aboutsummaryrefslogtreecommitdiffstats
path: root/vnfs/VES5.0/evel/evel-library/code
diff options
context:
space:
mode:
Diffstat (limited to 'vnfs/VES5.0/evel/evel-library/code')
-rw-r--r--vnfs/VES5.0/evel/evel-library/code/VESreporting_HB/hb_config.json20
-rw-r--r--vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json135
-rw-r--r--vnfs/VES5.0/evel/evel-library/code/VESreporting_syslog/syslog_config.json34
-rw-r--r--vnfs/VES5.0/evel/evel-library/code/VESreporting_vFW/meas_config.json89
4 files changed, 142 insertions, 136 deletions
diff --git a/vnfs/VES5.0/evel/evel-library/code/VESreporting_HB/hb_config.json b/vnfs/VES5.0/evel/evel-library/code/VESreporting_HB/hb_config.json
index db32d2db..66e3c928 100644
--- a/vnfs/VES5.0/evel/evel-library/code/VESreporting_HB/hb_config.json
+++ b/vnfs/VES5.0/evel/evel-library/code/VESreporting_HB/hb_config.json
@@ -1,13 +1,13 @@
{
- "tmp_directParameters": {
- "eventType": "platform",
- "eventName": "Heartbeat_VNF-AT&T_heartbeat",
- "nfcNamingCode": "ssc",
- "nfNamingCode": "scfx",
- "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
- "reportingEntityName": "ibcx0001vm002oam001",
- "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
- "sourceName": "scfx0001vm002cap001",
- "heartbeatInterval": 10
+ "tmp_directParameters": {
+ "eventType": "platform",
+ "eventName": "Heartbeat_VNF-AT&T_heartbeat",
+ "nfcNamingCode": "ssc",
+ "nfNamingCode": "scfx",
+ "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
+ "reportingEntityName": "ibcx0001vm002oam001",
+ "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
+ "sourceName": "scfx0001vm002cap001",
+ "heartbeatInterval": 10
}
}
diff --git a/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json b/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json
index efe892b0..7da5ecf4 100644
--- a/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json
+++ b/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json
@@ -1,71 +1,74 @@
{
- "tmp_directParameters": {
- "eventType": "applicationVnf",
- "nfcNamingCode": "AFX",
- "nfNamingCode": "AFX",
- "priority": "Low",
- "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
- "reportingEntityName": "ibcx0001vm002oam001",
- "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
- "sourceName": "scfx0001vm002cap001",
- "vfStatus": "Idle",
- "tmp_device": ["lo", "enp0s3", "docker0"]
-
+ "tmp_directParameters": {
+ "eventType": "applicationVnf",
+ "nfcNamingCode": "AFX",
+ "nfNamingCode": "AFX",
+ "priority": "Low",
+ "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
+ "reportingEntityName": "ibcx0001vm002oam001",
+ "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
+ "sourceName": "scfx0001vm002cap001",
+ "vfStatus": "Idle",
+ "tmp_device": [
+ "lo",
+ "enp0s3",
+ "docker0"
+ ]
},
"tmp_indirectParameters": {
- "tmp_faultInstance01": {
- "eventName": "Fault_vFirewall-AT&T_linkDownError",
- "eventCategory": "link",
- "eventSourceType": "router",
- "tmp_init":{
- "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
- "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
- "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
- "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
- },
- "alarmInterfaceA": "$tmp_device",
- "tmp_faultCheckInterval": 20,
- "tmp_lowWaterMark": 100,
- "tmp_command": {
- "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
- "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
- "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
- "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
- },
- "tmp_BytesIn": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
- "tmp_PacketsIn": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
- "tmp_BytesOut": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
- "tmp_PacketsOut": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
- "tmp_alarmSetParameters": {
- "specificProblem": "physical or logical connection to a remote router is down",
- "eventSeverity": "MAJOR",
- "alarmCondition": "link down trap_alarm"
- },
- "tmp_alarmClearParameters": {
- "specificProblem": "physical or logical connection to a remote router is up",
- "eventSeverity": "NORMAL",
