1
WWW.BROADSOFT.COM
BroadWorks ® Guide
Copyright Notice
Copyright © 2014 BroadSoft, Inc.
All rights reserved.
Any technical documentation that is made available by BroadSoft, Inc. is proprietary and confidential and is
considered the copyrighted work of BroadSoft, Inc.
This publication is for distribution under BroadSoft non-disclosure agreement only.
No part of this publication may be duplicated without the express written permission of BroadSoft, Inc.
9737 Washingtonian Boulevard, Gaithersburg, MD 20878.
BroadSoft reserves the right to make changes without prior notice.
Trademarks
BroadWorks® and BroadWorks Assistant-Enterprise™, BroadWorks Call Center™, BroadWorks
Communicator™, BroadWorks Receptionist™, BroadWorks Deployment Studio™ are trademarks of
BroadSoft, Inc.
Microsoft, MSN, Windows, and the Windows logo are registered trademarks of Microsoft Corporation.
Other product names mentioned in this document may be trademarks or registered trademarks of their
respective companies and are hereby acknowledged.
This document is printed in the United States of America.
18.0 1.0 Transformed document in the following ways: November 25, 2011
• Combined content from BroadWorks EMS Administration Guide
(Part I and Part II), BroadWorks EMS User Guide (Part I and Part
II), and BroadWorks EMS Product Description.
• Converted document to DITA-based format.
18.0 3.0 Integrated additional content from the BroadWorks EMS Product March 24, 2012
Description.
18.0 3.0 Integrated content from the BroadWorks Enterprise/Service Provider May 15, 2012
Subscriber Migration Tool Administration Guide in addition to feedback
from Technical Support.
19.0 1.0 Updated document with the following Release 19.0 content: October 12, 2012
• Managing Licenses on page 441
• Configure License Reporting on page 346
19.0 3.0 Updated content in the following sections for EV192306: May 29, 2013
• Configure License Reporting on page 346
• Managing Licenses on page 441
19.0 4.0 Updated content in the following section for EV190411: July 31, 2013
• Using Patch Management on page 419
19.0 5.0 Updated content in the following sections for EV192055: August 12, 2013
• Add BroadWorks Servers with Multiple Interfaces on page 39
• Discover BroadWorks Servers on page 40
• Add Node on page 36
19.0 6.0 Updated content in the following section for EV190411 and published October 10, 2013
document:
• BroadSoft Patch Center Substitution on page 438
19.sp1 1.0 Updated the following sections for EV175535: July 16, 2014
• Perform Service Pack Migration on page 388
• Add Service Pack Migration Task on page 391
• Configure User Migration on page 353
• Add User Migration Configuration on page 355
• Execute User Migration on page 373
19.sp1 1.0 Edited content and published document. July 28, 2014
BroadWorks offers a performance monitoring program designed to help BroadSoft customers monitor
their system resources. You only need to set up your system so that it sends an alert to the BroadSoft
Technical Assistance Center (TAC) in the event of a health status change. When TAC receives the alert,
it investigates the cause of the status change (if you grant BroadSoft remote access to your system) and
provides you with the results of the analysis and the recommendations.
To participate in the program:
1) Open a TAC ticket in ExtraView, which is a request to participate.
2) Enter the following information:
• Title: Performance Monitoring Program
• Description: Send us details on how to participate in the BroadSoft performance monitoring
program.
• Severity: Set to "Informational".
• Remote access information. For information on secure remote access recommendations, see
BroadSoft TAC Overview from the BroadSoft Xchange.
• Address (Fully Qualified Domain Name [FQDN] or Internet Protocol [IP]) of a Simple Network
Management Protocol (SNMP) server that can relay e-mail from your Element Management System
(EMS) to BroadSoft TAC.
The EMS provides multiple human-to-machine and machine-to-machine interfaces. The EMS makes use
of the existing interfaces of the BroadWorks managed elements. From an EMS-layer perspective, the
EMS communicates southbound to the BroadWorks managed elements through the following interfaces:
• Simple Network Management Protocol (SNMP)
• Network Server (NS) OSS Portal API
• Application Server (AS) Portal API
• Secured Shell (SSH)
• Software Manager API (BCCT)
The EMS uses the existing interfaces of the BroadWorks managed elements. From an EMS layer
perspective, the EMS communicates southbound to BroadWorks managed elements via the following
interfaces, to perform specific functions:
• BroadWorks Managed Element Simple Network Management Protocol (SNMP) Agent – This interaction
allows the EMS to receive SNMP traps that report application alarms, retrieve the performance
management values, send SNMP maintenance requests, and have access to the BroadWorks
managed object MIBs.
• BroadWorks Managed Element SNMP Subagents – Since the SNMP agent is also an SNMP proxy
to other SNMP subagents (Basic SMC, Sun MIB-II, and TimesTen), the EMS has access to the
subagents' SNMP characteristics as well.
• Network Server Operations Support System (OSS) – This EMS interaction uses various Network
Server OSS commands such as getHostingNes and getHostingNeNodes to enable discovery of other
BroadWorks nodes.
• Network Server and Application Server Portal APIs – This EMS interaction uses the portal application
programming interface (API) command PrepareLoginToken to enable automatic web cut through.
In addition, the EMS acts as an eXtensible Markup Language (XML) and SNMP proxies for BroadWorks-
managed elements to communicate northbound to the Network Management System (NMS) layer (and
above).
• The SNMP northbound interface has several roles. It reports EMS performance management values
and processes SNMP maintenance requests meant to control the EMS via a dedicated Management
Information Base (MIB). It is also responsible for forwarding traps received from managed objects to a
higher management system. In addition, the EMS allows the proxying of performance measurements
1.5.1 Maps/Topology
In the EMS, the Topology feature is called Maps. The EMS Maps shows a graphical representation of the
EMS network.
Managed Elements Auto-configuration and Network Auto-discovery
The Auto-configuration and Network Auto-discovery features are interrelated. The Auto-configuration
feature relies on the Network Auto-discovery feature to determine the managed elements. However,
the Auto-configuration feature is triggered first upon the addition of a node. For the provided Network
Server seed, the auto-discovery occurs only once the auto-configuration for the provided Network Server
seed has succeeded. Using this approach, the network auto-discovery confirms that a valid UNIX user
name and password exist for the provided Network Server seed. As auto-discovery identifies other
nodes for addition, the EMS uses the same approach by invoking the auto-configuration feature first.
Nevertheless, a successful auto-configuration is not mandatory, that is, the EMS adds a node even if the
auto-configuration has failed. Upon success, having the Auto-configuration feature invoked first allows the
EMS to add an SNMP node. Note that as auto-configuration populates the SNMP access list, the EMS
successfully queries the SNMP. If the auto-configuration fails, the EMS adds a regular node.
Managed Elements Auto-configuration
As auto-discovery identifies nodes for addition, the EMS runs the Auto-configuration feature. The EMS
uses Secure Shell (SSH) to run remote scripts on the managed node.
The remote script performs the following tasks:
• Auto-populates the EMS IP address to the SNMP access control list (ACL) and trap table (TT)
• The EMS populates the trap table using the OID shared model. Upon receiving traps, the EMS parses
the message text to identify relevant content.
• Auto-populates the EMS IP address to the Network Server OSS access list
• Auto-populates the EMS IP address to the Application Server OCI access list
• Auto-populates the EMS IP address to the BCCT access list
• Auto-configures syslog trap forwarding to the EMS
• Retrieves the platform type
• Retrieves OS information, BroadWorks server type and active release, and the Software Manager
version.
• Puts scripts on each node to collect OS performance information
The above actions allow the automatic enabling of many EMS functionalities. For example, the EMS starts
receiving traps immediately. In addition, the EMS has periodic audits of managed elements to maintain
EMS information for the access control list and trap table. Following the completion of a BroadWorks
network auto-discovery, the EMS generates an event (fault management) to report the auto-configuration
results. The event becomes an alarm if the auto-configuration was not successful. Otherwise, the EMS
generates only an information event.
The auto-configuration relies on the UNIX user name and password for individual nodes to be configured
on the EMS. These are required to update SNMP in the Times Ten database and to log in the the
Command Line Interface (CLI). The user has the following options to configure the UNIX user names and
passwords of managed elements on the EMS:
• Manually manage individual user names and passwords for each node.
• Manually ensure a single user name and password is available across all nodes.
• Enable a centralized user name and password on all managed elements using NIS PLUS (LDAP-
based).
Network Auto-discovery Configuration
1.5.2 Inventory
For inventory management, the EMS provides an information base of BroadWorks components and
devices across the network. For more information on the inventory, see Overview of Inventory on page
85.
NOTE: This behavior excludes alarms that should always be cleared manually. For example, any alarm
that reports a software error or requires contacting BroadSoft personnel must be cleared manually. For
these exceptions, the alarm indicates the need for a manual clear by the end user.
The EMS trap correlation agent parses the trap's content to simulate support for state-full traps. The
correlation requires parsing into the trap's alarm text to ensure uniqueness of individual alarms.
The following traps follow this behavior:
• bwNetworkDeviceIsFailed, bwNetworkDeviceIsOnline
• bwPMOpenClientServerStartupFailed
• bwPMOpenClientServerLaunched.
Centralized Syslog
This feature aims at centralizing the UNIX syslog capabilities for all managed objects at the EMS. The goal
is to allow an EMS administrator to review all system logs.
The EMS converts syslog messages to EMS events where the category is set to "syslog", thus enabling
EMS administrators to view syslog in a typical EMS events view. Since the syslog integration uses ems
events, it leverages existing ems capabilities to raise ems syslog alarms when an event has a severity with
a criticality.
The integration focuses on the following items:
• Identifying which syslog messages are forwarded to the EMS.
• Specifying how the EMS maps the received syslog messages to EMS events.
This feature aims at centralizing the UNIX syslog capabilities for all managed objects at the EMS. The goal
is to allow an EMS administrator to review all system logs. The EMS converts syslog messages to EMS
events where the category is set to "syslog", thus enabling EMS administrators to view syslog in a typical
EMS events view. Since the syslog integration uses ems events, it leverages existing ems capabilities
to raise ems syslog alarms when an event has a severity with a criticality. The integration focuses on the
following items: n Identifying which syslog messages are forwarded to the EMS. Specifying how the EMS
maps the received syslog messages to EMS events. The following figure summarizes the steps involved
Audible Alarms
The BroadWorks EMS allows administrators to associate an audio file to each alarm severity level. The
administrator also specifies if the audio file is to be played only once or repeatedly.
The audio file for the highest alarm severity gets played if alarms are present at multiple severity levels.
An audible cut-off (ACO) capability allows users to silence audible alarms. If a new alarm comes in after
the audible cut-off is activated, the audible alarm is reactivated.
For more information on fault management, see Overview of Fault Management on page 167.
1.5.5 Security
The EMS provides the following security features:
• Fine-grained and extensible authorization including support for users, groups, roles, operations, and
object views
• Secure authentication and access control, including Secure Sockets Layer (SSL)
Default User Groups
For addressing the various needs of EMS users and to contain the wider implications of the centralized
functionality, the EMS provides four distinct user-groups:
• CentralizedUsers
• CentralizedAdmin
• Admin
• Users
The users whose list of groups includes the group named CentralizedUsers have the ability to view
information regarding the centralized functionality. Such operations are typically located in the Centralized
Management and Centralized Services tabs of the Web Client interface. For example, a user in the
CentralizedUsers group may view all the information about the patches of remote nodes from the Patch
Management tree item of the Centralized Management tab.
The users whose list of groups includes the group named CentralizedAdmin have the ability to perform
remote operations that have a direct impact on the remote nodes that are within the EMS span of control.
For example, a user in the CentralizedAdmin group may apply a patch on a remote node from the Patch
Management tree item of the Centralized Management tab.
The users whose list of groups includes the group named Admin have the ability to perform configuration
changes whose impacts are limited to the EMS itself. Such operations are typically located in the Admin
tab. For example, a user in the Admin group may set the patch download frequency from the BroadSoft
Patch Center Schedule tree item of the Admin tab.
The users whose list of groups includes the group named Users have the ability to view information about
the information local to the EMS.
Security Breach Detection
The EMS generates a bwEMSLoginFailed alarm and deactivates the user account when a security breach
is detected, that is when a subscriber enters an incorrect password for the same user more than three
consecutive times (default value). Only an EMS administrator can re-enable an account. The security
administration tool available from the applet interface provides a list of disabled accounts. An administrator
must select the Setting Profile button from the User Profile tab to re-enable an account and set the user
status to enable.
1.5.7 Administration
EMS Administration includes configuring discovery, traps, notifications, events, alarms MIBs, and audit
trails, amongst other features. For more information on EMS Administration, see Admin Tab on page
290.
This section provides information on how to use the Element Management System (EMS) web interface,
as well as, the start-up five procedures to get the EMS up and running.
This section describes the following:
• Using EMS Web Interface on page 33
• Start-up Procedures on page 35
• Configuring Northbound Trap Forwarding on page 46
• Configuring Southbound Interface on page 48
Figure 5: Login
5) In the User Name text box, enter your user name.
6) In the Password text box, enter your password. By default, the user name and password are "admin"
and "admin" respectively, for newly installed systems.
7) Click Login. The Web Client page appears.
8) To log out from the Web Client, click Logout.
For more information
Module Tabs
The different module tabs available in the Web Client are the following:
• Maps
• Fault
• Performance
• Inventory
• Admin
• Centralized Networking
Click the tab to display its contents.
Module Menus
A tree containing various nodes is provided on the left side of the Web Client. This tree is different for
each tab. Click each of the tree nodes to display related information on the module view frame of the Web
Client.
Module View
The module view presents detailed information associated with the selected module menu.
Menus are available as drop-down lists, links, and icons . The drop-down list contains a set of
commands you can perform over multiple elements on a page. To perform the same operation over more
than one network element, click the check boxes of those elements, and then select the option on the drop-
down list.
Health Summary Panel
The Health Summary panel gives an overview of the system health. For more information on how to read
and act on the information presented in this panel, see Overview of Performance Monitoring on page
233.
This panel is below the module tree and is displayed on all the module pages. When you click the count
on this panel, the alarms of a specific severity are displayed in the corresponding alarm panel. For more
information about alarms, see section Overview of Alarms on page 180.
2.2.1 Prerequisites
Before beginning to apply the steps documented in this section, all the installation steps must have been
completed. This includes running the post-installation setup and successfully applying all EMS released
patches. The EMS requires specific ports to be opened when using a firewall. For more information, see
the relevant sections documented in the BroadWorks Server Security Guide.
If the server is deployed in a redundant configuration, the database replication must be running and both
peers must be synchronized. An EMS administrator can use the BroadWorks UNIX command repctl status
to confirm this.
Both Front End (FE) and Back End (BE) components of the EMS server must be in a fully running state.
You can use the BroadWorks UNIX command showrun to confirm this.
Finally, this guide assumes that you have logged in with a valid EMS administrator user ID. For information
on configuring the command line interface (CLI) Hypertext Transfer Protocol (HTTP) interfaces to log in
to the Web Client, see the the BroadWorks Application Server Server EMS Configuration Management
Guide.
NOTE:
The Configuring Node Access link can be used for all types of BroadWorks-managed nodes.
The web browser pop-up blocker must be disabled as the Configuring Node Access link opens a new
window.
User Name This text box specifies the user name for Secure Shell (SSH) access to the node.
Password This text box specifies the user password for SSH access to the node.
IP Address This text box specifies the node's Internet Protocol (IP) address.
BroadWorks Platform This option specifies whether the node is a BroadWorks server.
Auto Detect BroadWorks This check box determines whether the node type is detected by the add node functionality.
Type
Server Type This drop-down list specifies the server type of the node.
Non-BroadWorks Platform This option specifies whether the node is a non-BroadWorks server.
Non-BroadWorks Platform This drop-down list specifies the server type of the node.
Server Type
Group This drop-down list specifies the name of the group associated with the node.
Associated NS (Network This drop-down list specifies the name of the Network Server seed associated with the node.
Server) Seed
SNMP Port This text box specifies the Simple Network Management Protocol (SNMP) port number.
Enable V3 This check box controls whether the SNMP v3 is enabled on the node.
User Name This text box specifies the SNMP v3 user name.
Context Name This text box specifies the SNMP v3 context name.
To add a node:
1) From the Discovery submenu, click Add Node. The Add Node page appears.
2) In the User Name text box, enter the SSH user name.
3) In the Password text box, enter the SSH password.
4) In the IP Address text box, enter the IP address of the node.
5) If the node is a BroadWorks server:
a) Select BroadWorks Platform, or
b) Select Auto Detect BroadWorks Type to let the add node process identify the type of node.
c) Optionally, unselect Auto Detect BroadWorks Type and select the node type from the Server Type
drop-down list.
6) If the node is not a BroadWorks server:
a) Select Non-BroadWorks Platform.
b) Select the node type from the Non-BroadWorks Platform Server Type drop-down list.
7) Select the Group to associate the node with from the drop-down list.
NOTE: The EMS uses group data for clustering and farm association. Therefore, the same group
can be reused upon adding more nodes of the same server cluster or farm. A group must contain only
nodes of the same server type.
8) Select the Associated NS (Network Server) Seed to associate the node with, from the drop-down list.
NOTE: The Network Server seed association allows the display of the node on the corresponding
BroadWorks maps.
9) In the SNMP Port text box, enter the SNMP port number.
10)In the Read Community text box, enter the read community.
NOTE: Add an Xtended Services Platform or Provisioning Server node before you perform a Discovery
procedure.
NOTE: The auto-discovery procedure is not recommended for BroadWorks servers with multiple
interfaces. These must be added using the manual Add Node procedure to ensure that all the functions
provided by the EMS work properly. For information, see Add BroadWorks Servers with Multiple
Interfaces on page 39.
NOTE: If you select Disable future rediscovery, the Keep any existing configuration check box is
automatically disabled.
6) If you selected Enable future rediscovery, enter the interval time in the New rediscovery interval (in
minutes) text box.
7) Click Submit Request. A message displaying "Discovery request successfully submitted" appears.
The EMS is processing the validity of the discovery request. For information on reviewing the results of
a discovery, see Review Discovery Results on page 42.
NOTE: Only events are visible since an event of severity "info" does not generate an alarm.
NOTE: Only events are visible since an event of the severity "info" does not generate an alarm.
NOTE: The threshold modifiers mechanism overlays the platform type mechanism in earlier EMS versions
where the multiplicator factor was mapped to one of three platform sizes (small, medium, and large). As
threshold values must increase based on improved processors, the threshold modifier mechanism allows
the EMS to avoid the need for new platform sizes (for example, large, extra-large, and so on) on an on-
going basis.Therefore, beginning with Release 16.0, this section is deprecated. It is still listed because
the threshold modifier functionality remains fully backward-compatible with the information provided by the
platform type.
No manual configuration should be required if you use one of the hardware configurations documented in
the BroadWorks Recommended Hardware Guide [4].
To determine if your hardware matches a default configuration, refer to the “Multiplicator Factors” sheet of
the EMS Polling Objects and Thresholds Definition Document [17].
The EMS requires knowledge of the platform type (also known as the platform size) for the platform name
retrieved from the discovered managed nodes. The platform type is used by the Health Status Monitoring
feature. (By default, the EMS uses a small platform type for all platform names that have a platform name
reported as “unknown”.) The EMS reports an alarm when it retrieves a platform name that has a platform
type that is unknown.
NOTE: Wait at least one hour after the inital discovery before auditing the statistics. This is required to
ensure that enough time has lapsed to collect OS data.
To audit statistics:
1) From the Inventory tab, select Nodes. The Nodes page appears.
2) Click a server to audit. The Node Properties page displays the statistics for that server appear.
NOTE: Make sure that the Network Management System (NMS) is listening on port 162 and for Enterprise
OID = 6431 (BroadSoft entOID).
The EMS can forward to multiple destinations, simply duplicate the line TRAP-REDIRECTION for every
destination with the corresponding IP address and port. When a destination is added to the file and the file
is saved the changes does not take effect immediately. The parameter Refresh_Time is used to instruct
the EMS to periodically read the file for new destination entries. It is only after the EMS reads the file, at the
end of the refresh cycle, that the traps start to be forwarded to the new destinations. The default refresh
time is 300 seconds.
EMS forward events created by EMS to NMS
This configuration allows the BroadWorks EMS to forward all events/alarms – both received and/or
generated at the EMS level – to a NMS-level management system. In this context, the NMS system
receives all events/alarms re-packaged under a distinct snmp traps (using Enterprise OID 2162). Then,
the NMS must implement a trap parser (as a mediation layer) to map the trap OID fields of the AdventNet-
WebNMS-MIB (as per your own requirements).
You can load this MIB from the SNMP Tools tab of the BW EMS Web client. Please look for the section
named alertNotificationMib (.1.3.6.1.4.1.2162.4.3.8) to understand the list of fields available.
The set-up for enabling the NorthBound interface requires to edit the config file named
V1V2TrapForwardingTable.xml .
For releases before Release 17.0, the file is located at:
cd /usr/local/broadworks/bw_base/public_html/conf/jmx_agent/conf
For Release 17.0 and above, the file is located at:
cd /usr/local/broadworks/apps/active/EMSBackEnd/conf/jmx_agent/conf
Primary Server This parameter specifies the southbound interface of the primary
EMS from a drop-down list.
This tree on the left-hand side of the page provides access to the following:
Menu Description Icon
Enter web username This text box specifies the user name for the web portal.
Enter web password This text box specifies the user password for the web portal.
Re-enter web password This text box specifies the reconfirmed user password for the web portal.
Enter CORBA port number This text box specifies the CORBA port number.
Enter BCCT port number This text box specifies the BroadWorks Common Communication Transport (BCCT) port number.
Secure This check box controls whether the BCCT port is secure.
Enter ssh username This text box specifies the user name for the secure shell (SSH).
Enter ssh password This text box specifies the user password for the SSH.
Reenter ssh password This text box specifies the reconfirmed user password for the SSH.
Enter ssh port number This text box specifies the SSH port number.
Enter telnet port number This text box specifies the telnet port number.
SNMP Port This text box specifies the SNMP port number.
User Name This text box specifies the SNMP v3 user name.
Context Name This text box specifies the SNMP v3 context name.
5) Click Submit Request to complete the configuration. To cancel the request, click Cancel Request.
NOTE: Add an Xtended Services Platform or Provisioning Server node before you perform a Discovery
procedure.
NOTE: The auto-discovery procedure is not recommended for BroadWorks servers with multiple
interfaces. These must be added using the manual Add Node procedure to ensure that all the functions
provided by the EMS work properly. For information, see Add BroadWorks Servers with Multiple
Interfaces on page 39.
NOTE: If you select Disable future rediscovery, the Keep any existing configuration check box is
automatically disabled.
6) If you selected Enable future rediscovery, enter the interval time in the New rediscovery interval (in
minutes) text box.
7) Click Submit Request. A message displaying "Discovery request successfully submitted" appears.
The EMS is processing the validity of the discovery request. For information on reviewing the results of
a discovery, see Review Discovery Results on page 42.
User Name This text box specifies the user name for Secure Shell (SSH) access to the node.
Password This text box specifies the user password for SSH access to the node.
IP Address This text box specifies the node's Internet Protocol (IP) address.
BroadWorks Platform This option specifies whether the node is a BroadWorks server.
Auto Detect BroadWorks This check box determines whether the node type is detected by the add node functionality.
Type
Server Type This drop-down list specifies the server type of the node.
Non-BroadWorks Platform This option specifies whether the node is a non-BroadWorks server.
Non-BroadWorks Platform This drop-down list specifies the server type of the node.
Server Type
Group This drop-down list specifies the name of the group associated with the node.
Associated NS (Network This drop-down list specifies the name of the Network Server seed associated with the node.
Server) Seed
SNMP Port This text box specifies the Simple Network Management Protocol (SNMP) port number.
Enable V3 This check box controls whether the SNMP v3 is enabled on the node.
User Name This text box specifies the SNMP v3 user name.
Context Name This text box specifies the SNMP v3 context name.
To add a node:
1) From the Discovery submenu, click Add Node. The Add Node page appears.
2) In the User Name text box, enter the SSH user name.
3) In the Password text box, enter the SSH password.
4) In the IP Address text box, enter the IP address of the node.
5) If the node is a BroadWorks server:
a) Select BroadWorks Platform, or
b) Select Auto Detect BroadWorks Type to let the add node process identify the type of node.
c) Optionally, unselect Auto Detect BroadWorks Type and select the node type from the Server Type
drop-down list.
6) If the node is not a BroadWorks server:
a) Select Non-BroadWorks Platform.
b) Select the node type from the Non-BroadWorks Platform Server Type drop-down list.
7) Select the Group to associate the node with from the drop-down list.
NOTE: The EMS uses group data for clustering and farm association. Therefore, the same group
can be reused upon adding more nodes of the same server cluster or farm. A group must contain only
nodes of the same server type.
8) Select the Associated NS (Network Server) Seed to associate the node with, from the drop-down list.
NOTE: The Network Server seed association allows the display of the node on the corresponding
BroadWorks maps.
9) In the SNMP Port text box, enter the SNMP port number.
10)In the Read Community text box, enter the read community.
General Information
Device Type This text box displays the device type of the node.
Is Managed? This option controls whether the node is managed or "unmanaged". When
a managed object is "unmanaged", status polling and data collection stops.
Therefore, threshold calculation is not done. Traps for the node continue to
be processed. To disable the processing of traps, see the Configure Fault
Management Parameters on page 303.
Is DHCP Enabled? This text box indicates whether Dynamic Host Configuration Protocol (DHCP) is
enabled on the node.
Status This text box displays the overall alarm status of the node. The highest alarm
severity level associated with the node is displayed.
Display Name This input box displays the managed object's name that is used on the web
interface.
Netmask This drop-down list specifies the network mask of the node.
UnamePlatform This text box displays the platform type of the node. This value corresponds to
the result of the command uname -i when it is run on the node.
SnmpAgentUnreachable This text box indicates whether the SNMP agent of the node is unreachable.
ConfiguredMemory This text box displays the amount of memory available on the node.
Threshold Name(s) This text box lists the threshold names that apply to the node when computing
(Multiplicator) performance.
bwName-NodeId This text box displays the name of the nodes clustered together with the node
ID within the cluster.
bwIpForWeb This text box displays the IP address to be used to access the web interface of
the node.
bwIsPrimary This text box indicates whether the node is the primary server of the cluster.
bwNsSeed This text box displays the IP address of the Network Server seed that was used
to discover the node. When a node is added manually, BW-Other is displayed.
bwManuallyAdded This text box indicates whether the node was manually added through "Add
Node" or discovered through a Network Server seed.
Server Type This text box displays the type of server. Valid values include: Application
Server (AS), Network Server (NS), Media Server (MS), Xtended Services
Platform (XSP), Profile Server (PS), Web Server (WS), Execution Server
(XS), Call Detail Server (CDS), Access Mediation Server (AMS), Conferencing
Server (CS), and Database Server (DBS).
bwPlatformName This text box displays the name of the hardware platform. It is taken from the
product name available from the command dmidecode (available on x86_64
server only).
bwPlatformType This text box displays the platform type from a performance point of view.
Processor This text box displays the processor architecture of the node.
Operating System This text box displays the operating system running on the node.
BW Version This text box displays the version of BroadWorks running on the node.
bw.config.managementMode
This is an internal BroadWorks text box.
Modifier Factor(s) This text box displays the modifier factor used by the performance module to
compute the statistics and threshold for the node.
BroadWorksServer This text box indicates whether the node is a BroadWorks Server. If the value is
"true", the node is a BroadWorks Server. If the value is "false", it is not.
SWManager version This text box displays the version of the Software Manager running on the
node.
NodeDesc This text box describes the node within the cluster context.
NumberOfCores This text box specifies the number of cores available on the node.
Is Status polling This option controls status polling on the node. If the value is set to "yes", the
enabled? status of the node (alarms and events) is available through the web interface. If
the value is set to "false", the status is not available.
Last Status Change This text box displays the time of the last change of status.
Time
Last Status Update This text box displays the time stamp of the last time the node was polled for its
Time status.
Failure Threshold This input box specifies the number of consecutive failed status poll attempts to
declare the object as failed. A status change event for the object is generated
when the status polling for the object fails for "Failure Threshold" times.
Failure Count This text box displays the number of times consecutive status poll attempts for
this object have failed. The count is reset to "0" once the object is declared as
failed or when the object recovers after the failure. When the value of "Failure
Count" equals that of "Failure Threshold", the object is declared failed.
Tester for Status This drop-down list provides the ability to select the action to be performed on
Polling status polling for the managed object. When the selected value is "Max", the
status of the interface is propagated to the managed node. If the value "User
Test" is used, the User Class Name parameter should be set with the name of
the user tester class.
User Class Name This input box specifies the class to be invoked for status polling. Set this
parameter only if the selected value of the Tester for Status Polling parameter
is "User Test".
Status Polling Interval This input box specifies the interval between status polling attempts for this
group.
List of Interfaces This drop-down list displays the list of interfaces available on this node.
Parent Object This text box specifies the parent of the managed object.
Is Container? This text box specifies whether the managed object is a container.
Parent Networks This drop-down list displays the IP address of the parent network(s).
List of Groups This drop-down list identifies the names of the groups to which the node
belongs.
Is Group? This text box specifies whether the managed object is a group.
SNMP Port This text box displays the SNMP port number that the EMS uses to retrieve
SNMP values from this interface.
Read Community This text box displays the read community associated with this interface.
SNMP Version This text box displays the SNMP version running on this interface.
System Object This text box displays the node's sysOID MIB-II value.
Identifier (SysOID)
Base MIBs This text box displays the list of base Management Information Bases (MIBs)
implemented by the SNMP agent of the node.
Write Community This text box specifies the write community associated with this node.
System Description This text box displays the node's sysDescr MIB-II value.
(sysDescr)
Interfaces
Index This text box displays the hardware index of the interface.
Status This text box displays the overall alarm status of the interface. The highest
alarm severity level associated with the interface is displayed. Supported
values are: critical(1), major(2), minor(3), warning(4), clear(5).
MAC This text box displays the Media Access Control (MAC) address of this
interface.
CPU Utilization If available, this diagram illustrates the amount of CPU utilization on the node.
Memory Utilization If available, this diagram illustrates the amount of memory utilization on the
node.
Disk Utilization If available, this diagram illustrates the amount of disk utilization on the node.
Other Graphs
INTERFACE_out_octets This graph displays the total number of octets transmitted out of the interface,
including framing characters.
INTERFACE_in_octets This graph displays the total number of octets received on the interface,
including framing characters.
memUsageSwap This graph displays the amount of memory swapped to disk per second.
virtualMemWaitThreads This graph displays the number of processes waiting for run time.
waitThreadsRatio This graph displays the ratio of wait threads per CPU instance.
blockedVsWaitThreads This graph displays the difference between the blocked threads and the wait
threads.
diskUsageSlash This graph displays the disk usage for the "/" directory.
diskUsageBw This graph displays the disk usage for the "/bw" directory.
CPUIdle This graph displays the percentage of the CPU idle time.
CPUSys This graph displays the percentage of the CPU used by the system.
CPUUsr This graph displays the percentage of the CPU used by the user programs.
ASOciRequestsInPerSecond
This graph displays the number of Open Client Interface (OCI) requests
attempted per second.
diskUsageTmp This graph displays the disk usage for the /tmp directory.
maxDiskIOSvc This graph displays the maximum disk Input Output (IO) svc time.
maxDiskIOBsyVsSvc This graph displays the maximum disk IO busy time versus svc time.
maxXsJavaHeap This graph displays the maximum Java heap used by the Execution Server.
totalXsJavaHeap This graph displays the total Java heap used by the Execution Server.
percentXsJHeap This graph displays the percentage of the Java heap used by the Execution
Server.
dsnInUse This graph displays the percentage of usage of the DataStore Name (DSN).
ASOciAvgRequestDelay This graph displays the average time (in milliseconds based on a rolling
average of the last 100 samples) it takes to process an OCI request.
ASOciMaxRequestDelay This graph displays the longest OCI request response time.
AStoSMTPtraffic This graph displays the total number of messages sent attempted on the
primary Simple Mail Transfer Protocol (SMTP) server.
ASNbOfUsers This graph displays the number of users configured on the node.
ASActiveCalls This graph displays the number of active calls on the node.
ASSysIntQueueTimeAvgCallHalf
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgRegAdapt(1000usec)
This graph displays the average registration queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxRegAdapt(msec)
This graph displays the largest registration queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgCallPThreadDBAccess(1000usec)
This graph displays the average database access from call processing queue
holding time (in milliseconds).
ASSysIntQueueTimeMaxCallPThreadDBAccess(msec)
This graph displays the largest database access from call processing queue
sample holding time (in milliseconds).
ASSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)
This graph displays the average voice mail queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxVoiceMailInAdapt(msec)
This graph displays the largest voice mail queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgAcctOutAdapt(1000usec)
This graph displays the average accounting queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxAcctOutAdapt(msec)
This graph displays the largest accounting queue sample holding time (in
milliseconds).
ASSipMsgPerSecond This graph displays the number of Session Initiation Protocol (SIP) messages
(per second).
ASSipRegistersInPerSecond
This graph displays the number of SIP register messages (per second).
ASSipOptionsPerSecond This graph displays the number of SIP option messages (per second).
ASSipSubscribeNotifyPerSecond
This graph displays the number of SIP subscribe messages (per second).
ASSipAvgCallSetupDelayThis graph displays the average time (in milliseconds) it takes between
the receipt of an INVITE message for the origination of a new call and the
transmission of an INVITE (SiIPterminator), Notification Request (RQNT)
(Media Gateway Control Protocol [MGCP] terminator with in-band ringback), or
Create Connection (CRCX) (MGCP terminator without in-band ringback) to the
primary device of the original called party (for intra-group call) or to the network
element of the original called party (for a call to the Public Switched Telephone
Network [PSTN]).
ASSipMaxCallSetupDelay(msec)
This graph displays the longest SIP setup-signal delay.
ASSipAvgAnswerDelay(msec)
This graph displays the average time (in milliseconds) between the receipt of a
200 OK message indicating answer or a NTFY off-hook indicating answer and
the transmission of a 200 OK indicating answer to the originator.
ASSipMaxAnswerDelay(msec)
This graph displays the longest SIP answer-signal delay.
ASSysIntQueueTimeAvgSIPEncodeQ(1000usec)
This graph displays the average SIP encoding queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxSIPEncodeQ(msec)
This graph displays the largest SIP encoding queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgSIPCallDecodeQ(1000usec)
This graph displays the average SIP decoding queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxSIPCallDecodeQ(msec)
This graph displays the largest SIP decoding queue sample holding time (in
milliseconds).
ASMgcpMsgPerSecond This graph displays the number of MGCP messages (per second).
ASMgcpAvgDialToneDelay(msec)
This graph displays the average MGCP dial tone delay time (in milliseconds).
ASMgcpMaxDialToneDelay(msec)
This graph displays the largest dial tone delay time (in milliseconds).
ASMgcpAvgCallSetupDelay(msec)
This graph displays the average MGCP call setup delay time (in milliseconds).
ASMgcpMaxCallSetupDelay
This graph displays the largest MGCP call setup delay time (in milliseconds).
(msec)
ASMgcpAvgAnswerDelay(msec)
This graph displays the average MGCP answer delay time (in milliseconds).
ASMgcpMaxAnswerdelay(msec)
This graph displays the largest MGCP answer delay time (in milliseconds).
ASSysIntQueueTimeAvgCallHalf(1000usec)T1
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)T1
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPEncodeQ(1000usec)
This graph displays the average MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPEncodeQ(msec)
This graph displays the largest MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgCallHalf(1000usec)T2
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)T2
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPDecodeQ(1000usec)
This graph displays the average MGCP decode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPDecodeQ(1000usec)
This graph displays the largest MGCP decode queue delay time (in
milliseconds).
ASCapMsgPerSecond This graph displays the number of Client Application Protocol (CAP) messages
handled (per second).
ASNbOfMigratedUsers This graph displays the number of users migrated to the secondary Application
Server.
hrStorageAllocationUnits_RAM
This graph displays the memory allocation unit.
Device_INTERFACE_out_octets
This graph displays the number of octets sent over the network.
Device_INTERFACE_in_octets
This graph displays the number of octets received over the network.
InterfaceOutUtilization This graph displays the percentage of the interface utilization in output.
InterfaceInUtilization This graph displays the percentage of the interface utilization in input.
ASSysIntQueueTimeAvgSIPEncodeQ(1000usec)T1
This graph displays the average SIP encode queue delay time (in milliseconds).
ASSysIntQueueTimeMaxSIPEncodeQ(msec)T1
This graph displays the largest SIP encode queue delay time (in milliseconds).
ASSysIntQueueTimeAvgSIPCallDecodeQ(1000usec)T1
This graph displays the average SIP call decode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxSIPCallDecodeQ(msec)T1
This graph displays the largest SIP call decode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPEncodeQ(1000usec)T1
This graph displays the average MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPEncodeQ(msec)T1
This graph displays the largest MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)T1
This graph displays the average voice mail queue delay time (in milliseconds).
ASSysIntQueueTimeMaxVoiceMailInAdapt(msec)T1
This graph displays the largest voice mail queue delay time (in milliseconds).
ASSysIntQueueTimeAvgRegAdapt(1000usec)T1
This graph displays the average registration queue delay time (in milliseconds).
ASSysIntQueueTimeMaxRegAdapt(msec)T1
This graph displays the largest registration queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)T1
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSipMsgPerSecond This graph displays the number of SIP messages (per second).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipDecodeQ(1000usec)
This graph displays the largest SIP decode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipEncodeQ(msec)
This graph displays the largest SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipDecodeQ(msec)
This graph displays the largest SIP decode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)T2
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)T1
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)T2
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)T1
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)T2
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipEncodeQ(msec)T2
This graph displays the largest SIP encode queue delay time (in milliseconds).
Alarm Status
Status This column displays the status of the alarm. Values include: Critical, Major,
Minor, Warning, Info, and Clear.
Source – Alarm Name This column displays the name of the alarm or the category of the alarm. For
or Category more information, see the BroadWorks Fault and Alarm Interface Specification.
Date/Time This column displays the date and time the alarm was issued.
Alarm Details This column displays the alarm description. It is also a link to the details of the
alarm on the Fault tab. For more information, see View Alarm Properties on
page 186.
NOTE: The menu is different based on the BroadWorks server type. The Peer Ctl Status and Rep Ctl
Status commands are only available for the Application Server and the Network Server. These commands
do not appear for other servers.
NOTE: Remote commands are not available for the Conferencing Server.
Command Description
BW Show Run This command is used to view all active BroadWorks processes.
An empty list means the application is not running.
BW Show Version This command is used to view the active BroadWorks release
and applied patches.
BW Health Mon This command is used to monitor and report the status of a
BroadWorks server.
BW CPU Mon This command runs the CPU monitoring script (for CPU idle
percentage and memory usage).
BW Tech Support This command is used to report the server software version,
the BroadWorks process and Solaris process status, the IP
configuration, the redundancy status, and other diagnostics.
BW List Port In Use This command provides a list of all Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP) ports
configured to be used by BroadWorks.
BW View SNMP Access List This command is used to view the list of IP addresses
configured in the SNMP access list of the node (for SNMP
performance measurement [PM] request).
BW View Trap Table This command is used to view the list of IP addresses
configured in the SNMP trap table of the node. The traps
generated by the node are sent to IP addresses specified on this
list.
BW Peer Ctl List This command is used to list all cluster peers.
BW Rep Ctl Status This command is used to get the status of file and database
replication. A lock file is created in /var/broadworks/lock /repctl
to prevent multiple instances from running simultaneously.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
ifInOctets This column displays the number of input octets to the interface.
ifOutOctets This column displays the number of output octets from the interface.
ifOutDiscards This column displays the number of output discards from the interface.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
tcpConnLocalAddress This column displays the local address of the TCP connection.
tcpConnLocalPort This column displays the local port of the TCP connection.
tcpConnRemAddress This column displays the remote address of the TCP connection.
tcpConnRemPort This column displays the remote port of the TCP connection.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
ipNetToMediaPhysAddress This column displays the physical address of the IPNet to Media.
ipNetToMediaNetAddress This column displays the network address of the IPNet to Media.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode".
