With the Event Browser in Cisco UGM, you can identify all faults, also known as alarm events and take appropriate action to resolve them quickly and efficiently; in addition, you can forward user-specified SNMP traps to any configured remote host, and continuously export all alarm events, as they are raised, to a user-specified text file.
Trap handling in Cisco UGM is handled by the ASFaultStandAlone process, and constitutes the main function of the fault management component. A standalone process is started by sysmgr which restarts it in case of a crash.
Monitored Events
Alarm events are generated from these sources:
Incoming (supported) SNMP traps from managed devices.
Internal traps generated by Cisco UGM itself.
You can use the Event Browser to view alarm events raised against a device object; various filtering criteria are provided by the Query Editor.
Note Only SNMP traps from
managed devices are reported by Cisco UGM; traps from any other
unsupported device are discarded. Cisco UGM identifies incoming traps as
originating from managed devices by matching the trap source IP address with
the IP address of the managed device. Moreover, the set of supported
traps is predefined and nonconfigurable.
The Map Viewer shows all managed device objects with current alarms. These alarm events are indicated by colored dots next to the objects in the Map Viewer tree, and also by the color and appearance of object device icons in the Map Viewer (right) pane.
Color Identification of Alarms
In the Map Viewer tree, you can see raised alarm events by the presence of colored dots next to tree objects and by object icons in the Map Viewer pane.
The dots are color coded to reflect the following severity levels (highest to lowest): critical, major, minor, warning, informational, and normal.
The defined color coding is:
Red = Critical
Orange = Major
Yellow = Minor
Cyan = Warning
White = Informational
Green = Normal (no events)
Objects and Icons Representing Device States
The icons in this table are specific to Cisco UGM only.
Table 7-3 Cisco UGM Objects and Icons
Icon
Device State and Appearance
Decommissioned.
Diagonal lines through the object.
Deploying
Green outline with diagonal lines through the object; arrow icon in upper left corner.
Errored
Orange outline; explosive icon in upper left corner.
Initializing
Green outline with diagonal lines through the object; lock icon and arrow icon on upper side.
Normal
Green outline.
Reload
Green outline; clipboard icon in upper left corner.
Alarms Generated by Commissioning or Decommissioning Objects
A device or card object can be in either commissioned or decommissioned state within Cisco UGM.
If an object is in a commissioned state, most alarm events against that object are propagated to the physical tree in the Map Viewer and appear in the parent objects at the region level.
For decommissioned objects, alarm events are not propagated up to the physical tree in the Map Viewer.
Table 7-1 describes Cisco UGM alarm events, their severity, explanation, and recovery procedures.
Clearing Alarm Events
If you manually clear an alarm event for an object in the Event Browser, that object appears in the Map Viewer with an alarm notification reflecting the next highest alarm present for that object (assuming that there is more than one alarm for the object).
Cisco UGM does not generate all alarm events again, even if the alarm conditions are still present; therefore, be cautious in clearing alarm events.
Tip You can view cleared alarm events in the Event History.
Step 1 In the Map Viewer, note the color of the status dots to represent the occurrence of alarm events against the objects.
Step 2 Right-click the object whose list of alarm events you want to view and choose Tools > Open Event Browser.
You can acknowledge and clear individual alarm events by clicking the appropriate box next to each event.
Tip To clear a large number of events, click the first event, press the Shift key, and click on the last event you wish to remove. Then click Clear Events.
Overview of the Event Browser
You can start the Event Browser from the Launchpad or from the pop-up menu for the individual object within Map Viewer.
With the Event Browser, you can perform these tasks:
Query (filter) events
Sort events
Acknowledge events
Clear events
Start services on events
You can see all eventsregardless of your access privilege. The events are color coded to the corresponding alarm. (See "Color Identification of Alarms" section, and the Cisco Element Management Framework User Guide.