- "alarmCondition": "link up trap_alarm"
- }
- },
- "tmp_faultInstance02": {
- "eventName": "Fault_vFirewall-AT&T_serviceDownError",
- "alarmInterfaceA": "afx@input.service",
- "eventCategory": "other",
- "eventSourceType": "virtualMachine",
- "tmp_faultCheckInterval": 10,
- "tmp_command": {
- "tmp_cmd1": "/bin/systemctl is-active afx@input* |grep -E 'inactive|failed' | wc -l"
- },
- "tmp_alarmSetParameters": {
- "specificProblem": "service is down",
- "eventSeverity": "MAJOR",
- "alarmCondition": "service down trap_alarm"
- },
- "tmp_alarmClearParameters": {
- "specificProblem": "service is up",
- "eventSeverity": "NORMAL",
- "alarmCondition": "service up trap_alarm"
- }
- }
+ "tmp_faultInstance01": {
+ "eventName": "Fault_vFirewall-AT&T_linkDownError",
+ "eventCategory": "link",
+ "eventSourceType": "router",
+ "tmp_init": {
+ "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
+ "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
+ "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
+ "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
+ },
+ "alarmInterfaceA": "$tmp_device",
+ "tmp_faultCheckInterval": 20,
+ "tmp_lowWaterMark": 100,
+ "tmp_command": {
+ "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
+ "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
+ "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
+ "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
+ },
+ "tmp_BytesIn": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
+ "tmp_PacketsIn": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
+ "tmp_BytesOut": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
+ "tmp_PacketsOut": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
+ "tmp_alarmSetParameters": {
+ "specificProblem": "physical or logical connection to a remote router is down",
+ "eventSeverity": "MAJOR",
+ "alarmCondition": "link down trap_alarm"
+ },
+ "tmp_alarmClearParameters": {
+ "specificProblem": "physical or logical connection to a remote router is up",
+ "eventSeverity": "NORMAL",
+ "alarmCondition": "link up trap_alarm"
+ }
+ },
+ "tmp_faultInstance02": {
+ "eventName": "Fault_vFirewall-AT&T_serviceDownError",
+ "alarmInterfaceA": "afx@input.service",
+ "eventCategory": "other",
+ "eventSourceType": "virtualMachine",
+ "tmp_faultCheckInterval": 10,
+ "tmp_command": {
+ "tmp_cmd1": "/bin/systemctl is-active afx@input* |grep -E 'inactive|failed' | wc -l"
+ },
+ "tmp_alarmSetParameters": {
+ "specificProblem": "service is down",
+ "eventSeverity": "MAJOR",
+ "alarmCondition": "service down trap_alarm"
+ },
+ "tmp_alarmClearParameters": {
+ "specificProblem": "service is up",
+ "eventSeverity": "NORMAL",
+ "alarmCondition": "service up trap_alarm"
+ }
+ }
}
}
diff --git a/vnfs/VES5.0/evel/evel-library/code/VESreporting_syslog/syslog_config.json b/vnfs/VES5.0/evel/evel-library/code/VESreporting_syslog/syslog_config.json
index 6a434e43..a4250107 100644
--- a/vnfs/VES5.0/evel/evel-library/code/VESreporting_syslog/syslog_config.json
+++ b/vnfs/VES5.0/evel/evel-library/code/VESreporting_syslog/syslog_config.json
@@ -1,20 +1,20 @@
{
- "tmp_directParameters": {
- "eventName": "syslog_vFirewall-AT&T_connectionReset",
- "eventType": "applicationVnf",
- "nfcNamingCode": "AFX",
- "nfNamingCode": "AFX",
- "nfVendorName": "AT&T",
- "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
- "reportingEntityName": "ibcx0001vm002oam001",
- "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
- "sourceName": "scfx0001vm002cap001",
- "timeZoneOffset": "UTC-05:30",
- "eventSourceType": "virtualMachine",
- "syslogProc": "vSyslog",
- "syslogTag": "peer reset"
+ "tmp_directParameters": {
+ "eventName": "syslog_vFirewall-AT&T_connectionReset",
+ "eventType": "applicationVnf",
+ "nfcNamingCode": "AFX",
+ "nfNamingCode": "AFX",
+ "nfVendorName": "AT&T",
+ "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
+ "reportingEntityName": "ibcx0001vm002oam001",
+ "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
+ "sourceName": "scfx0001vm002cap001",
+ "timeZoneOffset": "UTC-05:30",
+ "eventSourceType": "virtualMachine",
+ "syslogProc": "vSyslog",
+ "syslogTag": "peer reset"
},
- "tmp_indirectParameters": {
