Professional Documents
Culture Documents
Imanager U2000 Administration Training PDF
Imanager U2000 Administration Training PDF
Trademarks
HUAWEI, C&C08, EAST8000, HONET, ViewPoint, Intess, ETS, DMC,
TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium,
M900/M1800,
TELESIGHT, Quidview, Musa, Airbridge, Tellwin, Inmedia, VRP, DOPRA,
iTELLIN, HUAWEI OptiX, C&C08 iNET, NETENGINE, Optix, SoftX, iSite, USYS, iMUSE, OpenEye, Lansway, SmartAX are trademarks of Huawei
Technologies Co., Ltd.
All other trademarks mentioned in this manual are the property of their respective
holders.
Notice
The information in this manual is subject to change without notice, every effort
has been made in the preparation of this manual to ensure accuracy of the
contents, but all statements, information, and recommendations in this manual do
not constitute a warranty of any kind, express or implied.
Huawei Technologies
TABLE OF CONTENT
CONTENT
OptiX iManager U2000 CORBA Interface
OptiX iManager U2000 SNMP Interface
iManager U2000 V100R002 Security and Data Management
P-0
P-1
P-2
P-3
As a model and standard of software development, the Common Object Request Broker
Architecture (CORBA) provides necessary services and toolkit to develop software.
The CORBA northbound interface (NBI) functions to integrate the distributed software at the
element management layer with that at the network management layer.
The CORBA NBI has the following features:
Complying with the CORBA 2.3 specification of the Object Management Group (OMG) and
supporting the IIOP 1.1 and IIOP 1.2.
Adopting the standard CORBA Naming Service 1.1 and Notification Service 1.0.
The current version that uses The ACE ORB (TAO) 1.3 is highly efficient. Capable of being
smoothly transplanted to other ORB platforms.
It supports the interconnection between different ORB platforms, including:
IONA Orbix2000
IONA Orbix 6.1
InterBus
JacORB
Borland VisiBroker
Borland BES
P-4
The CORBA NBI complies with the following standards recommended by the Tele
Management Forum (TMF):
TMF 513 V2.1
TMF 608 V2.1
TMF 814 V2.0 (IDL V2.1)
P-5
Network element (NE): It refers to the device in the network. The NE reports alarms to
the element management system (EMS) .
EMS: The network devices provided by Huawei can be managed by the iManager
U2000. The iManager U2000 is at the EMS layer and interconnects with the thirdparty NMS through the NBI.
NMS: It refers to the NMS of a carrier.
CORBA NBI: It provides an interface for the superior NMS to access the EMS.
Querying the Current Alarms of the EMS and All NEs in Real-Time
This function allows the superior NMS to deploy services such as SDH, WDM path
creation, active, deactive, delete, etc.
This function allows the superior NMS to query the resource information such as the
main type of EMS resource, topology information of EMS, etc.
Service deployment
This function allows the EMS to report the resource changing information to the
superior NMS .
Resource querying
This function allows the superior NMS to synchronize alarm information with the EMS.
This function allows the superior NMS to set the filtering rules for the EMS or NE
alarms and set the alarm severity levels, event type, and device type to filter the
alarms.
Alarm Synchronization
This function allows the superior NMS to query the current alarms of the EMS and all
NEs and set alarm severity levels to filter the alarms. The filter for the notification
service does not affect the query result. The current alarm refers to a fault alarm that is
uncleared and unacknowledged, uncleared but acknowledged, or cleared but
unacknowledged. NMS can obtain the real-time alarms of the EMS and NEs. The EMS
detects the alarms returned to the caller. The NMS needs to perform this task
periodically to obtain the real-time alarms.
Filtering Alarms
P-6
This function allows the superior NMS to query the current performance data.
This function allows the superior NMS to query the historical performance data.
Confidential Information of Huawei. No Spreading Without Permission
P-7
P-8
There are three parts of the CORBA interface: standard naming service, notifying
service and CORBA agent.
Naming service: provides the interface for the OSS to access the U2000 CORBA. The
uniqueness of the name of the EMS must be guaranteed in the NMS management
domain.
Notifying service: is responsible for the adding/deleting events monitoring, receiving
alarm/performance/report.
CORBA agent: transform the internal data of U2000 to the CORBA data complying
with the international standard and transform the request from OSS to the internal
data of U2000 to guarantee the integration of OSS and U2000.
P-9
IDL: Interface Definition Language. IDL is not a programming language and its only
purpose is to allow the CORBA interface being defined as a programming language
independent mode, and allow the inter-operation of applications programmed with
different languages. IDL can not be programmed and compiled, and is only applicable
to describe the CORBA interface and define the data type of the objects.
Language mapping defines how to translate the IDL file into different programming
languages. The third party software can be used such as TAO, JacORB. Huawei
uses TAO to translate CORBA language into C++.
NMS and EMS invoke functions such as getNEName{} to query and report alarm,
resource, and performance information.
P-10
P-11
When OSS connects to U2000, U2000 establishes a session between them. U2000
performs the ping every 30 seconds and if there is no reply to the ping for 4 times,
U2000 will abort the session; meanwhile, U2000 sends a heartbeat notifying message
to OSS every 30 seconds.
P-12
getAllManagedElements: Query the NE resource information of the EMS and all NEs
getAllActiveAlarms: Query the current alarms of the EMS and all NEs
getAllCurrentPMData: Query the current performance data of the EMS and all NEs
NT_ALARM: Alarm notifying
P-13
P-14
P-15
P-16
Click the MSUITE icon on the desktop or click the program below:
%MSUITE%\engineering\ startclient.bat.