In the Event Browser window, you can check the Ack (acknowledge) box next to an event to communicate to other users that you are planning to deal with that particular event. When you resolve the event, click the Clear box.
Note Only the most severe alarm event against an object appears on its icon within
Map Viewer.
You can view additional alarm details by using the Event browser. For more information, refer to the Cisco Element Management Framework User's Guide.
Using the Event Browser
Step 1 In the Map Viewer, note the color coding of status dots to represent the occurrence of alarm events against the objects.
Step 2 Right-click the object whose list of alarm events you want to view and choose Tools > Open Event Browser.
Using the Query Editor
If you do not want to view all events in the system, set up a query by using the Query Editor to view only specific events.
The criteria that you use to specify a query are on individual tabs. The Event Browser is updated with only those events that match the query criteria. A progress bar when the event browser is opened indicates that Cisco UGM is querying events and the window is being updated.
Caution Any changes that you make to a query are not stored when you exit the Event Browser.
If you have specified different queries, you can open more than one Event Browser session at a time.
For details about the Query Editor refer to the Cisco Element Manager Framework User's Guide.
To access the Query Editor from the Event Browser, choose Edit > Query Setup.
Overview of Trap Forwarding
Note Cisco UGM enables you to select frequency of data polling and SNMP trap
forwarding destinations. When making these selections, consider the number
of managed ports and devices in your network, and be aware that your
selections affect system performance and scalability.
Cisco UGM monitors UDP port 162 for all SNMPv1 and v2c traps sent from managed devices configured to send traps to this port, and then forwards the traps to the specified host destinations.
Cisco UGM forwards SNMP v1 and v2 traps to multiple remote hosts, but SNMP v2 traps are forwarded as SNMP v1 traps.
For each remote host, configure a list of trap specifiers that identify specific SNMP traps (consisting of Enterprise ID, Generic ID, and Specific ID).
Cisco UGM maintains a list of host destinations that you define. Also define specific SNMP traps for each host destination.
Enter a wildcard (*) for any field of a trap specifier.
Add new remote hosts or new trap specifiers by using the Trap Forwarding Deployment Wizard.
Update existing remote hosts or trap specifier fields by using the Trap Forwarding Properties Dialog box.
Delete existing remote hosts or trap specifiers from the Map Viewer.
Click Accept Saved Setting (in the Trap Forwarding Properties Dialog box) for trap forwarding changes to take effect.
Specifying New Trap Forwarding Hosts
By using the Trap Forwarding Deployment Wizard, you can:
Deploy host destinations and traps.
Specify host destinations and traps to be forwarded.
Step 2 Follow the instructions provided by the Deployment wizard.
Step 3 In the Map viewer window, choose ASEMSConfig > Trap Forwarding > Trap Forwarding Properties.
Step 4 Click the Save icon from the dialog toolbar, or choose File > Save.
Step 5 To enable trap forwarding, click Accept Saved Setting.
Specifying New Trap Specifiers for a Trap Forwarding Host
Step 1 From the Map Viewer, open ASEMSConfig.
Step 2 Expand the Trap Forwarding tree by clicking on the + (plus) sign.
Step 3 Open the Trap Specifiers Deployment Wizard.
Step 4 Right-click the host destination for which you wish to add a new trap specifier and select Deploy Trap Specifiers.
Step 5 Follow the instructions provided by the Deployment wizard.
Step 6 In the Map Viewer, choose ASEMSConfig > Trap Forwarding > Trap Forwarding Properties.
Step 7 Click the Save icon from the dialog toolbar, or choose File > Save.
Step 8 To update trap forwarding, click Accept Saved Setting.
Trap forwarding reflects any changes made (and saved) in this dialog box. Any previously specified trap forwarding settings are replaced.
Changing Previously Specified Trap Forwarding Data
Step 1 In the Map Viewer, choose ASEMSConfig > Trap Forwarding > Trap Forwarding Properties.
Step 2 Enter your changes.