- "tmp_syslogFile": "/var/log/syslog"
- }
+ "tmp_indirectParameters": {
+ "tmp_syslogFile": "/var/log/syslog"
+ }
}
diff --git a/vnfs/VES5.0/evel/evel-library/code/VESreporting_vFW/meas_config.json b/vnfs/VES5.0/evel/evel-library/code/VESreporting_vFW/meas_config.json
index 14f98650..4fd5621d 100644
--- a/vnfs/VES5.0/evel/evel-library/code/VESreporting_vFW/meas_config.json
+++ b/vnfs/VES5.0/evel/evel-library/code/VESreporting_vFW/meas_config.json
@@ -1,50 +1,53 @@
{
- "tmp_directParameters": {
- "eventName": "Measurement_vFirewall-AT&T_nicPerformance",
- "eventType": "applicationVnf",
- "nfcNamingCode": "AFX",
- "nfNamingCode": "AFX",
- "priority": "Low",
- "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
- "reportingEntityName": "ibcx0001vm002oam001",
- "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
- "sourceName": "scfx0001vm002cap001",
- "measurementInterval": 20,
- "tmp_device": ["lo", "enp0s3", "docker0"]
-
+ "tmp_directParameters": {
+ "eventName": "Measurement_vFirewall-AT&T_nicPerformance",
+ "eventType": "applicationVnf",
+ "nfcNamingCode": "AFX",
+ "nfNamingCode": "AFX",
+ "priority": "Low",
+ "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
+ "reportingEntityName": "ibcx0001vm002oam001",
+ "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
+ "sourceName": "scfx0001vm002cap001",
+ "measurementInterval": 20,
+ "tmp_device": [
+ "lo",
+ "enp0s3",
+ "docker0"
+ ]
},
- "tmp_indirectParameters": {
- "tmp_init":{
- "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
- "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
- "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
- "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
- },
- "vNicPerformance": {
- "tmp_vnic_command": {
- "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
- "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
- "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
- "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
- },
- "receivedOctetsDelta": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
- "receivedTotalPacketsDelta": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
- "transmittedOctetsDelta": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
- "transmittedTotalPacketsDelta": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
- "valuesAreSuspect": "true",
- "vNicIdentifier": "$tmp_device"
- },
- "cpuUsage": {
- "tmp_cpuuse_command": {
+ "tmp_indirectParameters": {
+ "tmp_init": {
+ "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
+ "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
+ "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
+ "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
+ },
+ "vNicPerformance": {
+ "tmp_vnic_command": {
+ "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
+ "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
+ "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
+ "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
+ },
+ "receivedOctetsDelta": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
+ "receivedTotalPacketsDelta": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
+ "transmittedOctetsDelta": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
+ "transmittedTotalPacketsDelta": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
+ "valuesAreSuspect": "true",
+ "vNicIdentifier": "$tmp_device"
+ },
+ "cpuUsage": {
+ "tmp_cpuuse_command": {
"tmp_cpuUseCmd": "/usr/bin/top -bn 2 -d 0.01 | grep '^%Cpu' | tail -n 1 | cut -d ':' -f2",
"tmp_cpuIdle": "/usr/bin/top -bn 2 -d 0.01 | grep '^%Cpu' | tail -n 1 |cut -d ':' -f2 | cut -d ',' -f4 | cut -b 1-5",
"tmp_cpuUsageSystem": "/usr/bin/top -bn 2 -d 0.01 | grep '^%Cpu' | tail -n 1 |cut -d ':' -f2 | cut -d ',' -f2 | cut -b 1-5",
"tmp_cpuUsageUser": "/usr/bin/top -bn 2 -d 0.01 | grep '^%Cpu' | tail -n 1 |cut -d ':' -f2 | cut -d ',' -f1 | cut -b 1-5"
- },
- "cpuIdentifier": "Cpu1",
- "cpuIdle": "$tmp_cpuIdle",
- "cpuUsageSystem": "$tmp_cpuUsageSystem",
- "cpuUsageUser": "$tmp_cpuUsageUser"
- }
- }
+ },
+ "cpuIdentifier": "Cpu1",
+ "cpuIdle": "$tmp_cpuIdle",
+ "cpuUsageSystem": "$tmp_cpuUsageSystem",
+ "cpuUsageUser": "$tmp_cpuUsageUser"
+ }
+ }
}