Enter the IP address and the user name, password to login MSUITE.
After login, select NBI > Configure CORBA Interface Instance from the main
menu to configure the CORBA NBI parameters.
Note:
If you need to install CORBA component, select Deploy > Add Component
from MSUITE to add CORBA NBI. After that, you should restart U2000 server.
P-17
SSL Mode
Naming service SSL port: 22001
Notify service SSL port: 22002
CORBA Agent SSL port: 22003
P-18
P-19
P-20
P-21
P-22
P-23
P-24
P-25
P-26
P-27
P-28
P-29
P-0
P-1
P-2
At the beginning, the network and service are simple. We can use ICMP and Ping
command to manage and monitor the network. As time went by, the Ping command
cannot manage the network. How to develop the new NMS protocol which is easy to
the maintenance engineer is the next step for R&D. In this background SNMP (Simple
Network Management Protocol) is developed.
P-3
SNMPv3 is not widely supported, U2000 can support all the versions.
P-4
Many telecom level equipment support SNMP, such as Huawei Access and IP
equipment. If we enable the SNMP function, and then the U2000 is server for the
equipment. In this case, SNMP is a southbound interface for U2000.
Actually, SNMP is a type of NBI of U2000, which will transfer data to higher layer
OSS.
The relationship between SNMP and COBRA:
The basic function of SNMP and COBRA is to report the information to upper
level NMS;
SNMP is protocol which is applied between NMS and EMS or EMS and NEs;
but COBRA is only applied between NMS and EMS;
OSS
Operating Support System
Agent
P-5
Process which run on the managed equipments or low level NMS (U2000).
When it receive the requirement from the OSS, the Agent will give response.
The main function is collecting the status information of the NEs, the realizing
the remote operation from the NMS to NEs, and sending the alarm message
to the OSS.
MIB
SNMP NBI is the communication protocol between the OSS and Agent, it includes
two parts:
OSS;
SNMP Agent.
P-6
SNMP is divided into NMS U2000 and AGENT. U2000, the NMS sends request to
Agent. Agent is a process or task residing in managed equipment. When Agent
receives the enquiry packet from the NMS, it performs decoding analysis and gets
value of management variable from relevant modules. Then it generates Response
message, sends the packet back to the NMS after it is encoded.
SNMP is the application layer protocol that defines the transfer of management
information between NMS and Agent.
P-7
To simplify the development of the Agent side, SNMP only defines two kinds of
operations --- Get and Set. Get is used to obtain management information from
managed equipment. And Set is used to configure managed equipment via setting
the value of variable.
NMS and Agent transfer management information to each other via packet. And
SNMP V1 only defines five kinds of packets:
Get Request packet: Used to get the value of specified management variable.
GetNext Request packet: Used to continuously get the values of a group of
variables.
GetResponse packet: Used to respond request, return value for request or
error type, etc.
Set Request packet: Used to set the specified management variable.
Trap packet: Used for managed equipment to send information to NMS
initiatively in urgent cases.
GetRequest and GetNextRequest are used to obtain information of the managed
object in NM. SetRequest is used to configure the managed object. These three kinds
of requests correspond with three kinds of SNMP messages. Agent responds them
via sending GetResponse message.
Trap is generated by Agent. It is used to report abnormal event of the managed
equipment to the NM. Agent will send Trap to notify NM when equipment gives alarm
or important data is changed by user/console/other NMs. When SNMP Manager
receives the Trap, relevant actions will be initiated, such as diagnosing fault via
polling, adopting recovery measures, modifying relevant database of the NM.
P-8
SNMP is base on TCP/IP, and it is in the application layer of TCP/IP. SNMP provides
one simple command set for communication, and it use UDP to send and receive
massage between NMS and Agent.
Normally:
P-9
The OSS will send message to Agent, such as request operations, after the
Agent receive the message, at first, it will check the version, community and
operation objective of SNMP message. If they are matched, the Agent will give
the feedback message and report what the OSS want to know.
In emergency:
Such as the NIC port is down and repaired, and then the Agent will send
TRAP message to OSS to establish the link again.
P-10
1. The agent receives an SNMP request packet from the NM station through UDP
port 161.
2. The agent decodes the packet based on ASN.1 basic coding rules and represents
it in an internal data structure. The agent discards the packet if there is a decoding
failure.
3. The agent gets the version number from the packet. The agent discards the packet
if the version is inconsistent with the SNMP version it supports.
4. The agent gets the community name from the packet. The community name is filled
by the NM station that sends the request. If the community name is inconsistent with
that of the agent, the packet is discarded. A trap message or an Inform packet is
generated simultaneously.
5. The agent gets PDUs from the authenticated ASN.1 object. If the agent fails to get
the PDUs, the agent discards the packet; otherwise, the agent processes the PDUs.
6. The agent processes PDUs differently and gets the management variables of the
corresponding protocol modules by searching nodes that correspond to management
variables in the MIB.
7. The agent encapsulates the values of management variables in a PDU, uses the
source IP address and port of the request packet as the destination IP address and
port, and adds the SNMP version number. A response packet is then generated. After
being coded, the response packet is sent to the NM station.
P-11
P-12
Click the MSUITE icon on the desktop or click the program below:
%MSUITE%\engineering\ startclient.bat.
Enter the IP address and the user name, password to login MSUITE.
After login, select NBI > Configure SNMP Interface Instance from the main
menu to configure the SNMP NBI parameters.