Step 3 Click the Save icon from the dialog toolbar, or choose File > Save.
Step 4 To update trap forwarding, click Accept Saved Setting.
Trap forwarding reflects any changes made (and saved) in this dialog box. Any previously specified trap forwarding settings are replaced.
Removing Previously Specified Trap Forwarding Data
Step 1 From the Map Viewer, open ASEMSConfig.
Step 2 Expand the Trap Forwarding tree by clicking the + (plus) sign.
Step 3 Expand any listed host destination by clicking the + (plus) sign.
Step 4 Right-click the object to be deleted (a host destination, or a specific trap specifier for a given host destination) and choose Deployment > Delete Objects.
Step 5 In the Map Viewer, choose ASEMSConfig > Trap Forwarding > Trap Forwarding Properties.
Step 6 Click the Save icon from the dialog toolbar, or choose File > Save.
Step 7 To update trap forwarding, click Accept Saved Setting.
Trap forwarding reflects any changes made (and saved) in this dialog box. Any previously specified trap forwarding settings are replaced.
Tip To deactivate or disable all trap forwarding, you must delete all host destinations, click Save, and click Accept Saved Setting.
To resume trap forwarding, re-enter the host destinations.
Tables 7-4 through 7-8 provide detailed information about SNMP v1 traps handled by Cisco UGM. Each trap is uniquely identified by Enterprise ID, Generic ID, and Specific ID.
Table 7-4 Cisco AS5300 Trap Mapping
Class Mapping
Enterprise
Generic ID
Specific ID
Alarm Severity
ciscoColdStart
1.3.6.1.4.1.9.1.162
0
0
warning
ciscoWarmStart
1.3.6.1.4.1.9.1.162
1
0
warning
ciscoLinkDown
1.3.6.1.4.1.9.1.162
2
0
major
ciscoLinkUp
1.3.6.1.4.1.9.1.162
3
0
normal
ciscoAuthenticationFailure
1.3.6.1.4.1.9.1.162
4
0
major
Table 7-5 Cisco AS5350 Trap Mapping
Class Mapping
Enterprise
Generic ID
Specific ID
Alarm Severity
ciscoColdStart
1.3.6.1.4.1.9.1.313
0
0
warning
ciscoWarmStart
1.3.6.1.4.1.9.1.313
1
0
warning
ciscoLinkDown
1.3.6.1.4.1.9.1.313
2
0
major
ciscoLinkUp
1.3.6.1.4.1.9.1.313
3
0
normal
ciscoAuthenticationFailure
1.3.6.1.4.1.9.1.313
4
0
major
Table 7-6 Cisco AS5400 Trap Mapping
Class Mapping
Enterprise
Generic ID
Specific ID
Alarm Severity
ciscoColdStart
1.3.6.1.4.1.9.1.274
0
0
warning
ciscoWarmStart
1.3.6.1.4.1.9.1.274
1
0
warning
ciscoLinkDown
1.3.6.1.4.1.9.1.274
2
0
major
ciscoLinkUp
1.3.6.1.4.1.9.1.274
3
0
normal
ciscoAuthenticationFailure
1.3.6.1.4.1.9.1.274
4
0
major
Table 7-7 Cisco AS5800 Trap Mapping
Class Mapping
Enterprise
Generic ID
Specific ID
Alarm Severity
ciscoColdStart
1.3.6.1.4.1.9.1.188
0
0
warning
ciscoWarmStart
1.3.6.1.4.1.9.1.188
1
0
warning
ciscoLinkDown
1.3.6.1.4.1.9.1.188
2
0
major
ciscoLinkUp
1.3.6.1.4.1.9.1.188
3
0
normal
ciscoAuthenticationFailure
1.3.6.1.4.1.9.1.188
4
0
major
Table 7-8 Cisco AS5850 Trap Mapping
Class Mapping
Enterprise
Generic ID
Specific ID
Alarm Severity
ciscoColdStart
1.3.6.1.4.1.9.1.308
0
0
warning
ciscoWarmStart
1.3.6.1.4.1.9.1.308
1
0
warning
ciscoLinkDown
1.3.6.1.4.1.9.1.308
2
0
major
ciscoLinkUp
1.3.6.1.4.1.9.1.308
3
0
normal
ciscoAuthenticationFailure
1.3.6.1.4.1.9.1.308
4
0
major
Table 7-9 provides detailed information about SNMP v2 traps handled by Cisco UGM.
