aboutsummaryrefslogtreecommitdiffstats
path: root/vnfs/VES5.0/evel/evel-library/code/VESreporting_fault/flt_config.json
blob: 7da5ecf43731b47979b15e785b21def9f95aed17 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
{
    "tmp_directParameters": {
        "eventType": "applicationVnf",
        "nfcNamingCode": "AFX",
        "nfNamingCode": "AFX",
        "priority": "Low",
        "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
        "reportingEntityName": "ibcx0001vm002oam001",
        "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
        "sourceName": "scfx0001vm002cap001",
        "vfStatus": "Idle",
        "tmp_device": [
            "lo",
            "enp0s3",
            "docker0"
        ]
    },
    "tmp_indirectParameters": {
        "tmp_faultInstance01": {
            "eventName": "Fault_vFirewall-AT&T_linkDownError",
            "eventCategory": "link",
            "eventSourceType": "router",
            "tmp_init": {
                "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
                "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
                "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
                "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
            },
            "alarmInterfaceA": "$tmp_device",
            "tmp_faultCheckInterval": 20,
            "tmp_lowWaterMark": 100,
            "tmp_command": {
                "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
                "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10",
                "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3",
                "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11"
            },
            "tmp_BytesIn": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
            "tmp_PacketsIn": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
            "tmp_BytesOut": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
            "tmp_PacketsOut": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
            "tmp_alarmSetParameters": {
                "specificProblem": "physical or logical connection to a remote router is down",
                "eventSeverity": "MAJOR",
                "alarmCondition": "link down trap_alarm"
            },
            "tmp_alarmClearParameters": {
                "specificProblem": "physical or logical connection to a remote router is up",
                "eventSeverity": "NORMAL",
                "alarmCondition": "link up trap_alarm"
            }
        },
        "tmp_faultInstance02": {
            "eventName": "Fault_vFirewall-AT&T_serviceDownError",
            "alarmInterfaceA": "afx@input.service",
            "eventCategory": "other",
            "eventSourceType": "virtualMachine",
            "tmp_faultCheckInterval": 10,
            "tmp_command": {
                "tmp_cmd1": "/bin/systemctl is-active afx@input* |grep -E 'inactive|failed' | wc -l"
            },
            "tmp_alarmSetParameters": {
                "specificProblem": "service is down",
                "eventSeverity": "MAJOR",
                "alarmCondition": "service down trap_alarm"
            },
            "tmp_alarmClearParameters": {
                "specificProblem": "service is up",
                "eventSeverity": "NORMAL",
                "alarmCondition": "service up trap_alarm"
            }
        }
    }
}