Note:
If you need to install SNMP component, select Deploy > Add Component
from MSUITE to add SNMP NBI. After that, you should restart U2000 server.
P-13
Description
Value
Send Trap
address
IP address
Default: U2000
server IP address
Send Trap
Port
1 to 65535
Default: 982
Receive
Request
from NMS
address
IP address
Default: U2000
server IP address
Receive
Request
from NMS
Port
1 to 65535
Recommended
value: >1024
Default: 9812
P-14
Input the OSS Receive Trap Address and Port, etc. The default port is 6666.
The following table lists the description and the value of the parameters.
Name
Description
Value
NMS Receive
Trap Address
IP address
Default: OSS IP
address
Port
1-65535
Default: 6666
Read /Write
Community
The default
read/write
community is
public/private. You
can also enter any
character string
consisting of 255
characters at most.
Heartbeat Settings
Other Settings
P-15
P-16
After we add the SNMP Agent instant, we can start and stop the process by right
click on the process.
Entrance
P-17
In the Default Access Protocol Parameters tab, click the SNMP version tab to
switch to the page for configuring protocol parameters.
Configure the NE SNMP parameter template as follows:
Click Add. After setting all the parameters in the parameter setting
area at the bottom of the window, click OK.
Note: After configure the template, you can select and apply them when creating or
discovering the NEs.
18
For U2000 SBI, we need to configure on U2000 and configure SNMP parameters in
the managed equipment, such as DSLAM and Router.
If the parameters are the same. The SNMP interface will work normal.
P-19
Pre-configuration Tasks
Before Configuring, complete the following tasks:
Assigning an IP address to the router
Configuring the routing protocol to make the router and the NM Station
accessible
snmp-agent
The SNMP agent function is enabled.
snmp-agent sys-info version all
The SNMP version is configured.
By default, only SNMPv3 is configured.
snmp-agent mib-view { excluded | included } view-name oid-tree
A MIB view is created.
snmp-agent community { read | write } community-name mib-view view-name
MIB-view-based access control is configured.
snmp-agent trap enable [ Trap-type [ Trap-list ] ]
The router is enabled to send alarms.
In the VRP system, alarms generated by the interface-name-change, port
and standard are enabled through the snmp-agent trap enable command.
snmp-agent target-host trap address udp-domain ip-address [ udp-port portnumber | vpn-instance vpn-intance-name ] params securityname security-string [
v1 | v2c | v3 [ authentication | privacy ]]
The destination host of trap messages is configured.
Note: At present, the VRP does not support the configuration of sending trap
messages to the IPv6-based VPN.
snmp-agent trap source interface-type interface-number
The source interface to send Trap messages is configured.
Note: The source interface to send trap messages configured on the router must be
the same as that configured on the NM Station; otherwise, the NM Station discards
trap messages because of unmatched addresses.
Confidential Information of Huawei. No Spreading Without Permission
P-20
P-21
P-22
For more detailed steps, please refer Northbound SNMP Interface User Guide
(U2000 V100R002C01)
P-23
P-24
P-25
Index
Maximum concurrent
NMS connections
10
Alarm Forwarding
capacity
P-26
P-0
P-1
P-2
P-3
P-4
security management strategy: The security management function provides the rolebased and domain-based management for the U2000 and NEs. With this function, the
U2000 can also monitor in real time the users that already log in to the U2000 and
NEs. In this way, the network and data security ensures that login failures or illegal
operations are captured.
After installing U2000 on Solaris platform, there will be three system users: root,
sybase, nmsuser. Usually we use nmsuser to log in the JDE and start U2000 server.
P-5
root: this user is the super user of the OS and it has the highest authority in the
system. The root user is used to create other users with relevant authorities.
The default password of root is rootkit.
sybase: this user is the database operation user. It is responsible for setting
Sybase environment variables, installing, maintaining and managing the
Sybase database, As the owner of the directory /opt/sybase, the sybase user
can manage the Sybase database, for example, configuring Sybase
environment variables and starting/stopping the Sybase service.
nmsuser: During the U2000 installation, the software creates a nmsuser user
of the operating system automatically. The nmsuser user is responsible for
setting environment variables of the U2000 server and starting the U2000
server. The nmsuser user has all the rights of its home directory. The
file .profile in this directory records environment variables for the U2000
running.
After database initialization, there are two default users: sa and NMSuser.
P-6
The logs include the U2000 security log, the U2000 operation log, the system logs
and the NE log. The logs record operations performed by operators to the U2000 or
an NE.
Security logs record the security operations that the user performs in the
U2000, for example, login, logout, locking, and unlocking. By viewing the logs,
an administrator can track and check the security operations of the users.
Operation logs record the information about the non-security operations that
the user performs in the U2000, for example, creating subnets, and muting
and unmuting the alarm sound. By viewing the logs, an administrator can track
and check the user operations.
System logs record the operations or tasks that the U2000 performs
automatically, for example, scheduled tasks and system tasks.
The NE syslog running logs record the running information of U2000 NEs. By
obtaining all NE syslog running logs from NEs through the U2000, you can
view the NE syslog running logs managed by the U2000 through the U2000,
instead of viewing the NE syslog running logs on each NE.
P-7
Procedure:
Choose Administration > Log Management > Query Operation Logs. You can also
select Query System Logs or Query Security Logs to browse system or security logs.
In the Filter window as follows, set the filtering conditions, and then click OK.
Right-click in the query window and perform the operations listed in the picture.
P-8
Procedure:
P-9
Dump log can avoid that the logs reach the maximum storage capacity of the
database and that the system performance is degraded.