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode".
Enter web username This text box specifies the user name for the web portal.
Enter web password This text box specifies the user password for the web portal.
Re-enter web password This text box specifies the reconfirmed user password for the web portal.
Enter CORBA port number This text box specifies the CORBA port number.
Enter BCCT port number This text box specifies the BroadWorks Common Communication Transport (BCCT) port number.
Secure This check box controls whether the BCCT port is secure.
Enter ssh username This text box specifies the user name for the secure shell (SSH).
Enter ssh password This text box specifies the user password for the SSH.
Reenter ssh password This text box specifies the reconfirmed user password for the SSH.
Enter ssh port number This text box specifies the SSH port number.
Enter telnet port number This text box specifies the telnet port number.
SNMP Port This text box specifies the SNMP port number.
User Name This text box specifies the SNMP v3 user name.
Context Name This text box specifies the SNMP v3 context name.
5) Click Submit Request to complete the configuration. To cancel the request, click Cancel Request.
NOTE: Add an Xtended Services Platform or Provisioning Server node before you perform a Discovery
procedure.
NOTE: The auto-discovery procedure is not recommended for BroadWorks servers with multiple
interfaces. These must be added using the manual Add Node procedure to ensure that all the functions
provided by the EMS work properly. For information, see Add BroadWorks Servers with Multiple
Interfaces on page 39.
NOTE: If you select Disable future rediscovery, the Keep any existing configuration check box is
automatically disabled.
6) If you selected Enable future rediscovery, enter the interval time in the New rediscovery interval (in
minutes) text box.
7) Click Submit Request. A message displaying "Discovery request successfully submitted" appears.
The EMS is processing the validity of the discovery request. For information on reviewing the results of
a discovery, see Review Discovery Results on page 42.
Complete View Displays the list of all the managed elements: networks,
groups, nodes, and interfaces.
Networks Displays the list of all the managed networks on your EMS
network. From this list, you can configure any network.
Groups Displays the list of all the managed groups on your EMS
network. From this list, you can configure any group.
Nodes Displays the list of all the managed nodes (servers) on your
EMS network. From this list, you can configure any node.
Interfaces Displays the list of all the managed interfaces on your EMS
network. From this list, you can configure any interface.
Display Name This column displays the name of the managed object as it appears on the EMS maps.
Status This column displays the status of the managed object. When the managed object is "unmanaged",
this column displays a gray icon "?". When the managed object is "managed", a red (Critical),
orange (Major), yellow (Minor), blue (Warning), or green (Healthy) arrow icon appears.
NOTE: If there have not been any events triggered for the selected managed object, the page
displays a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
Custom view name This text box defines the name of the child view.
First drop-down list This drop-down list includes the properties available to define this view. These include:
• name: includes managed objects based on their names
• status: includes managed objects based on their status. Possible status values are: critical,
major, minor, warning, info, and clear.
• ipAddress: includes managed objects based on their IP addresses
• managed: includes managed objects depending on whether they are currently managed
• type: includes managed objects of a specific type (for example, bwserver-app, SnmpNode, and
so on)
• snmpport: includes managed objects by SNMP port
• version: includes managed objects by their version number
• isSNMP: includes managed objects depending on whether they run on SNMP
• statusPollEnabled: includes managed objects depending on whether they are enabled to poll for
status
• pollInterval: includes managed objects based on their polling interval
• statusUpdateTime: includes managed objects based on the time of status update
• statusChangeTime: includes managed objects based on the time of status change
• isDHCP: includes managed objects depending on whether they run on the Dynamic Host
Configuration Protocol (DHCP)
• isNode: includes managed objects depending on whether they are nodes
• isInterface: includes managed objects depending on whether they are interfaces
• isRouter: includes managed objects depending on whether they are routers
• isNetwork: includes managed objects depending on whether they are networks
Second drop-down list This drop-down list includes the Boolean statements available to define this view. These include:
• equals
• not equals
• starts with
• ends with
• contains
• does not contain
7) To preview the results of this view, click Preview Results. The view appears.
8) To add this view to the Inventory menu, click Add Child View. This view appears on the Inventory
menu.
Tasks to perform from this page
To edit the view criteria of a child view from the complete view of the inventory:
1) From any View page, (Complete View, Network View, Group View, Node View, Interface View), click
Edit View Criteria. The Edit Topology View Criteria page appears.
2) In the Custom view name text box, type the name of the child view. This input box is mandatory.
3) Select the property from the first drop-down list.
4) Select the Boolean statement from the second drop-down list.
5) In the text box, type the view criteria.
6) To add additional criteria, click More and repeat steps 3 through 5.
7) To preview the results of this view, click Preview Results. The view appears.
8) To save the changes to this view, click Apply. This view appears on the Inventory menu.
NOTE: When a view is deleted, all of its child views are also removed.
4.2.1.3 Search
Use the Search page to search for alarms, events, or managed objects.
To search:
1) From a view page, click Search and complete the following:
NOTE: If there have not been any events triggered for the selected managed object, the page displays
a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
General Information
Device Type This text box displays the device type of the node, group, or interface.
Is Managed? This option controls whether the node, group, or interface is managed or "unmanaged". When
a node, group, or interface is "unmanaged", status polling and data collection stops. Therefore,
threshold calculation is not done. Traps for the node, group, or interface continue to be processed.
To disable the processing of traps, see the Configure Fault Management Parameters on page 303.
IP Address This text box specifies the IP address of the node, group, or interface.
Is DHCP Enabled? This text box displays whether Dynamic Host Configuration Protocol (DHCP) is enabled on the node,
group, or interface.
Status This option displays the overall alarm status of the node. The highest alarm severity level associated
with the node, group, or interface is displayed.
Display Name This input box displays the name of the node, group, or interface that is used on the web interface.
Netmask This drop-down list specifies the network mask of the node, group, or interface.
Is Status polling enabled? This option controls status polling on the node, group, or interface. If the value is set to "yes", the
status of the node, group, or interface (alarms and events) is available through the web interface. If
the value is set to "false", the status is not available.
Last Status Update Time This text box displays the time stamp of the last time the node, group, or interface was polled for its
status.
User Class Name This text box specifies the class to be invoked for status polling. Set this parameter only if the
selected value of the Tester for Status Polling parameter is "User Test".
Failure Count This text box displays the number of times the EMS has failed to poll the node, group, or interface.
Tester for Status Polling This drop-down list provides the ability to select the action to be performed on status polling for the
node, group, or interface. When the selected value is "Max", the status of the interface is propagated
to the node. If the value "User Test" is used, the User Class Name parameter should be set with the
name of the user tester class.
Last Status Change Time This text box displays the time stamp of the last time the status of the node was changed.
Failure Threshold This text box displays the maximum number of occurrences of a failure before an alarm threshold is
reached.
Status Polling Interval This text box indicates the frequency that the node is polled for its status (in seconds).
Discovery Settings
Discover Status This text box displays the status of Discovery on the network.
Start/Resume Discovery This text box appears if the discovery command is currently available for this network.
List of Nodes This text box displays the list of discovered nodes on this network.
Sub Networks This text box displays the subnetworks included on this network.
Parent Netmask This text box displays the parent netmask for this network.
List of Interfaces This text box displays the list of interfaces on this network.
Sub Netmasks This text box displays the subnetmasks included on this network.
Parent Network This text box displays the parent network on this network.
Group
CPU Utilization This text box displays the Central Processing Unit (CPU) utilization of this network at the time of the
last polling.
Memory Utilization This text box displays the current memory utilization of the network at the time of the last polling.
Disk Utilization This text box displays the current disk utilization of the network at the time of the last polling.
Alarm Status
Status This column displays the status of the alarm. Values include: Critical, Major, Minor, Warning, Info,
and Clear.
Source – Alarm Name or This column displays the name of the alarm or the category of the alarm. For more information, see
Category the BroadWorks Fault and Alarm Interface Specification.
Date/Time This column displays the date and time the alarm was issued.
Alarm Details This column displays a link to the details of the alarm on the Fault tab. For more information on
alarms, see the Overview of Alarms on page 180.
NOTE: If there have not been any events triggered for the selected managed object, the page displays
a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
General Information
Device Type This text box displays the device type of the node.
Is Managed? This option controls whether the node is managed or "unmanaged". When
a managed object is "unmanaged", status polling and data collection stops.
Therefore, threshold calculation is not done. Traps for the node continue to
be processed. To disable the processing of traps, see the Configure Fault
Management Parameters on page 303.
Is DHCP Enabled? This text box indicates whether Dynamic Host Configuration Protocol (DHCP) is
enabled on the node.
Status This text box displays the overall alarm status of the node. The highest alarm
severity level associated with the node is displayed.
Display Name This input box displays the managed object's name that is used on the web
interface.
Netmask This drop-down list specifies the network mask of the node.
UnamePlatform This text box displays the platform type of the node. This value corresponds to
the result of the command uname -i when it is run on the node.
SnmpAgentUnreachable This text box indicates whether the SNMP agent of the node is unreachable.
ConfiguredMemory This text box displays the amount of memory available on the node.
Threshold Name(s) This text box lists the threshold names that apply to the node when computing
(Multiplicator) performance.
bwName-NodeId This text box displays the name of the nodes clustered together with the node
ID within the cluster.
bwIpForWeb This text box displays the IP address to be used to access the web interface of
the node.
bwIsPrimary This text box indicates whether the node is the primary server of the cluster.
bwNsSeed This text box displays the IP address of the Network Server seed that was used
to discover the node. When a node is added manually, BW-Other is displayed.
bwManuallyAdded This text box indicates whether the node was manually added through "Add
Node" or discovered through a Network Server seed.
Server Type This text box displays the type of server. Valid values include: Application
Server (AS), Network Server (NS), Media Server (MS), Xtended Services
Platform (XSP), Profile Server (PS), Web Server (WS), Execution Server
(XS), Call Detail Server (CDS), Access Mediation Server (AMS), Conferencing
Server (CS), and Database Server (DBS).
bwPlatformName This text box displays the name of the hardware platform. It is taken from the
product name available from the command dmidecode (available on x86_64
server only).
bwPlatformType This text box displays the platform type from a performance point of view.
Processor This text box displays the processor architecture of the node.
Operating System This text box displays the operating system running on the node.
BW Version This text box displays the version of BroadWorks running on the node.
bw.config.managementMode
This is an internal BroadWorks text box.
Modifier Factor(s) This text box displays the modifier factor used by the performance module to
compute the statistics and threshold for the node.
BroadWorksServer This text box indicates whether the node is a BroadWorks Server. If the value is
"true", the node is a BroadWorks Server. If the value is "false", it is not.
SWManager version This text box displays the version of the Software Manager running on the
node.
NodeDesc This text box describes the node within the cluster context.
NumberOfCores This text box specifies the number of cores available on the node.
Is Status polling This option controls status polling on the node. If the value is set to "yes", the
enabled? status of the node (alarms and events) is available through the web interface. If
the value is set to "false", the status is not available.
Last Status Change This text box displays the time of the last change of status.
Time
Last Status Update This text box displays the time stamp of the last time the node was polled for its
Time status.
Failure Threshold This input box specifies the number of consecutive failed status poll attempts to
declare the object as failed. A status change event for the object is generated
when the status polling for the object fails for "Failure Threshold" times.
Failure Count This text box displays the number of times consecutive status poll attempts for
this object have failed. The count is reset to "0" once the object is declared as
failed or when the object recovers after the failure. When the value of "Failure
Count" equals that of "Failure Threshold", the object is declared failed.
Tester for Status This drop-down list provides the ability to select the action to be performed on
Polling status polling for the managed object. When the selected value is "Max", the
status of the interface is propagated to the managed node. If the value "User
Test" is used, the User Class Name parameter should be set with the name of
the user tester class.
User Class Name This input box specifies the class to be invoked for status polling. Set this
parameter only if the selected value of the Tester for Status Polling parameter
is "User Test".
Status Polling Interval This input box specifies the interval between status polling attempts for this
group.
List of Interfaces This drop-down list displays the list of interfaces available on this node.
Parent Object This text box specifies the parent of the managed object.
Is Container? This text box specifies whether the managed object is a container.
Parent Networks This drop-down list displays the IP address of the parent network(s).
List of Groups This drop-down list identifies the names of the groups to which the node
belongs.
Is Group? This text box specifies whether the managed object is a group.
SNMP Port This text box displays the SNMP port number that the EMS uses to retrieve
SNMP values from this interface.
Read Community This text box displays the read community associated with this interface.
SNMP Version This text box displays the SNMP version running on this interface.
System Object This text box displays the node's sysOID MIB-II value.
Identifier (SysOID)
Base MIBs This text box displays the list of base Management Information Bases (MIBs)
implemented by the SNMP agent of the node.
Write Community This text box specifies the write community associated with this node.
System Description This text box displays the node's sysDescr MIB-II value.
(sysDescr)
Interfaces
Index This text box displays the hardware index of the interface.
Status This text box displays the overall alarm status of the interface. The highest
alarm severity level associated with the interface is displayed. Supported
values are: critical(1), major(2), minor(3), warning(4), clear(5).
MAC This text box displays the Media Access Control (MAC) address of this
interface.
CPU Utilization If available, this diagram illustrates the amount of CPU utilization on the node.
Memory Utilization If available, this diagram illustrates the amount of memory utilization on the
node.
Disk Utilization If available, this diagram illustrates the amount of disk utilization on the node.
Other Graphs
INTERFACE_out_octets This graph displays the total number of octets transmitted out of the interface,
including framing characters.
INTERFACE_in_octets This graph displays the total number of octets received on the interface,
including framing characters.
memUsageSwap This graph displays the amount of memory swapped to disk per second.
virtualMemWaitThreads This graph displays the number of processes waiting for run time.
waitThreadsRatio This graph displays the ratio of wait threads per CPU instance.
blockedVsWaitThreads This graph displays the difference between the blocked threads and the wait
threads.
diskUsageSlash This graph displays the disk usage for the "/" directory.
diskUsageBw This graph displays the disk usage for the "/bw" directory.
CPUIdle This graph displays the percentage of the CPU idle time.
CPUSys This graph displays the percentage of the CPU used by the system.
CPUUsr This graph displays the percentage of the CPU used by the user programs.
ASOciRequestsInPerSecond
This graph displays the number of Open Client Interface (OCI) requests
attempted per second.
diskUsageTmp This graph displays the disk usage for the /tmp directory.
maxDiskIOSvc This graph displays the maximum disk Input Output (IO) svc time.
maxDiskIOBsyVsSvc This graph displays the maximum disk IO busy time versus svc time.
maxXsJavaHeap This graph displays the maximum Java heap used by the Execution Server.
totalXsJavaHeap This graph displays the total Java heap used by the Execution Server.
percentXsJHeap This graph displays the percentage of the Java heap used by the Execution
Server.
dsnInUse This graph displays the percentage of usage of the DataStore Name (DSN).
ASOciAvgRequestDelay This graph displays the average time (in milliseconds based on a rolling
average of the last 100 samples) it takes to process an OCI request.
ASOciMaxRequestDelay This graph displays the longest OCI request response time.
AStoSMTPtraffic This graph displays the total number of messages sent attempted on the
primary Simple Mail Transfer Protocol (SMTP) server.
ASNbOfUsers This graph displays the number of users configured on the node.
ASActiveCalls This graph displays the number of active calls on the node.
ASSysIntQueueTimeAvgCallHalf
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgRegAdapt(1000usec)
This graph displays the average registration queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxRegAdapt(msec)
This graph displays the largest registration queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgCallPThreadDBAccess(1000usec)
This graph displays the average database access from call processing queue
holding time (in milliseconds).
ASSysIntQueueTimeMaxCallPThreadDBAccess(msec)
This graph displays the largest database access from call processing queue
sample holding time (in milliseconds).
ASSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)
This graph displays the average voice mail queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxVoiceMailInAdapt(msec)
This graph displays the largest voice mail queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgAcctOutAdapt(1000usec)
This graph displays the average accounting queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxAcctOutAdapt(msec)
This graph displays the largest accounting queue sample holding time (in
milliseconds).
ASSipMsgPerSecond This graph displays the number of Session Initiation Protocol (SIP) messages
(per second).
ASSipRegistersInPerSecond
This graph displays the number of SIP register messages (per second).
ASSipOptionsPerSecond This graph displays the number of SIP option messages (per second).
ASSipSubscribeNotifyPerSecond
This graph displays the number of SIP subscribe messages (per second).
ASSipAvgCallSetupDelayThis graph displays the average time (in milliseconds) it takes between
the receipt of an INVITE message for the origination of a new call and the
transmission of an INVITE (SiIPterminator), Notification Request (RQNT)
(Media Gateway Control Protocol [MGCP] terminator with in-band ringback), or
Create Connection (CRCX) (MGCP terminator without in-band ringback) to the
primary device of the original called party (for intra-group call) or to the network
element of the original called party (for a call to the Public Switched Telephone
Network [PSTN]).
ASSipMaxCallSetupDelay(msec)
This graph displays the longest SIP setup-signal delay.
ASSipAvgAnswerDelay(msec)
This graph displays the average time (in milliseconds) between the receipt of a
200 OK message indicating answer or a NTFY off-hook indicating answer and
the transmission of a 200 OK indicating answer to the originator.
ASSipMaxAnswerDelay(msec)
This graph displays the longest SIP answer-signal delay.
ASSysIntQueueTimeAvgSIPEncodeQ(1000usec)
This graph displays the average SIP encoding queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxSIPEncodeQ(msec)
This graph displays the largest SIP encoding queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgSIPCallDecodeQ(1000usec)
This graph displays the average SIP decoding queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxSIPCallDecodeQ(msec)
This graph displays the largest SIP decoding queue sample holding time (in
milliseconds).
ASMgcpMsgPerSecond This graph displays the number of MGCP messages (per second).
ASMgcpAvgDialToneDelay(msec)
This graph displays the average MGCP dial tone delay time (in milliseconds).
ASMgcpMaxDialToneDelay(msec)
This graph displays the largest dial tone delay time (in milliseconds).
ASMgcpAvgCallSetupDelay(msec)
This graph displays the average MGCP call setup delay time (in milliseconds).
ASMgcpMaxCallSetupDelay
This graph displays the largest MGCP call setup delay time (in milliseconds).
(msec)
ASMgcpAvgAnswerDelay(msec)
This graph displays the average MGCP answer delay time (in milliseconds).
ASMgcpMaxAnswerdelay(msec)
This graph displays the largest MGCP answer delay time (in milliseconds).
ASSysIntQueueTimeAvgCallHalf(1000usec)T1
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)T1
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPEncodeQ(1000usec)
This graph displays the average MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPEncodeQ(msec)
This graph displays the largest MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgCallHalf(1000usec)T2
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)T2
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPDecodeQ(1000usec)
This graph displays the average MGCP decode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPDecodeQ(1000usec)
This graph displays the largest MGCP decode queue delay time (in
milliseconds).
ASCapMsgPerSecond This graph displays the number of Client Application Protocol (CAP) messages
handled (per second).
ASNbOfMigratedUsers This graph displays the number of users migrated to the secondary Application
Server.
hrStorageAllocationUnits_RAM
This graph displays the memory allocation unit.
Device_INTERFACE_out_octets
This graph displays the number of octets sent over the network.
Device_INTERFACE_in_octets
This graph displays the number of octets received over the network.
InterfaceOutUtilization This graph displays the percentage of the interface utilization in output.
InterfaceInUtilization This graph displays the percentage of the interface utilization in input.
ASSysIntQueueTimeAvgSIPEncodeQ(1000usec)T1
This graph displays the average SIP encode queue delay time (in milliseconds).
ASSysIntQueueTimeMaxSIPEncodeQ(msec)T1
This graph displays the largest SIP encode queue delay time (in milliseconds).
ASSysIntQueueTimeAvgSIPCallDecodeQ(1000usec)T1
This graph displays the average SIP call decode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxSIPCallDecodeQ(msec)T1
This graph displays the largest SIP call decode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPEncodeQ(1000usec)T1
This graph displays the average MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPEncodeQ(msec)T1
This graph displays the largest MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)T1
This graph displays the average voice mail queue delay time (in milliseconds).
ASSysIntQueueTimeMaxVoiceMailInAdapt(msec)T1
This graph displays the largest voice mail queue delay time (in milliseconds).
ASSysIntQueueTimeAvgRegAdapt(1000usec)T1
This graph displays the average registration queue delay time (in milliseconds).
ASSysIntQueueTimeMaxRegAdapt(msec)T1
This graph displays the largest registration queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)T1
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSipMsgPerSecond This graph displays the number of SIP messages (per second).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipDecodeQ(1000usec)
This graph displays the largest SIP decode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipEncodeQ(msec)
This graph displays the largest SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipDecodeQ(msec)
This graph displays the largest SIP decode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)T2
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)T1
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)T2
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)T1
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)T2
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipEncodeQ(msec)T2
This graph displays the largest SIP encode queue delay time (in milliseconds).
Alarm Status
Status This column displays the status of the alarm. Values include: Critical, Major,
Minor, Warning, Info, and Clear.
Source – Alarm Name This column displays the name of the alarm or the category of the alarm. For
or Category more information, see the BroadWorks Fault and Alarm Interface Specification.
Date/Time This column displays the date and time the alarm was issued.
Alarm Details This column displays the alarm description. It is also a link to the details of the
alarm on the Fault tab. For more information, see View Alarm Properties on
page 186.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
ifInOctets This column displays the number of input octets to the interface.
ifOutOctets This column displays the number of output octets from the interface.
ifOutDiscards This column displays the number of output discards from the interface.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
tcpConnLocalAddress This column displays the local address of the TCP connection.
tcpConnLocalPort This column displays the local port of the TCP connection.
tcpConnRemAddress This column displays the remote address of the TCP connection.
tcpConnRemPort This column displays the remote port of the TCP connection.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
ipNetToMediaPhysAddress This column displays the physical address of the IPNet to Media.
ipNetToMediaNetAddress This column displays the network address of the IPNet to Media.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode".
NOTE: If there have not been any events triggered for the selected managed object, the page displays
a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
General Information
Device Type This text box displays the device type of the group.
Is Managed? This option controls whether the group is managed or "unmanaged". When a managed object is
"unmanaged", status polling and data collection stops. Therefore, threshold calculation is not done.
Traps for the node continue to be processed. To disable the processing of traps, see Configure
Fault Management Parameters on page 303.
Status This text box displays the overall alarm status of the group. The highest alarm severity level
associated with the group is displayed.
Display Name This text box displays the managed object's name that is used on the web interface.
Is Status polling enabled? This option controls status polling on the group. If the value is set to "yes", the status of the group
(alarms and events) is available through the web interface. If the value is set to "false", the status is
not available.
Last Status Update Time This text box displays the time stamp of the last time the group was polled for its status.
User Class Name This text box specifies the class to be invoked for status polling. Set this parameter only if the
selected value of the Tester for Status Polling parameter is "User Test".
Failure Count This text box displays the number of times consecutive status poll attempts for this object have
failed. The count is reset to "0" once the object is declared as failed or when the object recovers
after the failure. When the value of "Failure Count" equals that of "Failure Threshold", the object is
declared failed.
Tester for Status Polling This drop-down list provides the ability to select the action to be performed on status polling for the
managed object. If the value "User Test" is used, the User Class Name parameter should be set
with the name of the user tester class.
Last Status Change Time This text box displays the time stamp of the last time the status of the group was changed.
Failure Threshold This input box specifies the number of consecutive failed status poll attempts, to declare the object
as failed. A status change event for the object is generated when the status polling for the object
fails for "Failure Threshold" times.
Status Polling Interval This text box specifies the interval between status polling attempts for this group.
Parent Object This text box specifies the parent of the managed object.
Is Container? This text box specifies whether the managed object is a container.
Group Members This drop-down list identifies the managed nodes that are members of the group.
List of Groups This drop-down list identifies the names of the groups to which the object belongs.
Is Group? This text box specifies whether the managed object is a group.
Other Graphs
CPUBusyGroup This graph displays the amount of utilization of busy CPU in the group.
NOTE: If there have not been any events triggered for the selected managed object, the page displays
a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
General Information
Device Type This text box displays the device type of the interface.
Is Managed? This option controls whether the interface is managed or "unmanaged". When an interface is
"unmanaged", status polling and data collection stops. Therefore, threshold calculation is not done.
Traps for the node interface continue to be processed. To disable the processing of traps, see
Configure Fault Management Parameters on page 303.
Is DHCP Enabled? This text box indicates whether Dynamic Host Configuration Protocol (DHCP) is enabled on the
interface.
Status This text box displays the overall alarm status of the interface. The highest alarm severity level
associated with the interface is displayed.
Display Name This input box displays the managed object's name (network, node, group, or interface) that is used
on the web interface.
Netmask This drop-down list specifies the network mask of the interface.
Is Status polling enabled? This option controls status polling on the node. If the value is set to "yes", the status of the node
(alarms and events) is available through the web interface. If the value is set to "false", the status is
not available.
Last Status Change Time This text box displays the time of the last change of status.
Last Status Update Time This text box displays the time stamp of the last time the node was polled for its status.
Failure Threshold This input box specifies the number of consecutive failed status poll attempts, to declare the object
as failed. A status change event for the object is generated when the status polling for the object fails
for "Failure Threshold" times.
Failure Count This text box displays the number of times consecutive status poll attempts for this object have
failed. The count is reset to "0" once the object is declared as failed or when the object recovers
after the failure. When the value of "Failure Count" equals that of "Failure Threshold", the object is
declared failed.
Tester for Status Polling This drop-down list provides the ability to select the action to be performed on status polling for the
managed object (network, node, group, or interface). When the selected value is "Max", the status
of the interface is propagated to the managed node. If the value "User Test" is used, the User Class
Name parameter should be set with the name of the user tester class.
User Class Name This input box specifies the class to be invoked for status polling. Set this parameter only if the
selected value of the Tester for Status Polling parameter is "User Test".
Status Polling Interval This input box specifies the interval between status polling attempts for this group.
Parent Networks This text box specifies the parent of the managed object (network, node, group, or interface).
Parent Object This text box specifies the parent of the managed object.
Is Container? This text box specifies whether the managed object is a container.
Parent Node This text box displays the IP address(es) of the parent node.
List of Groups This drop-down list identifies the names of the groups to which the node belongs.
Is Group? This text box specifies whether the managed object is a group.
SNMP Port This text box displays the SNMP port number the EMS uses to retrieve SNMP values from this
interface.
Read Community This text box displays the read community associated with this interface.
SNMP Version This text box displays the SNMP version running on this interface.
Physical Media This text box displays the physical media that the interface resides on.
Interface Speed This text box displays the speed of the interface.
System Object Identifier This text box displays the BroadWorks base object identifier (OID) for the interface.
(SysOID)
Base MIBs This text box displays the list of base Management Information Bases (MIBs) implemented by the
SNMP agent of the node.
Write Community This text box specifies the write community associated with this node.
Physical Address This text box displays the physical address of this interface.
Interface Descriptor This text box displays the (interface) descriptor of this interface.
SNMP index number for the This text box displays the SNMP index number for the physical interface.
physical interface (lfindex)
Graphs
Interface Traffic Details This graph displays the interface traffic details.
Interface Utilization Details This graph displays the interface utilization details.
Interface Error & Discard This graph displays the interface error and discard details.
Details
Display Name This column displays the name of the network as it appears on the EMS.
Status This column displays the status of the network. When the network is "unmanaged", this column
displays a gray icon "?". When the network is "managed", a red/yellow/green arrow icon is displayed.
Last Status Time Change This column displays the time stamp of the last status change of the network.
NOTE: If there have not been any events triggered for the selected managed object, the page
displays a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
6) To manage a network:
a) Click the check box for the managed object(s) (network, group, node, or interface) to manage.
Custom view name This text box defines the name of the child view.
First drop-down list This drop-down list includes the properties available to define this view. These include:
• name: includes managed objects based on their names
• status: includes managed objects based on their status. Possible status values are: critical,
major, minor, warning, info, and clear.
• ipAddress: includes managed objects based on their IP addresses
• managed: includes managed objects depending on whether they are currently managed
• type: includes managed objects of a specific type (for example, bwserver-app, SnmpNode, and
so on)
• snmpport: includes managed objects by SNMP port
• version: includes managed objects by their version number
• isSNMP: includes managed objects depending on whether they run on SNMP
• statusPollEnabled: includes managed objects depending on whether they are enabled to poll for
status
• pollInterval: includes managed objects based on their polling interval
• statusUpdateTime: includes managed objects based on the time of status update
• statusChangeTime: includes managed objects based on the time of status change
• isDHCP: includes managed objects depending on whether they run on the Dynamic Host
Configuration Protocol (DHCP)
• isNode: includes managed objects depending on whether they are nodes
• isInterface: includes managed objects depending on whether they are interfaces
• isRouter: includes managed objects depending on whether they are routers
• isNetwork: includes managed objects depending on whether they are networks
Second drop-down list This drop-down list includes the Boolean statements available to define this view. These include:
• equals
• not equals
• starts with
• ends with
• contains
• does not contain
7) To preview the results of this view, click Preview Results. The view appears.
8) To add this view to the Inventory menu, click Add Child View. This view appears on the Inventory
menu.
For more information
To edit the view criteria of a child view from the networks' view of the inventory:
1) From any View page, (Complete View, Network View, Group View, Node View, Interface View), click
Edit View Criteria. The Edit Topology View Criteria page appears.
2) In the Custom view name text box, type the name of the child view. This input box is mandatory.
3) Select the property from the first drop-down list.
4) Select the Boolean statement from the second drop-down list.
5) In the text box, type the view criteria.
6) To add additional criteria, click More and repeat steps 3 through 5.
7) To preview the results of this view, click Preview Results. The view appears.
8) To save the changes to this view, click Apply. This view appears on the Inventory menu.
NOTE: When a view is deleted, all of its child views are also removed.
4.3.1.3 Search
Use the Search page to search for alarms, events, or managed objects.
To search:
1) From a view page, click Search and complete the following:
NOTE: The buttons that appear on this page reflect the state of the network.
NOTE: If there have not been any events triggered for the selected managed object, the page displays
a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
General Information
Device Type This text box displays the device type of the node, group, or interface.
Is Managed? This option controls whether the node, group, or interface is managed or "unmanaged". When
a node, group, or interface is "unmanaged", status polling and data collection stops. Therefore,
threshold calculation is not done. Traps for the node, group, or interface continue to be processed.
To disable the processing of traps, see the Configure Fault Management Parameters on page 303.
IP Address This text box specifies the IP address of the node, group, or interface.
Is DHCP Enabled? This text box displays whether Dynamic Host Configuration Protocol (DHCP) is enabled on the node,
group, or interface.
Status This option displays the overall alarm status of the node. The highest alarm severity level associated
with the node, group, or interface is displayed.
Display Name This input box displays the name of the node, group, or interface that is used on the web interface.
Netmask This drop-down list specifies the network mask of the node, group, or interface.
Is Status polling enabled? This option controls status polling on the node, group, or interface. If the value is set to "yes", the
status of the node, group, or interface (alarms and events) is available through the web interface. If
the value is set to "false", the status is not available.
Last Status Update Time This text box displays the time stamp of the last time the node, group, or interface was polled for its
status.
User Class Name This text box specifies the class to be invoked for status polling. Set this parameter only if the
selected value of the Tester for Status Polling parameter is "User Test".
Failure Count This text box displays the number of times the EMS has failed to poll the node, group, or interface.
Tester for Status Polling This drop-down list provides the ability to select the action to be performed on status polling for the
node, group, or interface. When the selected value is "Max", the status of the interface is propagated
to the node. If the value "User Test" is used, the User Class Name parameter should be set with the
name of the user tester class.
Last Status Change Time This text box displays the time stamp of the last time the status of the node was changed.
Failure Threshold This text box displays the maximum number of occurrences of a failure before an alarm threshold is
reached.
Status Polling Interval This text box indicates the frequency that the node is polled for its status (in seconds).
Discovery Settings
Discover Status This text box displays the status of Discovery on the network.
Start/Resume Discovery This text box appears if the discovery command is currently available for this network.
List of Nodes This text box displays the list of discovered nodes on this network.
Sub Networks This text box displays the subnetworks included on this network.
Parent Netmask This text box displays the parent netmask for this network.
List of Interfaces This text box displays the list of interfaces on this network.
Sub Netmasks This text box displays the subnetmasks included on this network.
Parent Network This text box displays the parent network on this network.
Group
CPU Utilization This text box displays the Central Processing Unit (CPU) utilization of this network at the time of the
last polling.
Memory Utilization This text box displays the current memory utilization of the network at the time of the last polling.
Disk Utilization This text box displays the current disk utilization of the network at the time of the last polling.
Alarm Status
Status This column displays the status of the alarm. Values include: Critical, Major, Minor, Warning, Info,
and Clear.
Source – Alarm Name or This column displays the name of the alarm or the category of the alarm. For more information, see
Category the BroadWorks Fault and Alarm Interface Specification.
Date/Time This column displays the date and time the alarm was issued.
Alarm Details This column displays a link to the details of the alarm on the Fault tab. For more information on
alarms, see the Overview of Alarms on page 180.
Display Name This column displays the name of the group as it is displayed on the EMS.
Status This column displays the status of the group. When the group is "unmanaged", this column displays
a gray icon "?". When the group is "managed", a red/yellow/green arrow icon is displayed.
Last Status Time Change This column displays the time stamp of the last status change of the group.
NOTE: If there have not been any events triggered for the selected managed object, the page
displays a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
6) To manage a group:
a) Click the check box for the managed object(s) (network, group, node, or interface) to manage.
b) Click Manage.
7) To "unmanage" a group:
a) Click the check box for the managed object(s) (network, group, node, or interface) to "unmanage".
b) Click Unmanage. The managed object is no longer accessible to configure, poll, or display events or
alarms.
Tasks to perform from this page
Custom view name This input box defines the name of the child view.
First drop-down list This drop-down list includes the properties available to define this view. These include:
• name: includes managed objects based on their names
• status: includes managed objects based on their status. Possible status values are: critical,
major, minor, warning, info, and clear.
• ipAddress: includes managed objects based on their IP addresses
• managed: includes managed objects depending on whether they are currently managed
• type: includes managed objects of a specific type (for example, bwserver-app, SnmpNode, and
so on).
• snmpport: includes managed objects by SNMP port
• version: includes managed objects by their version number
• isSNMP: includes managed objects depending on whether they run on SNMP
• statusPollEnabled: includes managed objects depending on whether they are enabled to poll for
status
• pollInterval: includes managed objects based on their polling interval
• statusUpdateTime: includes managed objects based on the time of status update
• statusChangeTime: includes managed objects based on the time of status change
• isDHCP: includes managed objects depending on whether they run on the Dynamic Host
Configuration Protocol (DHCP)
• isNode: includes managed objects depending on whether they are nodes
• isInterface: includes managed objects depending on whether they are interfaces
• isRouter: includes managed objects depending on whether they are routers
• isNetwork: includes managed objects depending on whether they are networks
Second drop-down list This drop-down list includes the Boolean statements available to define this view. These include:
• equals
• not equals
• starts with
• ends with
• contains
• does not contain
7) To preview the results of this view, click Preview Results. The view appears.
8) To add this view to the Inventory menu, click Add Child View. This view appears on the Inventory
menu.
For more information
To edit the view criteria of a child view from the groups' view of the inventory:
1) From any View page, (Complete View, Network View, Group View, Node View, Interface View), click
Edit View Criteria. The Edit Topology View Criteria page appears.
2) In the Custom view name text box, type the name of the child view. This input box is mandatory.
3) Select the property from the first drop-down list.
4) Select the Boolean statement from the second drop-down list.
5) In the text box, type the view criteria.
6) To add additional criteria, click More and repeat steps 3 through 5.
7) To preview the results of this view, click Preview Results. The view appears.
8) To save the changes to this view, click Apply. This view appears on the Inventory menu.
NOTE: When a view is deleted, all of its child views are also removed.
To search:
1) From a view page, click Search and complete the following:
2) Select Match any of the Following to perform a search operation that satisfies any of the specified
matching criteria or select Match all of the Following to perform a search operation that satisfies all of
the specified matching criteria.
3) In the left-hand input box (Properties), select the property based on which you need to perform your
search. If you select the time property as a search criterion, the Date Input Helper icon appears. It can
help you quickly specify the time and date of interest.
4) In the middle input box (Condition), select the condition based on which you need to restrict your
search.
5) In the right-hand input box, type the exact information you are looking for. For example, if you have
selected severity in the Properties box, then you must specify the severity value here, such as "critical",
"major", and so on.
6) To specify additional criteria, click More and repeat steps 2 through 4. Fewer options can be used to
remove the criteria that were last added.
7) Click Search. Events satisfying the criteria appear.
NOTE: If there have not been any events triggered for the selected managed object, the page displays
a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
General Information
Device Type This text box displays the device type of the group.
Is Managed? This option controls whether the group is managed or "unmanaged". When a managed object is
"unmanaged", status polling and data collection stops. Therefore, threshold calculation is not done.
Traps for the node continue to be processed. To disable the processing of traps, see Configure
Fault Management Parameters on page 303.
Status This text box displays the overall alarm status of the group. The highest alarm severity level
associated with the group is displayed.
Display Name This text box displays the managed object's name that is used on the web interface.
Is Status polling enabled? This option controls status polling on the group. If the value is set to "yes", the status of the group
(alarms and events) is available through the web interface. If the value is set to "false", the status is
not available.
Last Status Update Time This text box displays the time stamp of the last time the group was polled for its status.
User Class Name This text box specifies the class to be invoked for status polling. Set this parameter only if the
selected value of the Tester for Status Polling parameter is "User Test".
Failure Count This text box displays the number of times consecutive status poll attempts for this object have
failed. The count is reset to "0" once the object is declared as failed or when the object recovers
after the failure. When the value of "Failure Count" equals that of "Failure Threshold", the object is
declared failed.
Tester for Status Polling This drop-down list provides the ability to select the action to be performed on status polling for the
managed object. If the value "User Test" is used, the User Class Name parameter should be set
with the name of the user tester class.
Last Status Change Time This text box displays the time stamp of the last time the status of the group was changed.
Failure Threshold This input box specifies the number of consecutive failed status poll attempts, to declare the object
as failed. A status change event for the object is generated when the status polling for the object
fails for "Failure Threshold" times.
Status Polling Interval This text box specifies the interval between status polling attempts for this group.
Parent Object This text box specifies the parent of the managed object.
Is Container? This text box specifies whether the managed object is a container.
Group Members This drop-down list identifies the managed nodes that are members of the group.
List of Groups This drop-down list identifies the names of the groups to which the object belongs.
Is Group? This text box specifies whether the managed object is a group.
Other Graphs
CPUBusyGroup This graph displays the amount of utilization of busy CPU in the group.
Display Name This column displays the name of the node as it is displayed on the EMS.
Status This column displays the status of the node. When the node is "unmanaged", this column displays a
gray icon "?". When the node is "managed", a red/yellow/green arrow icon is displayed.
Last Status Time Change This column displays the time stamp of the last status change of the node.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
6) To manage a node:
a) Click the check box for the managed object(s) (network, group, node, or interface) to manage.
b) Click Manage.
7) To "unmanage" a node:
a) Click the check box for the managed object(s) (network, group, node, or interface) to "unmanage".
b) Click Unmanage. The managed object is no longer accessible to configure, poll, or display events or
alarms.
Tasks to perform from this page
Custom view name This input box defines the name of the child view.
First drop-down list This drop-down list includes the properties available to define this view. These include:
• name: includes managed objects based on their names
• status: includes managed objects based on their status. Possible status values are: critical,
major, minor, warning, info, and clear.
• ipAddress: includes managed objects based on their IP addresses
• managed: includes managed objects depending on whether they are currently managed
• type: includes managed objects of a specific type (for example, bwserver-app, SnmpNode, and
so on).
