summaryrefslogtreecommitdiffstats
path: root/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault
diff options
context:
space:
mode:
authorBartek Grzybowski <b.grzybowski@partner.samsung.com>2020-03-20 14:34:13 +0100
committerBartek Grzybowski <b.grzybowski@partner.samsung.com>2020-03-23 07:47:18 +0000
commitac4ab50bdf312a1824388acbb9908c31f2b39c1a (patch)
tree599173be86ff68dabbfd619b35b2c2949b9df1c7 /vnfs/VES5.0/evel/evel-library/code/VESreporting_fault
parent06e584f80beaa11ff180ed0348202287574a208c (diff)
Pretty print json files in vnfs/
Fixing json files to conform to linter rules. Change-Id: I88556796ebf7737bc82db1ab0675b943061c6354 Issue-ID: INT-1482 Signed-off-by: Bartek Grzybowski <b.grzybowski@partner.samsung.com>
Diffstat (limited to 'vnfs/VES5.0/evel/evel-library/code/VESreporting_fault')
-rw-r--r--vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json135
1 files changed, 69 insertions, 66 deletions
diff --git a/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json b/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json
index efe892b0..7da5ecf4 100644
--- a/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json
+++ b/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json
@@ -1,71 +1,74 @@
{
- "tmp_directParameters": {
- "eventType": "applicationVnf",
- "nfcNamingCode": "AFX",
- "nfNamingCode": "AFX",
- "priority": "Low",
- "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
- "reportingEntityName": "ibcx0001vm002oam001",
- "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
- "sourceName": "scfx0001vm002cap001",
- "vfStatus": "Idle",
- "tmp_device": ["lo", "enp0s3", "docker0"]
-
+ "tmp_directParameters": {
+ "eventType": "applicationVnf",
+ "nfcNamingCode": "AFX",
+ "nfNamingCode": "AFX",
+ "priority": "Low",
+ "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
+ "reportingEntityName": "ibcx0001vm002oam001",
+ "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
+ "sourceName": "scfx0001vm002cap001",
+ "vfStatus": "Idle",
+ "tmp_device": [
+ "lo",
+ "enp0s3",
+ "docker0"
+ ]
},
"tmp_indirectParameters": {
- "tmp_faultInstance01": {
- "eventName": "Fault_vFirewall-AT&T_linkDownError",
- "eventCategory": "link",
- "eventSourceType": "router",
- "tmp_init":{
- "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
- "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
- "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
- "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
- },
- "alarmInterfaceA": "$tmp_device",
- "tmp_faultCheckInterval": 20,
- "tmp_lowWaterMark": 100,
- "tmp_command": {
- "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
- "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
- "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
- "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
- },
- "tmp_BytesIn": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
- "tmp_PacketsIn": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
- "tmp_BytesOut": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
- "tmp_PacketsOut": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
- "tmp_alarmSetParameters": {
- "specificProblem": "physical or logical connection to a remote router is down",
- "eventSeverity": "MAJOR",
- "alarmCondition": "link down trap_alarm"
- },
- "tmp_alarmClearParameters": {
- "specificProblem": "physical or logical connection to a remote router is up",
- "eventSeverity": "NORMAL",
- "alarmCondition": "link up trap_alarm"
- }
- },
- "tmp_faultInstance02": {
- "eventName": "Fault_vFirewall-AT&T_serviceDownError",
- "alarmInterfaceA": "afx@input.service",
- "eventCategory": "other",
- "eventSourceType": "virtualMachine",
- "tmp_faultCheckInterval": 10,
- "tmp_command": {
- "tmp_cmd1": "/bin/systemctl is-active afx@input* |grep -E 'inactive|failed' | wc -l"
- },
- "tmp_alarmSetParameters": {
- "specificProblem": "service is down",
- "eventSeverity": "MAJOR",
- "alarmCondition": "service down trap_alarm"
- },
- "tmp_alarmClearParameters": {
- "specificProblem": "service is up",
- "eventSeverity": "NORMAL",
- "alarmCondition": "service up trap_alarm"
- }
- }
+ "tmp_faultInstance01": {
+ "eventName": "Fault_vFirewall-AT&T_linkDownError",
+ "eventCategory": "link",
+ "eventSourceType": "router",
+ "tmp_init": {
+ "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
+ "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
+ "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
+ "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
+ },
+ "alarmInterfaceA": "$tmp_device",
+ "tmp_faultCheckInterval": 20,
+ "tmp_lowWaterMark": 100,
+ "tmp_command": {
+ "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
+ "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
+ "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
+ "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
+ },
+ "tmp_BytesIn": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
+ "tmp_PacketsIn": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
+ "tmp_BytesOut": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
+ "tmp_PacketsOut": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
+ "tmp_alarmSetParameters": {
+ "specificProblem": "physical or logical connection to a remote router is down",
+ "eventSeverity": "MAJOR",
+ "alarmCondition": "link down trap_alarm"
+ },
+ "tmp_alarmClearParameters": {
+ "specificProblem": "physical or logical connection to a remote router is up",
+ "eventSeverity": "NORMAL",
+ "alarmCondition": "link up trap_alarm"
+ }
+ },
+ "tmp_faultInstance02": {
+ "eventName": "Fault_vFirewall-AT&T_serviceDownError",
+ "alarmInterfaceA": "afx@input.service",
+ "eventCategory": "other",
+ "eventSourceType": "virtualMachine",
+ "tmp_faultCheckInterval": 10,
+ "tmp_command": {
+ "tmp_cmd1": "/bin/systemctl is-active afx@input* |grep -E 'inactive|failed' | wc -l"
+ },
+ "tmp_alarmSetParameters": {
+ "specificProblem": "service is down",
+ "eventSeverity": "MAJOR",
+ "alarmCondition": "service down trap_alarm"
+ },
+ "tmp_alarmClearParameters": {
+ "specificProblem": "service is up",
+ "eventSeverity": "NORMAL",
+ "alarmCondition": "service up trap_alarm"
+ }
+ }
}
}