There are three types of dump: scheduled dump, manual dump and overflow dump.
Choose Administration > Task Schedule > Task Management from the
main menu.
In the Task Management window, select Database Capacity Management
in the navigation tree.
Double-click the Operation Log Dump task in the task list. You can configure
the timing dump parameters as follows and the presentation. The file type
support CSV and XML.
P-10
In the network planning, you can configure and plan the data transmission according
to certain network security isolation policy. In this way, you can ensure the security
and reliability of the network and data of the U2000 system, and avoid illegal login
and data loss or theft.
P-11
Procedure:
On the computer of the U2000 client, double-click the U2000 Client icon on
the desktop
Indicates that the connection between the U2000 and client is not
encrypted.
Indicates that the connection between the U2000 and client is encrypted.
Indicates that both the situations when the connection between the U2000
and client is encrypted or is not encrypted are supported.
P-12
The ACL (Access Control List) is a secure access control mechanism. It restricts a
user to log in to the server through only the clients with the specified IP addresses.
Procedure:
Choose Administration > NMS Security > ACL from the Main Menu. The ACL
dialog box is displayed
Click Add and the New System Access Control Item box is displayed
Procedure:
P-13
Choose Administration > NMS Security > NMS User Management from the
Main Menu.
In the NMS User Management area, double-click Users and select a desired
user.
In the right-hand pane, click the ACL Settings tab.
Select Use all the ACLs in the system or Use the specified ACLs according to
requirements.
Click Set ACL and the ACL dialog box is displayed.
NOTES:
If you select Use System ACL, the U2000 user can log in to the clients
corresponding to all IP addresses or network segments in the list by default.
If you select Use User ACL, you need to select an IP address or network
segment of the client that the U2000 user can log in.
P-14
Procedure:
Click Add and the New System Access Control Item dialog box is displayed.
P-15
Procedure:
Optional: If Use the specified ACLs is selected, you need to check the Access
Permitted check box corresponding to the IP address or network segment.
Click Apply.
P-16
P-17
Procedure:
Choose Administration > NMS Security > Security Policies from the Main
Menu. The Security Policy dialog box is displayed
In the Security Policy dialog box, click the Password Policy tab.
Set the basic and advanced parameters of the password policy as required.
Click OK.
In the Security Policy dialog box, click the Account Policy tab.
Click OK.
Procedure:
P-18
P-19
The U2000 remote maintenance function allows login to the U2000 server from a
remote client. Strict management for the remote maintenance user not only ensures
U2000 system security, but also makes maintenance operations easier.
Procedure:
Set the Operation Authority. You can select Query or Configuration as needed
Click OK
P-20
By DCN or other types, you can access the U2000 server by remote maintenance
user. Then maintenance command can be done by this function.
Input the user and password, then the windows display as the slide;
P-21
User: The user name and password of a U2000 user identifies the U2000
management rights entitled to the user. When a user is added to a user group, the
user has all the operation rights of this user group. The U2000 provides a default user:
admin. It is the super user of the system and has a higher authority than the system
administrator group. You can neither modify the rights of the user admin, nor add user
admin to other user groups.
Procedure:
Choose Administration > NMS Security > NMS User Management from the
Main Menu
In the NMS User Management area, double-click Users, right-click and choose
New User from the shortcut menu
Complete the information in the New User dialog box
For network maintenance purposes, you can create U2000 users and assign different
authorities to them. Apart from user admin, all the users to operate the U2000 need to
create corresponding accounts, that is, the U2000 user accounts.
P-22
You can specify the user group of a U2000 user so that the user can have the
management rights and operation rights of the user group.
Usually, we assign the user with certain user authorities by adding the user to a user
group rather than assigning specific authorities for the user.
Procedure:
Choose Administration > NMS Security > NMS User Management from the
Main Menu
In the NMS User Management area, double-click Users and select a desired
user
Click Add and the Add User Groups dialog box is displayed
P-23
User Group: This is a collection of the U2000 users that have the same management
rights. The default user groups are maintainer group, manager group, monitor group,
operator group and security manager. The attributes of the user groups include name,
description, member and authority.
Procedure:
Choose Administration > NMS Security > NMS User Management from the
Main Menu.
In the NMS User Management area, double-click User Group, right-click and
choose New User Group from the shortcut menu. In the New User Group
dialog box that is displayed, input the information of a new user group.
Click OK.
P-24
After creating a U2000 user, you assign the user with certain user authorities
by adding the user to a user group rather than assigning specific authorities for
the user.
If the user authorities are limited, and the user cannot perform certain
operations after the user is added to a default user group, you can create user
group. After adding authorities to this user group, you can assign the user to
this new user group.
In practice, you may need to add or delete specific authorities for a user
without creating new user groups. In this case, follow the rules below.
P-25
Procedure:
Choose Administration > NMS Security > NMS User Management from the
Main Menu.
In the NMS User Management area, right-click Operation Set and choose New
Operation Set from the shortcut menu.
In the New Operation Set dialog box displayed, input the information of a new
operation set.
Click the Members tab. Check the Select button (display in the slide) or Copy
member from operation button to add members to the operation set.
Click OK.
P-26
Procedure:
Choose Administration > NMS Security > NMS User Management from the
Main Menu
In the NMS User Management area, click Object Set, right-click and choose
New Object Set from the shortcut menu
In the New Object Set dialog box that is displayed, input the information of a
new equipment set
Click the Members tab. Check the Select button (display in the slide) or Copy
members from object button to add device to the object set.
Click OK.