• snmpport: includes managed objects by SNMP port
• version: includes managed objects by their version number
• isSNMP: includes managed objects depending on whether they run on SNMP
• statusPollEnabled: includes managed objects depending on whether they are enabled to poll for
status
• pollInterval: includes managed objects based on their polling interval
• statusUpdateTime: includes managed objects based on the time of status update
• statusChangeTime: includes managed objects based on the time of status change
• isDHCP: includes managed objects depending on whether they run on the Dynamic Host
Configuration Protocol (DHCP)
• isNode: includes managed objects depending on whether they are nodes
• isInterface: includes managed objects depending on whether they are interfaces
• isRouter: includes managed objects depending on whether they are routers
• isNetwork: includes managed objects depending on whether they are networks
Second drop-down list This drop-down list includes the Boolean statements available to define this view. These include:
• equals
• not equals
• starts with
• ends with
• contains
• does not contain
7) To preview the results of this view, click Preview Results. The view appears.
8) To add this view to the Inventory menu, click Add Child View. This view appears on the Inventory
menu.
For more information
To edit the view criteria of a child view from the nodes view of the inventory:
1) From any View page, (Complete View, Network View, Group View, Node View, Interface View), click
Edit View Criteria. The Edit Topology View Criteria page appears.
2) In the Custom view name text box, type the name of the child view. This input box is mandatory.
3) Select the property from the first drop-down list.
4) Select the Boolean statement from the second drop-down list.
5) In the text box, type the view criteria.
6) To add additional criteria, click More and repeat steps 3 through 5.
7) To preview the results of this view, click Preview Results. The view appears.
8) To save the changes to this view, click Apply. This view appears on the Inventory menu.
NOTE: When a view is deleted, all of its child views are also removed.
4.5.1.3 Search
Use the Search page to search for alarms, events, or managed objects.
To search:
1) From a view page, click Search and complete the following:
NOTE: If there have not been any events triggered for the selected managed object, the page displays
a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
General Information
Device Type This text box displays the device type of the node.
Is Managed? This option controls whether the node is managed or "unmanaged". When
a managed object is "unmanaged", status polling and data collection stops.
Therefore, threshold calculation is not done. Traps for the node continue to
be processed. To disable the processing of traps, see the Configure Fault
Management Parameters on page 303.
Is DHCP Enabled? This text box indicates whether Dynamic Host Configuration Protocol (DHCP) is
enabled on the node.
Status This text box displays the overall alarm status of the node. The highest alarm
severity level associated with the node is displayed.
Display Name This input box displays the managed object's name that is used on the web
interface.
Netmask This drop-down list specifies the network mask of the node.
UnamePlatform This text box displays the platform type of the node. This value corresponds to
the result of the command uname -i when it is run on the node.
SnmpAgentUnreachable This text box indicates whether the SNMP agent of the node is unreachable.
ConfiguredMemory This text box displays the amount of memory available on the node.
Threshold Name(s) This text box lists the threshold names that apply to the node when computing
(Multiplicator) performance.
bwName-NodeId This text box displays the name of the nodes clustered together with the node
ID within the cluster.
bwIpForWeb This text box displays the IP address to be used to access the web interface of
the node.
bwIsPrimary This text box indicates whether the node is the primary server of the cluster.
bwNsSeed This text box displays the IP address of the Network Server seed that was used
to discover the node. When a node is added manually, BW-Other is displayed.
bwManuallyAdded This text box indicates whether the node was manually added through "Add
Node" or discovered through a Network Server seed.
Server Type This text box displays the type of server. Valid values include: Application
Server (AS), Network Server (NS), Media Server (MS), Xtended Services
Platform (XSP), Profile Server (PS), Web Server (WS), Execution Server
(XS), Call Detail Server (CDS), Access Mediation Server (AMS), Conferencing
Server (CS), and Database Server (DBS).
bwPlatformName This text box displays the name of the hardware platform. It is taken from the
product name available from the command dmidecode (available on x86_64
server only).
bwPlatformType This text box displays the platform type from a performance point of view.
Processor This text box displays the processor architecture of the node.
Operating System This text box displays the operating system running on the node.
BW Version This text box displays the version of BroadWorks running on the node.
bw.config.managementMode
This is an internal BroadWorks text box.
Modifier Factor(s) This text box displays the modifier factor used by the performance module to
compute the statistics and threshold for the node.
BroadWorksServer This text box indicates whether the node is a BroadWorks Server. If the value is
"true", the node is a BroadWorks Server. If the value is "false", it is not.
SWManager version This text box displays the version of the Software Manager running on the
node.
NodeDesc This text box describes the node within the cluster context.
NumberOfCores This text box specifies the number of cores available on the node.
Is Status polling This option controls status polling on the node. If the value is set to "yes", the
enabled? status of the node (alarms and events) is available through the web interface. If
the value is set to "false", the status is not available.
Last Status Change This text box displays the time of the last change of status.
Time
Last Status Update This text box displays the time stamp of the last time the node was polled for its
Time status.
Failure Threshold This input box specifies the number of consecutive failed status poll attempts to
declare the object as failed. A status change event for the object is generated
when the status polling for the object fails for "Failure Threshold" times.
Failure Count This text box displays the number of times consecutive status poll attempts for
this object have failed. The count is reset to "0" once the object is declared as
failed or when the object recovers after the failure. When the value of "Failure
Count" equals that of "Failure Threshold", the object is declared failed.
Tester for Status This drop-down list provides the ability to select the action to be performed on
Polling status polling for the managed object. When the selected value is "Max", the
status of the interface is propagated to the managed node. If the value "User
Test" is used, the User Class Name parameter should be set with the name of
the user tester class.
User Class Name This input box specifies the class to be invoked for status polling. Set this
parameter only if the selected value of the Tester for Status Polling parameter
is "User Test".
Status Polling Interval This input box specifies the interval between status polling attempts for this
group.
List of Interfaces This drop-down list displays the list of interfaces available on this node.
Parent Object This text box specifies the parent of the managed object.
Is Container? This text box specifies whether the managed object is a container.
Parent Networks This drop-down list displays the IP address of the parent network(s).
List of Groups This drop-down list identifies the names of the groups to which the node
belongs.
Is Group? This text box specifies whether the managed object is a group.
SNMP Port This text box displays the SNMP port number that the EMS uses to retrieve
SNMP values from this interface.
Read Community This text box displays the read community associated with this interface.
SNMP Version This text box displays the SNMP version running on this interface.
System Object This text box displays the node's sysOID MIB-II value.
Identifier (SysOID)
Base MIBs This text box displays the list of base Management Information Bases (MIBs)
implemented by the SNMP agent of the node.
Write Community This text box specifies the write community associated with this node.
System Description This text box displays the node's sysDescr MIB-II value.
(sysDescr)
Interfaces
Index This text box displays the hardware index of the interface.
Status This text box displays the overall alarm status of the interface. The highest
alarm severity level associated with the interface is displayed. Supported
values are: critical(1), major(2), minor(3), warning(4), clear(5).
MAC This text box displays the Media Access Control (MAC) address of this
interface.
CPU Utilization If available, this diagram illustrates the amount of CPU utilization on the node.
Memory Utilization If available, this diagram illustrates the amount of memory utilization on the
node.
Disk Utilization If available, this diagram illustrates the amount of disk utilization on the node.
Other Graphs
INTERFACE_out_octets This graph displays the total number of octets transmitted out of the interface,
including framing characters.
INTERFACE_in_octets This graph displays the total number of octets received on the interface,
including framing characters.
memUsageSwap This graph displays the amount of memory swapped to disk per second.
virtualMemWaitThreads This graph displays the number of processes waiting for run time.
waitThreadsRatio This graph displays the ratio of wait threads per CPU instance.
blockedVsWaitThreads This graph displays the difference between the blocked threads and the wait
threads.
diskUsageSlash This graph displays the disk usage for the "/" directory.
diskUsageBw This graph displays the disk usage for the "/bw" directory.
CPUIdle This graph displays the percentage of the CPU idle time.
CPUSys This graph displays the percentage of the CPU used by the system.
CPUUsr This graph displays the percentage of the CPU used by the user programs.
ASOciRequestsInPerSecond
This graph displays the number of Open Client Interface (OCI) requests
attempted per second.
diskUsageTmp This graph displays the disk usage for the /tmp directory.
maxDiskIOSvc This graph displays the maximum disk Input Output (IO) svc time.
maxDiskIOBsyVsSvc This graph displays the maximum disk IO busy time versus svc time.
maxXsJavaHeap This graph displays the maximum Java heap used by the Execution Server.
totalXsJavaHeap This graph displays the total Java heap used by the Execution Server.
percentXsJHeap This graph displays the percentage of the Java heap used by the Execution
Server.
dsnInUse This graph displays the percentage of usage of the DataStore Name (DSN).
ASOciAvgRequestDelay This graph displays the average time (in milliseconds based on a rolling
average of the last 100 samples) it takes to process an OCI request.
ASOciMaxRequestDelay This graph displays the longest OCI request response time.
AStoSMTPtraffic This graph displays the total number of messages sent attempted on the
primary Simple Mail Transfer Protocol (SMTP) server.
ASNbOfUsers This graph displays the number of users configured on the node.
ASActiveCalls This graph displays the number of active calls on the node.
ASSysIntQueueTimeAvgCallHalf
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgRegAdapt(1000usec)
This graph displays the average registration queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxRegAdapt(msec)
This graph displays the largest registration queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgCallPThreadDBAccess(1000usec)
This graph displays the average database access from call processing queue
holding time (in milliseconds).
ASSysIntQueueTimeMaxCallPThreadDBAccess(msec)
This graph displays the largest database access from call processing queue
sample holding time (in milliseconds).
ASSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)
This graph displays the average voice mail queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxVoiceMailInAdapt(msec)
This graph displays the largest voice mail queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgAcctOutAdapt(1000usec)
This graph displays the average accounting queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxAcctOutAdapt(msec)
This graph displays the largest accounting queue sample holding time (in
milliseconds).
ASSipMsgPerSecond This graph displays the number of Session Initiation Protocol (SIP) messages
(per second).
ASSipRegistersInPerSecond
This graph displays the number of SIP register messages (per second).
ASSipOptionsPerSecond This graph displays the number of SIP option messages (per second).
ASSipSubscribeNotifyPerSecond
This graph displays the number of SIP subscribe messages (per second).
ASSipAvgCallSetupDelayThis graph displays the average time (in milliseconds) it takes between
the receipt of an INVITE message for the origination of a new call and the
transmission of an INVITE (SiIPterminator), Notification Request (RQNT)
(Media Gateway Control Protocol [MGCP] terminator with in-band ringback), or
Create Connection (CRCX) (MGCP terminator without in-band ringback) to the
primary device of the original called party (for intra-group call) or to the network
element of the original called party (for a call to the Public Switched Telephone
Network [PSTN]).
ASSipMaxCallSetupDelay(msec)
This graph displays the longest SIP setup-signal delay.
ASSipAvgAnswerDelay(msec)
This graph displays the average time (in milliseconds) between the receipt of a
200 OK message indicating answer or a NTFY off-hook indicating answer and
the transmission of a 200 OK indicating answer to the originator.
ASSipMaxAnswerDelay(msec)
This graph displays the longest SIP answer-signal delay.
ASSysIntQueueTimeAvgSIPEncodeQ(1000usec)
This graph displays the average SIP encoding queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxSIPEncodeQ(msec)
This graph displays the largest SIP encoding queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgSIPCallDecodeQ(1000usec)
This graph displays the average SIP decoding queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxSIPCallDecodeQ(msec)
This graph displays the largest SIP decoding queue sample holding time (in
milliseconds).
ASMgcpMsgPerSecond This graph displays the number of MGCP messages (per second).
ASMgcpAvgDialToneDelay(msec)
This graph displays the average MGCP dial tone delay time (in milliseconds).
ASMgcpMaxDialToneDelay(msec)
This graph displays the largest dial tone delay time (in milliseconds).
ASMgcpAvgCallSetupDelay(msec)
This graph displays the average MGCP call setup delay time (in milliseconds).
ASMgcpMaxCallSetupDelay
This graph displays the largest MGCP call setup delay time (in milliseconds).
(msec)
ASMgcpAvgAnswerDelay(msec)
This graph displays the average MGCP answer delay time (in milliseconds).
ASMgcpMaxAnswerdelay(msec)
This graph displays the largest MGCP answer delay time (in milliseconds).
ASSysIntQueueTimeAvgCallHalf(1000usec)T1
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)T1
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPEncodeQ(1000usec)
This graph displays the average MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPEncodeQ(msec)
This graph displays the largest MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgCallHalf(1000usec)T2
This graph displays the average call processing queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxCallHalf(msec)T2
This graph displays the largest call processing queue sample holding time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPDecodeQ(1000usec)
This graph displays the average MGCP decode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPDecodeQ(1000usec)
This graph displays the largest MGCP decode queue delay time (in
milliseconds).
ASCapMsgPerSecond This graph displays the number of Client Application Protocol (CAP) messages
handled (per second).
ASNbOfMigratedUsers This graph displays the number of users migrated to the secondary Application
Server.
hrStorageAllocationUnits_RAM
This graph displays the memory allocation unit.
Device_INTERFACE_out_octets
This graph displays the number of octets sent over the network.
Device_INTERFACE_in_octets
This graph displays the number of octets received over the network.
InterfaceOutUtilization This graph displays the percentage of the interface utilization in output.
InterfaceInUtilization This graph displays the percentage of the interface utilization in input.
ASSysIntQueueTimeAvgSIPEncodeQ(1000usec)T1
This graph displays the average SIP encode queue delay time (in milliseconds).
ASSysIntQueueTimeMaxSIPEncodeQ(msec)T1
This graph displays the largest SIP encode queue delay time (in milliseconds).
ASSysIntQueueTimeAvgSIPCallDecodeQ(1000usec)T1
This graph displays the average SIP call decode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxSIPCallDecodeQ(msec)T1
This graph displays the largest SIP call decode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPEncodeQ(1000usec)T1
This graph displays the average MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPEncodeQ(msec)T1
This graph displays the largest MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)T1
This graph displays the average voice mail queue delay time (in milliseconds).
ASSysIntQueueTimeMaxVoiceMailInAdapt(msec)T1
This graph displays the largest voice mail queue delay time (in milliseconds).
ASSysIntQueueTimeAvgRegAdapt(1000usec)T1
This graph displays the average registration queue delay time (in milliseconds).
ASSysIntQueueTimeMaxRegAdapt(msec)T1
This graph displays the largest registration queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)T1
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSipMsgPerSecond This graph displays the number of SIP messages (per second).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipDecodeQ(1000usec)
This graph displays the largest SIP decode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipEncodeQ(msec)
This graph displays the largest SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipDecodeQ(msec)
This graph displays the largest SIP decode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)T2
This graph displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)T1
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)T2
This graph displays the largest SIP redirect queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)T1
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)T2
This graph displays the average SIP encode queue delay time (in milliseconds).
NSSysIntQueueTimeMaxSipEncodeQ(msec)T2
This graph displays the largest SIP encode queue delay time (in milliseconds).
Alarm Status
Status This column displays the status of the alarm. Values include: Critical, Major,
Minor, Warning, Info, and Clear.
Source – Alarm Name This column displays the name of the alarm or the category of the alarm. For
or Category more information, see the BroadWorks Fault and Alarm Interface Specification.
Date/Time This column displays the date and time the alarm was issued.
Alarm Details This column displays the alarm description. It is also a link to the details of the
alarm on the Fault tab. For more information, see View Alarm Properties on
page 186.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
ifInOctets This column displays the number of input octets to the interface.
ifOutOctets This column displays the number of output octets from the interface.
ifOutDiscards This column displays the number of output discards from the interface.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
tcpConnLocalAddress This column displays the local address of the TCP connection.
tcpConnLocalPort This column displays the local port of the TCP connection.
tcpConnRemAddress This column displays the remote address of the TCP connection.
tcpConnRemPort This column displays the remote port of the TCP connection.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
ipNetToMediaPhysAddress This column displays the physical address of the IPNet to Media.
ipNetToMediaNetAddress This column displays the network address of the IPNet to Media.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode". For these nodes, use step 1 to access the node.
NOTE: This drop-down list does not appear for nodes that have a managed object (MO) label of
"SnmpNode".
Display Name This column displays the name of the interface as it is displayed on the EMS.
Status This column displays the status of the interface. When the interface is "unmanaged", this column
displays a gray icon "?". When the interface is "managed", a red/yellow/green arrow icon is
displayed.
Last Status Time Change This column displays the time stamp of the last status change of the interface.
NOTE: If there have not been any events triggered for the selected managed object, the page
displays a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
6) To manage an interface:
a) Click the check box for the managed object(s) (network, group, node, or interface) to manage.
b) Click Manage.
7) To "unmanage" an interface:
a) Click the check box for the managed object(s) (network, group, node, or interface) to "unmanage".
b) Click Unmanage. The managed object is no longer accessible to configure, poll, or display events or
alarms.
Tasks to perform from this page
Custom view name This input box defines the name of the child view.
First drop-down list This drop-down list includes the properties available to define this view. These include:
• name: includes managed objects (network, node, group, or interface) based on their names
• status: includes managed objects (network, node, group, or interface) based on their status.
Possible status values are: critical, major, minor, warning, info, and clear.
• ipAddress: includes managed objects (network, node, group, or interface) based on their IP
addresses
• managed: includes managed objects (network, node, group, or interface) depending on whether
they are currently managed
• type: includes managed objects (network, node, group, or interface) of a specific type (for
example, bwserver-app, SnmpNode, and so on)
• snmpport: includes managed objects (network, node, group, or interface) by SNMP port
• version: includes managed objects (network, node, group, or interface) by their version number
• isSNMP: includes managed objects (network, node, group, or interface) depending on whether
they run on SNMP
• statusPollEnabled: includes managed objects (network, node, group, or interface) depending on
whether they are enabled to poll for status
• pollInterval: includes managed objects (network, node, group, or interface) based on their polling
interval
• statusUpdateTime: includes managed objects (network, node, group, or interface) based on the
time of status update
• statusChangeTime: includes managed objects (network, node, group, or interface) based on the
time of status change
• isDHCP: includes managed objects (network, node, group, or interface) depending on whether
they run on the Dynamic Host Configuration Protocol (DHCP)
• isNode: includes managed objects (network, node, group, or interface) depending on whether
they are nodes
• isInterface: includes managed objects (network, node, group, or interface) depending on whether
they are interfaces
• isRouter: includes managed objects (network, node, group, or interface) depending on whether
they are routers
• isNetwork: includes managed objects (network, node, group, or interface) depending on whether
they are networks
Second drop-down list This drop-down list includes the Boolean statements available to define this view. These include:
• equals
• not equals
• starts with
• ends with
• contains
• does not contain
7) To preview the results of this view, click Preview Results. The view appears.
8) To add this view to the Inventory menu, click Add Child View. This view appears on the Inventory
menu.
For more information
To edit the view criteria of a child view from the interfaces view of the inventory:
1) From any View page, (Complete View, Network View, Group View, Node View, Interface View), click
Edit View Criteria. The Edit Topology View Criteria page appears.
2) In the Custom view name text box, type the name of the child view. This input box is mandatory.
3) Select the property from the first drop-down list.
4) Select the Boolean statement from the second drop-down list.
7) To preview the results of this view, click Preview Results. The view appears.
8) To save the changes to this view, click Apply. This view appears on the Inventory menu.
NOTE: When a view is deleted, all of its child views are also removed.
4.6.1.3 Search
Use the Search page to search for alarms, events, or managed objects.
To search:
1) From a view page, click Search and complete the following:
2) Select Match any of the Following to perform a search operation that satisfies any of the specified
matching criteria or select Match all of the Following to perform a search operation that satisfies all of
the specified matching criteria.
3) In the left-hand input box (Properties), select the property based on which you need to perform your
search. If you select the time property as a search criterion, the Date Input Helper icon appears. It can
help you quickly specify the time and date of interest.
4) In the middle input box (Condition), select the condition based on which you need to restrict your
search.
5) In the right-hand input box, type the exact information you are looking for. For example, if you have
selected severity in the Properties box, then you must specify the severity value here, such as "critical",
"major", and so on.
6) To specify additional criteria, click More and repeat steps 2 through 4. Fewer options can be used to
remove the criteria that were last added.
7) Click Search. Events satisfying the criteria appear.
NOTE: If there have not been any events triggered for the selected managed object, the page displays
a message indicating that there is no data to display.
NOTE: If there have not been any alarms triggered for the selected managed object(s), the page
displays a message indicating that there is no data to display.
General Information
Device Type This text box displays the device type of the interface.
Is Managed? This option controls whether the interface is managed or "unmanaged". When an interface is
"unmanaged", status polling and data collection stops. Therefore, threshold calculation is not done.
Traps for the node interface continue to be processed. To disable the processing of traps, see
Configure Fault Management Parameters on page 303.
Is DHCP Enabled? This text box indicates whether Dynamic Host Configuration Protocol (DHCP) is enabled on the
interface.
Status This text box displays the overall alarm status of the interface. The highest alarm severity level
associated with the interface is displayed.
Display Name This input box displays the managed object's name (network, node, group, or interface) that is used
on the web interface.
Netmask This drop-down list specifies the network mask of the interface.
Is Status polling enabled? This option controls status polling on the node. If the value is set to "yes", the status of the node
(alarms and events) is available through the web interface. If the value is set to "false", the status is
not available.
Last Status Change Time This text box displays the time of the last change of status.
Last Status Update Time This text box displays the time stamp of the last time the node was polled for its status.
Failure Threshold This input box specifies the number of consecutive failed status poll attempts, to declare the object
as failed. A status change event for the object is generated when the status polling for the object fails
for "Failure Threshold" times.
Failure Count This text box displays the number of times consecutive status poll attempts for this object have
failed. The count is reset to "0" once the object is declared as failed or when the object recovers
after the failure. When the value of "Failure Count" equals that of "Failure Threshold", the object is
declared failed.
Tester for Status Polling This drop-down list provides the ability to select the action to be performed on status polling for the
managed object (network, node, group, or interface). When the selected value is "Max", the status
of the interface is propagated to the managed node. If the value "User Test" is used, the User Class
Name parameter should be set with the name of the user tester class.
User Class Name This input box specifies the class to be invoked for status polling. Set this parameter only if the
selected value of the Tester for Status Polling parameter is "User Test".
Status Polling Interval This input box specifies the interval between status polling attempts for this group.
Parent Networks This text box specifies the parent of the managed object (network, node, group, or interface).
Parent Object This text box specifies the parent of the managed object.
Is Container? This text box specifies whether the managed object is a container.
Parent Node This text box displays the IP address(es) of the parent node.
List of Groups This drop-down list identifies the names of the groups to which the node belongs.
Is Group? This text box specifies whether the managed object is a group.
SNMP Port This text box displays the SNMP port number the EMS uses to retrieve SNMP values from this
interface.
Read Community This text box displays the read community associated with this interface.
SNMP Version This text box displays the SNMP version running on this interface.
Physical Media This text box displays the physical media that the interface resides on.
Interface Speed This text box displays the speed of the interface.
System Object Identifier This text box displays the BroadWorks base object identifier (OID) for the interface.
(SysOID)
Base MIBs This text box displays the list of base Management Information Bases (MIBs) implemented by the
SNMP agent of the node.
Write Community This text box specifies the write community associated with this node.
Physical Address This text box displays the physical address of this interface.
Interface Descriptor This text box displays the (interface) descriptor of this interface.
SNMP index number for the This text box displays the SNMP index number for the physical interface.
physical interface (lfindex)
Graphs
Interface Traffic Details This graph displays the interface traffic details.
Interface Utilization Details This graph displays the interface utilization details.
Interface Error & Discard This graph displays the interface error and discard details.
Details
The EMS integrates the Syslog feature by integrating two new views to the Fault Management tab. These
views are named Syslog Events and Syslog Alarms.
Flow of Notifications
The flow of notifications in EMS, divides syslog events from regular events. SNMP traps are also referred
to as notifications. Notifications that are evaluated as stateful alarms are forwarded to the trap collector.
The trap collector includes trap filters and trap parsers that convert a trap into an event. When traps are
received, they are first passed through a set of trap filters. Traps filters are Java-written code and are
not available for configuration from the EMS web interface. Trap parsers occupy the next step in the
notification flow. A received trap is passed through the level of trap parsers only if the trap has not already
been converted into an event by a trap filter or if the received trap has not been dropped by any trap filter
previously. Trap parsers are parsing mechanisms that can be configured by users to generate useful and
appropriate event information from the trap received (for example, a trap parser can be configured to set
the message of a generated event to be the same as that of a received trap message). The output of a trap
parser is an event. Trap parsers can be configured from the Admin tab. With the current implementation, all
BroadWorks traps (trapoid ".1.3.6.1.4.1.6431.*") are converted to corresponding events by the trap filters;
therefore, no BroadWorks traps actually get to the trap parser level. For more information on configuring
trap parsers, see Configure Trap Parsers on page 313.
The generated events are then passed through a series of event parsers. Event parsers are simple parsing
mechanisms that can be configured by users when further processing (or refinement) of the input events is
required. Event parsers are very flexible. They include tokenizers to convert any event field to tokens that
can be used in the output of the parser. Event parsers can be configured from the Admin tab. There are
no default event parsers defined/activated in EMS. For more information on configuring event parsers, see
Configure Event Parsers on page 321.
Event filters are used to execute user-specific actions whenever events are received with configurable
matching criteria, such as e-mailing someone when a particular event is generated. Types of supported
inbuilt filter actions are suppressing multiple events in a given interval, running shell commands on the
server system, sending e-mails, sending traps, and running custom Java code to filter events. Custom
Java code may be needed in cases where additional data must be retrieved or if specific rules are to
be applied in processing the event. Event filters can be configured from the Admin tab. By default, the
following event filters are defined/activated in EMS: BWEventFilterForThreshold, BWEventFilterForHealth,
NOTE: Parsers and filters are performed following the order in which they are defined on their list.
Currently, it is not possible to reorder the parser/filter lists through the web interface. You must use the
applet interface to perform these ordering actions.
NOTE: This behavior excludes alarms that should always be cleared manually. For example, any alarm
that reports a software error or requires contacting BroadSoft personnel must be cleared manually. For
these exceptions, the alarm indicates the need for a manual clear by the end user.
Audible Alarms
The BroadWorks EMS allows administrators to associate an audio file with each alarm severity level. The
administrator also specifies whether the audio file is to be played only once or repeatedly. The audio file
for the highest alarm severity is played if alarms are present at multiple severity levels. An audible cutoff
(ACO) capability allows users to silence audible alarms. If a new alarm comes in after the audible cutoff
is activated, the audible alarm is reactivated. For information on configuring audible alarms, see Managing
Audible Alarms on page 382.
Source This column displays a link to the source node of the network event. Click this link to display the
Event Properties page. For information on the input boxes appearing on this page, see View Event
Properties Reference on page 177.
BW Sub Component This column displays the BroadWorks subcomponent source of the network event.
Date/Time This column displays the date and time the network event occurred.
Event Details This column displays the detailed description of the network event.
Child view name This text box describes this child view.
Severity These check boxes specify the severity levels included in this view.
Source This text box specifies the source of the events associated with this view. Events are filtered based
on this source only.
Source -- Alarm Name or This text box specifies the source, alarm name, or category of the events associated with this view.
Category Events are filtered based on this source, alarm name, or category only.
Message This text box specifies the event message associated with this view. Events are filtered based on
this event message only.
Category This text box displays the category of the events associated with this view. Events are filtered
based on this category only.
Node This text box displays the node associated with this view. Events are filtered based on this node
only.
Network This text box displays the network associated with this view. Events are filtered based on this
network only.
Events generated after This text box specifies the start date and time of the events included in this view. The calendar icon
provides the ability to specify the date and time in the correct format.
Events generated before This text box specifies the end date and time of the events included in this view. The calendar icon
provides the ability to specify the date and time in the correct format.
Event Age This combination box specifies the age of the events included in this view. The drop-down list
includes the following:
• "Any" filters all ages of events.
• "Age in Minutes" filters the age of events by the number of minutes identified in the text box.
• "Age in Hours" filters the age of events by the number of hours identified in the text box.
• "Age in Days" filters the age of events by the number of days identified in the text box.
• "Today" filters the age of events based on the day the view is executed.
• "Yesterday" filters the age of events based on the day before the view is executed.
Refresh Period in Minutes This text box specifies the frequency that the view is refreshed (in minutes).
NOTE: Once you have added a view, you can remove it. To remove a child view, select the child view
from the Fault Management menu in the left-hand navigation bar and click Remove View. A message
appears asking for your confirmation. Click OK to remove the view.
NOTE: Once you have added a view, you can remove it. To remove a child view, select the child view
from the Fault Management menu in the left-hand navigation bar and click Remove View. A message
appears asking for your confirmation. Click OK to remove the view.
5.2.4 Search
Use the Search page to search for alarms, events, or managed objects.
To search:
1) From a view page, click Search and complete the following:
2) Select Match any of the Following to perform a search operation that satisfies any of the specified
matching criteria or select Match all of the Following to perform a search operation that satisfies all of
the specified matching criteria.
Source -- Alarm Name or Category This text box displays the source (IP address or host name) and
name or category of the alarm.
Status This column displays the status of the alarm. Values include:
Critical, Major, Minor, Warning, Info, and Clear.
Message This text box displays the message associated with the event.
Created This text box displays the creation time stamp of the event.
Group Name This text box displays the name of the group associated with the
event, if any.
Node This text box displays the node associated with the event.
Domain This text box displays the name of the domain associated with
the event, if any.
Network This text box displays the name of the network associated with
the event, if any.
BWTrapGenerated This text box specifies whether the event was generated by a
BroadWorks node.
BWMoSource This text box displays the managed object that generated the
event.
BWClearable This text box specifies whether the event can be automatically
cleared.
SourceTimeStamp This text box displays the time stamp of the time the event was
sent from the source.
BroadworksNode This text box specifies whether the node affected by the event
is a BroadWorks node. The value "true" indicates that it is a
BroadWorks node. The value "false" indicates that it is not a
BroadWorks node.
BwSubComponent This text box displays the subcomponent associated with the
event, if any.
RecommendedAction This text box displays the recommended action associated with
the event.
Source -- Alarm Name or This column displays the source and name/category of the alarm. Click this link to display the
Category Alarm Properties page. For information on the input boxes displaying on that page, see View Alarm
Properties on page 186.
BW Sub Component This column displays the BroadWorks subcomponent source of the alarm.
Date/Time This column displays the date and time the alarm occurred.
Alarm Details This column displays the description of the detailed alarm.
Recommended Action This column displays the recommended action to address the alarm.
NOTE: To view the alarms that you have picked up, create a new child view with your user name in the
Operator text box.
NOTE: It is important to track any action you have taken to fix an alarm or any new information you
have gathered about the alarm. The Annotate option can be used to add notes to an alarm for future
reference. For example, you can enter the resolution to a problem as an annotation to the alarm, for
future reference. For information on annotating alarms, see View Alarm Properties on page 186 .
To "unpick" an alarm:
1) On the Network Alarms page, click the check box for the alarm that you want to "unpick" for
investigation. (In most cases, this is when you have resolved the problem associated with the alarm or
you want to allow another operator to investigate it.)
2) Click Unpick. The Alarms page displays the list of alarms including the alarm that you have "unpicked".
To clear an alarm:
An alarm can be cleared when it has been resolved or if it is inconsequential.
1) On the Network Alarms page, click the check box for the alarm that you want to change the status to
clear.
2) Click Clear. The Alarms page displays the list of alarms. The alarm that you have cleared appears at
the top of the list with its status changed to clear.
To delete an alarm:
You also have an option to delete an alarm when you feel that the alarm is not significant or the alarm
has been cleared. By default, the alarms that are in clear status for more than 24 hours are deleted and
this deletion occurs every 60 minutes automatically. However, if you want to manually delete the cleared
alarms, use this option.
1) On the Network Alarms page, click the check box for the alarm that you want to delete.
2) Click Delete. A dialog box appears requesting your confirmation.
3) Click OK. The Alarms page displays the list of alarms without the alarm that you deleted.
Tasks to perform from this page
Child view name This text box describes this child view.
Severity These check boxes specify the severity levels of the alarms included in this view.
Previous Severity These check boxes specify the previous severity levels of the alarms included in this view.
Source This text box specifies the source of the alarms included in this view. Alarms are filtered based on
this source only. The source is either an IP address or a host name.
Source -- Alarm Name or This text box specifies the source, alarm name, or category of the events associated with this view.
Category Alarms are filtered based on this source, alarm name, or category only. The source is either an IP
address or a host name.
Category This text box displays the category of the alarms included in this view. Alarms are filtered based on
this category only.
Owner This text box displays the owner associated with the alarms included in this view. The owner or an
alarm is the operator who has picked up an alarm to investigate. Alarms are filtered based on this
owner only.
Group Name This text box displays the name of the group associated with this view. Alarms are filtered based on
this group only.
From Last Modified This text box specifies the start date and time of the alarms included in this view based on the
modification date and time. The calendar icon provides the ability to specify the date and time in the
correct format.
To Last Modified This text box specifies the end date of the alarms included in this view based on the modification
date and time. The calendar icon provides the ability to specify the date and time in the correct
format.
From Created This text box specifies the start date and time of the alarms included in this view based on the
creation date and time. The calendar icon provides the ability to specify the date and time in the
correct format.
To Created This text box specifies the end date and time of the alarms included in this view based on the
creation date and time. The calendar icon provides the ability to specify the date and time in the
correct format.
Group View Mode This drop-down list specifies the type of group view to filter the alarms.
• "None" filters all group views of alarms.
• "Max" filters the maximum alarm in the group view.
• "Latest" filters the latest alarm in the group view.
NOTE: The EMS is currently not using the Group View functionality.
Alarm Age This combination box specifies the age of the alarms included in this view. The drop-down list
includes the following:
• "Any" filters all ages of alarms.
• "Age in Minutes" filters the age of alarms by the number of minutes identified in the text box.
• "Age in Hours" filters the age of alarms by the number of hours identified in the text box.
• "Age in Days" filters the age of alarms by the number of days identified in the text box.
• "Today" filters the age of alarms based on the day the view is executed.
• "Yesterday" filters the age of alarms based on the day before the view is executed.
Refresh Period in Minutes This text box specifies the frequency that the view is refreshed (in minutes).
NOTE: Once you have added a view, you can remove it. To remove a child view, select the child view
from the Fault Management menu in the left-hand navigation bar and click Remove View. A message
appears asking for your confirmation. Click OK to remove the view.
NOTE: Once you have added a view, you can remove it. To remove a child view, select the child view
from the Fault Management menu in the left-hand navigation bar and click Remove View. A message
appears asking for your confirmation. Click OK to remove the view.
5.3.5 Search
Use the Search page to search for alarms, events, or managed objects.
To search:
1) From a view page, click Search and complete the following:
2) Select Match any of the Following to perform a search operation that satisfies any of the specified
matching criteria or select Match all of the Following to perform a search operation that satisfies all of
the specified matching criteria.
3) In the left-hand input box (Properties), select the property based on which you need to perform your
search. If you select the time property as a search criterion, the Date Input Helper icon appears. It can
help you quickly specify the time and date of interest.
4) In the middle input box (Condition), select the condition based on which you need to restrict your
search.
5) In the right-hand input box, type the exact information you are looking for. For example, if you have
selected severity in the Properties box, then you must specify the severity value here, such as "critical",
"major", and so on.
6) To specify additional criteria, click More and repeat steps 2 through 4. Fewer options can be used to
remove the criteria that were last added.
7) Click Search. Events satisfying the criteria appear.
Source -- Alarm Name or This text box specifies the source, alarm name, or category of the event associated with this alarm.
Category The source is either an IP address or a host name.
Source This text box specifies the source of the alarm. The source is either an IP address or a host name.
Created This text box displays the creation time stamp of the event.
Last Updated This text box displays the time stamp of the event last updated.
Severity This text box displays the current severity level of the alarm. Values include: Critical, Major, Minor,
Warning, Info, and Clear.
Previous Severity This text box displays the previous severity level of the alarm.
Message This text box displays the message associated with the alarm.
Owner This text box displays the owner associated with this alarm. The owner or an alarm is the operator
who has picked up an alarm to investigate.
Group Name This text box displays the name of the group associated with this alarm.
EventName This text box displays the name of the event that relates to the alarm.
BroadWorksNode This text box indicates whether the node impacted by the alarm is a BroadWorks node.
BWTrapGenerated This text box specifies whether the event was generated by a BroadWorks node.
SourceTimeStamp This text box displays the time stamp of the event that is associated with this alarm.
BWClearable This text box specifies whether the alarm can be automatically cleared.
RecommendedAction This text box displays the recommended action pertaining to this alarm.
BWSubComponent This text box displays the BroadWorks subcomponent affected by this alarm.
BWMoSource This text box displays the managed object that generated the alarm.
NOTE: Among relevant syslog events, the "auth" and "sshd" messages may be of particular interest since
they report potential attempts of security breach.
Source This column displays the source of the syslog event. Click this link to display the Event Properties
page.
Date/Time This column displays the date and time the syslog event occurred.
Event Details This column displays the details of the syslog event.
Child view name This text box describes this child view.
Severity These check boxes specify the severity levels included in this view.
Source This text box specifies the source of the syslog events associated with this view. Syslog events are
filtered based on this source only.
Source -- Alarm Name or This text box specifies the source, alarm name, or category of the syslog events associated with
Category this view. Syslog events are filtered based on this source, alarm name, or category only.
Message This text box specifies the message that appears with syslog events included in the view.
Category This text box displays the category of the syslog events associated with this view. Syslog events
are filtered based on this category only.
Node This text box displays the node associated with this view. Syslog events are filtered based on this
node only.
Network This text box displays the network associated with this view. Syslog events are filtered based on
this network only.
Events generated after This text box specifies the start date of the syslog events included in this view. The calendar icon
provides the ability to specify the date in the correct format.
Events generated before This text box specifies the end date of the syslog events included in this view. The calendar icon
provides the ability to specify the date in the correct format.
Event Age This combination box specifies the age of the syslog events included in this view. The drop-down
list includes the following:
• "Any" filters all ages of syslog events.
• "Age in Minutes" filters the age of syslog events by the number of minutes identified in the text
box.
• "Age in Hours" filters the age of syslog events by the number of hours identified in the text box.
• "Age in Days" filters the age of syslog events by the number of days identified in the text box.
• "Today" filters the age of syslog events based on the day the view is executed.
• "Yesterday" filters the age of syslog events based on the day before the view is executed.
Refresh Period in Minutes This text box specifies the frequency the view is refreshed (in minutes).
NOTE: Once you have added a view, you can remove it. To remove a child view, select the child view
from the Fault Management menu in the left-hand navigation bar and click Remove View. A message
appears asking for your confirmation. Click OK to remove the view.
NOTE: Once you have added a view, you can remove it. To remove a child view, select the child view
from the Fault Management menu in the left-hand navigation bar and click Remove View. A message
appears asking for your confirmation. Click OK to remove the view.
5.4.4 Search
Use the Search page to search for alarms, events, or managed objects.
To search:
1) From a view page, click Search and complete the following:
2) Select Match any of the Following to perform a search operation that satisfies any of the specified
matching criteria or select Match all of the Following to perform a search operation that satisfies all of
the specified matching criteria.
Source -- Alarm Name or Category This text box displays the source (IP address or host name) and
name or category of the alarm.
Severity This text box displays the severity of the alarm. Values include:
Critical, Major, Minor, Warning, Info, and Clear.
Message This text box displays the message associated with the event.
Created This text box displays the creation time stamp of the event.
Group Name This text box displays the name of the group associated with the
event, if any.
Node This text box displays the node associated with the event.
Domain This text box displays the name of the domain associated with
the event, if any.
Network This text box displays the name of the network associated with
the event, if any.
BWTrapGenerated This text box specifies whether the event was generated by a
BroadWorks node.
BWMoSource This text box displays the managed object that generated the
event.
BWClearable This text box specifies whether the event can be automatically
cleared.
SourceTimeStamp This text box displays the time stamp of the time the event was
sent from the source.
