aboutsummaryrefslogtreecommitdiffstats
path: root/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json
blob: 90654ef5e26334d28028f8481f81a9b912b96d99 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
{
   "tmp_directParameters": {
       "eventType": "applicationVnf",
       "nfcNamingCode": "AFX",
       "nfNamingCode": "AFX",
       "priority": "Low",
       "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
       "reportingEntityName": "ibcx0001vm002oam001",
       "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
       "sourceName": "scfx0001vm002cap001",
       "vfStatus": "Idle",
       "tmp_device": ["lo", "enp0s3", "docker0"]

    },
    "tmp_indirectParameters":   [
       "tmp_faultInstance01": {
          "eventName": "Fault_vFirewall-AT&T_linkDownError",
          "eventCategory": "link",
          "eventSourceType": "router",
          "tmp_init":{
      	       "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
               "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10", 
               "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3", 
               "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11" 
          },
          "alarmInterfaceA": "$tmp_device",
          "tmp_faultCheckInterval": 20,
          "tmp_lowWaterMark": 100,
          "tmp_command": {
               "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2", 
               "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10", 
               "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3", 
               "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11" 
          },
          "tmp_BytesIn": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
          "tmp_PacketsIn": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
          "tmp_BytesOut": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
          "tmp_PacketsOut": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
          "tmp_alarmSetParameters": {
               "specificProblem": "physical or logical connection to a remote router is down",
               "eventSeverity": "MAJOR",
               "alarmCondition": "link down trap_alarm"
          },
          "tmp_alarmClearParameters": {
               "specificProblem": "physical or logical connection to a remote router is up",
               "eventSeverity": "NORMAL",
               "alarmCondition": "link up trap_alarm"
          }
       },
       "tmp_faultInstance02": {
          "eventName": "Fault_vFirewall-AT&T_serviceDownError",
          "alarmInterfaceA": "afx@input.service",
          "eventCategory": "other",
          "eventSourceType": "virtualMachine",
          "tmp_faultCheckInterval": 10,
          "tmp_command": {
               "tmp_cmd1": "/bin/systemctl is-active afx@input* |grep -E 'inactive|failed' | wc -l"
          },
          "tmp_alarmSetParameters": {
               "specificProblem": "service is down",
               "eventSeverity": "MAJOR",
               "alarmCondition": "service down trap_alarm"
          },
          "tmp_alarmClearParameters": {
               "specificProblem": "service is up",
               "eventSeverity": "NORMAL",
               "alarmCondition": "service up trap_alarm"
          }
       }
   ]
}