P-27
Procedure
Choose Administration > NMS Security > NMS User Management from the
Main Menu
In the NMS User Management area, double-click User Groups, and select a
U2000 user group
Optional: Select one or more desired operation authorities and click Delete
Click Select and the Select Operation Rights dialog box is displayed
Click OK
P-28
Procedure:
Choose Administration > NMS Security > NMS User Management from the
main menu
In the NMS User Management navigation tree, expand the User Groups node,
and then select a user group
Click the Domain tab to view the managed domain of the user group
Click Select button. In the Select Domain dialog box, select the devices and
object sets.
Click OK
P-29
P-30
You can back up and restore the U2000 data in two ways: Back up and restore all
data in U2000 databases, and back up and restore the U2000 network configuration
data by using scripts.
The following data is not backed up when you back up the U2000 database:
Characteristics
Application Scenario
Backing up and
restoring all data
in the U2000
databases
Backing up and
restoring the
U2000 network
configuration data
by using the script
files
P-31
All the operations about backup and restoration are implemented via backup
server
P-32
Back up is a method used to store important data to prevent the damage of the
original data. You can back up network configuration data, alarm data and
performance data.
Dump is a method used to store the log information in databases as operating system
files in text format, to clear database space. The dumped objects are various types of
logs, including alarm events, abnormal events, operation logs and different types of
performance events.
Procedure :
P-33
Choose Administration > Back Up/Restore NMS Data > Database Backup
from the Main Menu
Set a backup directory for the server, and click Backup. The U2000 starts to
back up the database. A progress bar is displayed showing the status of the
operation.
Procedure:
P-34
P-35
# cd /opt/HWENGR/engineering
# ./startclient.sh
In Windows, access the C:\HWENGR\engineering path, and then run
the startclient.bat file.
2. Log in to the MSuite. The default user name and password are both admin.
3. Select Back Up and Restore -> Back Up System Data.
Procedure for Restore:
1. Shut down U2000 client and server.
2. Start the U2000 MSuite, login MSuite client.
3. On the NMS maintenance tool client, choose Backup and Restore >
Restore System Data.
4. Select the backup file and click Next.
5. The system starts the restoration preprocessing and data restoration, and
displays the restoration progress in a progress bar. Wait patiently.
6. After the backup is complete, click Finish.
7. Start U2000 server and client.
Prerequisite for backup:
On UNIX and Linux, the current user is root and the Sybase database must be
started.
On Windows, the current user must have the administrator authority of the
operating system. The MS SQL database server must also be started.
6. Set the backup path on the local server. Then click Next.
P-36
7. The system starts the backup preprocessing and data backup process. A
progress bar is displayed to show the backup progress. Wait patiently.
8. After the backup is complete, click Finish.
2. Log in to the client. The default user name and password are both admin.
4. Click Next.
P-37
5. The system starts initializing the database and displays the initialization
progress in a progress bar. Wait patiently.
6. After the initialization is complete, click Finish
P-38
This method is usually used to upgrade the U2000 and to back up and restore the
basic configuration data for a single NE. This method also restores the user-defined
data. The new U2000 version is compatible with the scripts of the old version.
Procedure:
Select a file format. Then select a script file type from the Script File Type field
Select the NE for which you want to export script files from the Export NE List
Click Create File Directory to create a directory where the exported script files
are to be saved
Choose Administration > Back Up/ Restore NMS Data > Import/Export Script
File from the Main Menu
In the Confirm dialog box, click OK. A progress bar appears showing the
status of the export
NOTES:
The script file is saved on the U2000 server. On Windows, the backup
directory is \U2000\server\script; on UNIX, the backup directory is
/opt/U2000/server/script. You can create a new directory under it.
Procedure:
P-39
Choose Administration > Back Up/ Restore NMS Data > Import/Export Script
File from the Main Menu.
Click the Import option button.
Select the file format and select the script file type from the Script File Type
field.
In the Operation Directory List, select the directory where the script file is to be
imported is located.
Select the script file to import from the Import File List.
Click Apply. The system prompts you twice that the import of the configuration
script will result in data inconsistency between the U2000 and the NE.
Click OK. A progress bar appears showing the status of the import.
NOTES:
Before importing the script file, it is better to back up the U2000 database.
Procedure:
Choose Administration > Task Schedule > Task Management from the main
menu.
In the Task Management window, select Database Capacity Management,
Manual Dump or Overflow Dump in the navigation tree.
Double-click the task in the task list. You can configure the dump parameters
as the presentation. The file type support CSV and XML.
overflow dump :It is performed when the logs in the databases reach the maximum
storage capacity. You can specify the number of logs to dump.
P-40
Maximum Capacity : The maximum piece of data that can be saved when the
U2000 server works normally. If exceeded, the overflow occurs
scheduled dump : It is the alternative method of overflow dump, is optional. You can
set whether to create a scheduled task, and if you create a scheduled task you can
specify the schedule time and duration.
Overflow dump and periodic dump can work together. In this case, the U2000 dumps
the data or log according to the settings of overflow dump and periodic dump.
During the routine maintenance of the U2000, you can clear the unwanted log data to
save spaces for the computer.
Notes: Clearing the U2000 log data will directly delete the log data from the
database. This affects the fault location in future. You are recommended to
clear the database space by dumping.