BroadworksNode This text box specifies whether the node affected by the event
is a BroadWorks node. The value "true" indicates that it is a
BroadWorks node. The value "false" indicates that it is not a
BroadWorks node.
BwSubComponent This text box displays the subcomponent associated with the
event, if any.
RecommendedAction This text box displays the recommended action associated with
the event.
Source -- Alarm Name or This column displays the source and name/category of the alarm. Click this link to display the Alarm
Category Properties page. For information on the input boxes that appear on that page, see View Syslog
Alarm Properties on page 203.
Date/Time This column displays the date and time the network syslog alarm occurred.
Alarm Details This column displays the detailed description of the syslog alarm.
NOTE: To view the alarms that you have picked up, create a new child view with your user name in the
Operator text box.
NOTE: It is important to track any action you have taken to fix an alarm or any new information you
have gathered about the alarm. The Annotate option can be used to add notes to an alarm for future
reference. For example, you can enter the resolution to a problem as an annotation to the alarm, for
future reference. For information on annotating alarms, see View Syslog Alarm Properties on page
203 .
Child view name This text box describes this child view.
Severity These check boxes specify the severity levels of the syslog alarms included in this view.
Previous Severity These check boxes specify the previous severity levels of the syslog alarms included in this view.
Source This text box specifies the source of the syslog alarms included in this view. Syslog alarms are
filtered based on this source only. The source is either an IP address or a host name.
Source -- Alarm Name or This text box specifies the source, syslog alarm name, or category of the events associated with
Category this view. Syslog alarms are filtered based on this source, syslog alarm name, or category only.
The source is either an IP address or a host name.
Category This text box displays the category of the syslog alarms included in this view. Syslog alarms are
filtered based on this category only.
Owner This text box displays the owner associated with the syslog alarms included in this view. The owner
or a syslog alarm is the operator who has picked up a syslog alarm to investigate. Syslog alarms
are filtered based on this owner only.
Group Name This text box displays the name of the group associated with this view. Syslog alarms are filtered
based on this group only.
From Last Modified This text box specifies the start date and time of the syslog alarms included in this view based on
the modification date. The calendar icon provides the ability to specify the date and time in the
correct format.
To Last Modified This text box specifies the end date and time of the syslog alarms included in this view based on
the modification date and time. The calendar icon provides the ability to specify the date and time
in the correct format.
From Created This text box specifies the start date and time of the syslog alarms included in this view based on
the creation date and time. The calendar icon provides the ability to specify the date and time in the
correct format.
To Created This text box specifies the end date and time of the syslog alarms included in this view based on
the creation date and time. The calendar icon provides the ability to specify the date and time in the
correct format.
Group View Mode • "None" filters all group views of syslog alarms.
• "Max" filters the maximum syslog alarm in the group view.
• "Latest" filters the latest syslog alarm in the group view.
NOTE: The EMS is currently not using the Group View functionality.
Alarm Age This combination box specifies the age of the syslog alarms included in this view. The drop-down
list includes the following:
• "Any" filters all ages of syslog alarms.
• "Age in Minutes" filters the age of syslog alarms by the number of minutes identified in the text
box.
• "Age in Hours" filters the age of syslog alarms by the number of hours identified in the text box.
• "Age in Days" filters the age of syslog alarms by the number of days identified in the text box.
• "Today" filters the age of syslog alarms based on the day the view is executed.
• "Yesterday" filters the age of syslog alarms based on the day before the view is executed.
Refresh Period in Minutes This text box specifies the frequency that the view is refreshed (in minutes).
NOTE: Once you have added a view, you can remove it. To remove a child view, click Remove View.
A message appears asking for your confirmation. Click OK to remove the view.
NOTE: Once you have added a view, you can remove it. To remove a child view, click Remove View.
A message appears asking for your confirmation. Click OK to remove the view.
5.5.4 Search
Use the Search page to search for alarms, events, or managed objects.
To search:
1) From a view page, click Search and complete the following:
2) Select Match any of the Following to perform a search operation that satisfies any of the specified
matching criteria or select Match all of the Following to perform a search operation that satisfies all of
the specified matching criteria.
3) In the left-hand input box (Properties), select the property based on which you need to perform your
search. If you select the time property as a search criterion, the Date Input Helper icon appears. It can
help you quickly specify the time and date of interest.
4) In the middle input box (Condition), select the condition based on which you need to restrict your
search.
5) In the right-hand input box, type the exact information you are looking for. For example, if you have
selected severity in the Properties box, then you must specify the severity value here, such as "critical",
"major", and so on.
6) To specify additional criteria, click More and repeat steps 2 through 4. Fewer options can be used to
remove the criteria that were last added.
7) Click Search. Events satisfying the criteria appear.
Source -- Alarm Name or This text box specifies the source, alarm name, or category of the event associated with this alarm.
Category The source is either an IP address or a host name.
Source This text box specifies the source of the alarm. The source is either an IP address or a host name.
Created This text box displays the creation time stamp of the event.
Last Updated This text box displays the time stamp when the event was last updated.
Severity This text box displays the current severity level of the alarm. Values include: Critical, Major, Minor,
Warning, Info and Clear.
Previous Severity This text box displays the previous severity level of the alarm.
Message This text box displays the message associated with the alarm.
Owner This text box displays the owner associated with this alarm. The owner or an alarm is the operator
who has picked up an alarm to investigate.
Group Name This text box displays the name of the group associated with this alarm.
EventName This text box displays the name of the event that relates to the alarm.
BroadWorksNode This text box indicates whether the node impacted by the alarm is a BroadWorks node.
BWTrapGenerated This text box specifies whether the event was generated by a BroadWorks node.
SourceTimeStamp This text box displays the time stamp of the event that is associated with this alarm.
BWClearable This text box specifies whether the alarm can be automatically cleared.
RecommendedAction This text box displays the recommended action pertaining to this alarm.
BWSubComponent This text box displays the BroadWorks subcomponent affected by this alarm.
BWMoSource This text box displays the managed object that generated the alarm.
bwPMElementManagementSystemFELaunched
BroadWorks EMS front-end process Info
started
bwPMElementManagementSystemFEShutDown
BroadWorks EMS front-end process shut Info
down
bwPMElementManagementSystemFERestarted
BroadWorks EMS front-end process Info
restarted
bwPMElementManagementSystemBELaunched
BroadWorks EMS back-end process Info
started
bwPMElementManagementSystemBEShutDown
BroadWorks EMS back-end process shut Info
down
bwPMElementManagementSystemBERestarted
BroadWorks EMS back-end process Info
restarted
bwGeneralSoftwareError NE
msSoftwareError NE
msSmtpFailure NE
bwSipAuthenticationFailure NE
bwCallPThreadAutoRestart NE
bwForcedExitDueToHungThread NE
bwLicenseAccntViolation NE
bwLicenseFileNotFound NE
bwLicenseAuthenticationFailure NE
bwLicenseFileExpiring NE
bwSMAPConnectionFailure NE
bwMSLicenseHWViolation NE
bwPMProvisioningServerStopped Internal
bwPMExecutionServerStopped Internal
bwPMMediaServerStopped Internal
bwPMNSProvisioningServerStopped Internal
bwPMNSExecutionServerStopped Internal
bwPMOpenClientServerStopped Internal
bwPMtomcatStopped Internal
bwNetworkDeviceIsFailed NE
bwServerLocked Internal
To open a folder, click the plus (+) sign to the left of the folder. The menu expands and the corresponding
sign changes to a minus (-) sign to indicate that the folder is open.
Specific configuration pages are indicated with a blue circle to the left of the name of the page. Click the
name of the page to display the page.
Help on Parameters
From any page, you can obtain help for parameters. Click Help to the right of the parameter that you want
information on. A description of the parameter appears. The following figure illustrates an example of the
help for the File Collector of the Scheduler page.
Deployed Revision Date This column displays the date the current configuration came
into effect.
Latest Revision This column displays the latest revision of the common
configuration. Note that a revision of the common configuration
may be created without being deployed.
To create a revision:
1) Click the Centralized Networking tab.
2) From the Configuration Management submenu, click Common Configuration. The Common
Configuration page appears.
3) Click the Server Type link.
4) Click Edit Latest to modify the latest revision of the common configuration.
5) Modify the common configuration for this node. Click Save Changes on each changed page.
6) Click Create Revision to create a revision of the common configuration. The Edit Revision page
appears.
7) Type a precise description of this new revision.
8) Click Save to save this description, Reset to reset the revision, or Cancel to cancel this description.
To compare revisions:
1) Click the Centralized Networking tab.
2) From the Configuration Management submenu, click Common Configuration. The Common
Configuration page appears.
3) Click the Deployed/Latest revision link of the server type that has the revisions to compare. The
Common Configuration Revisions page appears.
NOTE: Once a revision of the common configuration is deployed, it is not possible to roll back the
change, since this would potentially require deleting committed revisions of node configurations.
However, it is possible to create a new revision of the common configuration based on an earlier
revision rather than on the latest version, which reinstates the settings of that revision.
To cancel your changes, "uncheck" the check box in the row for the node type(s). A confirmation dialog
box appears if any unsaved changes are about to be lost.
To export a revision:
1) Click the Centralized Networking tab.
2) From the Configuration Management submenu, click Common Configuration. The Common
Configuration page appears.
3) Click the Deployed or Latest Revision link of a server type. The Common Configuration Revisions
page appears.
4) Click the Export link of the revision to export. The File Download dialog box appears.
5) Click Save. Open the export file with an XML Editor.
Deployed Revision This indicates the revision currently deployed. Click to view the
history of revisions for this node.
Latest Revision This indicates the latest revision of the common configuration.
NOTE: Once a revision of the node configuration is deployed, it is not possible to roll back the change,
since this would potentially require deleting committed revisions of node configurations. However, it is
possible to create a new revision of the common configuration based on an earlier revision rather than
on the latest version, which reinstates the settings in the earlier revision.
NOTE: Access the revision history for a node type by selecting the latest revision in the Deployed
Revision or Latest Revision column for the row of the desired server type.
To configure a node:
NOTE: You can only configure a node that you currently manage.
Mode This input box specifies the consolidation mode. When Automatic mode is selected, old revisions
that match the criteria are automatically consolidated on the server. In Manual mode, the user must
display this page, select the criteria, and click Archive Now to perform a consolidation.
Managed node available This list displays the nodes available to manage.
This section provides information on authorization (including support for users, groups, roles, operations,
and object views) and secure authentication and access control, including the Secure Sockets Layer
(SSL).
This section describes the following:
• Configuring Users on page 219
• Configuring Groups on page 225
• Defining Schedules on page 229
• Stale User Accounts on page 231
• Assign Schedule to User on page 230
Group This column displays the name of the group(s) of which the user is a member.
Status This column displays the status of the user (green for "enabled" or gray for "disabled").
Active This column shows whether the user is currently active/logged on the EMS.
To view users:
1) Click the Admin tab.
2) From the Security Administration submenu, click User Configuration. The User Configuration page
appears.
3) Select from the following type of users to view from the drop-down list:
• "All Users" to display all users
• "Active Users" to display active users
• "Inactive Users" to display inactive users
User name This input box specifies the name of the user.
Password This input box specifies the password for the user.
Re-type Password This input box confirms the password for the user.
Available group names This list displays the names of the groups to which the user can belong.
Add this user to a new This check box allows a user to be associated with a new group.
group
Password expires in days This input box specifies the number of days before the password expires.
Account expires in days This input box specifies the number of days before the account expires.
To add a user:
1) Click the Admin tab.
2) From the Security Administration submenu, click User Configuration. The User Configuration page
appears.
3) Click Add User. The Add User page appears.
4) In the User Name input box, enter the user's name.
5) In the Password input box, enter the user's password.
6) In the Re-type Password input box, re-enter the user's password.
7) Select the group(s) to assign the user to from the Available group names drop-down list. Press CTRL to
select multiple groups.
8) To add the user to a new group, click the check box and enter the name of the new group.
9) Select Password expires in and enter the number of days the password stays valid. If this check box is
not selected, then the password never expires.
10)Select Account expires in and enter the number of days the user account stays valid. If this check box is
not selected, then the user account never expires.
Associated Groups This section displays the group information pertaining to the user.
Permitted Operations This section displays the permitted operations pertaining to the user.
User Name This input box specifies the name of the user.
Selected Group This drop-down list indicates all the existing groups.
Users This column specifies the name of the users in the group.
To delete a group:
1) Click the Admin tab.
2) From the Security Administration submenu, click Group Configuration. The Group Configuration page
appears.
3) Click the delete icon on the row of the group to delete. A confirmation dialog box appears. Alternatively,
you can first select a group by clicking the check box of the group row and then clicking the Delete
button.
4) Click Yes to delete the group or click No to return to the previous page.
To assign operations to a group:
1) Click the Admin tab.
2) From the Security Administration submenu, click Group Configuration. The Group Configuration page
appears.
3) Click the operations icon on the row of the group to modify. The Operations Tree page appears.
4) Select the operations you would like to add or remove.
Group Name This input box specifies the name of the group.
To add a group:
1) Click the Admin tab.
2) From the Security Administration submenu, click Group Configuration. The Group Configuration page
appears.
3) Click Add Group. The Add Group page appears.
4) In the Group Name input box, enter the group name.
5) Select the operations options to include, exclude, or not authorize the operations for the user. In the
Operations Tree section, add or delete new operations and modify the permissions. The Operation Tree
Root lists all the existing operations that the group can be permitted. These operations will be inherited
by all the users belonging to this group.
Members This section displays the name and active status of users in the group.
Operation Settings This section displays the permitted operations pertaining to the group.
Custom View Scope This section displays the custom view scope pertaining to the group.
To modify members:
1) Click the Admin tab.
2) From the Security Administration submenu, click Group Configuration. The Group Configuration page
appears.
3) Click the group name on the row of the group to modify. The Group Profile page appears.
4) Click Edit.
5) Modify the input boxes as required.
6) Under the Members section, the users who have already enrolled in the group are displayed. To add
new member(s) or delete existing user(s), click Assign User. The Modify Profile window appears.
7) Use the arrow buttons to move the entries from the Available Users list to Enrolled Users list.
8) Click Submit to add/remove the user(s) to/from the group, click Reset to reset the values to the
previous values, or click Cancel to return to the previous page.
To modify the permitted operations of a group:
1) Click the Admin tab.
2) From the Security Administration submenu, click Group Configuration. The Group Configuration page
appears.
3) Click the group name on the row of the group to modify. The Group Profile page appears.
4) Click Operations Settings. In the Operations Settings section, the Name column lists the operations
for which the group is permitted, the Type column lists the type of permission for the corresponding
operation, and the Scope Setting column lists whether any custom view scope is set for this operation.
NOTE: Authorized scopes (or authorized views) are independent entities that store the real
authorization information. The scopes are associated with the actual operations of the group
leading to fine-grained authorization for the user. Scopes consist of a set of properties, and the
scope is applicable only when these properties are true. For example, if you give a property as
network=192.168.4.0, the scope of that associated operation is applicable only for this network. These
scopes associated with the respective operations are grouped together under the groups and then
allocated to the users.
a) Click the Edit Operation Scope Settings icon on the row of the operation to modify. The Custom
View Scope Modify page appears.
b) In the Name input box, enter the property name.
c) In the Value input box, enter the property value.
d) Click Save to save these changes or Cancel to return to the previous page.
7) To modify a scope of an operation:
a) Click the Edit Operation Scope Settings icon on the row of the operation to modify. The Custom
View Scope Modify page appears.
b) Modify the Name and Value input boxes as required.
c) Click Save to save these changes or Cancel to return to the previous page.
8) To delete a scope of an operation:
a) Click the Edit Operation Scope Settings icon on the row of the operation to modify. The Custom
View Scope Modify page appears.
b) Click the Delete (X) icon next to the scope property that you want to delete.
c) Click Save to save these changes or Cancel to return to the previous page.
To modify the custom view scopes for a group:
1) Click the Admin tab.
2) From the Security Administration submenu, click Group Configuration. The Group Configuration page
appears.
3) Click the group name on the row of the group to modify. The Group Profile page appears.
4) Click Custom View Scope. Under the Custom View Scope section, the Authorized Scopes column lists
the custom view scopes authorized for this group.
5) To define new custom view scopes:
a) Select a scope name (module) from the drop-down list and click Add New Scope. Custom View
Scope - Modify page is displayed.
b) Enter the name for the new custom view scope in the Scope Name input box. In the Property Name
drop-down list, select the required property and enter the required value in the Property Value in the
input box.
c) Click More to add more properties and the Delete icon against the properties to remove them.
d) Click Save to add the new custom view scope or click Cancel to return to the previous page.
6) To assign or remove custom view scope(s) to/from a group:
a) Click Assign Scope. The Modify Profile window appears.
b) Use the arrow buttons to move the entries from the Available Scope list to Enrolled Scope list.
Override Schedule This input box determines whether the schedule is replaced for the user. If this option is selected,
the access schedule is overridden for this user (the user has all-time access to the EMS). This is the
default value.
Assign a schedule for this If this option is selected, this user can only access EMS inside of the schedule defined by specified
user Schedule and Timezone input boxes.
This section provides information on how to monitor the performance of your network.
This section describes the following:
• Overview of Performance Monitoring on page 233
• Collecting Performance Data on page 234
• Monitoring Health Status on page 252
• Viewing Reports and Graphs of Statistics on page 265
• Monitoring JVM on page 270
• View the Performance Status of a Node on page 275
• Configure List of Statistics (Health Status) on page 276
• Configure List of Statistics (Daily) on page 282
• Configure Threshold Modifier Actions on page 288
About EMS Performance
The EMS automates and centralizes the configuration and polling of system-level performance commands
and data. This automation enables the EMS to auto-configure and poll system-level performance
commands on all managed objects. The EMS stores the consolidated data in its database. The goal is
to perform continuous monitoring, prevent unexpected failures, and keep the system in a healthy state.
As a result, an EMS administrator can take corrective actions before the system reaches specific limits.
Furthermore, the EMS provides a unique feature named Health Status Monitoring, which monitors the
health of the overall BroadWorks network. This functionality is based on recurrent distribution pattern of
threshold crossings. Every managed node has an overall node health status that may become green,
yellow, or red. The EMS also defines a group health status that has the same purpose but applies to the
server cluster level.
Monitoring Concepts
For all managed objects, the EMS provides individual Network Operations Center (NOC) status and health
status.
The NOC status refers to the existing alarm status based on the highest severity among all outstanding
alarms of a given managed object. The default severities defined for the NOC status are informational,
warning, minor, major, and critical. In the typical monitoring of a production environment for a BroadWorks
network, any outstanding alarms of high severity (major and critical) require immediate attention from the
NOC personnel.
The health status focuses on the performance status of a managed object. The server health status
aggregates the health status of a series of individual statistics (created from polling objects that match
specific criteria) for a given network element. Similar to the server health status, a group health status
aggregates a series of individual statistics for all servers of the same cluster. The default severities defined
for the health status are green, yellow, and red. In the typical monitoring of a production environment of a
BroadWorks network, outstanding health status (yellow and red) can be reviewed on a scheduled basis by
specialists in network performance analysis.
The NOC status and health status are not mutually exclusive. A threshold crossing can trigger a change
in both the server health status and NOC status if it is justified by the severity of the event. Such an event
requires immediate attention from the NOC personnel and prompts a review by a performance analyst as
soon as possible.
The summary of the Health Status and the NOC (Alarm) Status are provided on the left-hand dashboard of
the EMS web client.
This section focuses on the Health Status Monitoring feature. For more information about NOC Status,
please refer to section Managing Faults on page 167.
This section describes the following:
Statistic Name This displays the statistics for the managed object. A description of each prepackaged statistic
follows.
Data Identifier This column displays the unique identification number of the polling objects from which data about
the node(s) is collected.
Community This column displays the community to be used when sending the SNMP request for collecting the
statistic.
Interval This column displays the interval at which data is collected for the statistic. For example, the value
"600" indicates that after every 600 seconds, data has to be collected.
Active This column specifies whether data collection for the selected node is active The possible values are
"true" or "false". If it is "false", data collection is not performed for that node.
Multiple This column specifies the type used to poll the columnar value of the tables.
Context Name This column specifies the context name of the SNMP node.
SSysIntQueueTimeAvgVoiceMailInAdapt(1000usec) Displays the average voice mail queue holding time (in
milliseconds).
SSysIntQueueTimeMaxVoiceMailInAdapt(msec) Displays the largest voice mail queue sample holding time
(in milliseconds).
SSysIntQueueTimeAvgSIPEncodeQ(1000usec) Displays the average SIP encoding queue holding time (in
milliseconds).
ASSysIntQueueTimeMaxSIPCallDecodeQ(msec) Displays the argest SIP decoding queue sample holding (in
milliseconds).
ASMgcpAvgDialToneDelay(msec) Displays the average MGCP dial tone delay time (in
milliseconds).
SMgcpMaxDialToneDelay(msec) Displays the largest dial tone delay time (in milliseconds).
ASMgcpAvgCallSetupDelay(msec) Displays the average MGCP call setup delay time (in
milliseconds).
ASMgcpMaxCallSetupDelay (msec) Displays the argest MGCP call setup delay time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPEncodeQ(1000usec) Displays the average MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPEncodeQ(msec) Displays the argest MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPDecodeQ(1000usec) Displays the average MGCP decode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPDecodeQ(1000usec) Displays the largest MGCP decode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgSIPEncodeQ(1000usec)T1 Displays the average SIP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxSIPEncodeQ(msec)T1 Displays the largest SIP encode queue delay time (in
milliseconds).
SSysIntQueueTimeAvgSIPCallDecodeQ(1000usec)T1 Displays the average SIP call decode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxSIPCallDecodeQ(msec)T1 Displays the largest SIP call decode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgMGCPEncodeQ(1000usec)T1 Displays the average MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxMGCPEncodeQ(msec)T1 Displays the largest MGCP encode queue delay time (in
milliseconds).
ASSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)T1 Displays the average voice mail queue delay time (in
milliseconds).
ASSysIntQueueTimeMaxVoiceMailInAdapt(msec)T1 Displays the largest voice mail queue delay time (in
milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)T1 Displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec) Displays the average SIP encode queue delay time (in
milliseconds).
NSSysIntQueueTimeAvgSipDecodeQ(1000usec) Displays the largest SIP decode queue delay time (in
milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec) Displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipEncodeQ(msec) Displays the largest SIP encode queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipDecodeQ(msec) Displays the largest SIP decode queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec) Displays the largest SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)T2 Displays the average SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)T1 Displays the largest SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipRedirectSessMgr(msec)T2 Displays the largest SIP redirect queue delay time (in
milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)T1 Displays the average SIP encode queue delay time (in
milliseconds).
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)T2 Displays the average SIP encode queue delay time (in
milliseconds).
NSSysIntQueueTimeMaxSipEncodeQ(msec)T2 Displays the largest SIP encode queue delay time (in
milliseconds).
Name of the Polling Object This input box specifies the name of the polling object. This name is shown as Policy Name on the
Statistics - Modify page of corresponding statistics.
Status This input box specifies the polling object status from a drop-down list. When the value is set to
"true", it is active and data collection for its associated polled data can be done. If set to "false", data
collection for the associated polled data is stopped. The default value is "true".
Collected data for already This input box determines if you want to collect data for already polled nodes. When checked, it
polled nodes indicates that the polling object’s definition is applied over existing managed objects (MOs) and they
are updated with information given in polling objects. For example, you have 20 managed objects
existing and for each, you have two polled data added. Suppose you want to add two more polled
data for a particular set of managed objects. You can specify the match criteria in polling object and
information regarding the new polled data. If this check box is selected, as soon as a polling object
is added, for the existing managed objects that satisfy the match criteria, the two polled data are
added. If this option is unchecked, the polling object is used for newly created managed objects
only. The default value is "false".
Prefix This input box specifies the prefix. Normally the data identifiers are lengthy. For the identifiers
that have the starting “n” digits in common, you can specify that as prefix. For example, if two
statistics-IfSpeed and IfinOctect-the corresponding data identifiers are .1.3.6.1.2.1.2.2.1.5.1
and .1.3.6.1.2.1.2.2.1.10.1. You can see the first part, for example: .1.3.6.1.2.1.2.2.1 is common to
both. You can specify the common prefix as “1.3.6.1.2.1.2.2.1”. In the case of RFC 1213 MIB, even
if the prefix is not specified, the performance module will internally add a prefix to the identifier.
Polling Period (seconds) This input box specifies the time interval for periodic data collection (in seconds). For example,
if set to 5, it indicates that for all the data identifiers, data will be collected every 5 seconds. The
default value is 300 seconds.
User Class Name You can write your own Java class to define your own match criteria according to your requirement.
This class can be specified here to filter out managed objects. This feature requires JAVA coding
expertise. Please contact BroadSoft to create custom match criteria.
Match Criteria These combination input boxes specify the match criteria. When you specify a list of match criteria
based on MO properties, an implicit AND operation is performed among the results i.e., if you
specify 2 conditions, both of them have to be satisfied for the managed object to be considered for
data collection.
Below is a list of MO properties that can be used to set the match criteria.
status, type, managed, isGroup, isContainer, isSNMP, isDHCP, isRouter, isNode, isNetwork,
isInterface, sysName, sysOID, ifSpeed, ifDescr, ifIndex, BroadWorksServer, bwServerType, BW
Version, etc.
Data Collection Once it has been decided for which MOs data has to be collected, you have to choose the type of
data to be collected and the location. Data from the MO can be accessed from its agent, An agent
is a program running in the device which awaits data collection request.
Data Identifiers This input box lists the data identifiers to be collected. When a request is made to the agent for a
particular data, the corresponding OID (Object Identifier - A unique Identification number) has to be
supplied. An object identifier uniquely identifies specific characteristic of the Managed object. Hence
to collect the data you have to specify the OID for that characteristic. The term OID is generically
used as Data identifier. OID is SNMP-specific term.
SNMP OID This input box specifies the data OID to be collected. It could be a SNMP OID (e.g., 1 2.2.1.16.1
refers to IfOutOctects interface of instance 1) or OSPM OID. This input is mandatory.
The select button on the right allows to load a MIB and select a SNMP OID from the MIB tree.
You can form an expression using logical, arithmetic operators and existing Data identifiers. For
example, ( .1.3.6.1.2.1.2.2.1.10.1 + .1.3.6.1.2.1.2.2.1.16.1 ) / 2. The Configure Expression OIDs
link displays examples of Expression OIDs.
Type This input identifies the type from a drop-down list. It can be set to “interface”, “node”, “multiple”, or
“none”.
Interface: This type has been exclusively made available for IF table entries of RFC 1213 MIB,
only. This is used when the object has many instances. When you want to collect data for all
the instances of an object, then you can choose the type to be Interface. Enter the data identifier
as .1.3.6.1.2.1.2.2.1.10. For every instance of the object, a PolledData will be created.
Node: If you know the fully qualified OID to collect data, then you can set the type as Node. For
example if you want to collect data for ifInOctets, instance 1, then choose this type and specify the
data identifier as .1.3.6.1.2.1.2.2.1.10.1.
Multiple: If you do not know how many instances exist for the OID, then this type can be used to
collect data for all the instances. As Interface type is specific to IF table entries; for other OIDs that
have multiple instances, you can choose the type as Multiple. Only one PolledData will be created
for the OID specified, but data collection will be done for all the instances.
Warning: Do not terminate the OID with a dot. If you do, then it will be treated as an invalid OID
and data will not be collected for it.
None: This is used when other protocols are used for data collection apart from SNMP.
The default value is "None".
Name This input box specifies the name for the data identifier. This name is also used as name for the
corresponding statistic created for managed objects that satisfy this polling object match criteria.
This input is mandatory.
Protocol This input box specifies the protocol used for data collection. If no value is specified, default
protocol SNMP will be assumed for data collection.
Interval This input box specifies the time interval for periodic data collection (in seconds). For example if set
to 2, data will be collected every 2 seconds. The default value is 300 seconds.
NOTE:
Case 1: If polling period (common property) and interval are specified, then interval value will take
precedence.
Case 2: If polling period is specified, but no interval, then polling period will be taken as interval.
Case 3: If neither polling period nor interval is specified, then default value (300) will be taken.
Threshold This input box specifies threshold application from a drop-down list. If it is set to "true", it indicates
that you want threshold to be applied on this identifier. If it is set to"false", it means you do not want
any threshold to be applied. The default value is "false".
Store Data This input box specifies if you want to store the data. Sometimes you may not want to store the data
collected for the data identifier. In this case, you can view the data only by Real Time monitoring
using Current Statistic Graph which is currently only available in the applet client. The default value
is "true".
More Properties Other properties that can be set for a data identifier.
Stats Data Table Name If the Collected data is of data type Long then it will be stored in STATSDATA table of the database.
The table will have the name and current date appended to it. For example if today's date is Aug
10 2003 then the table name will be STATSDATA8_10_2003. If you do not specify any input for
this property, then this will be the default behavior.
However, if you want to store data in some other table and not in the default STATSDATA, then you
can specify it in this field. For example, MyTable.
CAUTION: The table name which you specify here must have its structure already defined.
NOTE: You have to append a percentage symbol (%) to the table name like MyTable%. This
enables one table creation per day with the current date appended to the table name. If you do
not specify the % symbol, then no new table will be created everyday and data collected everyday
will be appended to the same table MyTable. This results in a big table after several days. It is
recommended to have separate tables for each day.
String Data Table Name If the collected data is of data type String, then it will be stored in the STRINGDATA table of the
database. The table will have the name and current date appended to it. For example, if today's
date is Aug 10 2003 then the table name will be STRINGDATA8_10_2003. If you do not specify
any input for this property, then this will be the default behavior.
If you want to store data in another table and not in default STRINGDATA, then you must specify it.
For example, StringMyTable.
WARNING: The table name that you specify here must be already available with its structure
defined. The concept of appending % symbol applies for STRINGDATA table also.
Failure Threshold This input box specifies the number of consecutive failures after which, the threshold event should
be generated. This can be used in cases where a single Poll (data collection for the data identifier)
is not stable, for example, if the data identifier has a threshold associated and it is predicted
that the data collected can be cross checked 3 times. If the collected value still exceeds the
Threshold value, then it means that the collected data is stable and this may result in performance
degradation.
NOTE: If there is more than one threshold associated with the data identifier, then the collected
data has to exceed the same threshold consecutively “n” times, as specified in Failure Threshold.
Then only the Threshold Event will be generated.
Save Absolutes This input box specifies the save absolutes. This option is applicable only for Counter type OIDs.
By default, data collected for Counter-type OIDs is not stored as it is. The difference between
the previous data and latest data is collected and stored. If the exact value (absolute value) of
collected data has to be stored for Counter-type OIDs, then this check box should be checked.
Data collected for OIDs of other data types are saved as absolute values.
The default value is "false".
Time Average This input box determines whether the time average is calculated as (Latest collected value +
Previous value)/Difference in Data collection Time value. This is mostly calculated for Counter-
type and Gauge-type data identifiers where the data collected will be an incremental value, and
at one point, will reach the final value and reset to zero. As this reset may happen very often, it is
preferred that a delta value is derived from two consecutive polls. The default value is "false".
Active If this input box is set to "false", data collection will be temporarily stopped for this data identifier.
To resume data collection you will have to set it to "true". The default value is "true".
Save Poll Count This input box specifies the count, for example, only after “n” number of polls, data will be stored in
the database. This is used if the initial set of data collected for the data identifier is unstable and
may not be a correct measure of performance. The default value is "1".
Save On Threshold This input box determines whether the collected data is saved only when it exceeds threshold. The
default value is "False".
Available Thresholds This input box allows to specify the associated thresholds from the list of available thresholds. To
select several thresholds, click the entries you want while holding down the CTRL key.
NOTE: If you delete a Polling Object that is included with the EMS at the time of purchase, you will
seriously compromise the reporting of statistics. You should only delete Polling Objects that have been
created since the EMS was installed on your premises.
NOTE:
Thresholds of category “License Monitoring” are available from this page but it is highly recommended not
to perform any operation on the license monitoring threshold from here. It should be done, instead, from
theConfigure Thresholds on page 445 page.
Kind This input box specifies the kind of threshold from a drop-down
list: Long, String or Percentage.
Long: Threshold can be associated with data identifiers for
which the collected data is of type long. Some of such sample
data identifiers are IfAdminStat, IfOperStat, etc in RFC 1213
MIB. The value you provide for this threshold will be compared
as it is with the data collected for the identifier.
String: These thresholds are for comparing string type of
collected values. The fields Allowed Values and Disallowed
Values are specific to String thresholds. When the collected
value is any one of the strings given in Disallowed Values field
(comma separated), an event of specified Trigger Severity will
be generated. Likewise, when the value is any one string in
Allowed Values field, an event of specified Reset Severity will be
generated.
Percentage: These thresholds are used when the value
collected from an OID is to be compared against value of
another OID. The comparision is to be given in terms of
percentage.
For example, depending upon the toner level you want to set the
number of pages to be loaded in a printer. When the toner level
is 80% of the number of pages to be printed, you may like to be
notified. To achieve this perform the following:
1) Create a statistic for the toner level.
2) Create a percentage threshold with a Threshold Value 80
and ObjectID corresponding to the OID of "Number of pages
in the printer".
3) Associate this threshold object to the statistic created in
step 1. When data collected for the toner level statistic
iscompared with the Threshold value, since the Threshold
type is percentage, data is collected for the threshold
ObjectID. Then the toner level value will be divided by the
number of pages value and the result multiplied by 100, thus
giving a percentage. This resultant value will be compared
with 80 (the Threshold value).
Severity This input box specifies the severity of the event generated
when threshold value is exceeded. This field is applicable only
to threshold objects whose Kind value is "long" or "percentage".
The following severitues are supported: Critical, Major, Minor,
Warning, and Clear.
Threshold Type This input box specifies the type of threshold value you are
going to specify. This field is applicable only to threshold
objects whose Kind value is "long" or "percentage". Possible
values are Max, Min, or Equal. Max: If the collected value
exceeds the threshold value, an event will be generated. Min:
If the collected value is less than the threshold value, an event
will be generated. Equal: If the collected value is equal to the
threshold value, an event will be generated.
Threshold Value This input box specifies the threshold value. In case of threshold
defined for long values, the data collected for the OID is
compared with this value. In case of percentage thresholds,
the result of (first OID / second OID) * 100, for example, a
percentage value, is compared with this value.This field is
applicable only to threshold objects whose Kind value is "long"
or "percentage".
Rearm Value This input box specifies the rearm value. You can enter an
integer here that denotes that when the collected value or
calculated value (in case of % thresholds) reaches the rearm
value, the violated threshold is brought back to normalcy and
a clear event will be generated. This field is applicable only to
threshold objects whose Kind value is "long" or "percentage".
Send Clear This input box determines whether "Clear" events are generated
on threshold reset from the drop-down list. If it is set to "False",
when the threshold is reset (rearmed), no information will be
displayed on the Events page.This field is applicable only to
threshold objects whose Kind value is "long" or "percentage".
Message This input box specifies a string that is displayed on the Events
page when the threshold value is exceeded. This input is
optional, the default value is "Threshold exceeded".
Clear Message This input box specifies a string that is displayed on the Events
page when the threshold is reset (rearmed). This input is
optional, the default value is "Threshold reset".
Trigger Severity This input box specifies the severity of the event generated for
threshold objects of kind string. The following severitues are
supported: Critical, Major, Minor, Warning, and Clear.
Reset Severity The severity to be generated for the threshold object of the
kind string, when the previous severity is cleared. The following
severitues are supported: Critical, Major, Minor, Warning, and
Clear.
ObjectID This input box specifies the OID from which the value should be
obtained to calculate the percentage. This field is applicable only
to threshold objects whose Kind value is "percentage".
ObjectID Type This input box specifies the type of the oid (.ie., whether it is of
type node, interface or multiple). It is applicable for threshold
objects of kind percentage.
Warning: The type of identifier you choose here should be the
same as that of the identifier on which this Threshold is going
to be applied. Otherwise, when division of the two values take
place, invalid resultant value will be generated.
To add a threshold:
1) On the Configured Collection page, click Thresholds: Add. The Threshold - Add page displays.
2) Enter the information as required.
3) Click Add. The threshold is created and can be associated to a polling object.
To modify a threshold:
1) On the Configured Collection page, click Threshold: Modify. The Threshold - Modify page displays.
2) Select the threshold to modify from the Available Thresholds drop-down list.
3) Modify the input boxes.
4) To save the changes, click Submit. To disregard the changes, click Reset. Click Cancel to return to the
previous page.
To delete a threshold:
NOTE: If you delete a threshold that is included with the EMS at the time of purchase, you will
seriously compromise the reporting of statistics. You should only delete thresholds that have been
created since the EMS was installed on your premises.
Name This input box specifies the name of the statistic. This input is
mandatory
Snmp Version This input box determines the SNMP version. If you choose
V3, two more fields labeled User Name and Context Name are
available. The default value is "v1".
Agent This input box specifies the agent. This input is mandatory.
Normally, a device will have one agent in it to collect device
data, where device name and agent name will be same. Hence,
you can specify the device name as agent name. Example:
netwserver01.
If you are adding Statistic via UI, ensure that agent name and
DNS name are set.
Period This input box specifies the time interval for periodic data
collection (in seconds). This input is mandatory. The default
value is "300".
Port This input box specifies the port number to which the EMS can
send the request to the managed nodes for data collection.
When the "Statistics - ADD" page is opened, the value displayed
for this parameter is 161. You must change it to 8001 which is
the default SNMP port used by all Broadworks servers except
EMS server which uses port 8002.
OID This input box specifies a unique Object Identifier string that
represents a MIB entry. Data is collected for this identifier.
An SNMP-specific Data identifier is called OID. This input is
mandatory.
Is MultiplePolledData This input box determines if the statistic relies on multiple polled
data. Select "true" if Data Identifier is of type multiple.
Active This input box determines whether data collection will start for
this statistic. The default value is "True".
Parent Object This input box specifies the name of the managed object which
acts as the parent for this statistic.
Protocol This input box determines the protocol used for data collection,
SNMP or OSPM. The default value is SNMP.
Write Community This input box specifies the SNMP write community.
DNS Name This input box specifies the name of the device from which data
has to be collected. Example: netwserver01.
Policy Name This input box displays the name of the policy which correspond
to the Polling Object name It is relevant only to statistics created
through polling objects.
Threshold List This input box determines which threshold(s) is(are) applied on
this statistic.
Current Save Count This input box specifies the current save count used for internal
purpose only.
Save Absolute This option is applicable only for Counter type OIDs. By default,
data collected for Counter type OIDs is not stored as it is. The
difference between the previous data and latest data is collected
and stored. If the exact value (absolute value) of collected data
has to be stored for Counter type OIDs then this option should
be selected (checked). Data collected for OIDs of other data
types is saved as absolute values. The default value is "False".
Save This input box determines whether collected data is stored in the
database. The default value is "True".
StatsDataTableName If the Collected data is of data type Long then it will be stored
in STATSDATA table of the database. The table will have
the name and current date appended to it. For example
if today's date is Aug 10 2003 then the table name will be
STATSDATA8_10_2003. If you do not specify any input for this
property, then this will be the default behavior.
However, if you want to store data in some other table and not in
the default STATSDATA, then you can specify it in this field. For
example, MyTable.
CAUTION: The table name which you specify here must have
its structure already defined.
Log Directly This input box determines whether collected data is stored in flat
files rather than storing them in database. The default value is
"false".
Log File Name This input box specifies the name of the log file to store
collected data.
Save Poll Count This input box specifies the integer (n), during every nth poll, the
collected data will be stored. The default value is "1".
Failure Threshold This input box specifies the failure threshold. This indicates the
number of consecutive failures after which the threshold event
should be generated.
Save On Threshold This input box determines whether the collected data is saved
only when it exceeds threshold. The default value is "false".
Owner Name This input box specifies a string to denote the owner of the
statistic.
Time Average This input box determines whether the Time Average is
calculated as (Latest collected value - Previous value ) /
Difference in Data collection Time value. This is mostly
calculated for Counter type OIDs where the collected data will
be an incremental value and at one point will reach the final
value and reset to Zero. As this reset may happen soon and
very often, it is preferred that a Delta value is derived from two
consecutive Polls. The default value is "false".