Table 7-9 SNMP V2 Trap Mapping
Class Mapping
Enterprise
Generic ID
Specific ID
Alarm Severity
ciscoColdStart
1.3.6.1.6.3.1.1.5.1
-1
-1
warning
ciscoWarmStart
1.3.6.1.6.3.1.1.5.2
-1
-1
warning
ciscoLinkDown
1.3.6.1.6.3.1.1.5.3
-1
-1
major
ciscoLinkUp
1.3.6.1.6.3.1.1.5.4
-1
-1
normal
ciscoAuthenticationFailure
1.3.6.1.6.3.1.1.5.5
-1
-1
major
cardInserted
1.3.6.1.4.1.9.9.117.2
6
3
warning
cardRemoved
1.3.6.1.4.1.9.9.117.2
6
4
warning
redC5800StatusChange
1.3.6.1.4.1.9.9.105.2.0.1
6
1
warning
redRFStatusChange
1.3.6.1.4.1.9.9.176.2.0.2
6
2
warning
flashCopyCompletion
1.3.6.1.4.1.9.9.10.1.3.0.1
-1
-1
normal
envMonShutdown
1.3.6.1.4.1.9.9.13.3
6
1
critical
envMonVoltage
1.3.6.1.4.1.9.9.13.3
6
2
major
envMonTemperature
1.3.6.1.4.1.9.9.13.3
6
3
major
envMonFan
1.3.6.1.4.1.9.9.13.3
6
4
major
envMonRedundantSupply
1.3.6.1.4.1.9.9.13.3
6
5
major
Overview of Exporting Alarm Events
With Cisco UGM, you can capture and export all alarm data to an ASCII text file; this file can then be examined locally by an external system or retrieved by an external system by using File Transfer Protocol (FTP). The external system is responsible for parsing the contents of this file.
Exporting SNMP traps consists of capturing traps from managed devices and writing them to a text file.
Note Internally generated Cisco UGM alarm events cannot be forwarded through
SNMP; you can export these alarm events by writing them to the ASCII text
file.
Exporting Alarm Events to a File
Step 1 From the Map viewer choose ASEMSConfig > File Export > Open File Export Properties.
Step 2 Click the Alarm tab.
Step 3 In the Export Type field, select Continuous.
Step 4 Enter a storage path for the file.
Step 5 Select an action to be performed when file aging occurs:
noneDisables aging; File Age and Aging Directory fields are ignored.
deleteDeletes the aged file from the disk.
moveMoves the aged file into aging directory.
moveTarCompressCompresses the aged file, and then adds it to the FileExport.tar file which, if it does not already exist, is created in the Aging Directory.
Step 6 Specify the maximum size (in KBytes) of a file before the selected aging action begins. When the maximum file size is reached, export then continues to the newly created file.
Step 7 Specify where the file is moved to (or moveTarCompressed to) when aging occurs.
If you enter a non-existent directory path, it is automatically created; if the path exists, Cisco UGM starts writing data to this location.
This field does not apply to the delete aging action.
The directory string that you enter must end with a trailing / (forward slash).
If the Action field is set to moveTarCompress, a tar file named FileExport.tar is created in the Aging Directory for the aged files.
Step 8 Click Save:
Saves user-specified data.
Changes are validated and applied to the system (if valid).
Generates an Action Report containing results of this action.