Confidential Information of Huawei. No Spreading Without Permission
P-41
P-42
and
Data
Table of Contents
Task 1 Starting and Shutting Down U2000 .............................................................................................. 1
1.1
1.2
1.1.2
1.2.2
Task 2 Starting and Shutting Down U2000 (Solaris HA System) Optional .................................... 5
1.1
1.2
1.2
1.3
1.4
1.5
1.2
1.3
1.4
1.5
1.6
1.7
Testing the Communication between the U2000 and the GNE ....................................... 18
1.8
Check the communication status between the U2000 and a non-gateway NE........ 18
Confidential Information of Huawei.
1.8.2
and
Data
Check the communication status between the U2000 and the GNE. ...................... 19
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.1.2
ii
1.2
1.3
1.4
and
Data
1.2.2
1.3.2
1.2
1.3
1.4
1.5
Deleting component............................................................................................................. 40
1.6
1.7
1.8
1.9
iii
and
Data
Starting U2000
Database
U2000 Server
U2000 Client
2)
3)
U2000 can be installed on the UNIX/Linux and Windows platforms, and it provides the same functions
and shares the same operations on these platforms.
Action
and
Data
Step
Action
$ ./startnms.sh
Starting the U2000 System Monitor
Method 1: Double-click the "U2000 System Monitor " icon on the desktop;
Method 2: Enter the following commands in the terminal window.
$cd /opt/U2000/client
$ ./startup_sysmonitor_global.sh
Server: Local
Click <Login>
Notes:
4
Wait a few minutes until the NE Manager, Security Process, Topology Processr, etc.
processes of Automatic start mode are all in "Running" status. Then the U2000
server starts successfully.
Starting the U2000 Client
Method 1: Double-click the "U2000Client" icon on the desktop.
Method 2: Enter the following commands on the terminal window:
$cd /opt/U2000/client
$./startup_all_global.sh
Notes:
If the UU2000 Server and the U2000 Client are on different computers, click
icon to edit the IP Address and port where the U2000 Server is installed.
7
and
Data
Double-click the icon to see the status. If it is not in running status, then click Start.
And then start the U2000 Server and U2000 Client as follow:
Step
Action
Server: Local
Click <Login>
Notes:
4
Wait a few minutes until the NE Manager, Security Process, Topology Processr, etc.
processes of Automatic start mode are all in "Running" status. Then the U2000
server starts successfully.
Start the U2000 Client
Method 1: On the computer of the U2000 client, double-click the "U2000 Client"
icon on the desktop.
Notes:
If the U2000 Server and the U2000 Client are on different computers, click
to edit the IP Address and port where the U2000 Server is installed.
7
icon
1.2
and
Data
Action
If the topology has changed, please save it to the database, click <OK>.
Shutting down the U2000 server by command
$cd /opt/U2000/server/bin
$ ./stopnms.sh
Shutting down the U2000 server from System Monitor Client.
Select [Administration/ShutDown NMS] from the menu.
Action
If the topology has changed, please save it to the database, click <OK>.
Shutting down the U2000 server by command
and
Data
1.1
Starting U2000
OS/Veritas
U2000 Server
U2000 Client
2)
3)
You should start the OS of both the active and standby servers and the software such as
VxVM, VVR and VCS. Normally, the U2000 is not started automatically with the VCS. You
need to start the U2000 applications manually.
Caution: Start the U2000 server only on the primary node.
Step
Action
Turn on the power supply of the active server. Login the Solaris as root user and the default
password for root user is rootkit.
The OS is automatically started and at the same time, VxVM, VVR and VCS are all started
automatically along with the OS.
Turn on the power supply of the standby server. Login the Solaris as root user and the default
password for root user is rootkit.
The OS is automatically started and at the same time, VxVM, VVR and VCS are all started
automatically along with the OS.
Run the following command to log in to the VCS interface on primary node.
# hagui &
and
Data
Step
Action
Select [File/New Cluster...], and input [Primary] in the Host name column, then click <OK>;
Here Primary is the hostname of the primary workstation. You can also enter the IP address of
the Heartbeat network service of the primary site
Input user name [admin] and password [password], then click <OK>;
Right-click AppService in the Object Tree and choose Online > Primary to start the U2000 on
6
the primary node.
and
Data
Step
Action
If the status of all resources in the AppService group is Online on Primary, the AppService is
normally started.
On the U2000 client computer, double-click the U2000 Client icon on the desktop.
Enter the User Name and Password of the U2000 client.
1.2
For example, the default super user name: admin; password: admin.
and
Data
Step
Action
Choose File > Exit from the Main Menu of U2000 client.
1
In the Confirm dialog box displayed, click OK to log out of the client.
Log in to the VCS interface on active server.
2
Right-click AppService in the Object Tree and choose Offline > Primary to shut
down the U2000 on the active node.
Log in to the active server as the root user and run the following commands to
stop the VCS service:
3
# cd /opt/VRTSvcs/bin
# hastop -all force
To check whether the VCS service is disabled normally, run the following
command:
4
5
preceding two steps to stop the VCS service on the server of the standby site.
Run the following command on both the primary and secondary nodes to keep
6
the data in the disk synchronous with the data stored in the memory:
# sync; sync; sync; sync; sync
Run the following command at both the primary and secondary nodes to shut
and
Data
Step
Action
# cd /opt/HWENGR/engineering
# ./stopserver.sh
# ./startserver.sh
1.2
Step
Action
and
Step
Data
Action
Run the ssl_adm -cmd setmode both command to change the SSL mode between
U2000 server and client.
The new communication mode takes effect after you restart the U2000.
Note:
Value
Normal
Description
Indicates that the connection between the U2000 Server
Both
1.3
Step
Action
Choose Administration > NMS Security > NMS User Management from the
1
main menu.