Real Time Status This is the status, in real time, of the group or node. The icons indicate the following:
Indicates that the group (or node) is marginally healthy. The threshold has been exceeded.
Indicates that the group (or node) is not healthy. The maximum threshold has been exceeded.
Group Name/Node Name This displays the name of the group or the name of the node.
Date This displays the time stamp of the last polling attempt on the group or node.
Real Time Status This is the status, in real time, of the health statistic. The icons indicate the following:
Indicates that the polled values of this statistic are below the defined threshold crossing for the
defined number of successive polls.
Indicates that the polled values of this statistic are above the defined threshold crossing, whose
severity is Major, for the defined number of successive polls.
Indicates that the polled values of this statistic are above the defined threshold crossing whose
severity is Critical, for the defined number of successive polls.
Date This displays the time stamp of the statistic last polling attempt.
NOTE: The EMS provides a mechanism that allows the immediate resetting of an outstanding health
status. The EMS provides this functionality in addition to the automatic reset that waits for a number of
data collection cycles before automatically resetting a health status. The automatic approach ensures
that the health status is eventually reset when a condition clears. However, when an EMS operator
intervenes to correct a problem identified by an outstanding health status, it becomes useful to allow a
manual reset of the corresponding health status. This manual action accelerates the return to the default
"green" processing. Therefore, in case the corrective actions were not sufficient, this manual reset should
accelerate the time before the next health status. Upon invocation of a manual reset, the EMS resets all
counters related to the selected health status to "zero" and returns the corresponding health status to
"green". You can only select a manual reset for health status at the basic statistics level. The node and
group health status are automatically reset based on the conditions of the other health status at the basic
statistics level (from the corresponding node and group). If you select all the health status at the basic
statistics level, the node or group health status are reset automatically.
NOTE: Once the ThresholdModifierItemCustom.xml file is modified, the thresholds must be reloaded to
become active.
Network Audit
By loading the full list of threshold modifiers, the EMS accumulates a list of UNIX commands that map
to various characteristics of a managed object. The EMS runs a network audit for managing these
characteristics. The EMS audit runs these UNIX commands from all relevant network elements on a daily
basis. Then the EMS adds the resulting characteristics as properties of the corresponding managed object.
Threshold Value Hierarchy
Given the generic nature of the current threshold modifier definitions, multiple threshold modifiers may be
relevant at the same time.
The EMS uses a priority list for determining which threshold modifier definition it ultimately uses. The
priority list is specified by an XML element named ModifierItemPriority, which is located in the same XML
file as the ModifierItem instances. (The file is named ThresholdModifierItem.xml.) For this tag, all the
values of the definitionName attribute for modifier definitions are separated by a space, and the highest
priority definitions are listed from left to right. Using this approach, an EMS administrator can modify the
priority list by customizing this XML element. Note that a reload of the threshold modifier definitions is
required before a change in the priority list becomes effective.
<MODIFIERITEMPRIORITY>
MANAGEDOBJECTBASED CLUSTERBASED MANAGEDOBJECTESTIMATOR EXPRESSIONBASEDSYSENG
DEFAULTSYSENG CPUNAMEBASED PLATFORMNAMEBASED PLATFORMSIZEBASED
</MODIFIERITEMPRIORITY>
<MODIFIERDEFINITION DEFINITIONNAME="DEFAULTSYSENG">
<!-- MODIFIERPROPERTY DEFINES ONE OF THE FOLLOWING:
- A PROPERTY THAT IS RAN FROM REMOTE NODES AND
ADDED TO A MANAGEDOBJECT.
- A PROPERTY ALREADY PRESENT FROM A MANAGEDOBJECT. -->
<MODIFIERPROPERTY NAME="NUMBEROFCORES" TYPE="INTEGER">
<UNIXCMD>/USR/LOCAL/BROADWORKS/BW_BASE/BIN/CPUNUM.PL | SED S/
NUMBER\ OF\ PROCESSORS\ IS\ *//</UNIXCMD>
</MODIFIERPROPERTY>
<MODIFIERPROPERTY NAME="UNAMEPLATFORM" TYPE="STRING">
<UNIXCMD>UNAME -I</UNIXCMD>
</MODIFIERPROPERTY>
<MODIFIERPROPERTY NAME="CONFIGUREDMEMORY" TYPE="INTEGER">
<UNIXCMD>PERL -I/USR/LOCAL/BROADWORKS/BW_BASE/BIN -I/USR/LOCAL/
BROADWORKS/BW_BASE/LIB -E "USE BWOS; PRINT MEMORY_SIZE().\"\N\";"</
UNIXCMD>
</MODIFIERPROPERTY>
<MODIFIERPROPERTY NAME="BWSERVERTYPE" TYPE="STRING"/>
<!-- THE SELECTION CRITERIA DEFINES MO PROPERTIES THAT MUST
BE FOUND AND MATCHED FOR THE DEFINED MODIFIERPROPERTY
(THE REMOTECMDBASEDPROPERTY SPECIFICALLY) TO BE COMPUTED
AND ADDED AS PROPERTY FOR AN MO.
ALL CRITERIA MUST MATCH FOR A MATCH. THUS 'AND' CONDITION
IS USED. -->
<MODIFIERSELECTIONCRITERION NAME="BWSERVERTYPE" TYPE="STRING"
MATCH="LIST">AS,NS,MS
</MODIFIERSELECTIONCRITERION>
<MODIFIERSELECTIONCRITERION NAME="ISGROUP" TYPE="BOOLEAN"
MATCH="EXACT">FALSE
</MODIFIERSELECTIONCRITERION>
</MODIFIERDEFINITION>
<MODIFIERITEM DEFINITIONNAME="DEFAULTSYSENG">
<!-- ALL PLATFORM-DEPENDANT THRESHOLDS FOR ALL AS RUNNING
ON X86_64 ARCHITECTURE HAVING 8 CORES AND BETWEEN 24G-32G
OF RAM HAVE A MULTIPLICATOR FACTOR OF 18.
-->
<MODIFIERITEMPROPERTY NAME="UNAMEPLATFORM" MATCH="EXACT"
TYPE="STRING">X86_64
</MODIFIERITEMPROPERTY>
<MODIFIERITEMPROPERTY NAME="NUMBEROFCORES" MATCH="EXACT"
TYPE="INTEGER">8
</MODIFIERITEMPROPERTY>
<MODIFIERITEMPROPERTY NAME="CONFIGUREDMEMORY" MATCH="RANGE"
TYPE="INTEGER">
24576-32768</MODIFIERITEMPROPERTY>
As a result, for all the remote nodes that match the above description, the EMS
multiplies all the static thresholds that have platform-dependent values by 18. That
is, when the EMS collects a statistic such as ASSipMsgPerSecond for which the
threshold named MPSBStatYel applies, the EMS uses the following value (given that
the above criteria apply to the remote node where the statistic was collected). Note that
ASSipMsgPerSecond defines the number of Session Initiation Protocol (SIP) messages
per second from an Application Server and MPSBStatYel defines the number of messages
per second before reaching a yellow status (static level).
Threshold Name: MPSBStatYel Static Threshold Value: 200 Threshold
Alterator: 18 Dynamic Threshold Value: 200 * 18 = 3600
ManagedObjectEstimator ModifierDefinition
The following example shows the modifier definition named ManagedObjectEstimator.
This has a goal to help characterize all platform-dependent thresholds from a new or
enhanced platform. It allows the specification of a specific managed object name where
instances of this modifier definition apply.
MODIFIERDEFINITION DEFINITIONNAME="MANAGEDOBJECTESTIMATOR">
<MODIFIERPROPERTY NAME="MANAGEDOBJECTNAME" TYPE="STRING"/>
</MODIFIERDEFINITION>
<MODIFIERITEM DEFINITIONNAME="MANAGEDOBJECTESTIMATOR">
<!-- ALL PLATFORM-DEPENDANT THRESHOLDS OF MO
MTL64LIN04.MTL.BROADSOFT.COM ARE MULTIPLIED BY 60.
-->
<MODIFIERITEMPROPERTY NAME="MANAGEDOBJECTNAME" MATCH="EXACT"
TYPE="STRING">
MTL64LIN04.MTL.BROADSOFT.COM</MODIFIERITEMPROPERTY>
<THRESHOLDALTERATORMULTIPLICATOR>60
</THRESHOLDALTERATORMULTIPLICATOR>
</MODIFIERITEM>
As a result, for all the statistics from the above-mentioned remote node, the EMS
multiplies all the static thresholds with platform-dependent values by 60, that is, when
the EMS collects a statistic such as ASSipMsgPerSecond with a threshold named
MPSBStatYel. The EMS uses the following value (given that this statistic was collected
from the managed object named mtl64lin04.mtl.broadsoft.com).
ManagedObjectBased ModifierDefinition
The following example shows the modifier definition named ManagedObjectBased, which
has a goal to allow overwriting the value for a specific threshold of a specific node.
Example of ManagedObjectBased ModifierDefinition
<MODIFIERDEFINITION DEFINITIONNAME="MANAGEDOBJECTBASED">
<MODIFIERPROPERTY NAME="MANAGEDOBJECTNAME" TYPE="STRING"/>
<THRESHOLDALTERATORABSOLUTE/>
</MODIFIERDEFINITION>
<MODIFIERITEM DEFINITIONNAME="MANAGEDOBJECTBASED">
<!-- ALTER ARM/REARM VALUE OF THRESHOLD MPSMOBJRED1
FOR MO MTLAS01.MTL.BROADSOFT.COM -->
<MODIFIERITEMPROPERTY NAME="MANAGEDOBJECTNAME" MATCH="EXACT"
TYPE="STRING">
MTLAS01.MTL.BROADSOFT.COM</MODIFIERITEMPROPERTY>
<THRESHOLDALTERATORABSOLUTE THRESHOLDNAME="MPSMOBJRED1"
ARM="120000" REARM="119500"/>
</MODIFIERITEM>
As a result, for all the statistics from the above-mentioned remote node, the EMS replaces
the defined static threshold values for the threshold named MPSMObjRed1. That is,
when the EMS collects a statistic such as ASSipMsgPerSecond with a threshold named
MPSMObjRed1, the EMS uses the following arm value (given that this statistic was
collected from the managed object named mtlas01.mtl.broadsoft.com). The same logic
applies to the rearm value.
Threshold Name: MPSMObjRed1 Static Threshold Value: 200 Absolute
Arm Threshold Value: 120000 Dynamic Arm Threshold Value: 120000
ClusterBased ModifierDefinition
The following example shows the modifier definition named ClusterBased, which has a
goal to allow the specification of an expression for determining the threshold progression
based on a baseline value and the number of nodes within a cluster. Since this modifier
definition applies to clusters, instances of this definition must set the IsGroup attribute to
"true".
Example of ClusterBased ModifierDefinition
<MODIFIERDEFINITION DEFINITIONNAME="CLUSTERBASED">
<MODIFIERPROPERTY NAME="ISGROUP" TYPE="STRING"/>
<THRESHOLDALTERATOREXPRESSION/>
The ModifierItem in the following example contains instances of the ClusterBased modifier
definition previously described. These instances specify the expression to be used when
determining the arm and rearm threshold values for the thresholds named CPUClusterYel
and CPUClusterRed when a relevant statistic is collected from any managed group object.
Note that CPUClusterYel defines the percentage of CPU utilization before reaching a
yellow status (group level) and CPUClusterRed defines the percentage of CPU utilization
before reaching a red status (group level).
Example of ModifierItem Instances Based on ClusterBased ModifierDefinition
<MODIFIERITEM DEFINITIONNAME="CLUSTERBASED">
<!-- DEFINE EXPRESSION FOR CLUSTER-BASED
THRESHOLD CPUCLUSTERYEL -->
<MODIFIERITEMPROPERTY NAME="ISGROUP" MATCH="EXACT"
TYPE="BOOLEAN">
TRUE</MODIFIERITEMPROPERTY>
<THRESHOLDALTERATOREXPRESSION THRESHOLDNAME="CPUCLUSTERYEL"
BASEARM="60" BASEREARM="54">
MAX(BASE,MIN(NBCLUSTERMEMBER,2)*BASE*9/10+MAX(0,
(NBCLUSTERMEMBER-2))*BASE)
</THRESHOLDALTERATOREXPRESSION>
</MODIFIERITEM>
<MODIFIERITEM DEFINITIONNAME="CLUSTERBASED">
<!-- DEFINE EXPRESSION FOR CLUSTER-BASED
THRESHOLD CPUCLUSTERRED -->
<MODIFIERITEMPROPERTY NAME="ISGROUP" MATCH="EXACT"
TYPE="BOOLEAN">TRUE
</MODIFIERITEMPROPERTY>
<THRESHOLDALTERATOREXPRESSION THRESHOLDNAME="CPUCLUSTERRED"
BASEARM="75" BASEREARM="67">
MAX(BASE,MIN(NBCLUSTERMEMBER,2)*BASE*9/10+MAX(0,
(NBCLUSTERMEMBER-2))*BASE)
</THRESHOLDALTERATOREXPRESSION>
</MODIFIERITEM>
As a result, for all the group statistics that have thresholds named CPUClusterYel and
CPUClusterRed that apply, the EMS replaces the defined static threshold values using the
specified formula, that is, when the EMS collects a statistic such as CPUBusyGroup, the
EMS uses the following arm value. This example assumes that the cluster has three nodes
(that is, nbClusterMember = 3).
<MODIFIERITEM DEFINITIONNAME="DEFAULTSYSENG">
<!-- ALL PLATFORM-DEPENDANT THRESHOLDS FOR ALL AS RUNNING
ON X86_64 ARCHITECTURE HAVING 8 CORES AND BETWEEN 24G-32G
OF RAM HAVE A MULTIPLICATOR FACTOR OF 18.
-->
<MODIFIERITEMPROPERTY NAME="UNAMEPLATFORM" MATCH="EXACT"
TYPE="STRING">X86_64
</MODIFIERITEMPROPERTY>
<MODIFIERITEMPROPERTY NAME="NUMBEROFCORES" MATCH="EXACT"
TYPE="INTEGER">8
</MODIFIERITEMPROPERTY>
<MODIFIERITEMPROPERTY NAME="CONFIGUREDMEMORY" MATCH="RANGE"
TYPE="INTEGER">
24576-32768</MODIFIERITEMPROPERTY>
<MODIFIERITEMPROPERTY NAME="BWSERVERTYPE" MATCH="EXACT"
TYPE="STRING">AS
</MODIFIERITEMPROPERTY>
<THRESHOLDALTERATORMULTIPLICATOR>18
</THRESHOLDALTERATORMULTIPLICATOR>
</MODIFIERITEM>
<MODIFIERITEM DEFINITIONNAME="MANAGEDOBJECTESTIMATOR">
<!-- ALL PLATFORM-DEPENDANT THRESHOLDS OF MO
MTL64LIN04.MTL.BROADSOFT.COM ARE MULTIPLIED BY 60.
-->
<MODIFIERITEMPROPERTY NAME="MANAGEDOBJECTNAME" MATCH="EXACT"
TYPE="STRING">
MTL64LIN04.MTL.BROADSOFT.COM</MODIFIERITEMPROPERTY>
<THRESHOLDALTERATORMULTIPLICATOR>60
</THRESHOLDALTERATORMULTIPLICATOR>
</MODIFIERITEM>
Therefore, the EMS must use the ModifierItemPriority element to determine which
threshold alterator it uses. If this priority list is used, the ManagedObjectEstimator
instance has the highest priority because its ModifierDefinition name is left of the
DefaultSysEng ModifierDefinition in the priority list.
<MODIFIERITEMPRIORITY>
MANAGEDOBJECTBASED CLUSTERBASED MANAGEDOBJECTESTIMATOR
EXPRESSIONBASEDSYSENG
DEFAULTSYSENG CPUNAMEBASED PLATFORMNAMEBASED PLATFORMSIZEBASED
</MODIFIERITEMPRIORITY>
NOTE: A report must be created before you can view the data as a graph.
NOTE: A report must be created before you can view the data as a graph.
Period This drop-down menu specifies the time period of the graph.
Start Date This text box specifies the day the graph begins.
End Date This text box specifies the last day of the graph.
Extrapolate-To Date This text box specifies the date the graph extrapolates to.
N This column displays the number of times the statistic was polled at the maximum value.
Max This column displays the maximum value polled for the statistic.
TimeStamp(Max) This column displays the last time the node was polled to collect data for this statistic.
<xs:schema>
<xs:complexType name="PerformanceStatisticReport">
<xs:sequence>
<xs:element name="PerformanceStatistic" type="PerformanceStatisticType"
maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="PerformanceStatisticType">
<xs:sequence>
<xs:element name="ManagedObject" type="xs:string"/>
<xs:element name="StatisticName" type="xs:string"/>
<xs:element name="StatisticValue" type="StatisticValueType"
maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="StatisticValueType">
<PerformanceStatisticReport>
<PerformanceStatistic>
<ManagedObject>mtl64lin01.mtl.broadsoft.com</ManagedObject>
<StatisticName>CPUBusy</StatisticName>
<PerformanceStatisticsList>
<StatisticValue>
<TimeStamp>2008-08-09T00:00:00</TimeStamp>
<Value>10</Value>
</StatisticValue>
<StatisticValue>
<TimeStamp>2008-08-09T00:05:00</TimeStamp>
<Value>11</Value>
</StatisticValue>
</PerformanceStatisticsList>
</PerformanceStatistic>
<PerformanceStatistic>
<ManagedObject>ml64lin02.mtl.broadsoft.com</ManagedObject>
<StatisticName>CPUBusy</StatisticName>
<PerformanceStatisticsList>
<StatisticValue>
<TimeStamp>2008-08-09T00:00:00</TimeStamp>
<Value>10</Value>
</StatisticValue>
<StatisticValue>
<TimeStamp>2008-08-09T00:05:00</TimeStamp>
<Value>10</Value>
</StatisticValue>
</PerformanceStatisticsList>
</PerformanceStatistic>
</PerformanceStatisticReport>
BE Host Name This input box displays the back end host name.
BE Startup Time This input box displays the back end startup time.
VM Version This input box displays the version of the virtual machine.
BE Host address This input box displays the back end host address.
Database Name This input box displays the name of the database.
VM Vendor This input box displays the name of the virtual machine vendor.
StatusPollingRate in PerSec This graph displays the rate of status polling per second.
TrapRate in PerSec This graph displays the rate of traps per second.
EventRate in PerSec This graph displays the rate of events per second.
AlertRate in PerSec This graph displays the rate of alerts per second.
To generate graphs:
1) Click the Admin tab.
2) From the Monitor/Management sub-menu, click JVM Management. The JVM Management page
appears.
3) To generate line graphs, click Line Graphs. A line graph representation of the statistics appear.
4) To generate line graphs, click Area Graphs. An area graph representation of the statistics appear.
5) To select the period of time that the graphs include, select the length of time from the drop-down menu.
The default is "1 day".
To view the stand-by server details:
Click STANDBY Server Details. The stand by server details display in a new window.
Tasks to perform from this page
FE Host Name This input box displays the front end host name.
VM Version This input box displays the version of the virtual machine.
FE StartUp Time This input box displays the front end startup time.
FE Host address This input box displays the front end host address.
VM Vendor This input box displays the name of the virtual machine vendor.
Web Server Port This input box displays the Web Server port.
To generate graphs:
1) Click the Admin tab.
2) From the Monitor/Management sub-menu, click JVM Management. The JVM Management page
appears.
3) Click the FE Server Details tab. The FE Server Details tab appears.
4) To generate line graphs, click Line Graphs. A line graph representation of the statistics appear.
5) To generate line graphs, click Area Graphs. An area graph representation of the statistics appear.
6) To select the period of time that the graphs include, select the length of time from the drop-down menu.
The default is "1 day".
To view the stand-by server details:
Click STANDBY Server Details. The stand by server details display in a new window.
Client Host Name This input box displays the client host name.
User Name This input box displays the user name currently logged in to the client.
Client Host Address This input box displays the client host address.
Start Time This input box displays the time the client logged in.
AS TRAFFIC Description
ASCallsPerSecond This statistic displays the number of calls (per second) on the
Application Server. It is based on the bwCallpCallsPerSecond
statistic.
ASActiveCalls This statistic displays the number of active calls (per second) on
the Application Server. It is based on the bwCallpActiveCalls
statistic.
ASSipMsgPerSecond This statistic displays the number of SIP messages (per second)
on the Application Server. The formula used for this statistic
is: (bwSipStatsTcpIns+bwSipStatsTcpOuts+bwSipStatsUdpIns
+bwSipStatsUdpOuts)/$DELTA_TIME.
ASSipRegistersInPerSecond This statistic displays the number of SIP registers (per second)
on the Application Server. The formula used for this statistic is:
(bwSipStatsRegisterIns)/$DELTA_TIME.
ASSipOptionsPerSecond This statistic displays the number of SIP options (per second)
on the Application Server. The formula used for this statistic is:
(bwSipStatsRegisterIns)/$DELTA_TIME.
ASSipAvgCallSetupDelay This statistic displays the average call delay for setting up
SIP messages on the Application Server. It is based on the
bwSipStatsSetupSignalDelay statistic.
ASSipMaxCallSetupDelay (msec) This statistic displays the maximum call delay for setting up
SIP messages (in milliseconds) on the Application Server. It is
based on the bwSipStatsSetupSignalDelay statistic.
ASSipAvgAnswerDelay (msec) This statistic displays the average time for SIP messages to
be answered (in milliseconds) on the Application Server. It is
based on the bwSipStatsAnswerSignalDelay statistic.
ASSipMaxAnswerDelay (msec) This statistic displays the maximum time for SIP messages to
be answered (in milliseconds) on the Application Server. It is
based on the bwSipStatsMaxAnswerSignalDelay statistic.
ASMgcpAvgDialToneDelay (msec) This statistic displays the maximum time for MGCP messages
to be answered (in milliseconds) on the Application Server. It is
based on the bwSipStatsMaxAnswerSignalDelay statistic.
ASMgcpAvgCallSetupDelay (msec) This statistic displays the average time before MGCP messages
are set-up (in milliseconds) on the Application Server. It is
based on the bwMGCPStatsSetupSignalDelay statistic.
ASMgcpMaxCallSetupDelay (msec) This statistic displays the average time before MGCP statistics
are set-up (in milliseconds) on the Application Server. It is
based on the bwMGCPStatsSetupSignalDelay statistic.
ASMgcpAvgAnswerDelay (msec) This statistic displays the average time before MGCP calls
are answered (in milliseconds) on the Application Server. It is
based on the bwMGCPStatsAnswerSignalDelay statistic.
ASMgcpMaxAnswerdelay (msec) This statistic displays the maximum time before MGCP calls
are answered (in milliseconds) on the Application Server. It is
based on the bwMGCPStatsMaxAnswerSignalDelay statistic.
bwSystemInternalQueueTimeAvg This statistic displays the average time messages stay in queue.
AS REDUNDANCY Description
MISCELLANEOUS Description
percentXsJHeap This statistic displays the percentage of JAVA heap being used
by the Execution Server (XS) process.
MSNoPortAvailableError This statistic displays the number of "no port available" errors.
MSPortsUsageRatio This statistic displays the ratio of currently used ports to the total
of licensed ports.
MSBlockingRatio This statistic displays the ratio of the number of "no port
available" error to the sum of Interactive Voice Response (IVR)
sessions and conferences.
MSVoiceMailDelivery-SMTP This statistic displays the total number of voice mail delivered
through SMTP.
MSIvrAudioMemoryUsageRatio This statistic displays the ratio of the IVR audio memory in use
to the IVF free audio memory.
MSRTPReceiveQOSin1000th This statistic displays the ratio of delta (times 1000) between
RTP packets expected and the RTP packets received to the
RTP packet expected.
MSRTPTransmitQOSin1000th This statistic displays the ratio (times 1000) of the cumulative
RTP packet lost to the total RTP packet sent.
MSBadSyncSourceRatio This statistic displays the ratio (times 100) of the number of
packets received that had an invalid Synchronization Source
(SSRC) to the number of RTP packets received.
MSVoiceQuality This statistic displays the number of RTP frames skipped per 10
seconds.
MSSipRetransmissionIn1000th This statistic displays the ratio (times 1000) of SIP invite 200OK
retransmits to the number of SIP invite.
MSASRequest-RetryIn1000th This statistic displays the ratio (times 1000) of SIP retransmit to
the sum of SIP invite, SIP Bye, and SIP Info.
MSTech-SupportPMEquivalencyNoPortAvailErr This statistic displays the number of ‘no ports available’ errors.
MSVoiceXMLErrorCount This statistic displays the number times an error occurs while
downloading or running a VoiceXML script.
NSSipMsgPerSecond This statistic displays the sum of SIP TCP messages received
and sent and the SIP UDP messages received and sent per
second.
NSSysIntQueueTimeAvgSipEncodeQ(1000usec) This statistic displays the average SIP encoding queue holding
time. This statistic is disabled when there is more than one
threads for SIP encoding.
NSSysIntQueueTimeAvgSipDecodeQ(1000usec) This statistic displays the average SIP decoding queue holding
time.
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec) This statistic displays the average SIP redirect session manager
holding time. This statistic is disabled when there is more than
one threads for SIP redirect session manager.
NSSysIntQueueTimeMaxSipEncodeQ(msec) This statistic displays the maximum SIP encoding queue holding
time. This statistic is disabled when there is more than one
threads for SIP encoding.
NSSysIntQueueTimeMaxSipDecodeQ(msec) This statistic displays the maximum SIP decoding queue holding
time.
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)TX This statistic displays the average SIP redirect session manager
holding time for thread TX, where TX can be T1 … TN, the
thread number.
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)TX This statistic displays the average SIP encoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
NSSysIntQueueTimeMaxSipEncodeQ(msec)TX This statistic displays the maximum SIP encoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSBusyHourCallAttempts This statistic displays the sum of user call origination attempts
and network call origination attempts.
XSSysIntQueueTimeAvgCallHalf(1000usec)TX This statistic displays the average queue holding time for a Call
Half thread TX, where TX can be T1 … TN, the thread number.
XSSysIntQueueTimeMaxCallHalf(msec)TX This statistic displays the maximum queue holding time for a
Call Half thread TX, where TX can be T1 … TN, the thread
number.
XSSysIntQueueTimeAvgRegAdapt(1000usec)TX This statistic displays the average queue holding time for a
Registration input queue.
XSSysIntQueueTimeMaxRegAdapt(msec)TX This statistic displays the maximum queue holding time for a
Registration input queue.
XSSysIntQueueTimeAvgCallPThreadDBAccess(1000usec) This statistic displays the average queue holding time for the
Callp thread to DB access.
XSSysIntQueueTimeMaxCallPThreadDBAccess(msec) This statistic displays the maximum queue holding time for the
Callp thread to DB access.
XSSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)TX This statistic displays the average queue holding time for a voice
mail input adapter thread TX, where TX can be T1 … TN, the
thread number.
XSSysIntQueueTimeMaxVoiceMailInAdapt(msec)TX This statistic displays the maximum queue holding time for a
voice mail input adapter thread TX, where TX can be T1 … TN,
the thread number.
XSSipMsgPerSecond This statistic displays the sum of SIP TCP messages received
and sent and the SIP UDP messages received and sent per
second.
XSSipAvgCallSetupDelay This statistic displays the average time (in milliseconds) it takes
between the receipt of an INVITE message for the origination of
a new call and the transmission of an INVITE (Sip terminator),
RQNT (MGCP terminator with in-band ringback), or CRCX
(MGCP terminator without in-band ringback) to the primary
device of the original called party (in the case of intra-group call)
or to the network element of the original called party (in the case
of a call to the PSTN).
XSSysIntQueueTimeAvgSIPEncodeQ(1000usec)TX This statistic displays the average SIP encoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSSysIntQueueTimeMaxSIPEncodeQ(msec)TX This statistic displays the maximum SIP encoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSSysIntQueueTimeAvgSIPCallDecodeQ(msec)TX This statistic displays the average SIP decoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSSysIntQueueTimeMaxSIPCallDecodeQ(msec)TX This statistic displays the maximum SIP decoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSCapMsgPerSecond This statistic displays the total number of CAP messages that
have been handled by the server.
AS TRAFFIC Description
ASCallsPerSecond This statistic displays the number of calls (per second) on the
Application Server. It is based on the bwCallpCallsPerSecond
statistic.
ASActiveCalls This statistic displays the number of active calls (per second) on
the Application Server. It is based on the bwCallpActiveCalls
statistic.
ASSipMsgPerSecond This statistic displays the number of SIP messages (per second)
on the Application Server. The formula used for this statistic
is: (bwSipStatsTcpIns+bwSipStatsTcpOuts+bwSipStatsUdpIns
+bwSipStatsUdpOuts)/$DELTA_TIME.
ASSipRegistersInPerSecond This statistic displays the number of SIP registers (per second)
on the Application Server. The formula used for this statistic is:
(bwSipStatsRegisterIns)/$DELTA_TIME.
ASSipOptionsPerSecond This statistic displays the number of SIP options (per second)
on the Application Server. The formula used for this statistic is:
(bwSipStatsRegisterIns)/$DELTA_TIME.
ASSipAvgCallSetupDelay This statistic displays the average call delay for setting up
SIP messages on the Application Server. It is based on the
bwSipStatsSetupSignalDelay statistic.
ASSipMaxCallSetupDelay (msec) This statistic displays the maximum call delay for setting up
SIP messages (in milliseconds) on the Application Server. It is
based on the bwSipStatsSetupSignalDelay statistic.
ASSipAvgAnswerDelay (msec) This statistic displays the average time for SIP messages to
be answered (in milliseconds) on the Application Server. It is
based on the bwSipStatsAnswerSignalDelay statistic.
ASSipMaxAnswerDelay (msec) This statistic displays the maximum time for SIP messages to
be answered (in milliseconds) on the Application Server. It is
based on the bwSipStatsMaxAnswerSignalDelay statistic.
ASMgcpAvgDialToneDelay (msec) This statistic displays the maximum time for MGCP messages
to be answered (in milliseconds) on the Application Server. It is
based on the bwSipStatsMaxAnswerSignalDelay statistic.
ASMgcpAvgCallSetupDelay (msec) This statistic displays the average time before MGCP messages
are set-up (in milliseconds) on the Application Server. It is
based on the bwMGCPStatsSetupSignalDelay statistic.
ASMgcpMaxCallSetupDelay (msec) This statistic displays the average time before MGCP statistics
are set-up (in milliseconds) on the Application Server. It is
based on the bwMGCPStatsSetupSignalDelay statistic.
ASMgcpAvgAnswerDelay (msec) This statistic displays the average time before MGCP calls
are answered (in milliseconds) on the Application Server. It is
based on the bwMGCPStatsAnswerSignalDelay statistic.
ASMgcpMaxAnswerdelay (msec) This statistic displays the maximum time before MGCP calls
are answered (in milliseconds) on the Application Server. It is
based on the bwMGCPStatsMaxAnswerSignalDelay statistic.
bwSystemInternalQueueTimeAvg This statistic displays the average time messages stay in queue.
AS REDUNDANCY Description
MISCELLANEOUS Description
percentXsJHeap This statistic displays the percentage of JAVA heap being used
by the Execution Server (XS) process.
MSNoPortAvailableError This statistic displays the number of "no port available" errors.
MSPortsUsageRatio This statistic displays the ratio of currently used ports to the total
of licensed ports.
MSBlockingRatio This statistic displays the ratio of the number of "no port
available" error to the sum of Interactive Voice Response (IVR)
sessions and conferences.
MSVoiceMailDelivery-SMTP This statistic displays the total number of voice mail delivered
through SMTP.
MSIvrAudioMemoryUsageRatio This statistic displays the ratio of the IVR audio memory in use
to the IVF free audio memory.
MSRTPReceiveQOSin1000th This statistic displays the ratio of delta (times 1000) between
RTP packets expected and the RTP packets received to the
RTP packet expected.
MSRTPTransmitQOSin1000th This statistic displays the ratio (times 1000) of the cumulative
RTP packet lost to the total RTP packet sent.
MSBadSyncSourceRatio This statistic displays the ratio (times 100) of the number of
packets received that had an invalid Synchronization Source
(SSRC) to the number of RTP packets received.
MSVoiceQuality This statistic displays the number of RTP frames skipped per 10
seconds.
MSSipRetransmissionIn1000th This statistic displays the ratio (times 1000) of SIP invite 200OK
retransmits to the number of SIP invite.
MSASRequest-RetryIn1000th This statistic displays the ratio (times 1000) of SIP retransmit to
the sum of SIP invite, SIP Bye, and SIP Info.
MSTech-SupportPMEquivalencyNoPortAvailErr This statistic displays the number of ‘no ports available’ errors.
MSVoiceXMLErrorCount This statistic displays the number times an error occurs while
downloading or running a VoiceXML script.
NSSipMsgPerSecond This statistic displays the sum of SIP TCP messages received
and sent and the SIP UDP messages received and sent per
second.
NSSysIntQueueTimeAvgSipEncodeQ(1000usec) This statistic displays the average SIP encoding queue holding
time. This statistic is disabled when there is more than one
threads for SIP encoding.
NSSysIntQueueTimeAvgSipDecodeQ(1000usec) This statistic displays the average SIP decoding queue holding
time.
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec) This statistic displays the average SIP redirect session manager
holding time. This statistic is disabled when there is more than
one threads for SIP redirect session manager.
NSSysIntQueueTimeMaxSipEncodeQ(msec) This statistic displays the maximum SIP encoding queue holding
time. This statistic is disabled when there is more than one
threads for SIP encoding.
NSSysIntQueueTimeMaxSipDecodeQ(msec) This statistic displays the maximum SIP decoding queue holding
time.
NSSysIntQueueTimeAvgSipRedirectSessMgr(1000usec)TX This statistic displays the average SIP redirect session manager
holding time for thread TX, where TX can be T1 … TN, the
thread number.
NSSysIntQueueTimeAvgSipEncodeQ(1000usec)TX This statistic displays the average SIP encoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
NSSysIntQueueTimeMaxSipEncodeQ(msec)TX This statistic displays the maximum SIP encoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSBusyHourCallAttempts This statistic displays the sum of user call origination attempts
and network call origination attempts.
XSSysIntQueueTimeAvgCallHalf(1000usec)TX This statistic displays the average queue holding time for a Call
Half thread TX, where TX can be T1 … TN, the thread number.
XSSysIntQueueTimeMaxCallHalf(msec)TX This statistic displays the maximum queue holding time for a
Call Half thread TX, where TX can be T1 … TN, the thread
number.
XSSysIntQueueTimeAvgRegAdapt(1000usec)TX This statistic displays the average queue holding time for a
Registration input queue.
XSSysIntQueueTimeMaxRegAdapt(msec)TX This statistic displays the maximum queue holding time for a
Registration input queue.
XSSysIntQueueTimeAvgCallPThreadDBAccess(1000usec) This statistic displays the average queue holding time for the
Callp thread to DB access.
XSSysIntQueueTimeMaxCallPThreadDBAccess(msec) This statistic displays the maximum queue holding time for the
Callp thread to DB access.
XSSysIntQueueTimeAvgVoiceMailInAdapt(1000usec)TX This statistic displays the average queue holding time for a voice
mail input adapter thread TX, where TX can be T1 … TN, the
thread number.
XSSysIntQueueTimeMaxVoiceMailInAdapt(msec)TX This statistic displays the maximum queue holding time for a
voice mail input adapter thread TX, where TX can be T1 … TN,
the thread number.
XSSipMsgPerSecond This statistic displays the sum of SIP TCP messages received
and sent and the SIP UDP messages received and sent per
second.
XSSipAvgCallSetupDelay This statistic displays the average time (in milliseconds) it takes
between the receipt of an INVITE message for the origination of
a new call and the transmission of an INVITE (Sip terminator),
RQNT (MGCP terminator with in-band ringback), or CRCX
(MGCP terminator without in-band ringback) to the primary
device of the original called party (in the case of intra-group call)
or to the network element of the original called party (in the case
of a call to the PSTN).
XSSysIntQueueTimeAvgSIPEncodeQ(1000usec)TX This statistic displays the average SIP encoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSSysIntQueueTimeMaxSIPEncodeQ(msec)TX This statistic displays the maximum SIP encoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSSysIntQueueTimeAvgSIPCallDecodeQ(msec)TX This statistic displays the average SIP decoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSSysIntQueueTimeMaxSIPCallDecodeQ(msec)TX This statistic displays the maximum SIP decoding queue holding
time for thread TX, where TX can be T1 … TN, the thread
number.
XSCapMsgPerSecond This statistic displays the total number of CAP messages that
have been handled by the server.
Reset all health status to green This input box determines if all the health status are reset at
the same time as reloading the threshold modifier definitions.
This behavior may be preferred when a reload introduces
significant changes to threshold values. Such changes may
lead to inconsistencies in the number of threshold crossings that
were triggered by the previous threshold values.
Run Synchronously This input box determines if the EMS immediately reports
any error identified in the configuration file on the screen.
In addition, the EMS generates corresponding events.
Furthermore, the EMS performs the reload action only if no
errors were identified during the reload action. Otherwise, the
EMS preserves the threshold modifiers that were currently in
use. When the Run Synchronously check box is unselected, the
EMS reports any error in EMS event only.
Security Administration For step-by-step procedures, see Configuring Security on page 219.
Patch Management For step-by-step procedures, see Using EMS Patch Support Center on page 424.
Configuration Management For step-by-step procedures, see About Configuration Management on page 209.
User Name This text box specifies the user name for Secure Shell (SSH) access to the node.
Password This text box specifies the user password for SSH access to the node.
IP Address This text box specifies the node's Internet Protocol (IP) address.
BroadWorks Platform This option specifies whether the node is a BroadWorks server.
Auto Detect BroadWorks This check box determines whether the node type is detected by the add node functionality.
Type
Server Type This drop-down list specifies the server type of the node.
Non-BroadWorks Platform This option specifies whether the node is a non-BroadWorks server.
Non-BroadWorks Platform This drop-down list specifies the server type of the node.
Server Type
Group This drop-down list specifies the name of the group associated with the node.
Associated NS (Network This drop-down list specifies the name of the Network Server seed associated with the node.
Server) Seed
SNMP Port This text box specifies the Simple Network Management Protocol (SNMP) port number.
Enable V3 This check box controls whether the SNMP v3 is enabled on the node.
User Name This text box specifies the SNMP v3 user name.
Context Name This text box specifies the SNMP v3 context name.
To add a node:
1) From the Discovery submenu, click Add Node. The Add Node page appears.
2) In the User Name text box, enter the SSH user name.
3) In the Password text box, enter the SSH password.
4) In the IP Address text box, enter the IP address of the node.
5) If the node is a BroadWorks server:
a) Select BroadWorks Platform, or
b) Select Auto Detect BroadWorks Type to let the add node process identify the type of node.
c) Optionally, unselect Auto Detect BroadWorks Type and select the node type from the Server Type
drop-down list.
6) If the node is not a BroadWorks server:
a) Select Non-BroadWorks Platform.
b) Select the node type from the Non-BroadWorks Platform Server Type drop-down list.
7) Select the Group to associate the node with from the drop-down list.
NOTE: The EMS uses group data for clustering and farm association. Therefore, the same group
can be reused upon adding more nodes of the same server cluster or farm. A group must contain only
nodes of the same server type.
8) Select the Associated NS (Network Server) Seed to associate the node with, from the drop-down list.
NOTE: The Network Server seed association allows the display of the node on the corresponding
BroadWorks maps.
9) In the SNMP Port text box, enter the SNMP port number.
10)In the Read Community text box, enter the read community.
Name of the Node This drop-down list specifies the name of the node as displayed on the maps or in the inventory.
SNMP Port This text box specifies the SNMP port number.
SNMP Version This drop-down list specifies the version of SNMP from a drop-down list.
User Name This text box specifies the SNMP v3 user name.
Context Name This text box specifies the SNMP v3 context name.
To refresh a node:
1) From the Discovery submenu, click Refresh Node. The Refresh Node page appears.
2) Select the name of the node from the drop-down list.