2
In the NMS User Management navigation tree, expand the User node, and then
select a user.
Click Set ACL, then click Add and the Add dialog box is displayed.
10
Step
and
Data
Action
1.4
NOTE:
If you select Use all the ACLs in the system, you can not specify the ACLs for
the user.
If you select Use the specified ACLs, you can select some permitted access IP
address for the user.
Step
Action
Choose Administration > NMS Security > NMS User Management from the main
1
menu.
2
In the NMS User Management navigation tree, expand the User node, and then
select a user.
Click Apply.
11
1.5
and
Data
Step
Action
Choose Administration > NMS Security > NMS User Management from the main menu.
Create the U2000 user NM_user1.
1. In the NMS User Management area, double-click User, right-click and choose New User
from the shortcut menu.
2. In the New User dialog box, complete the following information:
Name: NM_user1
Password: User1368
Confirm Password: User1368
12
and
Data
3. Click OK.
4
13
and
Data
3. Click OK.
Assign operation rights to the user NM_user1.
1. Click the Operation Rights tab and click Select.
2. In the Select Operation Rights dialog box, select the additional operation rights for the user
as following.
3. Click OK.
The added authorities are displayed in the Operation Rights list.
6
14
Set the IP address range of clients from which NM_user1 is allowed to log in.
Confidential Information of Huawei.
and
Data
15
and
Data
Step
Action
Select the GNE to be modified, right-click and choose Modify GNE from the
shortcut menu.
In the Modify GNE dialog box displayed, set Gateway Type.
1.2
Click OK. In the Warning dialog box that is displayed, click Close.
Step
Action
Select an NE. Double-click the Primary GNE1 field and select a GNE from the
drop-down list.
16
1.3
and
Data
Click Refresh.
Step
Action
Choose Administration > DCN Management from the Main Menu. Click the NE tab.
Select an NE. Double-click GNE2 and select a GNE from the drop-down list.
1.4
Step
Choose Administration > DCN Management from the Main Menu. Click the
GNE tab.
Right-click the GNE that you want to change and choose Delete GNE from the
shortcut menu.
Click OK in the Confirm and Reconfirm dialog box. Click Close in the Operation
Result dialog box.
1.5
Step
Action
Choose Administration > DCN Management from the Main Menu. Click the NE
tab.
Confidential Information of Huawei.
17
and
Data
Right-click a normal NE and choose Change to GNE from the shortcut menu.
In the Change to GNE dialog box, select the Gateway Type, and enter the IP
Address.
1.6
Step
Action
1.7
Step
Choose Administration > DCN Management from the Main Menu. Click the
GNE tab.
Right-click the GNE to be tested and choose Test GNE from the shortcut menu.
1.8
1.8.1
Step
Action
Click the NE tab. Click Refresh to view the communication status of all NEs.
Select an NE. Right-click in the Communication Status column and choose Test
18
and
Data
1.8.2
Step
The Operation Result dialog box is displayed indicating the test result of the non
gateway NE.
Check the communication status between the U2000 and the GNE.
Action
Click the GNE tab. Click Refresh to view the communication status of the GNE.
The Operation Result dialog box is displayed indicating the test result of the
GNE.
19
and
Data
Action
Set a backup directory for the server, and click Backup. The U2000 starts to back
up the database. A progress bar is displayed showing the status of the operation.
Action
Log in to the U2000 MSuite.
In Solaris and Linux, run the following commands:
# su - nmsuser
$ cd /opt/HWENGR/engineering
$ ./startclient.sh
The login dialog box is displayed.
The default user name and password are both admin. If the password has been
changed, enter the changed password.
Set the backup path on the local server. Then click Next.
6
7
20
The system starts the backup preprocessing and data backup process. A progress
bar is displayed to show the backup progress. Wait patiently.
After the backup is complete, click Finish.
1.2
and
Data
Step
Action
Choose Administration > Task Schedule > Task Management from the Main Menu.
On the Task Management page, Select DB Backup then click New.
Input DB Backup as the task name. Select Run Type as Period. Then click Next.
1.3
Select Back up the data to the local server and enter Backup Path on the Local Server. Then
click Finish.
Step
Action
2
File from the Main Menu.
Select TXT file format. Then select a script file type from the Script File Type
field.
3
NOTE:
To export the networkwide script file, select Networkwide Configuration File. Export the
following files to a specified directory: NE Port Naming File, NE Configuration File, NE List File,
Confidential Information of Huawei.
21
and
Data
NM Computer Information File, Service Actualization Script, Network Layer Information File,
Network Modeling and Design Information File, CEAS.
Select the NE for which you want to export script files from the Export NE List.
4
NOTE:
Specify the NE only when you export the NE Configuration File, NE List File, NE Port
Naming File and Networkwide Configuration File.
Click Create File Directory to create a directory where the exported script files are to
be saved.
1.4
Step
Action
Stop U2000 on the active server.
The current user is root user, and the Sybase database is started
Click Next.
5
6
1.5
The system starts initializing the database and displays the initialization progress in a
progress bar. Wait patiently.
After the initialization is complete, click Finish.
Step
Action
Stop U2000 server.
The Sybase or SQL server is started
Click Next.
5
6
1.6
The system starts initializing the database and displays the initialization progress in a
progress bar. Wait patiently.
After the initialization is complete, click Finish.
Step
1
2
22
Action
Stop U2000 on the active server.
The current user is root user, and the Sybase database is started
Log in to the U2000 MSuite on the active server.
Confidential Information of Huawei.
and
Data
Select Back Up and Restore > Restore System Data from the main menu.