3) In the SNMP Port text box, enter the port number.
4) Select the SNMP version from the drop-down list.
5) If the SNMP version value is "V3":
a) In the User Name text box, enter the user name.
b) In the Context Name text box, enter the context name.
6) Click Refresh to refresh the node. The results of the refresh appear.
To delete a node:
1) From the Discovery submenu, click Delete Node. The Delete Node page appears.
2) Select the node(s) to delete from the Available Nodes list.
3) Click Add>. The node(s) appears on the Selected Nodes list.
NOTE: Select a node and click Remove to remove a node from the Selected Nodes list.
Maximum Allowed Unsuccessful Login Attempts This parameter specifies the maximum allowed number of
unsuccessful login attempts. Login is blocked when a user
exceeds the maximum number of login attempts. A value of "0"
indicates that there is no maximum. The default is "3".
Security Scheduler Audit Interval (ms) This parameter specifies the time interval at which the status of
a user account must be checked for expiry. When the value "0"
is specified, user accounts are never checked for expiry even if
they are marked to expire. The default is "0".
Change Password after First Login This parameter determines whether the user is forced to change
the password after the first login from a drop-down list. The
default is "false".
Data Collection Start-up Delay (seconds) This parameter is used to specify the time delay after which the
data collection starts when a polled data (statistic) is created.
If you specify "0" seconds, data collection starts immediately.
Otherwise, it starts after the specified time. This setting is
common for all of the polled data created in the system. The
default is "300" seconds.
Data Collection Clean up Interval (days) This parameter controls the number of days after which tables
are deleted. Collected data is saved in the database in tables.
Each day a new table is created to save the data for the day.
The default is "30" days.
Status Polling Start-up Delay (seconds) This parameter specifies the time delay after which status
polling begins when polling is created or enabled. The default is
"300" seconds.
Use this parameter in cases where you have large networks to
be discovered and you do not want the EMS to be loaded with
both discovery and status polling. By configuring this parameter,
you can postpone the status polling.
Debugging Logs Enabled This parameter allows the enabling or disabling of debugging
logs from a drop-down list. The default is "false".
Data Collection Enabled This parameter allows the enabling or disabling of data
collection from a drop-down list. The default is "true".
Status Polling Enabled This parameter allows the enabling or disabling of status polling
from a drop-down list. The default is "true". Status polling
verifies the up/down status of managed objects.
Performance Statistics Auto Reset This parameter allows the enabling or disabling of automatic
reset of performance statistics at every polling cycle from a
drop-down list. The default is "true".
Generate an email upon Health Status Change This parameter allows the enabling or disabling of automatic
generation of an e-mail upon a health status change from a
drop-down list. The default is "true". For information managing
e-mail distribution lists, see Configure E-mail Distribution Lists
on page 338
Number of historical performance reports This parameter specifies the number of historical performance
reports kept. The default is "30" reports.
NOTE: Events that have a severity associated with them produce an alarm.
Syslog is the main logging facility on a UNIX system. Syslog messages are encoded by facility (area
of origin) and level (severity), allowing them to be easily filtered and/or sent to the correct log file.
BroadWorks centralizes syslog capabilities for all managed objects for EMS, allowing you to work with
them in much the same way as network events. For example, you can configure BroadWorks to raise
alarms for syslog messages for a particular level.
Value This drop-down list specifies the logging level for the syslog
facility. Values include:
• "none": Select this value if you do not want to log any
messages for the facility.
• "debug": Select this value to display information normally of
use only when debugging a program.
• "info": Select this value to display information messages.
• "notice": Select this value to display messages that may
require special handling.
• "warning": Select this value to display messages that
indicate that an error will occur if action is not taken, for
example, a file system that is 85% full.
• "err": Select this value to display non-urgent failures that
should be reported to administrators. Each item must be
resolved within a given period of time.
• "crit": Select this value to display messages that indicate
failure in a primary system. In terms of troubleshooting, you
need to fix CRITICAL messages before ALERT messages.
• "alert": Select this value to display messages that should be
corrected immediately.
• "emerg": Select this value to display messages that indicate
an emergency condition; that is, the system cannot be used.
By default, the only messages collected by the EMS for centralized syslog management are auth.err,
daemon.err, kern.err, and local2.warning.
To a modify a syslog:
1) Click the Admin tab.
2) From the Configurations submenu, click Syslog. The Centralized Syslog Configuration page appears.
3) Select the logging value from the drop-down list of each syslog facility.
4) Click Save to save the changes, click Reset to reset the default values, or click Cancel to return to the
previous page.
Audit Interval (hours) This parameter specifies the number of hours between audits.
The default is "24".
Audit Retry Interval (hours) This parameter specifies the number of hours between audit
retry attempts. If during the auto-configuration process some
nodes failed to be configured, another attempt is made to auto-
configure these nodes after the specified interval. The default is
"1".
Transport Protocol This parameter specifies the transport protocol used to perform
the auto-configuration from a drop-down list. The default is
"SSH".
Expected Telnet Login Prompt This parameter specifies the login prompt for Telnet. The default
is "login".
Expected Telnet Password Prompt This parameter specifies the password for logging in to Telnet.
The default is "assword".
Maximum Number of SSH and Telnet Connections in the This parameter specifies the maximum number of active SSH/
System Telnet connections permitted in the EMS. When the maximum
is reached, any new auto-configuration, remote command, or an
SSH/telnet cut-through fails. The default is "40".
Maximum Number of SSH and Telnet Connections per Node This parameter specifies the maximum number of active SSH/
Telnet connections permitted per node. When the maximum is
reached, any new auto-configuration, remote command, or an
SSH/telnet cut-through fails. The default is "10".
Remote Node Login Timeout (secs) This parameter specifies the number of seconds to wait before
returning from a failed attempt to log in to a remote server. The
default is "5".
Remote Node Request Execution Timeout (secs) This parameter specifies the number of seconds to wait before
returning from a failed attempt to execute a command on a
remote server. The default is "60".
Network Discovery Reconnection Interval (minutes) This parameter specifies the interval in minutes before a
discovery reconnection is attempted. A discovery reconnection
only occurs when a discovery fails and the rediscovery option
is enabled. When the rediscovery option is not enabled, this
parameter is not used. The default is "60".
Listen Port for Client Communication This parameter is used for the communication between the
client and the EMS server. The default is "36002".
FE Secondary Listen Port for Client Communication This parameter is used for the communication between the
client and the EMS Front End (FE). It represents a secondary
port used by optional services. The default is "36001".
RMI Secondary Listen Port for Client Communication This parameter is used for the Telnet/SSH communication
between the client and the active Back End (BE). The default is
"36003".
FE RMI Secondary Listen Port for Client Communication This parameter is used for the Telnet/SSH communication
between the client and the Front End (collocated with the
standby Back End). The default is "36004".
Time Credit (Days) This parameter is used for the BWStaleAccountPolicy and
the login check for the stale account user. The time credit in
days sets the maximum number of days a user account can be
inactive. On successful login, this period of inactivity is reset.
The default is "10".
Group to Exclude from Stale Account Check This parameter is used for excluding a particular group of users
from the stale account logic. Usually, the "Admin" group is
excluded to prevent disabling every account. The default is
"Admin".
Event Holding Time (days) This parameter specifies the number of days that events are
maintained in the EMS. The events older than this number of
days are removed from the system. A check for older events
is done once an hour. When a negative value is specified for
the parameter, events are not deleted by EMS based on a time
interval. The default is "7".
Number of Events Managed by EMS This parameter specifies the latest number of events that are
managed by the EMS. The default is "10000".
Drop Traps of Unmanaged Object This parameter specifies whether processing of a Simple
Network Management Protocol (SNMP) trap continues when the
corresponding managed object is in an unmanaged state. When
the value is set to "true", the trap is dropped. When the value is
set to "false", the trap is processed. The default is "false".
Enable Authentication for SNMP v3 Traps This parameter enables/disables authentication for SNMP V3
traps. The default is "false".
Acknowledge Inform Request This parameter specifies whether inform requests are
acknowledged from a drop-down list. Inform requests are
unsolicited notifications sent to SNMP managers by agents
or other managers. Usually, these are acknowledged by the
receiving manager. However, these acknowledgments result
in an increase in network traffic. This parameter allows you to
turn the acknowledgment mechanism on and off. The default is
"false".
Delete Clear Alarms Interval (hours) This parameter specifies the number of hours after which alarms
with "clear" (and unchanged) severity are automatically deleted.
The default is "24".
Setting this parameter to "0" results in the immediate deletion
of clear alarms. Specifying a negative value results in no
automatic deletion of clear alarms based on age.
The system performs the initial check for clear alarms one hour
after server start-up. After the initial check, it checks again at
the regular interval specified by this value.
Number of Alarms Managed by EMS This parameter specifies the latest number of alarms that are
managed by the EMS. The default is "10000".
Create Alarm History Objects This parameter specifies whether alarm history objects are
created to track the various operations performed, for example,
the addition, deletion, and update of alarms. The default is
"false".
Remove Annotations on Alarm Deletion This parameter specifies whether the annotations and/or history
of alarms are removed when an alarm is deleted from a drop-
down list. The default is "both".
Remove Corresponding Alarms on Managed Object Deletion This parameter specifies the action taken on an alarm if its
corresponding managed object is deleted.
Possible values are "delete", "clear", and "none". The default is
"delete".
BwFilterAction BwFilterActionThis filter action is used by both the BWEventFilter event filter and the BWAlertFilter
alarm filter . It manages the severity icon associated with the group icon in the map. When alerts
are received, their associated group is determined based on the source of the alert. The severity
associated with the group is then adjusted based on the severity of the alert being processed.
BWFilterForThreshold This filter action adjusts the event name with the name of the statistics for which the threshold was
crossed. It is associated with the BWEventFilterForThreshold event filter.
BWFilterForSyslog This filter action adds an event name property containing the type/source of the syslog to the
event. For example, when the syslog comes from the ssh daemon, the event name is "sshd". It is
associated with the BWEventFilterForSyslog event filter.
BWFilterForHealth This filter action processes all EMS internally generated health/threshold events. The information
contained in the events is analyzed and used as input to the health functionality. It is associated with
the BWEventFilterForHealth event filter.
BwAudibleAlarmAction This filter action is associated with the BWAudibleAlarm alarm filter. It checks every incoming alarm
against the configured audible alarm filters. In case of a match, the defined audible alarm is played.
For information on configuring audible alarm filters, see Managing Audible Alarms on page 382.
Action Name This text box specifies the name of the action.
Suppress All This option indicates how to suppress incoming events. Yes suppresses all subsequent events and
No allows the first event and suppresses subsequent events during the specified interval.
Suppress Interval (in secs.) This text box specifies a numeric value (in seconds) to suppress multiple events for a given interval.
The first event that matches the configured criteria is allowed and all the subsequent events are
suppressed for the given interval. After the suppress interval has elapsed, another event that
matches the criteria is allowed and the subsequent events are again suppressed, and so on.
Action Name This text box specifies the name of the action.
System Command This text box specifies the name of the system command to be executed. The command string
should be a machine-executable program on the server, which does not require a shell (it cannot be
a batch or a shell file).
AbortAfter(Seconds) This text box specifies the time (in seconds) after which the command execution is to be terminated
(that is, the time-out value of the specified command). This value plays an important role if even one
of the above check boxes is checked, since the entire event processing is held up by the command
execution.
Append Output This option controls whether the output of the command is appended to the event message.
Checking either one or both of the check boxes results in the command being run synchronously in
the main event processing thread. This delays all events that follow the event being processed until
the command execution is completed or terminated by time-out.
Append Error This option controls whether the error output from the command is appended to the event message.
Checking either one or both of the check boxes results in the command being run synchronously in
the main event processing thread. This delays all events that follow the event being processed until
the command execution is completed or terminated by time-out.
Action Name This text box specifies the name of the action.
Trap Destination This text box specifies the destination host of the trap.
Destination Port This text box specifies the destination port of the trap.
Community This text box specifies the community value of the trap.
SysUpTime This text box specifies the sysuptime value to use in the trap.
V1 Settings/V2C Settings These input boxes specify the type of the SNMP trap to send.
Enterprise This text box specifies the enterprise object identifier (OID) of the trap.
Generic Type This text box specifies the GT number of the trap (applicable only to SNMP v1).
Generic type value ranges from "0" to "6":
"0" denotes coldStart.
"1" denotes warmStart.
"2" denotes linkDown.
"3" denotes linkUp.
"4" denotes authenticationFailure.
"5 "denotes egpNeighborLoss.
"6" denotes enterprise-specific.
Specific Type This text box specifies the ST number of the trap. This is applicable only to SNMP v1 and when the
Generic Type is specific to the enterprise.
Trap OID This text box specifies the OID of the trap that is being sent. This is applicable only to SNMP V2C.
Variable Bindings
OID Type This drop-down list allows the specification of the type of the varbind.
OID Value This text box specifies the value of the varbind.
Action Name This text box specifies the name of the action.
SMTP Server This text box specifies the name (or Internet Protocol [IP] address) of the mail server.
Account Name This text box specifies the user name that the mail server uses for authentication.
Password This text box specifies the password that the mail server uses for authentication.
To Mail ID This text box specifies the destination address to which the e-mail should be sent.
From Mail ID This text box specifies the sender's address from which the e-mail is being sent.
Subject This text box specifies the subject of the e-mail. You can concatenate the available event properties
as required, by selecting them from the input boxes.
Message This input box specifies the contents of the message. You can concatenate the available event
properties by selecting them from the input boxes.
Attachment This text box specifies the absolute path of the attachment to e-mail.
$category This variable corresponds to the alarm/event category. Some of the possible values are
"applicationserver", "mediaserver", "elementmanagementsystem", "profileserver", and
"xtendedservicesplatform".
$entity This variable corresponds to the concatenation of the source and the alarm/event name, for
example, viras03.mtl.broadsoft.com--bwSystemHealthReport where viras03.mtl.broadsoft.com is the
source server and bwSystemHealthReport is the alarm/event name.
$severity This variable corresponds to severity of the alarm/event. It can have the following values:
"1" for Critical, "2" for Major, "3" for Minor, "4" for Warning, "5" for Clear, and "6" for Informational
$groupName This variable corresponds to the name of the group the source server belongs to.
NOTE: You can also write your own Java class to perform some actions according to your requirement.
This class can be invoked when the incoming events satisfy the filter criteria. This feature requires Java
coding expertise. To create custom filter actions, contact BroadSoft.
Use the Configure Custom Filter page to create a custom filter action.
Action Name This text box specifies the name of the action.
User Class This text box specifies the name of the Java class that implements this filter action.
NOTE: By default, all BroadWorks traps are converted into corresponding events by BroadWorks trap
filters; therefore, they do not reach the trap parser level. If you want to overwrite this default behavior,
contact BroadSoft.
The match criteria in the parser determine whether a specific trap matches the trap parser. The search for
matching trap parsers is done based on how the trap parsers are ordered on the list. Once a matching trap
parser is found, an event is generated by applying the corresponding trap parser. Only one trap parser is
applied to a given trap and no other trap parsers are applied to that trap.
Use the Trap Parser Configuration page to view, modify, or delete the trap parsers.
coldStart This parser looks for incoming coldStart traps to populate and raise a corresponding event of a
major severity.
warmStart This parser looks for incoming warmStart traps to populate and raise a corresponding event of an
info severity.
egpNeighborLoss This parser looks for incoming egpNeighborLoss traps to populate and raise a corresponding event
of a minor severity.
authenticationFailure This parser looks for incoming authenticationFailure traps to populate and raise a corresponding
event of a minor severity.
BwCsNotif This parser looks for all incoming Conferencing Server trap notifications. When this type of trap
is received, this parser extracts the relevant parameters from the trap to populate and raise a
Conferencing Server event.
BWDefaultForCS This parser looks for all incoming Conferencing Server trap notifications that have not been parsed
by BwCsNotif. This parser extracts the relevant parameters from the trap to populate and raise a
Conferencing Server event.
NOTE: You should not modify or reorder the default trap parsers that are stopped with your EMS as it
might impact the proper behavior of Fault Management. You should only change trap parsers that have
been added since the system was installed.
Parser Name This input box specifies the name to identify the parser.
Nodes Match criteria based on the source of the received trap matching one of the specified nodes. This is
an optional match criterion.
For an SNMPv1 trap, the agent address returned by the trap is used when matching the property
value. For SNMPv2c, the source address returned by the trap is used when matching the property
value.
Use the comma separator to specify more than one node. You can use the wildcard (*) character
and the negation (!) character in this input box.
Groups Match criteria based on the source of the received trap matching one of the specified groups. This is
an optional match criterion.
For an SNMPv1 trap, the agent address returned by the trap is used when matching the property
value. For SNMPv2c, the source address returned by the trap is used when matching the property
value.
Use the comma separator to specify more than one node. You can not use the wildcard (*)
character and the negation (!) character in this input box.
Enterprise This input box is associated with the SNMP V1 button only. Specify the enterprise object ID (OID)
of the SNMPv1 trap. When specified, the parser is applied only if the incoming trap's enterprise OID
starts with what is specified in this input box.
If the enterprise OID is specified as .1.3.6.1.2.1.11, all the OIDs under this tree are matched for
traps. To avoid this kind of matching, enter the enterprise OID value in angular brackets, such as
<.1.3.6.1.2.1.11> If the value is given as "*", then all the OIDs are matched.
Generic Type This input box is associated with the SNMP V1 button only. Each SNMPv1 trap has a generic type
number that can be specified as a match criterion. When specified, the trap parser is applied only if
the incoming traps match the specified generic type number.
Specific Type This input box is associated with the SNMP V1 button only. Each SNMPv1 trap has a specific type
number that can be specified as a match criterion. When specified, the trap parser is applied only if
the incoming traps match the specific type number.
Trap OID This input box is associated with the SNMP V2C & V3 button only. An SNMP V2C or SNMP V3 trap
is uniquely identified by the trap OID that is associated with the Trap Protocol Data Unit (PDU). This
trap OID can be specified as a match criterion.
The trap parser is applied only if the incoming trap has a value that starts with the OID specified in
this input box. When a trap OID is specified, all traps that start this OID are matched and the trap
parser is applied. If you want to match the exact OID, specify the trap OID within angular brackets
<>.
The wildcard (*) character can be used in this input box.
Severity This drop-down list specifies the state of the event that determines the severity. This severity
determines how an alarm is affected by this event. For a given failure object, the severity specified
for the event correlates with the severity of the corresponding alarm.
Event Details This input box specifies the details of the event. If you type directly into the input box, the content is
saved. Otherwise, you can specify variables. For information on valid variables, see the Variables
table that follows.
Source This input box specifies the source of the event. If you type directly into the input box, the content is
saved. Otherwise, you can specify variables. For information on valid variables, see the Variables
table that follows.
Source -- Alarm Name or This input box specifies the source, alarm name, or category associated with the event. If you
Category type directly into the input box, the content is saved. Otherwise, you can specify variables. For
information on valid variables, see the Variables table that follows.
Category This input box specifies the category associated with the event. If you type directly into the input
box, the content is saved. Otherwise, you can specify variables. For information on valid variables,
see the Variables table that follows.
Group Name This input box specifies the group name associated with the event. If you type directly into the input
box, the content is saved. Otherwise, you can specify variables. For information on valid variables,
see the Variables table that follows.
Node This input box specifies the node associated with the event. If you type directly into the input box,
the content is saved. Otherwise, you can specify variables. For information on valid variables, see
the Variables table that follows.
Variables
Variable Description
$Community This variable is replaced by the community string of the received trap.
$Enterprise This variable is replaced by the enterprise ID of the received trap. This variable is applicable to
SNMP traps only; for non-SNMP traps, it is replaced with "".
$GenericType This variable is replaced by the generic type of the received trap. This variable is applicable to
SNMP V1 traps only. For non-SNMP traps, it is replaced with "".
$Source If the device corresponding to the source address contained by the received trap has been
discovered by the EMS, this variable fetches the name of the parent that corresponds to the
interface object that matches the source address of the received trap. If the device corresponding to
the source address of the received trap has not been discovered, the corresponding IP address of
the source address is returned.
$SpecificType This variable is replaced by the specific type of the received trap and is applicable to SNMP v1
traps only. For non-SNMP traps, it is replaced with "".
$Uptime This variable is replaced by the uptime value in the received trap.
$TrapOID This variable is replaced by the trap OID of the received trap. This variable is applicable to SNMP
V2C traps only. For non-SNMP traps, it is replaced with "".
$* This variable is replaced by all the variable bindings (both OID and variable values) of the received
trap.
$# This variable is replaced by all the variable binding values (only variable values and not OIDs) of
the received trap.
$N For this variable, N is a non-negative integer. This variable is replaced by the (N+1)th SNMP
variable value in the variable bindings of the received trap. The Index N starts from 0.
@* This variable is replaced by all the OID labels in the variable bindings of the received trap.
@N This variable is replaced by the (N+1)th OID value in the variable bindings of the received trap.
The index count starts from "0". This variable is replaced by the (N+1)th OID label in the variable
bindings of the received trap.
$IP-Source This variable is replaced by the IP address corresponding to the source address of the received
trap.
$IP-Agent This variable is replaced by the IP address corresponding to the agent address of the received trap.
$AgentMO This variable enables access to managed object properties. The tag can be used to access any
properties of the parent managed object for the interface object corresponding to the agent address
of the received trap.
$IF-AgentMO This variable is similar to $AgentMO, except that the properties of the interface MO that
corresponds to the agent address of the received trap can be accessed using this tag. For SNMP
V2C traps, it is exactly the same as $IF-SourceMO.
$IF-Agent This variable is similar to $Agent, except that it results in the interface MO name that corresponds
to the agent address of the trap received. For SNMP V2C traps, it is exactly the same as $IF-
Source.
$SourceMO This variable can be used to access any properties of the parent for the interface object that
corresponds to the source address of the received trap. For example, if you want to access
the pollInterval property of the parent managed object corresponding to the source address
of the received trap and assign it to some property of the event, you must specify the tag as
$SourceMO(pollInterval) against the specific property of the event.
$IF-SourceMO This variable is similar to $SourceMO, except that the properties of the interface MO that
correspond to the source address of the received trap can be accessed using this tag.
$IF-Source This variable is similar to $Source, except that it results in the interface object name that
corresponds to the source address of the received trap.
Overwrites existing Trap This option controls whether the existing trap parsers (with the same matching criteria) are
Parsers overwritten with the new trap parsers in the file.
MIB File Name Rather than specifying the match criteria manually, a MIB with defined traps can be translated to
trap parsers. This text box specifies the name of the MIB file to load.
Filename To load a set of trap parsers previously saved using the Save To File option and add them to the
existing list of trap parsers, you can choose the Load From File option. This text box specifies the
name of the trap parser file to load.
NOTE: This file name should be specified with the path relative to <EMS Home>/mibs directory.
If the MIB depends on any other MIB files, then these dependency files should be mentioned with
spaces in between them, followed by this MIB file. For example, if A-MIB imports B- MIB, which
imports C-MIB (all the files in <EMS Home>/mibs directory), then it should be specified as the
following:
../mibs/C-MIB ../mibs/B-MIB ../mibs/A-MIB
Trap parsers are only created from the last MIB file.
b) Click Load. The trap parsers are loaded. Click Cancel to return to the previous page.
4) To load trap parsers from a file:
a) In the Filename text box, enter the name of the file. Click Cancel to return to the previous page.
b) Click Load. The trap parsers are loaded.
This input box specifies the name of the trap parser file.
Name This text box specifies the name to identify the parser.
Message This text box corresponds to the text field of the event object.
Network This text box specifies the network name from which the event originated.
Failure Object This text box tracks problems and identifies objects.
NOTE: The methodology of using the properties of the trap by means of symbolic notations is similar to
that of trap parsers, except for the following differences:
• To access the values of the Simple Network Management Protocol (SNMP) object identifier (OID) in the
SNMP variable bindings, the notation should start with % and not with $ as in trap parser.
• All the special purpose tags should start with % instead of $ as in trap parser.
• To access the SNMP OID in the SNMP variable bindings, the notation should start with @, which
is same as in trap parser. The values of the trap protocol data unit (PDU) can be used in any of the
columns, except in Tokenizer, in the parser defined. The trap PDU's explanation is the same for trap
parsers, event parsers, and event filters (only % and $ notations differ).
Variables
Variable Description
$severity This variable presents the severity value of the event. Severity values set for an event are
provided in SeverityInfo.conf present in the /conf directory.
$text This variable holds the description of the fault. For example, if the event is for a fault indicating
high processor load, then the text can be set as "Processor load high".
$source This variable represents the source of failure. The source input box of the event/alert object should
be the same as that of the name input box of ManagedObject so that the ManagedObject's status
is updated when alerts are generated.
$domain This variable represents the domain name for the event.
$network This variable represents the network name from which the event must be raised.
$node This variable represents the node from which the event has been raised.
$groupName This variable represents the group name associated with the event.
Example
Field Match String Tokenizer String Output String Value
Message A query was sent A query was sent Application Server Application
to the Media Server to the Media Server $source$1 failed to Server AppServerA
and no response and no response was communicate with failed to communicate
was received. Media received. Media server Media Server $text with Media Server
Server address: address: $1 SIP Media $1, SIP Media Endpoint 192.168.13.202, SIP
192.168.13.202 SIP Endpoint Session Key: Session Key: $text$2 Media Endpoint Session
Media Endpoint Session $2 Key: callhalf-23673:1
Key: callhalf-23673:1
Source AppServerA $1 - -
NOTE: To identify the replaceable parameter of a specific input box, the token number should be
preceded by the input box. For example, $text$1 indicates the first tokenized string of the input box
"Message". The tokens of any input box can be used in any other input box provided that paragraph (1)
is followed. Tokens are applied for space-separated words only
4) Enter the output strings. The output string of the event parser is an event object that becomes the
modified instance of the incoming event.
The attributes of the event object are defined by the specifications in the event parser. It is necessary
to select correct values, particularly for important attributes, namely failure object (affected entity),
severity, and message text. The properties that should remain unchanged must specifically be noted
by placing a dollar sign followed by the property name. For example, if the text input box should not be
modified, then the value $text should be entered in the output string. To use the values of the incoming
event properties while specifying the output values in the definition column, specify the exact property
name (case sensitive) with a prefixed $. For example, to use the event property "Source", the definition
should be $source. If the particular property has been tokenized and if you intend to use the value of
the token, then the format should be $propertyname$N, where N is the count of the token starting with
1.
When it is necessary to deliberately have a null value for a specific property of the output event, the
output string for that property should be left blank. The default properties of an event that can be used
in the definition column following the dollar sign ($) are category, domain, entity, groupName, helpURL,
network, node, source, severity, and text. While specifying the output values for the event object that is
generated in the input boxes, you can use information in the incoming trap information. The information
in the trap values can be accessed using the specifically designed tokens that represent the values of
the various input boxes present in the trap.
5) To specify your own properties to the event object generated by the event parser, click More. The
Event Parser Configuration page appears. Specify the name and the value of the property in the
Property Name and Match Criteria input boxes respectively.
6) To enter more properties, click More.
NOTE: If a criterion is configured based on the event user property and if no definition is given against
that property, then the user property is dropped in the resulting event. The event property's ID and time
are not configurable using the event parsers. These input boxes are copied to the values as that of the
incoming event object.
7) Click Submit. The Event Parsers page displays this event parser on the list of event parsers.
Deletes Existing Event This check box controls whether the existing event parsers (with the same matching criteria) are
Parsers overwritten with the new event parsers in the file.
File Name This text box specifies the name of the event parsers file to load.
This input box specifies the name of the event parser file.
BWEventFilterForThreshold This filter applies to events of the Threshold category. It adjusts the event name with the name of
the statistics for which the threshold was crossed.
BWEventFilterForHealth This filter applies to events of the Health Status category. The information contained in the events is
analyzed and used as input to the health functionality.
BWEventFilter This filter applies to all events. It performs the mapping of certain BroadWorks traps with an info
severity to events that have a severity with criticality (minor, major, critical). Examples of such traps
are bwServerStateTransition, BwPMExecutionServerDeath, BwPMExecutionServerShutdown, and
so on.
BWEventFilterForSyslog This filter applies to events of the Syslog category. It adds an EventName property containing the
type/source of the syslog to the event.
NOTE: You should not modify or delete the default event filters that are shipped with your EMS as it might
impact the proper behavior of EMS Fault Management.
NOTE: Modify event filters that have only been added since the system was installed.
NOTE: Delete event filters that have only been added since the system was installed.
Click the red "X" on the row of the event to delete on the Events Filters list. The event filter is removed from
the list.
Tasks to perform from this page
Filter Name This text box specifies the name of the event filter.
Source Match criteria based on information about the source of the event so that the events matching a
source can be filtered out.
Severity Match criteria based on the severity of the event, such as critical, major, and so on. You can also
choose the severities from the drop-down list next to the Severity input box.
Message Match criteria based on a message of the incoming event, for example, "Interface failure", "Status
Poll failed", and so on.
Category Match criteria based on the category name to which the event belongs.
Domain Match criteria based on an event object property with any domain-specific information. The
information can be based upon the physical location, or the functional or logical categorization of the
source of the event. The domain name of the event displays events of a particular domain.
Network Match criteria based on information about the network to which the source of the event belongs.
Using this criteria, events belonging to a particular network are displayed.
Node Match criteria based on any additional information (name of the node or server) about the source of
the event.
Entity Match criteria based on information about an exact device in which a problem has occurred.
NOTE:
The values that you specify in the Match Criteria determine whether the incoming event should be
filtered or not. If this field is left blank, it is automatically matched. For the Event Filter to be applied, all
the match criteria specified must be satisfied. If even one criterion fails, the filter will not be applied. The
following expressions can be used while specifying the match criteria:
• Wildcard - Asterisk (*): Used to signify a match of 0 or more characters of any value. For example,
"Failed*" matches any string starting with "Failed". Expressions, such as "*", "*Failed, or "Fai*led*",
can be used.
• Negation - Exclamation (!): Used at the start of the field to specify exclusion of events matching this
expression. For example, "!Failed" excludes strings starting with "Failed".
• Separator - Comma (,): Used to specify multiple values for a single match criterion by separating
them with commas. For example, "Critical, Major" will match a string which is either "Critical" or
"Major".
The following combinations can be used while specifying match criteria.
• * AND ,: This combination can be used to obtain the combined result of two matching criteria that
signifies a match of 0 or more characters for the given criteria.For example, "(*x,*y)" is tokenized into
"*x" and "*y" and only data ending with x and y is matched.
• ! AND ,: This combination can be used to obtain the exclusion of events matching two criteria. For
example, "(!x,!y)" is considered an AND operation. Hence all data starting with "(x,y)" will not be
matched.
• a,b: This combination is tokenized into two strings "a" and "b". Therefore this criterion matches "a,b"
and also the data "a" and "b".
To specify additional match criteria for the Event Filter, click Click to Add Custom Properties and
complete the following steps:
1) In the Property Name input box, specify the property name.
File Name This text box specifies the name of the event filter file to load.
File Name This text box specifies the name of the event filter file.
BWAlarmFilter This filter manages the severity icon associated with the group icon in the map. When alarms are
received, their associated group is determined based on the source of the alarm. The severity
associated with the group is then adjusted based on the severity of the alarm being processed.
BWaudibleAlarm This filter checks every incoming alarm against the configured audible alarm filters. In the case of
a match, the defined audible alarm is played. For information on configuring audible alarms, see
Managing Audible Alarms on page 382.
NOTE: You should not modify or delete the default alarm filters that are shipped with your EMS as it might
impact the proper behavior of EMS Fault Management.
NOTE: Delete alarm filters that have only been added since the system was installed.
On the Alarm Filters page, click the red "X" in the row of the alarm to delete on the Alarm Filters list. The
alarm filter is removed from the list.
Tasks to perform from this page
Filter Name This text box specifies the name of the alarm filter.
Source Match criteria based on information about the source of the event so that the alarms matching a
source can be filtered out.
Severity Match criteria based on the severity of the alarm, such as critical, major, and so on.
Category Match criteria based on the category name to which the alarm belongs.
Entity Match criteria based on the information about an exact device in which a problem has occurred.
NOTE:
The values that you specify in the Match Criteria determine whether the incoming event should be
filtered or not. If this field is left blank, it is automatically matched. For the Event Filter to be applied, all
the match criteria specified must be satisfied. If even one criterion fails, the filter will not be applied. The
following expressions can be used while specifying the match criteria:
• Wildcard - Asterisk (*): Used to signify a match of 0 or more characters of any value. For example,
"Failed*" matches any string starting with "Failed". Expressions, such as "*", "*Failed, or "Fai*led*",
can be used.
• Negation - Exclamation (!): Used at the start of the field to specify exclusion of events matching this
expression. For example, "!Failed" excludes strings starting with "Failed".
• Separator - Comma (,): Used to specify multiple values for a single match criterion by separating
them with commas. For example, "Critical, Major" will match a string which is either "Critical" or
"Major".
The following combinations can be used while specifying match criteria.
• * AND ,: This combination can be used to obtain the combined result of two matching criteria that
signifies a match of 0 or more characters for the given criteria.For example, "(*x,*y)" is tokenized into
"*x" and "*y" and only data ending with x and y is matched.
• ! AND ,: This combination can be used to obtain the exclusion of events matching two criteria. For
example, "(!x,!y)" is considered an AND operation. Hence all data starting with "(x,y)" will not be
matched.
• a,b: This combination is tokenized into two strings "a" and "b". Therefore this criterion matches "a,b"
and also the data "a" and "b".
To specify additional match criteria for the Event Filter, click Click to Add Custom Properties and
complete the following steps:
1) In the Property Name input box, specify the property name.
2) In the Property Value input box, specify the match criteria. The match criteria specified must be
based on the properties of the View Alarm Properties on page 186, as well as, "groupName". While
specifying additional criteria, specify only those properties that are in the event object. The name
should exactly match the case of the event object. You can also add event base properties as match
criteria, such as help URL, ID, and time.
3) When you are finished adding properties and values, close the More Properties dialog and then click
OK in the Match Criteria Properties dialog.
File Name This text box specifies the name of the alarm filter file to load.
File Name This text box specifies the name of the alarm filter file.
SMTP Server Address This text box specifies the address of the SMTP server.
Use Secure Connection This option specifies whether the SMTP server uses a secure connection.
Server Port This text box specifies the server port. The default port value for non-secure connection is "2" and for
secure connection is "465".
Use Secure Authentication This check box specifies whether the server requires user authentication.
User Name This text box specifies the user name of the mail account in the SMTP server.
Password This text box specifies the password of the mail account in the SMTP server.
From Email Address This text box specifies the sender's address.
To Email Address (for Test This text box specifies the destination address used for the Test Mail command
Mail only)
Distribution List Name This text box specifies the name of the distribution list.
Email This text box specifies the e-mail address to add to the distribution list.
NOTE: To delete an e-mail entry on the list, select the entry and click Delete.
9.6.1 Configuration
The parameters, such as host and community, can be set in the MIB Browser's main window. The other
parameters are set in the Set Parameters window, which can be accessed by clicking the Parameters
button on the MIB Browser's main window.
Simple Network Management Protocol (SNMP) mandates that the SNMP agents should accept request
messages only if the community string in the message matches its community name. Therefore, the
management application should always communicate with the agents along with the associated community
name. For BroadWorks servers, the default SNMP community names are "public" for read-only (GET) and
read-write (SET) operations.
SNMP Version This text box specifies the SNMP version to be used.
SNMP Port This text box specifies SNMP port. The MIB Browser uses the host name or the IP address of
the device to communicate with the SNMP agent of the device in the specified port number. This
default port value is "8001". By default, all the SNMP request messages are received in this port for
BroadWorks servers.
Timeout (secs) This text box specifies the time interval that the MIB Browser waits for a response message from the
device SNMP agent before timing out.
Retries This text box specifies the number of times a request is sent when a time-out occurs.
Max Repetitions (For This text box specifies the Max Repetitions value required in a GETBULK request. This parameter is
GetBulk) displayed only when the SNMP version is set to "v2c".
Non Repeaters This text box specifies the Non Repeaters value required in a GETBULK request. This parameter is
displayed only when the SNMP version is set to "v2c".
NOTE: When you load a MIB file, the following operations are performed:
NOTE:
If the selected node in the MIB tree has child nodes or columnar nodes, the Get operation performs
SNMP GETNEXT requests to retrieve the values for all the nodes under that subtree.
If the MIB is not loaded in the MIB Manager, the exact numbered OID with full instance (for example
.1.3.6.1.2.1.1.3.0 for sysUpTime), should be specified and the GET operation should be performed.
NOTE: Click Clear to clear the values from the MIB Browser.
NOTE: If the selected node in the MIB tree is not a table, an error message appears.
AuditTime This column displays the time stamp the operation was
performed.
Status This column displays the status of the operation. Valid values
include "SUCCESS" and "FAILURE".
Category This column displays the category of the operation. Valid values
include "Authentication" and "DEFAULT".
CATEGORY This row displays the category of the audit. Valid values include
"Authentication" and "DEFAULT".
USERNAME This row displays the name of the user who performed the
operation.
AUDITTIME This row displays the time stamp of the performed operation.
STATUS This row displays the status of the operation. Valid values
include "SUCCESS" and "FAILURE".
License Data Download This drop-down list provides the ability to select the frequency of the task that collects the data
Frequency Type from the Application Server. Valid values include: "Monthly", "Weekly", "Daily", and "Never". The
default value is "Never".
License Data Download These input boxes provide the ability to select the day of the month, the week day, and the time of
Frequency Value day depending on the frequency type. Valid values include:
• Day of the Month: "1" through 31"
• Week Day: "Monday" through "Sunday"
• Time of Day: "0:00" through "23:00"
License Data Clean Up This input box specifies the number of days after which the collected data is deleted from the EMS.
Interval The default value is "30".
Periodic Reports Clean Up This input box specifies the number of days after which the generated periodic reports are deleted.
Interval The default value is "30".
License Report Display This drop-down list determines if the service license packs or services that are not assigned to any
Empty Count user are included in the report. The default value is "true".
License Data Archive This input box specifies where the collected data is stored on EMS. When the license data archive
Location location is changed, the content of the original directory is moved to the new location specified. If
it does not exist, EMS creates the directory at the time of data collection. The default value is /var/
broadworks/serviceLicenseReporting.
Show Red When License This input box presents the license available content in the color red (to indicate that the licenses
Available Percentage< available are in jeopardy) in the Available and % Remaining columns in both the Purchased
Products Details section and Subscriber Licenses section of the HTML License Reports if their
value is below the specified value. Enter the content as a percentage of the total. The default value
is "10".
NOTE: The license available content is shown in the color yellow when the utilization percentage
is between the red and green thresholds.
Show Green When License This input box presents the license available content in the color green (to indicate adequate)
Available Percentage> in the Available and % Remaining columns in both the Purchased Products Details section and
Subscriber Licenses section of the HTML License Reports if their value is above the specified
value. Enter the content as a percentage of the total. The default value is "15".
NOTE: The license available content is shown in the color yellow when the utilization percentage
is between the red and green thresholds.
Outlying Users Maximum This input box presents the maximum number of users reported in the Outlying Users section of
Number the report. The range of values is "0" through "1000. The default is "100".
Detect Incomplete Match This drop-down list provides the ability to detect the outlying users for the Incomplete Match
Outlying Users category. The default value is "true".
Detect Multiple User Products This drop-down list provides the ability to detect the outlying users for the Multiple User Products
Outlying Users category. Valid values are "true" and "false". The default value is "true".
Detect No Trunk Product This drop-down list provides the ability to detect the outlying users for the No Trunk Product
Outlying Users category. Valid values are "true" and "false". The default value is "true".
Detect No User Product This drop-down list provides the ability to detect the outlying users for the No User Product
Outlying Users category. Valid values are "true" and "false". The default value is "true".
Product Precedence Order This is the precedence order of products that is used to determine the product usage. The
precedence can reflect some costs or it can reflect the intention of consuming certain products first.
The listed order is from the most basic to the most advanced. An attempt is made to consume the
most basic products first.
By default, all user products are on the Selected Products Precedence Order list and they are
already ordered from the least expensive to the most expensive. The Available Products list
contains all non-user products purchased by the customer.
For more information on product usage and product precedence, see the Product Usage Analysis
on page 444 page.
NOTE: Since the network-level report is computed when the license data is downloaded from
the Application Servers, a product precedence order change is reflected in the network-level
report only at the next license data download. A product precedence order change takes effect
immediately in Application Server cluster, service provider/enterprise, group, user- level reports.
License data download frequency is defined by the License Data Download Frequency Type and
License Data Download Frequency Value parameters.
NOTE: By default, when the EMS applet configures the collect maintenance task that runs on
the Application Server, it automatically schedules the gathering task at the same frequency as the
maintenance task; however, the time that is scheduled is two hours later to ensure the EMS collects the
last file created.
5) In the License Data Clean Up Interval input box, specify when the collected data stored on EMS is
deleted.
6) In the Periodic Reports Clean Up Interval input box, specify when the periodic reports are deleted.
7) In the License Report Display Empty Count drop-down list, determine if empty license packages or
features are included in reports.
8) In the License Data Archive Location input box, specify the location of the archive.
9) In the Show Red When License Available Percentage input box, type the percentage to trigger the
presentation to the color red in the graphs.
10)In the Show Green When License Available Percentage input box, type the percentage to trigger the
presentation to the color green in the graphs.
11)In the Outlying Users Maximum Number input box, type the maximum number of users reported in the
Outlying Users section of the report.
12)In the Detect Incomplete Match Outlying Users drop-down list, select "true" to detect outlying users for
the Incomplete Match category.
13)In the Detect Multiple User Products Outlying Users drop-down list, select "true" to detect the outlying
users for the Multiple User Products category.
14)In the Detect No Trunk Product Outlying Users drop-down list, select "true" to detect the outlying users
for the Multiple User Products category.
15)In the Detect No User Product Outlying Users drop-down list, select "true" to detect the outlying users
for the Multiple User Products category.
16)To order the precedence of the products:
NOTE: You can also suppress notifications at the origination (for example, a Session Initiation Protocol
[SIP] authentication failure). For more information on alarm threshold and suppression, see the
BroadWorks Alarm Threshold and Suppression Feature Description.
NOTE: An example of an alarm that you might want to suppress is the loop trap when the call is
successful (bwForwardDestinationLoop).
NOTE: Create a separate event filter for each type of event that you want to suppress.
viras03.mtl.broadsoft.com. psOciStatsNbAuthorizationRequestFailures
unspecified Mar
31,2012 09:50:32 AM Too Many login failure Value: 21 Data:
psOciStatsNbAuthorizationRequestFailures : viras03.mtl.broadsoft.com. :
.1.3.6.1.4.1.6431.1.6.8.1.6.0 Threshold Type: max Critical Threshold : 10
Critical Rearm
Value: 6
Email:
Subject: This is a test email
viras03.mtl.broadsoft.com.:.1.3.6.1.4.1.6431.1.6.8.1.6.0
Body:
TIME:Sat Mar 31 10:19:32 EDT 2012
Something related to threshold. Too Many logins
Value: 28 Data:
psOciStatsNbAuthorizationRequestFailures : viras03.mtl.broadsoft.com. :
.1.3.6.1.4.1.6431.1.6.8.1.6.0 Threshold Type: maxCritical Threshold :
10Critical Rearm Value:
0 viras03.mtl.broadsoft.com.
This section provides information on how to use the centralized services to simplify user migration,
maintenance tasks, audible alarms, and service packs.
This section describes the following:
• Performing User Migration on page 352
• Setting Up Maintenance Tasks on page 376
• Managing Audible Alarms on page 382
• Managing Service Packs on page 385
NOTE: This page is available from the EMS Java application only. Log in to the EMS Java application to
access this page.
Enterprises This column specifies the name of the enterprise when there is one enterprise/service provider
selected. Otherwise, it includes the number of enterprises/service providers when there are two or
more enterprises/service providers selected.
Source AS Cluster This column specifies the source Application Server cluster that the user information is migrated
from.
Destination AS Cluster This column specifies the destination Application Server cluster that the user information is migrated
to.
Current State This column specifies the current state of the user migration.
NOTE: An active migration configuration (the one being selected for execution) cannot be deleted
and the update is limited depending on the progress of the migration. For example, it is not possible
to change the source and destination Application Server cluster once the Application Server cluster
validation is completed or if it is ongoing. The Network Server is mandatory for the Shared Resources.
NOTE: An active migration configuration (the one being selected for execution) cannot be deleted
and the update is limited depending on the progress of the migration. For example, it is not possible
to change the source and destination Application Server cluster once the Application Server cluster
validation is completed or if it is ongoing. The Network Server is mandatory for the Shared Resources.
User Migration Name This text box specifies the name of the user migration. It is used to identify the migration. This can
be any sequence of character except the following: * ? ! | \ / ' " { } < > ; , ^ ( ) $ ~. This name is used
for the file name logging as well as directory name where migration files are saved.
Enterprises/Service This text box specifies the name(s) of the enterprises/service providers to migrate. This list contains
Providers to Migrate the identities of multiple enterprises/service providers on one line. Identities are separated by a
comma. The enterprise's/service provider’s identity can contain any characters. The leading and
trailing white spaces of the enterprise's/service provider identity are trimmed when the enterprises/
service providers list is parsed and saved to the EMS database. When the enterprise/service
provider identity contains a comma, the identity needs to be in double quotation marks. In the
following example the identity "BroadSoft, Inc." is in quotation marks because the identity includes
a comma:
Enterprise1, "BroadSoft, Inc.", Enterprise 2
Use the Select button to add enterprises/service providers identities to the list. For the Select button
to provide an enterprises/service providers selectable list, the node access data of the source
Application Server cluster needs to be properly configured (BW Web Access credentials).
Source AS Cluster Address This drop-down list specifies the primary server address of the Application Server cluster from
which the enterprise/service provider is migrated. The list is populated using the EMS inventory.
Destination AS Cluster This drop-down list specifies the primary server address of the Application Server cluster to which
Address the enterprise/service provider is migrated. The list is populated using the EMS inventory.
Migrate CDS This check box determines whether the Call Detail Server is migrated.
Source CDS This text box specifies the server address of the Call Detail Server (CDS) from which the data
associated to the migrated enterprise/service provider is taken.
Destination CDS This text box specifies the destination Call Detail Server address.
Migrate CCR This check box determines whether the Call Center Reporting Server is migrated.
Source CCR This text box specifies the source Call Center Reporting Server address.
Destination CCR This text box specifies the destination Call Center Reporting Server address.
Migrate CS This check box determines whether the Conferencing Server is migrated.
Source CS This text box specifies the source Conferencing Server address.
Destination CS This text box specifies the destination Conferencing Server address.
Network Server Address This drop-down list specifies the primary server address of the Application Server cluster to which
the enterprise/service provider is migrated. The list is populated using the EMS inventory.
NOTE:
For the migration task to work properly, all cluster resources identified must already be known as EMS
monitored nodes.
NOTE:
Migrating the Call Detail Server, the Call Center Reporting Server, and the Conferencing Server
are optional. However, the enterprise/service provider, the source, and the destination Application
Server cluster are mandatory.
For the Shared Resources, the Network Server is mandatory.
7) Click Apply to add the migration configuration. A new row is added in the Configured Migration table.
Or, click Cancel to exit the configuration.
NOTE:
The migration tool does not validate the above resources and settings. It is the responsibility of the
operator to ensure resources and settings are properly configured.
Once the above items have been validated, the Application Server migration can take place. The
Application Server migration phase is done in four steps:
1) Application Server cluster validation
2) Application Server cluster migration
3) Application Server cluster file migration
4) Application Server cluster migration check
For each step, certain actions are performed. The number of actions and the time each action takes to
execute vary from one step to another. The following table lists the main actions executed for each step
while in migration mode:
Migration Step Actions
Software Version Validation It must be verified that the software version and patch level on
the source and destination Application Server clusters are the
same.
Destination Application Server Cluster State The cluster must be locked, the replication must be stopped,
and the primary server must be stopped.
Default Domain The default domain on the source and destination cluster must
match.
Activatable Features The list of activatable features on the source and destination
Application Server clusters must match.
Service Pack Migration and Trunk Group User Creation Tasks There must not be any service pack migration tasks and no
trunk group user creation task in pending or running state on the
source Application Server cluster.
File System Protocol The "fileSystemProtocol" system parameter must be the same
on the source and destination Application Server clusters.
System Realm The default system realm must be the same on source and
destination Application Server clusters.
Destination Application Server Cluster State The cluster must be locked, the replication must be stopped,
and the primary server must be stopped.
Tables Migration The data from the source Application Server cluster is migrated
to the destination Application Server cluster. There are many
database tables to transfer, each corresponding to an action.
Depending on the size of the database, the execution of these
actions can be time-consuming.
Files and Scripts Transfer The necessary files and scripts required for the file migration
are transferred to the source and destination Application Server
clusters.
User File Migration The files associated with the migrated users are transferred
from the source to the destination Application Server
cluster. Depending on the number of user files to transfer, this
action can be time-consuming.
Configuration File Migration The files associated with the migrated devices are transferred
from the source to the destination Application Server cluster.
Depending on the number of configuration files to transfer, this
action can be time-consuming.
JWS Configuration File Migration The JWS configuration files associated with the migrated
enterprises/service providers are transferred from the source to
the destination Application Server cluster. This is only applicable
if the JWS configuration files are saved in a file repository
hosted on the source Application Server cluster and the same
configuration (local file repository) exists on the destination
Application Server cluster.
Files and Scripts Transfer The necessary files and scripts required for the "revert" file
migration are transferred to the destination Application Server
cluster.
Removing Files The migrated user files and configuration files are deleted from
the destination Application Server cluster.
NOTE: Enhanced Call Logs migration can occur simultaneously with active calls.
Before beginning Enhanced Call Logs migration, there are a few manual preparation steps the operator
must perform. These steps should be completed before Application Server migration begins:
1) Back up the Database Server where the destination Application Server cluster is configured to record
enhanced call logs.
2) Verify that the Enhanced Call Logs schema for the destination Application Server cluster has been
created on the destination Database Server.
3) Verify that the destination Database Server is large enough to accommodate the call log data for the
enterprise or service provider being migrated.
NOTE: The only way to completely revert a failed or aborted Enhanced Call Log migration is to restore
the destination Database Server from a backup.
Prepare Database (DB) Connection Framework Verify connectivity to the source and destination Database
Servers (DBS) in preparation for migration of enhanced call log
(ECL) data for the enterprise or service provider. It is expected
the operator has performed the manual preparation steps (see
above).
Migrate Customers Migrate the enterprise or service provider entries from the
source to the destination Database Server as identified for the
migration.
Migrate Enterprise Groups Migrate the relevant enterprise group entries from the source to
the destination Database Server. If a service provider is being
migrated, this "action" has no work to perform.
Migrate Users Migrate the relevant user entries from the source to the
destination Database Server.
Query Log Tables Identify the call log tables with data to migrate.
Migrate Logs Migrate the call logs for all relevant users in all identified
tables. This action may take an extended period of time to
complete; the time required to complete it depends on the
number of enhanced call logs users, the call volume, and call
log retention period. If log migration is interrupted due to a
network outage, this action may be reattempted without need for
recovery of the destination database.
NOTE: During the migration, the source and destination Call Detail Server must be stopped.
Software Version Validation Verify that the software version and patch level on the source
and destination Call Detail Servers are the same.
Source and Destination Servers State The source and destination servers must be stopped.
Source and Destination Servers State The source and destination servers must be stopped.
Table Migration (Call Logs) The call logs from the source server are transferred to the
destination server. During this action, each database table from
the source server is searched for call logs to migrate. Each call
log found is copied to the destination server. Depending on the
number of call logs to migrate, the execution of these actions
can be time-consuming.
When the migration is complete, the source and destination Call Detail Server can be started.
For more information
10.1.3.3.1 Revert Call Detail Server Migration
For the revert migration mode, the migration steps are executed in reverse order. During these steps, the
migrated call logs are removed from the destination Call Detail Server such that the server is brought back
to the state it was in before the migration. The following table summarizes the actions performed in revert
migration mode.
Revert Migration Step Actions
Action Description
None There is no action performed by the tool during this step when in
revert migration mode.
Remove Migrated Data This action removes all user call logs that have been migrated
from the destination Call Detail Server. Depending on the
number of call logs to remove, this action can be time-
consuming.
None There is no action performed by the tool during this step when in
revert migration mode.
Once the revert migration is complete, the destination Call Detail Server can be started.
NOTE: During the migration, the source and destination Call Center Reporting servers must be stopped.
Software Version Validation Verify that the software version and patch level on the source
and destination Call Center Reporting Servers are the same.
Source and Destination Server State The source and destination servers must be stopped.
Source and Destination Server State The source and destination servers must be stopped.
Table Migration (Statistics) The call center and agent statistics from the source server are
transferred to the destination server. During this action, each
database table from the source server is searched for call center
and agent statistics to migrate. Statistics found are copied to
the destination server. Depending on the number of statistics to
migrate, the execution of these actions can be time-consuming.
Update Reporting URL This action updates the reporting Uniform Resource Locator
(URL) of the migrated call center on the destination Application
Server cluster.
None There is no action performed by the tool during this step when in
revert migration mode.
Remove Migrated Data This action removes all statistics associated with the migrated
call centers and users from the destination Call Center
Reporting server. Depending on the number of statistics to
remove, this action can be time-consuming.
None There is no action performed by the tool during this step when in
revert migration mode.
Once the revert migration is complete, the destination Call Center Reporting Server can be started.
Conferencing Server Addresses Validation This action verifies that the specified Conferencing Server
addresses are valid.
Software Version Validation This action verifies that the software version on the source and
destination Conferencing Servers is the same.
Conferencing Server Configuration This action verifies that the source Conferencing Server stack
and the destination Conferencing Server stack contains the
same number of nodes. When the number is different, a
warning message is displayed to the operator. If the operator
decides to continue with the Conferencing Server migration, it is
possible for the migrated conferences to have their access code
changed.
Create Organization This action creates the bridges on the destination Conferencing
Server. The list of bridges to create is obtained from the source
Conferencing Server.
Create Bridge Administrator This action creates the bridge administrator on the destination
Conferencing Server.
None There is no action performed by the tool during this step when in
revert migration mode.
Remove Migrated Data This action removes all the data that has been migrated from the
destination Conferencing Server.
None There is no action performed by the tool during this step when in
revert migration mode.
Validate hosting NE attributes This action checks the attributes of the source and destination
hosting NE. If there are differences, this may impact call
processing on the Network Server. Calls made before and
after the migration may not be routed the same way for the
users in the migrated enterprise. It is suggested to perform
test calls and verify translations (VTRs) to ensure that calls still
complete successfully after the migration, or if possible, review
the attributes on both hosting NEs to confirm that they must be
different.
Validate hosting NE mediaCodecs support This action verifies the mediaCodec support of the source
and destination hosting NEs. In cases where the source and
destination do not have the same support, the call processing
may be impacted on the Network Server. Calls made before
and after the migration cannot be routed the same way for the
users in the migrated enterprise. It is suggested to perform test
calls and VTRs to ensure that calls still complete successfully
after the migration, or if possible, review the mediaCodecs on
both hosting NEs to confirm that they must be different.
Check for duplicate group names This action checks whether the groups of the source hosting NE
already exist on the destination hosting NE.
Get migration information This action gathers information that is used by the other actions
for the migration.
DNs migration This action changes the hosting NE associated with the DNs of
the migrated enterprise/service provider.
Extensions migration This action changes the hosting NE associated with the
extensions of the migrated enterprise/service provider.
URLs migration This action changes the hosting NE associated with the URLs of
the migrated enterprise/service provider.
User group and routing policies migration This action changes the hosting NE associated with the user
groups and policies of the migrated enterprise/service provider.
Admin IDs migration This action changes the hosting NE associated with the
administrator IDs of the migrated enterprise/service provider.
NOTE: During the validation actions in the Network Server validation step, a warning message can be
displayed to the operator to inform of the differences between the source and destination hosting NEs. In
these cases, the operator should consider updating the hosting NEs to ensure routing remains the same
after the migration.
None There is no action performed by the tool during this step when in
revert migration mode.
Get Migration Information This action gathers information that is used by the other actions
for the migration.
DNs Migration This action changes the hosting network element (NE)
associated with the directory numbers (DNs) of the migrated
enterprise/service provider.
Extensions Migration This action changes the hosting NE associated with the
extensions of the migrated enterprise/service provider.
URLs Migration This action changes the hosting NE associated with the Uniform
Resource Locators (URLs) of the migrated enterprise/service
provider.
User Group and Routing Policies Migration This action changes the hosting NE associated with the user
groups and policies of the migrated enterprise/service provider.
Administrator IDs Migration This action changes the hosting NE associated with the
administrator IDs of the migrated enterprise/service provider.
None There is no action performed by the tool during this step when in
revert migration mode.
Source Application Server Cluster State The cluster must be locked, the replication must be stopped,
and the primary server must be stopped.
Delete Table Content The data associated with the migrated enterprise/service
provider is deleted from the source Application Server cluster.
Delete User/Configuration Files The user/configuration files associated with the migrated
enterprise/service provider are deleted from the source
Application Server cluster.
Query Customers This identifies the enterprise or service provider entries that
were migrated from the source Database Server.
Delete Users This marks the relevant users as deleted in the source Database
Server.
Delete Groups This marks the relevant enterprise groups as deleted in the
source Database Server. If a service provider was migrated,
this "action" has no work to perform.
Delete Customers This marks the identified enterprise or service provider entries
as deleted in the source Database Server.
Delete Table Content The call logs associated with the migrated users are deleted
from the source Call Detail Server.
Delete Table Content The statistics associated with the migrated call centers and
agents are deleted from the source Call Center Reporting
Server.
Remove Conference Information This action removes the migrated information from the source
Conferencing Server.
The following sections describe the manual steps an operator must perform before and after the
Application Server cleanup steps. There are no manual steps required for other cleanup steps.
For more information
10.1.3.7.1 Pre-Cleanup Procedure
Before starting the cleanup, the following steps are required to bring the server to a state in which it is
possible to do the cleanup safely.
Before the cleanup:
1) Perform a backup of the primary source Application Server. This is done using the command:
bwBaclup.pl AppServer <backupFileName>.
2) If the Enhanced Call Logs feature is activated for the enterprise or service provider that was migrated,
perform a backup of the source Database Server (DBS).
3) Lock the Application Server source cluster. This is done using the command: peerctl lock all.
4) Stop the replication on the Application Server source cluster. This is done using the command:
peercmd repctl stop.
5) Stop BroadWorks on the primary source Application Server. This is done using the bwcli from which the
server can be locked and stopped.
The Application Server cleanup step can now be safely initiated.
10.1.3.7.2 Post Cleanup Procedure
Once the cleanup steps are completed, the Application Server source cluster can be put back into full
service by following these steps:
1) Start the replication on the primary source Application Server. This is done using the command:
repctl start.
2) Unlock the primary source Application Server. This is done using the command: peerctl unlock.
3) Start BroadWorks on the primary source Application Server. This is done using the command:
startbw.
4) Stop BroadWorks on the secondary source Application Server. This is done using the bwcli from which
the server can be locked and stopped.
5) Import the database on the secondary source Application Server. This is done using the command:
importdb.pl appserver <peer> appserver.
6) Start replication on the secondary source Application Server. This is done using the command: repctl
start.
7) Unlock the secondary source Application Server. This is done using the command: peerctl unlock.
8) Start BroadWorks on the secondary source Application Server. This is done using the command:
startbw.
9) On the destination primary Application Server, reset the registration extension timer to the pre-migration
value as follows: AS_CLI/System/Registration> set extensionTimeInSeconds 0.
NOTE: If the current action includes the processing of enterprises/service providers, the identity and
processed counts of enterprises/service providers as well as the total count are added after the current
action name. The progress bar takes into account the amount of enterprises/service providers such that
when 100 percent is reached, all actions for all enterprises/service providers are completed.
The Next button is used to move from one step to another and execute the migration. After the execution
of a step, it is possible to deactivate a migration using the Deactivate button. The migration can be
reactivated at any time and it resumes at the step where it was stopped.
In cases in which the EMS applet is closed or disconnected while a migration is still active, the migration
is not automatically deactivated. The migration remains active until the migration tool is restarted and the
migration is reactivated. When the migration is reactivated, the migration tool informs the operator that
the migration is already activated. This occurs because the migration tool remembers that the migration
has not been deactivated properly. It may also occur in cases in which another user has activated
the migration. The migration tool prompts the operator to see whether it should proceed with a forced
activation. When the operator answers "yes", the migration tool reactivates the migration and displays the
steps and status.
NOTE: Only one migration can be active at a time; therefore, only one user can have a migration
activated.
NOTE: If any of the items are changed after a migration has been activated, the migration must be
deactivated and then reactivated for the new values to be recognized by the migration tool.
NOTE: If the cleanup step has already started, it is not possible to undo the migration process.
Once the migration is configured, a row is added to the Configured Migration table.
For more information
Enable Maintenance Task Setup This check box enables/disables automatic invocation upon
BroadWorks discovery. If a new node is added, the behavior
specified here is repeated upon rediscovery. Enabled (default):
The EMS automatically attempts to apply the maintenance task
setup. Disabled: No automatic setup is attempted. You must
manually invoke the EMS maintenance task setup feature.
Daily Maintenance Window This input box sets the daily maintenance window definition.
No CPU-intensive tasks can be scheduled outside of the
maintenance window defined here. By default, the maintenance
window is from midnight to 6 A.M.
Run Audit This check box enables/disables periodic audits to report any
discrepancies between the maintenance tasks configured
at the EMS and those configured on individual NEs. When
enabled, the EMS reuses the existing setup commands from
the NEs to review the current configuration of the maintenance
tasks. Reporting is done from events and alarms where the
category reuses the existing "BW-AutoConfig" value. Results
are reported, per node, once the setup for all maintenance
tasks has completed. If an outstanding alarm exists, the EMS
automatically transforms any info event in a clear event to
support alarm auto-clearing. If automatic overrule is enabled, the
EMS reports an info event if the EMS maintenance task setup
was applied successfully. When automatic overrule is disabled
and the EMS identifies a delta between the EMS configuration
and the NE configuration, the EMS reports an event whose
severity has a criticality. An event of severity info is generated
if no delta is identified. In addition, upon successful completion
of maintenance task setup, the EMS generates an event of
severity info. In case of failure, the EMS generates an event
whose severity has a criticality, which automatically raises an
alarm. Enabled (default): The EMS reports on configuration and
audit results through EMS events and alarms. Disabled: No
reporting is performed and no events related to configuration are
generated by the EMS.
The following table lists the maintenance tasks available for scheduling:
Task Name Description Applicable Server Types CPU-Intensive
The following table presents typical configurations for the supported maintenance tasks. For more
information, see the BroadWorks Maintenance Guide.
Task ApplicationMedia Network Access EMS Call Xtended Profile Execution Database
Server Server Server Mediation Detail Services Server Server Server
Server Server Platform
AutoCleanupweekly weekly weekly weekly weekly weekly weekly weekly weekly weekly
Healthmon 30 30 30 30 30 30 30 30 30 30
minutes minutes minutes minutes minutes minutes minutes minutes minutes minutes
serviceLicenseCollect
daily N/A N/A N/A N/A N/A N/A N/A N/A N/A
Backup weekly weekly weekly weekly weekly weekly weekly weekly weekly weekly
RegAudit weekly N/A N/A N/A N/A N/A N/A N/A N/A N/A
DbSyncCheck
daily daily N/A N/A N/A N/A N/A N/A N/A N/A
CpuMon 5 minutes 5 minutes 5 minutes 5 minutes 5 minutes 5 minutes 5 minutes 5 minutes 5 minutes 5 minutes
Tech- daily daily daily daily daily daily daily daily daily daily
support
To modify a task:
1) Log in to the EMS Java applet.
2) From the Administration Tools menu, click Mtc Task Setup. The Mtc Task Setup page appears.
3) Click the task to modify and click Update. The Setup Mtc Task page appears.
4) Modify the task as required.
5) Click Apply.
To add a task:
1) Log in to the EMS Java applet.
2) From the Administration Tools menu, click Mtc Task Setup. The Mtc Task Setup page appears.
3) Click Add. The Setup Mtc Task page appears.
4) Select the task type, the server type to which it applies, its schedule, and the first-peer start time.
5) Click Apply.
To delete a task:
1) Log in to the EMS Java applet.
2) From the Administration Tools menu, click Mtc Task Setup. The Mtc Task Setup page appears.
3) Click the task to delete and click Delete. A confirmation dialog box appears.
4) Click Yes to delete the task or No to return to the previous page.
For more information
Global Parameters This section displays the values you have assigned on the
Configure Maintenance Tasks Setup tab as well as the tasks
available for application.
Configuration Options
Apply Configured Mtc Tasks This option allows you to apply maintenance task setups to all
discovered nodes, to specific nodes, or to specific server types
only.
Select Option This option saves the current maintenance task setup for all
discovered nodes to the EMS server without attempting to apply
the changes. In addition, when you return to the Maintenance
Task Setup page and click the Reset Configured Option button,
the Apply Configured Mtc Tasks to all discovered nodes is
selected automatically.
Apply Only This option saves the current maintenance task setup to the
EMS server without attempting to apply the changes to the local
servers.
Configure Now This option attempts to apply the current maintenance task
setups to the servers or server types you specify.
Reset List This option returns the maintenance task setup to the state you
saved to the EMS server.
Reset Configured Option This option returns to the area where you most recently saved
the configuration to the EMS server. This option is useful when
you return to the Maintenance Task Setup properties page, and
want to identify the maintenance task configuration that was
already saved to the EMS server.
Audio File This column displays the audio file associated with the filter.
Play Once This column indicates whether the alarm plays once for this
filter.
Severity This column displays the alarm severity associated with the
filter.
Source This column displays the alarm source associated with the filter.
Alarm Name This column displays the alarm name associated with the filter.
Users This column displays the users associated with the filter.
All Users This column indicates whether all users are associated with the
filter.
NOTE: The term "service pack" refers to packages of Call Processing services that can be provisioned to
a BroadWorks user.
The EMS uses the Open Client Interface-Provisioning (OCI-P) commands available for the service pack
migration tool of the Application Server to manage service pack migration tasks.
Since some OCI-P commands used by this feature have changed between releases, the functionality may
differ slightly depending on the selected Application Server clusters, the BroadWorks release, and the
BroadWorks patch level. In all cases, the EMS does not present the Application Servers that do not offer
the necessary OCI-P commands. In addition, they are not accepted when input files are used.
For more information
Awaiting Edits The task was copied from another task and is waiting to be
edited before being scheduled.
Terminated with Errors A user stopped the task but the EMS encountered problems
while requesting termination from the Application Servers.
Stopped By System The task was taking too long to complete or had too many
errors. Maximum allowed time and errors are defined when a
task is configured.
Completed The task has run and has finished migrating all selected groups
and users. Note that a completed task can have errors but did
not have enough errors to abort.
A task with the status Stopped By System was stopped for one of two reasons:
• The execution time exceeded the time configured for the task. In this case, all work is stopped on each
service provider and Application Server cluster.
• The number of errors exceeded the maximum number of errors allowed for each service provider
configured for this task. In this case, the task stops partially, that is, it stops only for the service provider
that generated too many errors, and continues running for every other service provider and Application
Server cluster. For a detailed view of the task information and to determine which Application Server
cluster and service provider completed and which Application Server cluster and service provider
stopped, refer to the service pack migration task report.
Service Pack Migration Monitoring
Once a service pack migration task configured on the EMS has started, a background thread polls each
Application Server cluster and all the service providers selected for the task at one-minute intervals. This
information is stored in the EMS database and is reflected on the service pack migration task list, on the
task status page, and in the task report. When the monitoring process detects that all Application Server
service pack migration tasks have been completed, stopped, or terminated, it stops monitoring the tasks,
and sends the results report by e-mail if an e-mail address was specified in the task configuration.
Scheduled Start Date This column specifies the day the task begins.
Scheduled Start Time This column specifies the time of day the task begins.
Status This column specifies the status of the service pack migration.
Awaiting Edits The task was copied from another task and is waiting to be
edited before being scheduled.
Terminated with Errors The task was stopped by a user but the EMS encountered
problems while requesting termination of tasks from the
Application Servers.
Stopped By System The task was taking too long to complete or had too many
errors. Maximum allowed time and errors are defined in
task configuration.
Completed The task has finished migrating all selected groups and
users. It may have had errors, but not enough to abort.
Description This text box specifies the descriptive name for the service pack
migration task.
Schedule Start Date This text box specifies the date and time the service pack
migration task is scheduled to run on each Application Server
cluster.
Results E-mail This text box specifies the e-mail address to notify when the task
is complete (optional).
Expire after (hours) This text box specifies the period of time before a service
pack migration task expires (if it has not started). When a task
reaches its expiration time, it expires if it is still waiting to be
started. If it has been processed or if it has started processing, it
does not expire.
Automatically stop after (hours) This input box specifies the period of time allowed for the
execution of the service migration task. This input box is
intended to prevent service migration tasks from extending
beyond a scheduled maintenance window.
Maximum Errors (per Service Provider) This input box specifies the number of errors permitted for each
service provider before a service migration task terminates
(optional).
Reporting Options Either Report all users in the migrated groups to report on all
users in the group included in the service migration task or
Report only users matching the selection criteria to report on all
users affected by the service migration task (this is the default).
Service Quantity Options Either Automatically increase the allocations to migrated groups
as needed to increase the service quantities of related services
or Terminate the migration for any group with the Service
Quantity Violations to prohibit service pack migration for groups
with inadequate service quantities (this is the default).
NOTE: At any time, you can click Apply to save the changes you made up to this point or click Reset to
clear the selection made on the page.
1) On the Clusters Selection page, select the Application Server clusters where you want to perform
service pack migration.
• For the Mode option, check the mode List to select the Application Server clusters from the provided
list or check File to use an input file containing a list of Application Server clusters.
• If you checked List, select the Application Server clusters from the displayed list or to check all the
Application Server clusters, check the box in the Application Server Clusters title row.
• If you checked File, use the Browse button to find the file. The file must have the following
eXtensible Markup Language (XML) format:
<ServicePackMigration>
<ApplicationServer hostname="mtlas04.mtl.broadsoft.com" />
1) On the Service Providers/Enterprises page, select the service providers for which you want to perform
service pack migration.
• For the Mode option, to select all service providers, check Migrate All; to select service providers
from the list, check Search; to use an input file containing a list of service providers, check File.
• If you checked Search, use the search tool to display a list of service providers, and select the
service providers you want from the provided list.
The search tool provides two criteria: organization ID and name with options Starts With, Contains
and Equals To. The search is executed only on the previously selected Application Server clusters.
1) On the Groups page, select the groups for which you want to perform service pack migration.
• For the Mode option, to select all groups, check Migrate All; to select groups from the list, check
Search; to use an input file containing a list of groups, check File.
• If you checked Search, use the search tool to display a list of service providers, and select the
service providers you want from the provided list.
The search tool provides two criteria: organization ID and name with options Starts With, Contains,
and Equals To. The search is executed only on the previously selected Application Server clusters.
Description This text box species the descriptive name for the service pack
migration task.
Start Date This input box species the date for which the service pack
migration task is scheduled to run on each Application Server
cluster.
Start Time This input box species the time of day the service pack
migration task is scheduled to run on each Application Server
cluster.
Results E-mail This text box species the e-mail address to notify when the task
is complete (optional).
Allowed Time (hours) This input box species the period of time allowed for the
execution of the service migration task. This input box is
intended to prevent service migration tasks from extending
beyond a scheduled maintenance window.
Maximum Errors This input box species the number of errors permitted for each
service provider before a service migration task terminates
(optional).
Reporting Options Either Report all users in the migrated groups to report on all
users in the group included in the service migration task or
Report only users matching the selection criteria to report on all
users affected by the service migration task (default).
Service Quantity Options Either Automatically increase the allocations to migrated groups
as needed to increase the service quantities of related services
or Terminate the migration for any group with the Service
Quantity violations to prohibit service pack migration for groups
with inadequate service quantities (default).
Status: Completed
Errors: 0
AS Clusters Modified Successfully: 1
AS Clusters Modified Unsuccessfully: 1
Service Provider Modified Successfully: 1
Service Provider Modified Unsuccessfully: 1
Groups Modified Successfully: 3
Groups Modified Unsuccessfully: 1
AS Cluster: mtl64lin01.mtl.broadsoft.com
Service Provider: sp1
AS Cluster: mtlsoldev1.mtl.broadsoft.com
Service Provider: sp2
NOTE: A task that has been stopped cannot be resumed but can be copied and rescheduled.
If the EMS is unable to communicate with an Application Server via the Open Client Interface (OCI) to
terminate a service pack migration task, the task state is set to "Terminated with Errors" and the EMS
generates an event.
This page is a list page that allows you to search several different ways. The search tool provides two
criteria: Organization ID and Name with options Starts With, Contains, and Equals To.
5) Select the service providers who have the service pack you want. Use the Search tool to display the
service providers. From the list, select the service providers you want or to select all service providers,
check the box in the title row.
6) Click Next. The Service Pack Management – Service Packs page appears displaying the list of
available service packs for the selected Application Server clusters and service providers.
Figure 203: Service Pack Management – Service Packs
NOTE: Since the modified service pack must have a different name from the original name, renaming
the original service pack allows you to keep the old name for the modified service pack.
8) To select the service pack you want to modify, click its name. The Service Pack Modification page
appears listing the available services on the left and the services already in the service pack on the
right.
NOTE: The Add Service Pack button navigates you to the Service Packs Add page for additional input
required to create a new service pack. For information, see section Add Service Pack Migration Task
on page 391.
If the EMS is unable to communicate with the Application Server via Open Client Interface-Provisioning
(OCI-P) to fetch the service packs, the EMS displays a warning message and generates an event to
report the issue.
Figure 204: Service Pack Management - Service Packs
NOTE: Service packs with the same names across multiple service providers and Application Server
clusters should have the same user services.
If the EMS is unable to communicate with the Application Server to fetch the service pack user service
list, the EMS generates an event to report the issue.
Tasks to perform from this page:
10.4.2.5.1 Create New Service Pack
The Service Packs Add page allows you to create a service pack on the selected Application Server
clusters and for the selected service providers. This page offers a basic service pack configuration
capability including the name and description of the service pack. Options are also available to activate or
deactivate the service pack and to specify the number of times this service pack may be assigned. A list
of available services allows you to choose the user services to include in the service pack. Only the user
services authorized for all selected service providers are listed.
Use the Service Pack Management page to perform a service pack migration.
This page is a list page that allows you to search several different ways. The search tool provides two
criteria: Organization ID and Name with options Starts With, Contains, and Equals To.
5) Select the service providers who have the service pack you want.
• Use the Search tool to display the service providers.
• From the list, select the service providers you want or to select all service providers, check the box in
the title row.
6) Click Next. The Service Pack Management – Service Packs page appears displaying the list of
available service packs for the selected Application Server clusters and service providers.
This section provides information on how to use the software lifecycle management support to facilitate the
management of EMS user accounts and the management of BroadSoft patches.
This section describes the following:
• Modifying EMS User Account on page 418
• Using EMS Patch Support Center on page 424
• Managing Patches for Node on page 429
EMS Unix User name This text box specifies the name of the EMS user.
Current Password This text box specifies the current password for the user.
New Password This text box specifies the new password for the user.
Re-type New Password This text box confirms the new password for the user.
1) Click the Centralized Networking tab and select the Centralized User submenu.
2) Click Modify EMS Account. The Modify EMS Account page appears.
3) In the EMS Unix User name text box, enter the user name. The default is "emsadmin".
4) In the Current Password text box, enter the current password.
5) In the New Password text box, enter the new password.
6) In the Re-type New Password text box, enter the new password again.
This feature includes embedded functionality that runs on a regular basis helping to keep the EMS
information synchronized with (a) the BroadSoft Patch Center and (b) the network elements.
BroadSoft Patch Center Audit Cycle
On a daily basis, the EMS uses directory listing commands to review the list of patches available based on
the list of server releases and server types within its management domain. The information retrieved from
the directory listings allows the EMS to gather the initial set of information for every patch while waiting for
the next scheduled download upon which all patch information becomes available. The EMS also retrieves
the list of defective patches from the BroadSoft Patch Center. Defective patches are patches that were
recalled or re-released by BroadSoft due to potential issues. The EMS marks those patches in its database
and takes appropriate actions.
Frequency Value This drop-down list specifies the day of the month that downloading occurs.
Week Day This drop-down list specifies the day of the week that downloading occurs.
Time of Day This drop-down list specifies the time of day that downloading occurs.
NOTE: The drop-down lists for the Frequency Value are configurable depending on the Frequency
Type you select.
4) Click Submit Schedule to save the schedule, click Reset Data to set the values to the previously
saved schedule, or click Download Patches Now to download the patches immediately.
BroadSoft Patch Center Site This text box specifies the address of the optional BroadSoft Patch Center.
BroadSoft Patch Center This text box specifies the address of the optional BroadSoft Patch Center Protocol.
Protocol
The information on this page includes the list of available patches for the nodes currently managed by the
EMS:
Column Description
Title This column displays the title of the patch (or patch bundle).
Description This column displays the description of the patch (or patch bundle). In the case where the patch is
not yet downloaded from Broadsoft Patch Center, "NE_GENERATED" is displayed..
Sys Crt This column specifies whether the patch (or patch bundle) impact is critical to the system . The value
"N" represents "No" and the value "Y" represents "Yes".
AS WS This column specifies whether the patch (or patch bundle) affects the Application Server or Web
Server. The value "N" represents "No" and the value "Y" represents "Yes".
Int Aff This column specifies whether the patch (or patch bundle) affects the interface. The value "N"
represents "No" and the value "Y" represents "Yes".
Rst Req This column specifies whether the patch (or patch bundle) requires a restart. The value "N"
represents "No" and the value "Y" represents "Yes".
DB Aff This column specifies whether the patch (or patch bundle) affects the database. The value "N"
represents "No" and the value "Y" represents "Yes".
Date Closed This column displays the date the patch was created.
BroadWorks Server Type This text box specifies the BroadWorks Server type.
AS WS Patch Required This text box appears if an Application Server Web Server patch is required.
Interface Affecting This text box appears if the patch affects the interface.
Schema Affecting This text box specifies whether the patch affects a schema.
EMS Patch Status This text box specifies the EMS patch status:
NOTE: The transient status remains while EMS completes a BroadSoft Patch Center Audit cycle.
Typically, the duration is directly related to the number of patches associated with the EMS span.
That is, the greater the number of patches in an EMS span, the longer a transient status remains.
Detailed Description Click the link to view the detailed description of the patch.
Patched Files Click the link to view the list of patched files.
Select OS This drop-down list defines the Operating System. Values include "Linux_vc86_64".
Bundle Name This input box specifies the name of the bundle.
To create a bundle:
1) On the EMS Patch Support Center page, select the check box(es) in the row for the patch(es) for which
you would like to create a bundle.
2) Click Create Bundle. The Patch Bundle Creation – Confirmation page appears.
3) From the Select OS drop-down list, select the operating system.
4) Review the Bundle Name.
5) From the Available Patches list, select the patches to bundle, and then click Select > to move them to
the Selected Patches list.
To re-download a patch:
1) On the Patch Support Center page, select the check box(es) in the row for the patch(es) you would like
to re-download.
2) Click Re-download Patches…. The Patch re-download - Confirmation Page appears.
3) Click Re-download Patches to download the patches or click Back to return to the previous page.
NB of applied patch(es) This column specifies the number of patches applied to the node.
NE missing critical This column displays whether the NE has any missing critical patches.
patch(es)
NB of missing critical This column displays the number of missing critical patches.
patch(es)
SWManager Version This column displays the Software Manager version running on the node.
Last Refresh Date This column specifies the time stamp indicating the last refresh.
EMS Patch Status This input box specifies the EMS patch status:
NOTE: The transient status remains while EMS completes a BroadSoft Patch Center Audit cycle.
Typically, the duration is directly related to the number of patches associated with the EMS
span. That is, the greater the number of patches in an EMS span, the longer a transient status
remains.
Rst Req This column appears if a restart is required after the patch is installed.
Date Closed This column displays the time stamp indicating when the patch was closed.
NOTE: The dependents (patches which requires some other patches) check boxes are enabled only if
the check boxes for their dependent (patch required by some other patches) are unchecked.
5) From the Scheduled Date text box, use the calendar to select the date to apply the patches. When
selecting the schedule option, the EMS asks for a final user confirmation before proceeding. If the user
confirms the request, the EMS takes the following actions at each of the selected NEs.
• Uploads any missing patches.
• If patches are missing, immediately refreshes the Patch tool context.
• Schedules the Apply Patch command for the selected patches.
• If required, schedules the NE locking command. The EMS issues an NE locking command only
when the Restart required input box is at "Y" for at least one of the selected patches.
• Schedules the executed patch command.
NOTE: The operation occurs only if the EMS is running at the time of the scheduled execution. The
processing includes a grace period of 15 minutes. The scheduled operation still occurs even if the
EMS was restarted within 15 minutes of the scheduled operation.
6) Select or unselect Force. The Force option allows you to apply the patches in an offline mode.
7) Click Apply Patches to apply the patches. A confirmation dialog box appears.
8) Click OK to apply the patches or click Cancel to cancel the application of the patch.
To remove a patch (or patches):
1) On the NE Patch Level page, select the node(s) for which you would like to remove patches.
2) Click Remove Patches.
3) Select from the list Patches Available by clicking the check box beside the desired patch. A pop-up
displays the required dependents which need to be removed along with the selected patch.
4) Click OK to select the dependents.
NOTE: The dependents (patches which requires some other patches) check boxes are enabled only if
the check boxes for their dependent (patch required by some other patches) are unchecked.
5) From the Scheduled Date text box, use the calendar to select the date on which to remove the patches.
When selecting the schedule option, the EMS asks for a final user confirmation before proceeding. If
the user confirms the request, the EMS takes the following actions at each of the selected NEs:
• Schedules the Remove Patch command for the selected patches.
Scheduled Date Time This column displays the scheduled date of each task.
Restart This column specifies whether the server needs to be restarted after the patch is installed.
Title This column displays the title of the patch (or patch bundle).
Description This column displays a description of the patch (or patch bundle).
Sys Crt This column specifies whether the patch (or patch bundle) affected is critical to the system. The
value "N" represents "No" and the value "Y" represents "Yes".
AS WS This column specifies whether the patch (or patch bundle) affects the Application Server or Web
Server. The value "N" represents "No" and the value "Y" represents "Yes".
Int Aff This column specifies whether the patch (or patch bundle) affects the interface. The value "N"
represents "No" and the value "Y" represents "Yes".
Rst Req This column specifies whether the patch (or patch bundle) requires a restart. The value "N"
represents "No" and the value "Y" represents "Yes".
DB Aff This column specifies whether the patch (or patch bundle) affects the database. The value "N"
represents "No" and the value "Y" represents "Yes".
Date Closed This column displays the date the patch was created.
For a description of the reference information on this page, see View Patch Details for Node on page
435.
To view the excluded patches for a node:
1) On the NE Patch Level page, select the NE for which you would like to view the excluded patches. The
Detailed Patch Level page appears.
2) Click the EXCLUDED Group tab. The Detailed Patch Level - EXCLUDED Group tab appears.
To re-include a patch:
On the Detailed Patch Level - EXCLUDED Group tab, click Re-include in active management. The
Detailed Patch Level - UNDEPLOYED Group tab appears on the list with the patch.
The Centralized Patching Management functionality has the following dependencies when using this
configuration:
• The external mechanism must synchronize the files between the following locations:
• From the centralized BroadSoft Patch Center directory for all patches
(<BROADSOFT_PATCH_CENTER_HOME_DIR>/GA/<BroadWorks release number>/<BroadWorks
Server Type>/).
For example, the BroadSoft Patch Center directory is named <customer username>/GA/14.sp3.200/
as for Release 14.sp3 of the BroadWorks Application Server.
• To the local (or intermediate site) EMS directory for all patches (/GA/<BroadWorks release number>/
<BroadWorks Server Type>/).
For example, the local directory is named /GA/14.sp3.200/as for Release 14.sp3 of the BroadWorks
Application Server.
• The synchronization mechanism must include the files named “system-criticalpatches” from all
subdirectories where patches are located.
• The synchronization mechanism must include the file named “defective-patches” that contains the list of
all patches flagged as defective (deprecated, recalled, reissued, rereleased, and so on).
• For supporting software manager management, the external mechanism must also synchronize the files
between the following locations:
• From the centralized BroadSoft Patch Center directory for the software manager binaries
(<BROADSOFT_PATCH_CENTER_HOME_DIR>/GA/co/).
• To the local (or intermediate site) EMS directory /GA/co.
The following figure shows an example of the BroadSoft Patch Center directory structure required by the
EMS Centralized Patching Management.
The following limitations apply when the Centralized Patching Management functionality uses this
configuration:
• The patch closed date field displayed by the EMS matches the patch transfer date to the local (or
intermediate site) EMS directory.
• The patches relevant to the EMS span of control are duplicated locally (or from the intermediate site)
since this first copy is viewed as the “BroadSoft Patch Center” copy.
This section provides information on how to use the centralized licensing to manage BroadWorks licenses.
This section describes the following:
• Reporting on Licenses on page 442
12.1 Terminology
Terminology that specifically describes the BroadWorks licensing includes the following:
Add-On Product
An add-on product is equivalent to a service license pack that contains a single service. Add-on products
may be of different types, including user services (such as BroadWorks Receptionist – Office), group-
oriented services (such as Hunt Group or Auto Attendant), or platform services (such as Lawful Intercept or
Deployment Studio).
Business Trunking License Unit Product
A business trunking license unit product is the license unit that determines how many simultaneous
trunking calls are allowed on a given Application Server pair at run time. Business trunking license units
are equivalent to the trunking call capacity. In the license file, it is defined by the license system parameter
named maxTrunkGroupCallCapacity.
Capacities
Capacities on Application Server license files include following properties: Largest group allowed
(groupUserLimit in the license file ), maximum number of groups (numGroupLicense in the license file),
and maximum number of users (userLicense in the license file). A group is consumed if a group is created;
a user is consumed if a user is created and a user in the group is counted as well.
Group Service
A group service is a single service that is assigned to a group. Group services can be counted as virtual
(number of instances).
Group Service License Pack
A group service license pack is a set of group services. An instance of the service license pack is
consumed as soon as one of the services is assigned to a group. In a service license pack, all services are
assigned with the same quantities.
Incomplete Match
An incomplete match is a user who consumes service license packs that could not be found in any product.
Licenses
BroadSoft sells licenses to customers by delivering license files. License files are used to authorize
services, capacities, and even start-up on a given BroadWorks server. License file content and formats are
changed based on the BroadWorks server type and release number.
Outlying Users
Outlying users fall into one of the following categories:
• Multiple user products: a user who consumes more than one user product.
• No user product: a non-trunk user who consumes only products that are not user products, and thus
fails to contain the subscriber license for that user.
• No trunk product: a trunk user who fails to consume a trunk product, and thus fails to contain the
subscriber license for that user.
Product
12.2.1 Overview
With the Centralized License Reporting and Monitoring feature, operators can report and monitor license
usage of Application Server clusters from the EMS web interface.
The feature comprises three main components:
• License data collection, which includes scheduling data generation through the EMS onto the
Application Server and gathering data from the Application Server to the EMS.
• License Reporting, which includes configuring periodic reports and generating usage/reverse lookup
reports.
• Monitoring, which includes configuring and monitoring license thresholds.
The following diagram shows a view of the license data collection process:
This process starts after the data generation is configured and the data gathering tasks are defined. The
data generation task results in the creation of a maintenance task on all managed Application Servers.
The data gathering task periodically retrieves ZIP files generated by the Application Server data generation
scheduled task onto the EMS.
The process begins on the Application Server where the scheduler executes the service license collection
at the specified time. A ZIP file that contains the service license and usage data is generated. Then the
EMS periodically retrieves the Application Server clusters' ZIP files. The EMS database is updated with the
related file information.
Once the Application Server license report files are on the EMS, the operator can generate license reports
from the EMS. There are two types of reports: usage report and reverse lookup report. Both report types
can be scheduled to be generated periodically and can optionally be sent by e-mail. Various file formats
are available for license reports. Periodic and reverse lookup reports are saved on the EMS and are
available for consultation.
The usage report is similar to the report generated by the Application Server Service License Report. The
EMS provides the ability to combine multiple Application Server clusters' license usage into a single report.
All clusters' license usages are added together. The product usage can also be included in this report.
The reverse lookup provides a list of Application Server clusters, service providers/enterprises, groups, or
users assigned a particular service or service license pack. One or more services or service license packs
are selected and the generated report provides the list of Application Server clusters, service providers/
enterprises, groups, or users with those services or service license packs assigned.
You can also configure thresholds to monitor the license usage of a product, a license pack, or a specific
service license. Thresholds can be applied for all Application Server clusters, for a specific Application
Server cluster, or for a specific service provider/enterprise.
NOTE: Since the support of the product is introduced to the Application Server license in Release 19.0,
there is no product information in the license usage reports for any Application Server running a previous
version (for example, Release 18.0).
Related information
NOTE: The frequency type can be daily, weekly, or monthly and within the range specified by Daily
Maintenance Window input boxes. It is recommended to schedule the License Collection Script to
run daily, during a low-traffic period.
9) Click Apply.
NOTE: If the maintenance task is already scheduled on the Application Server, the EMS overwrites
the current configuration and schedules the task with the new parameters if the Automatic Overrule
check box is selected.
NOTE: For more information on configuring a maintenance task, see Setting Up Maintenance Tasks
on page 376.
2) Configure the EMS to download data. By default, when the EMS applet configures the maintenance
task, it automatically schedules the gathering task at the same frequency as the maintenance task but
the scheduled time is two hours later to ensure that the EMS collects the last file created. The EMS
task that gathers the files is also configurable via the Web Client. For more information, see Configure
License Reporting on page 346.
NOTE: The creation of a license threshold is similar to a performance threshold; however, in addition,
information on the data to monitor must be entered.
To modify a threshold:
1) On the Threshold Configuration page, click the link of the name of the threshold to modify. The
Threshold Modify page appears.
2) Modify the threshold contents.
3) Click Submit to save these changes, Reset to reset the values to the previous settings, or Cancel to
return to the previous page.
To delete a threshold:
1) On the Threshold Configuration page, check the check box for the threshold to delete.
2) Click Delete. The threshold is removed from the list of thresholds.
Tasks to perform from this page
Value Type This drop-down list determines whether the threshold value is
absolute ("long") or a percentage.
Severity This drop-down list specifies the severity of the alarm generated
when the monitored value passes this threshold value. Values
include: "Minor", "Warning", "Clear", "Major", and "Critical".
Threshold type This drop-down list specifies the kind of operation applied on the
value. Values include "Max" and "Min".
Threshold Value This input box specifies the threshold value. Note that the
Rearm Value (the threshold value when the alarm is cleared)
is hard-coded. The Rearm Value equals Threshold Value – 1
when Threshold Type is set to "Max". The Rearm Value equals
Threshold Value + 1 when the Threshold Type is set to "Min".
Send Clear This input box determines whether "Clear" events are generated
on threshold reset from the drop-down list. If the value is set to
"False", when the threshold is reset (rearmed), no information
will be displayed on the Events page.
Message This input box specifies the text that is included in the alarm.
Clear Message This input box specifies the text that is included in the clear
event.
Service License Pack This input box determines whether the threshold is based on the
selected service license pack.
Service License This input box determines whether the threshold is based on the
selected service license.
Product This input box determines whether the threshold is based on the
selected product.
Report Format This input box identifies the format of the report. Valid values include: "HTML", "XML", "CSV", or
"PDF".
Date This drop-down list provides the ability to select the date on which the EMS takes the data to generate
the report. Valid values include all of the available dates for which the EMS has data. If the EMS has
not collected any data yet, thedrop-down list is empty and the other input boxes are disabled.
AS Cluster This drop-down list provides the ability to select the Application Server cluster. It is disabled until the
date is selected. Valid values include the list of all Application Server clusters for which the EMS has
data for the selected date. The value "ALL" displays a network report that contains the information of
all listed Application Server clusters.
Service Provider/ This input box provides the ability to select the service provider/enterprise. It is disabled until the
Enterprise Application Server cluster is selected and not set to "ALL". Auto completion is activated by pressing
the SPACEBAR when the cursor is in the input box. An empty value means that all service providers/
enterprises should be taken into account.
Group This input box provides the ability to select the group. It is disabled until a service provider/enterprise
is selected. Auto completion is activated by pressing the SPACEBAR when the cursor is in the input
box. An empty value means that all groups should be taken into account.
User This input box provides the ability to select the user. It is disabled until the group is selected. Auto
completion is activated by pressing the SPACEBAR when the cursor is in the input box. An empty
value means that all users should be taken into account.
Include Product Details This check box determines whether the Purchased Products Detail section of the report contains the
Service License Pack and Quantity columns. It is disabled if there is no product information in the
licenses. The validation is performed on the Application Server cluster on the selected date. When the
Application Server cluster is set to "ALL", at least one cluster must have the product information in the
licenses for this input box to be enabled. The default value is unchecked and the Purchased Products
Detail section of the report does not contain columns Service License Pack and Quantity.
Combine All AS Cluster This check box is only enabled when the Application Server cluster is set to "ALL". If checked, the
Report report is one combined report that sums up all Application Server cluster license values by service
license, subscriber license, trunking call capacity, and product. If unchecked, the report contains a list
of Application Server cluster license reports. The default value is unchecked for a separated report.
NOTE: For the Purchased Products Detail section of the report, only the Application Server clusters
that have product information in the license file are aggregated.
Include Single Service This check box determines whether the report contains the service license list of the service license
Usage Details packs. The default value is unchecked and the report does not contain the service licenses.
Report Name This input box displays the name of the periodic report. It is disabled until Periodic Report Generation
is checked.
Frequency Type This drop-down list provides the ability to select the frequency of the generation of the report. It
is disabled until Periodic Report Generation is checked. Valid values include: "Never", "Monthly",
"Weekly", and "Daily". The default value is "Never".
Frequency Value This input box provides the ability to select the day of the month, the week day, and the time of day
depending on the frequency type. It is disabled until Periodic Report Generation is checked. Valid
values include:
• Day of the Month: 1 through 31
• Week Day: Monday through Sunday
• Time of Day: 0:00 through 23:00
Mail Report This check box provides the ability to send the generated reports to an e-mail distribution list. The e-
mail distribution list is configured under Configure E-mail Distribution Lists on page 338.
14)To mail the report to an e-mail recipient, check the Mail Report check box and select the recipient from
the drop-down list.
15)Click Save to save these changes or Reset to reset the values to the previous settings.
For more information
To view the entire usage report, see HTML License – AS Cluster Report on page 465.
The information on this report includes the following:
Section Description
Header This section displays the date the report was generated and the selected values of the Application
Server cluster.
Purchased Products This section displays a summary of the consumption (percentage of licenses available) of
Dashboard purchased products in a bar chart format.
Purchased Products Detail This section displays the list of all products with the product name, the type, the number
of licenses purchased, the number of licenses used, the number of licenses available, the
percentage of licenses available, a breakdown of the list of licenses available in service license
packs, and the name and quantity of service license packs for each product.
Outlying Users This section displays the outlying users with the following columns: ServiceProvider/Enterprise,
Group, UserId, Reason, Details. The Reason column contains the name of the outlying category.
The Details column lists the applicable packs or products. Outlying users are listed in alphabetical
order based on the service provider/enterprise, group, user ID.
Not all outlying users are listed in the report. The configuration parameter, Outlying Users
Maximum Number, determines the maximum number of users listed. The value "0" is valid and
results in the suppression of the outlying user list in the report. In addition, the Outlying Users
section of the report is not shown if there is no product information in the licenses.
Subscriber Licenses This section displays the number of licenses, the number of licenses used, the number licenses
remaining, and the percentage of licenses remaining by user, trunk group, and group. Note that
the trunk group user does not count as a user license.
Trunking Call Capacity This section displays information on trunking call capacity. The Licensed column indicates the
maximum number of simultaneous trunk group calls that are allowed, that is, the license quantity
of Business Trunking License Units (BTLU). The Used, Available, and % Remaining columns
indicate the number of licenses used, the number licenses remaining, and the percentage of
licenses remaining, respectively. The first row displays trunking call capacity at the system level.
The remaining rows consist of a breakdown of the list for enterprises, service providers, and
groups. The calculation of used BTLUs (Trunking) is based on the following rules:
• The trunking call capacity licensed at the system level can be distributed (assigned) to
enterprise and service providers.
• Any trunking call capacity (in the number of calls) assigned to an enterprise directly consumes
the same number of BTLUs. This is independent from whether or not the trunking call capacity
is in turn assigned to groups of the enterprise.
• Any runking call capacity (in the number of calls) assigned to a service provider has no effect
on the consumption of BTLUs. This number limits the total amount of BTLUs that the service
provider can redistribute to its groups.
• Any trunking call capacity (in number of calls) assigned to a group of a service provider directly
consumes the same number of BTLUs.
Thus, the quantity of used BTLUs at the system level is as follows:
Used = sum (BTLUs assigned to enterprise) + sum (BTLUs assigned to group of a service
provider)
Group Service Licenses This section displays the list of all group license packs and services, including how many of each
are consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
User Service Licenses The section displays the hosted users and the trunk users. Both consume user licenses.
The Service column displays the list of services within the service license pack. When the Include Single
Service Usage Details check box is not checked, the list is not displayed and the only row displayed
shows the total of all services. In the example above, the check box was checked. The Licensed and
Available columns are only present when the report is constructed for one cluster or all clusters, but are not
displayed when the report is configured with a service provider/enterprise, group, or user selected.
To view a printable version of the report:
Click Printable View. The report appears in a new window in a printable format. You can print the report
from this window.
To view a PDF version of the report:
Click PDF View. The report appears in a new window in a PDF format. You can print the report from this
window.
Report Name This input box specifies the name of the report.
Report Format This drop-down list identifies the format of the report. Valid values include: "HTML", "XML", "CSV", or
"PDF".
Date This drop-down list provides the ability to select the date on which the EMS takes the data to generate
the report. Valid values include all of the available dates for which the EMS has data. If the EMS has
not collected any data yet, the drop-down list is empty and the other input boxes are disabled.
AS Cluster This drop-down list provides the ability to select the Application Server cluster. It is disabled until
the date is selected. Valid values include the list of all Application Server clusters for which the EMS
has data for the selected date. "ALL" is a possible value to display a network report that contains
information of all listed Application Server clusters.
Service Provider/ This input box provides the ability to select the service provider/enterprise. It is disabled until the
Enterprise Application Server cluster is selected and not set to "ALL". Auto completion is activated by pressing
the SPACEBAR when the cursor is in the input box. An empty value means that all service providers/
enterprises should be taken into account.
Group This input box provides the ability to select the group. It is disabled until a service provider/enterprise
is selected. Auto completion is activated by pressing the SPACEBAR when the cursor is in the input
box. An empty value means that all groups should be taken into account.
Reverse Lookup Level This drop-down list determines whether the report displays the list of clusters, enterprises, groups,
or users. Possible values include "AS Cluster", "Service Provider/Enterprise", "Group", and "User".
The possible values are automatically adjusted depending on whether an Application Server cluster,
service provider/enterprise, or group is selected in the previous input boxes.
Service License-based This input box provides the ability to include service licenses in a reverse lookup report. Click Edit to
Reverse Lookup select the service licenses to include in the reverse lookup from the Service Licenses Selection on
page 455 page.
Service License Pack- This input box provides the ability to include service license packs in a reverse lookup report. Click
based Reverse Lookup Edit to select the service license packs to include in the reverse lookup from the Service License
Packs Selection on page 457 page.
Frequency Type This drop-down list provides the ability to select the frequency of the generation of the report. It
is disabled until Periodic Report Generation is checked. Valid values include "Never", "Monthly",
"Weekly", and "Daily". The default value is "Never".
Frequency Value This input box provides the ability to select the day of the month, the week day, and the time of day
depending on the frequency type. It is disabled until Periodic Report Generation is checked. Valid
values include:
• Day of the Month: 1 through 31
• Week Day: Monday through Sunday
• Time of Day: 0:00 through 23:00.
Mail Report This input box provides the ability to send the generated reports to an e-mail distribution list. The e-
mail distribution list is configured under Configure E-mail Distribution Lists on page 338.
14)To mail the report to an e-mail recipient, check the Mail Report check box and select the recipient from
the drop-down list.
15)Click Save to save these changes or Reset to reset the values to the previous settings.
Available Service Licenses This list displays the service licenses that are available to report on.
Selected Service Licenses This list displays the services licenses that are included to report on.
Has One Of This section input box specifies that the report is based on one of the selected service licenses.
Otherwise, it is based on all of the selected service licenses.
NOTE: You can select more than one service at a time. Press Shift to select several services that
are sequentially listed or press Ctrl to select specific services.
b) To include any of the services in the report (as opposed to all the selected services), click Has One
Of.
2) Click Save to save the changes or click Cancel to disregard the modifications to this page. The
previous page appears.
Available Service License This list displays the service license packs that are available to report on.
Packs
Selected Service License This list displays the service license packs that are included to report on.
Packs
Has One Of This check box specifies that the report is based on one of the selected service license packs.
Otherwise, it is based on all of the selected service license packs.
To identify the service license packs to include in the Service License Pack-based Reverse Lookup
Report:
1) In the Available Service License Packs list, select the service license packs to include in the report:
a) Use the right arrow to move a service license pack to the Selected Service License Packs list.
b) To include any of the service license packs in the report (as opposed to all the selected service
license packs), check Has One Of.
2) Click Save to save the changes or click Cancel to disregard the modifications to this page. The
previous page appears.
Header This section displays the report-selected values for the date, Application Server cluster, and names
of the service licenses/service license packs.
Since it is possible to select multiple service licenses or service license packs, the EMS displays only the
first ten in the header and adds a "…" link that displays all of them.
The list of Application Server clusters, service providers/enterprises, groups, or users can be very long on
a reverse lookup report. The EMS displays the HTML report results on many pages with 50 items per page
separated in two columns. Possible options for the page length are "50", "100", "250", "500", and "1000".
To view a printable version of the report:
Click Printable View. The report appears in a new window in a printable format. You can print the report
from this window.
To view a PDF version of the report:
NOTE: Non-periodic reverse lookup reports can be accessed through the Reverse Lookup Results page.
For information on reverse lookup reports, see View Reverse Lookup Report Results on page 489.
Use this page to view periodic usage and reverse lookup reports.
Name This column displays the name of the periodic report. It is also a link to access the periodic report
configuration.
View Historical Reports This column displays a link to access the historical reports.
NOTE: The status of the report must be "Completed" to display a link to click.
To view a report:
1) On the Periodic Reports Results page, click the View link on the row of the report to display. The
Historical Report Management page appears.
2) Click the Date link on the row of the report to view. The Usage Report page displays the report.
To delete a report result:
1) On the Periodic Reports Results page, click the View link on the row of the report to display. The
Historical Report Management page appears.
2) Click the check box on the row of the report to delete.
3) Click Delete Report. The report is removed from the list of historical reports.
Header This section displays the date the report was generated and the selected values of the date,
Application Server cluster, service provider/enterprise, group, and user.
Purchased Products This section displays a summary of the consumption (percentage of licenses available) of
Dashboard purchased products in a bar chart format.
NOTE: This Purchased Products section only aggregates Application Server clusters that have
product information in license files.
Purchased Products Details This section displays the list of all products with the product name, the type, the number of licenses
purchased, the number of licenses used, the number of licenses available, the percentage of
licenses available, a breakdown of the list of licenses available in service license packs, and the
name and quantity of service license packs for each product.
Subscriber Licenses This section displays the number of licenses, the number of licenses used, the number licenses
remaining, and the percentage of licenses remaining by the user, trunk group, and group. Note that
the trunk group user does not count as a user license.
Trunking Call Capacity This section displays information on trunking call capacity. The Licensed column indicates the
maximum number of simultaneous trunk group calls that are allowed, that is, the license quantity
of Business Trunking License Units (BTLU). The Used, Available, and % Remaining columns
indicate the number of licenses used, the number licenses remaining, and the percentage of
licenses remaining, respectively. The first row displays trunking call capacity at the system level.
The remaining rows consist of a breakdown of the list for enterprises, service providers, and groups.
The calculation of used BTLUs (Trunking) is based on the following rules:
• The trunking call capacity licensed at the system level can be distributed (assigned) to
enterprise and service providers.
• Any trunking call capacity (in the number of calls) assigned to an enterprise directly consumes
the same number of BTLUs. This is independent from whether or not the trunking call capacity
is in turn assigned to groups of the enterprise.
• Any runking call capacity (in the number of calls) assigned to a service provider has no effect
on the consumption of BTLUs. This number limits the total amount of BTLUs that the service
provider can redistribute to its groups.
• Any trunking call capacity (in number of calls) assigned to a group of a service provider directly
consumes the same number of BTLUs.
Thus, the quantity of used BTLUs at the system level is as follows:
Used = sum (BTLUs assigned to enterprise) + sum (BTLUs assigned to group of a service provider)
Group Service Licenses This section displays the list of all group license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
User Service Licenses The section displays the hosted users and the trunk users. Both consume user licenses.
Header This section displays the date the report was generated and the selected values of the Application
Server cluster.
Purchased Products This section displays a summary of the consumption (percentage of licenses available) of
Dashboard purchased products in a bar chart format.
Purchased Products Detail This section displays the list of all products with the product name, the type, the number of licenses
purchased, the number of licenses used, the number of licenses available, the percentage of
licenses available, a breakdown of the list of licenses available in service license packs, and the
name and quantity of service license packs for each product.
Outlying Users This section displays the outlying users with following columns: ServiceProvider /Enterprise, Group,
UserId, Reason, Details. The Reason column contains the name of the outlying category. The
Details column lists the applicable packs or products. Not all outlying users are listed in the report.
The Outlying Users Maximum Number configuration parameter determines the maximum number of
users to be listed. The value "0" is valid and the result is that the outlying user list does not appear
in the report.
Subscriber Licenses This section displays the number of licenses, the number of licenses used, the number licenses
remaining, and the percentage of licenses remaining by user, trunk group, and group. Note that the
trunk group user does not count as a user license.
Trunking Call Capacity This section displays information on trunking call capacity. The Licensed column indicates the
maximum number of simultaneous trunk group calls that are allowed, that is, the license quantity
of Business Trunking License Units (BTLU). The Used, Available, and % Remaining columns
indicate the number of licenses used, the number licenses remaining, and the percentage of
licenses remaining, respectively. The first row displays trunking call capacity at the system level.
The remaining rows consist of a breakdown of the list for enterprises, service providers, and groups.
The calculation of used BTLUs (Trunking) is based on the following rules:
• The trunking call capacity licensed at the system level can be distributed (assigned) to
enterprise and service providers.
• Any trunking call capacity (in the number of calls) assigned to an enterprise directly consumes
the same number of BTLUs. This is independent from whether or not the trunking call capacity
is in turn assigned to groups of the enterprise.
• Any runking call capacity (in the number of calls) assigned to a service provider has no effect
on the consumption of BTLUs. This number limits the total amount of BTLUs that the service
provider can redistribute to its groups.
• Any trunking call capacity (in number of calls) assigned to a group of a service provider directly
consumes the same number of BTLUs.
Thus, the quantity of used BTLUs at the system level is as follows:
Used = sum (BTLUs assigned to enterprise) + sum (BTLUs assigned to group of a service provider)
Group Service Licenses This section displays the list of all group service license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
User Service Licenses The section displays the hosted users and the trunk users. Both consume user licenses.
Header This section displays the date the report was generated and the selected values of the date,
Application Server cluster, and service provider/enterprise.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed), in addition to the number used and how many are left. Note that the trunk
group user does not count as a user license.
Group Service Licenses This section displays the list of all group service license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs. It is not displayed when the report is generated for a
given user.
User Service Licenses The section displays the hosted users and the trunk users.
Header This section displays the date the report was generated and the selected values of the Application
Server cluster and group.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed), in addition to the number used and how many are left. Note that the trunk
group user does not count as a user license.
Group Service Licenses This section displays the list of all group service license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs. It is not displayed when the report is generated for a
given user.
Header This section displays the date the report was generated and the selected values of the date,
Application Server cluster, and user.
User Service Licenses The section displays the hosted and trunk users.
Header This section displays the date the report was generated and the selected values indicating the date,
Application Server cluster, service provider/enterprise, group, and user.
Purchased Products Detail This section displays the list of all products with the product name, the type, the number of licenses
purchased, the number of licenses used, the number of licenses available, the percentage of
licenses available, a breakdown of the list of licenses available in service license packs, and the
name and quantity of service license packs for each product.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed), in addition to the number used and how many are left. Note that the
trunk group user does not count as a user license.
Trunking Call Capacity TThis section displays information on trunking call capacity. The Licensed column indicates the
maximum number of simultaneous trunk group calls that are allowed, that is the quantity of Business
Trunking License Units (BTLU) licenses. The Used, Available, and % Remaining columns indicate
the number of licenses used, the number of licenses remaining, and the percentage of licenses
remaining. The first row displays the trunking call capacity at the system level. Additional rows
display the breakdown for enterprises, service providers, and groups.
The calculation of used BTLUs is based on the following rules:
• Any trunking call capacity licensed at the system-level can be distributed (assigned) to
enterprises and service providers.
• Any trunking call capacity (in number of calls) assigned to an enterprise directly consumes
the same number of BTLUs. This is independent of whether or not the trunking call capacity is
assigned to groups of the enterprise.
• Any trunking call capacity (in number of calls) assigned to a service provider has no effect on the
consumption of BTLUs. This number limits the total amount of BTLUs that the service provider
can redistribute to its groups.
• Any trunking call capacity (in number of calls) assigned to a group of a service provider directly
consumes the same number of BTLUs.
The quantity of used BTLUs at the system-level is:
Used = sum (BTLUs assigned to enterprise) + sum (BTLUs assigned to group within a service
provider)
Group Service Licenses This section displays the list of all group service license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
User Service Licenses The section displays the hosted users and the trunk users. Both consume user licenses.
Header This section displays the date the report was generated and the selected values of the Application
Server cluster.
Purchased Products Detail This section displays the list of all products with the product name, the type, the number of licenses
purchased, the number of licenses used, the number of licenses available, the percentage of
licenses available, a breakdown of the list of licenses available in service license packs, and the
name and quantity of service license packs for each product.
Outlying Users This section displays the outlying users with following columns: ServiceProvider/Enterprise, Group,
UserId, Reason, Details. The Reason column contains the name of the outlying category. The Details
column lists the applicable packs or products. Not all outlying users are listed in the report. The
Outlying Users Maximum Number configuration parameter determines the maximum number of
users to be listed. The value "0" is valid and the result is that it does not show the outlying user list in
the report.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed) in addition to the number used and how many are left. Note that the
trunk group user does not count as a user license.
Trunking Call Capacity This section displays information on trunking call capacity. The Licensed column indicates the
maximum number of simultaneous trunk group calls that are allowed, that is the quantity of Business
Trunking License Units (BTLU) licenses. The Used, Available, and % Remaining columns indicate
the number of licenses used, the number of licenses remaining, and the percentage of licenses
remaining. The first row displays the trunking call capacity at the system level. Additional rows
display the breakdown for enterprises, service providers, and groups.
The calculation of used BTLUs is based on the following rules:
• Any trunking call capacity licensed at the system-level can be distributed (assigned) to
enterprises and service providers.
• Any trunking call capacity (in number of calls) assigned to an enterprise directly consumes
the same number of BTLUs. This is independent of whether or not the trunking call capacity is
assigned to groups of the enterprise.
• Any trunking call capacity (in number of calls) assigned to a service provider has no effect on the
consumption of BTLUs. This number limits the total amount of BTLUs that the service provider
can redistribute to its groups.
• Any trunking call capacity (in number of calls) assigned to a group of a service provider directly
consumes the same number of BTLUs.
The quantity of used BTLUs at the system-level is:
Used = sum (BTLUs assigned to enterprise) + sum (BTLUs assigned to group within a service
provider)
Group Service Licenses This section displays the list of all group license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
User Service Licenses The section displays the hosted users and the trunk users. Both consume user licenses.
Header This section displays the date the report was generated and the selected values of the date,
Application Server cluster, and service provider/enterprise.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed), in addition to the number used and how many are left. Note that the trunk
group user does not count as a user license.
Group Service Licenses This section displays the list of all group license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs. It is not displayed when the report is generated for a
given user.
User Service Licenses The section displays the hosted users and the trunk users.
Header This section displays the date the report was generated and the selected values of the Application
Server cluster and group.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed), in addition to the number used and how many are left. Note that the trunk
group user does not count as a user license.
Group Service Licenses This section displays the list of all group service license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs. It is not displayed when the report is generated for a
given user.
Header This section displays the date the report was generated and the selected values of the date,
Application Server cluster, and user.
Purchased Products This section displays the list of all products and how many are consumed.
User Service Licenses The section displays the hosted and trunk users.
Header This section displays the date the report was generated and the selected values of the date,
Application Server cluster, service provider/enterprise, group, and user.
Utilization Zones This section displays the thresholds that trigger the presentation of the percentage remaining (of the
licenses and products) in the colors red, yellow, and green.
Products Utilization This section displays the file location of the bar chart images that present the percentage remaining
Dashboard File of the licenses and products.
Purchased License This section displays the list of all products with the product name, the type, the number of licenses
Definition purchased, the number of licenses used, the number of licenses available, the percentage of
licenses available, a breakdown of the list of licenses available in service license packs, and the
name and quantity of service license packs for each product.
Subscriber Licenses This section displays the number of licenses, the number of licenses used, the number licenses
remaining, and the percentage of licenses remaining by user, trunk group, and group. Note that the
trunk group user does not count as a user license.
Trunking Call Capacity This section displays information on trunking call capacity. The Licensed column indicates the
maximum number of simultaneous trunk group calls that are allowed, that is the quantity of Business
Trunking License Units (BTLU) licenses. The Used, Available, and % Remaining columns indicate
the number of licenses used, the number of licenses remaining, and the percentage of licenses
remaining. The first row displays the trunking call capacity at the system level. Additional rows
display the breakdown for enterprises, service providers, and groups.
The calculation of used BTLUs is based on the following rules:
• Any trunking call capacity licensed at the system-level can be distributed (assigned) to
enterprises and service providers.
• Any trunking call capacity (in number of calls) assigned to an enterprise directly consumes
the same number of BTLUs. This is independent of whether or not the trunking call capacity is
assigned to groups of the enterprise.
• Any trunking call capacity (in number of calls) assigned to a service provider has no effect on the
consumption of BTLUs. This number limits the total amount of BTLUs that the service provider
can redistribute to its groups.
• Any trunking call capacity (in number of calls) assigned to a group of a service provider directly
consumes the same number of BTLUs.
The quantity of used BTLUs at the system-level is:
Used = sum (BTLUs assigned to enterprise) + sum (BTLUs assigned to group within a service
provider)
Group Service Licenses This section displays the list of all group license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
User Service Licenses The section displays the hosted users and the trunk users. Both consume user licenses.
Header This section displays the date the report was generated and the selected values of the Application
Server cluster.
Utilization Zones This section displays the thresholds that trigger the presentation of the percentage remaining (of the
licenses and products) in the colors red, yellow, and green.
Products Utilization This section displays the file location of the bar chart images that present the percentage remaining
Dashboard File of the licenses and products.
Purchased License This section displays the list of all products with the product name, the type, the number of licenses
Definition purchased, the number of licenses used, the number of licenses available, the percentage of
licenses available, a breakdown of the list of licenses available in service license packs, and the
name and quantity of service license packs for each product.
Outlying Users This section displays the outlying users with following columns: ServiceProvider/Enterprise, Group,
UserId, Reason, Details. The Reason column contains the name of the outlying category. The Details
column lists the applicable packs or products. Not all outlying users are listed in the report. The
Outlying Users Maximum Number configuration parameter determines the maximum number of
users to be listed. The value "0" is valid and as a result does not show the outlying user list in the
report.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed) in addition to the number used and how many are left. Note that the trunk
group user does not count as a user license.
Trunking Call Capacity This section displays information on trunking call capacity. The Licensed column indicates the
maximum number of simultaneous trunk group calls that are allowed, that is the quantity of Business
Trunking License Units (BTLU) licenses. The Used, Available, and % Remaining columns indicate
the number of licenses used, the number of licenses remaining, and the percentage of licenses
remaining. The first row displays the trunking call capacity at the system level. Additional rows
display the breakdown for enterprises, service providers, and groups.
The calculation of used BTLUs is based on the following rules:
• Any trunking call capacity licensed at the system-level can be distributed (assigned) to
enterprises and service providers.
• Any trunking call capacity (in number of calls) assigned to an enterprise directly consumes
the same number of BTLUs. This is independent of whether or not the trunking call capacity is
assigned to groups of the enterprise.
• Any trunking call capacity (in number of calls) assigned to a service provider has no effect on the
consumption of BTLUs. This number limits the total amount of BTLUs that the service provider
can redistribute to its groups.
• Any trunking call capacity (in number of calls) assigned to a group of a service provider directly
consumes the same number of BTLUs.
The quantity of used BTLUs at the system-level is:
Used = sum (BTLUs assigned to enterprise) + sum (BTLUs assigned to group within a service
provider)
Group Service Licenses This section displays the list of all group license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs and services, including how many of each are
consumed. It is not displayed when the report is generated for a given user.
User Service Licenses The section displays the hosted users and the trunk users. Both consume user licenses.
Header This section displays the date the report was generated and the selected values of the date,
Application Server cluster, and service provider/enterprise.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed), in addition to the number used and how many are left. Note that the trunk
group user does not count as a user license.
Group Service Licenses This section displays the list of all group license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs. It is not displayed when the report is generated for a
given user.
User Service Licenses The section displays the hosted users and the trunk users.
Header This section displays the date the report was generated and the selected values of the Application
Server cluster and group.
Subscriber Licenses This section displays the number of user licenses, trunk group users, and group licenses that the
system can have (licensed), in addition to the number used and how many are left. Note that the trunk
group user does not count as a user license.
Group Service Licenses This section displays the list of all group license packs and services, including how many are
consumed. It is not displayed when the report is generated for a given user.
Virtual Service Licenses This section displays the virtual license packs. It is not displayed when the report is generated for a
given user.
Header This section displays the date the report was generated and the selected values of the date,
Application Server cluster, and user.
User Service Licenses The section displays the hosted and trunk users.
NOTE: There can only be one reverse lookup in progress at any time.
Use the Reverse Lookup Results page to display the list of all non-periodic reverse lookup reports.
Name This column displays the name of the reverse lookup report.
Date This column displays the date the report was generated.
Time Started This column displays the time of day the generation of the report began.
Status This column displays the status of the generation of the report.
NOTE: The status of the report must be "Completed" to display a link to click.
To delete a report:
1) On the Reverse Lookup Results page, to delete a report, click the check box for the report.
2) Click Delete. The report is removed from the list of reverse lookup results.
For more information
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the service providers in an Application Server cluster.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the groups in an Application Server cluster or for a service
provider.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the users in an Application Server cluster, service provider,
or group.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the service providers in an Application Server cluster.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the groups in an Application Server cluster or for a service
provider.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the users in an Application Server cluster, service provider,
or group.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the service providers in an Application Server cluster.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the groups in an Application Server cluster or for a service
provider.
Header This section displays the report-selected values for the date, Application Server cluster, and names of
the service licenses/service license packs.
NOTE: You can also create a report to include the Users in a Application Server cluster, service provider,
or group.
Header This section displays the report selected values for the date, Application Server cluster, and the
names of the service licenses/service license packs.