Enter the restoration path on the local server and click Next.
7
8
1.7
The system starts the restoration preprocessing and data restoration, and displays
the restoration progress in a progress bar. Wait patiently.
After the restore is complete, click Finish.
Step
Action
Stop U2000 server.
The current user is root user, and the Sybase database is started
Select Back Up and Restore > Restore System Data from the main menu.
Enter the restoration path on the local server and click Next.
7
8
1.8
The system starts the restoration preprocessing and data restoration, and displays
the restoration progress in a progress bar. Wait patiently.
After the restore is complete, click Finish.
Step
Action
2
File from the Main Menu.
3
NOTE:
Service Actualization Script and NM Computer Information File are not
supported.
In the Operation Directory List, select the directory where the script file is to be
imported is located.
Select the script file to import from the Import File List.
Click OK. A progress bar appears showing the status of the import.
In the Import Subnet List, select the subnets to be imported. All subnets are
Confidential Information of Huawei.
23
and
Data
required to be selected.
Click Apply. The system prompts you twice that the import of the configuration
9
script will result in data inconsistency between the U2000 and the NE.
10
1.9
Click OK. A progress bar appears showing the status of the import.
Step
Action
Open a terminal window in the server.
Run the following command as user sybase: (The default password of sybase user is sybase.)
$ /opt/sybase/ASE-15_0/install/showserver
if the server DBSVR and the backup server DBSVR_back are running, the status of databases
is normal.
24
and
Data
Step
Action
Choose Administration > Log Management > Query Security Logs from the main menu.
Click OK in the Filter dialog box.
1.2
Step
Action
Choose Administration > Task Schedule > Task Management from the main menu.
In the Task Type navigation tree, select Database Capacity Management > Security Log
Dump.
25
and
Data
Step
Action
Select Security Log Dump, then click Attribute to set period dump.
26
1.3
and
Data
Step
Action
Choose Administration > Task Schedule > Task Management from the main menu.
In the Task Type navigation tree, select Overflow Dump > Security Log Overflow Dump.
Select Security Log Overflow Dump, then click Attribute to set overflow dump.
27
and
Data
Step
1.4
Action
Step
Action
Choose Administration > Task Schedule > Task Management from the main menu.
In the Task Type navigation tree, select Manual Dump > Security Log Manual Dump.
28
and
Data
Step
Action
Select Security Log Manual Dump, then click Attribute to browse manual dump settings.
29
1.5
and
Data
Step
Action
Choose Administration > Log Management > Query Operation Logs from the main menu.
Click OK in the Filter dialog box.
1.6
Step
Action
Choose Administration > Task Schedule > Task Management from the main
1
menu.
2
In the Task Type navigation tree, select Database Capacity Management >
Operation Log Dump.
Select Operation Log Dump, then click Attribute to set period dump.
30
1.7
and
Data
Step
Action
Choose Administration > Task Schedule > Task Management from the main
menu.
In the Task Type navigation tree, select Overflow Dump > Operation Log
Overflow Dump.
Select Operation Log Overflow Dump, then click Attribute to set overflow dump.
1.8
Step
Action
Choose Administration > Task Schedule > Task Management from the main
1
menu.
2
In the Task Type navigation tree, select Manual Dump > Operation Log
Manual Dump.
Select Operation Log Manual Dump, then click Attribute to browse manual dump
settings.
1.9
Step
Action
Choose Administration > Log Management > Query System Logs from the main menu.
31
and
Data
Action
Choose Administration > Task Schedule > Task Management from the main
1
menu.
2
In the Task Type navigation tree, select Database Capacity Management >
System Log Dump.
Select System Log Dump, then click Attribute to set period dump.
Action
Choose Administration > Task Schedule > Task Management from the main
menu.
In the Task Type navigation tree, select Overflow Dump > System Log Overflow
Dump.
Select System Log Overflow Dump, then click Attribute to set overflow dump.
32
and
Data
Action
Choose Administration > Task Schedule > Task Management from the main
1
menu.
2
In the Task Type navigation tree, select Manual Dump > System Log Manual
Dump.
Select System Log Manual Dump, then click Attribute to browse manual dump
settings.
33
and
Data
Action
Open a terminal window, and run the following commands to switch to user root:
% su - root
Password:password_of_user_root
Run the following commands to view the physical status of the disk on the current server:
# iostat -E
Action
In the My Computer window, select a disk, right-click, and choose Attribute from the shortcut
menu.
In the Check Error area, click Start Check. Follow the prompts to check the disk status.
1.2
Action
Open a terminal window, and run the following commands to switch to user root:
% su - root
Password:password_of_user_root
Run the following command to view the disk space usage on the server:
# df -k
34
and
Data
Step
Action
In the screen output, view the space usage of the / and /opt directories.
Action
View the disk space of the server through sysmonitor or in the My Computer window.
You need to view the disk space usage of the operating system, SQL server, and U2000
mainly.
1.3
Action
Delete the core files created by the system. These files are usually located in the
directories of /, /opt/U2000/server/conf and /opt/U2000/server/bin. The file names start
with core.
Delete the outdated and useless alarm dump files. The default path is
/opt/U2000/server/dump.
Delete the outdated and useless log dump files. The default path is
/opt/U2000/server/dump.
Delete the outdated and useless database backup files. The default path is
/opt/U2000/server/var/backup.
Delete the outdated and useless U2000 running logs. The default path is
/opt/U2000/server/log.
Delete other outdated and useless files, such as installation files and patch files of earlier
versions.
Action
Delete the outdated and useless alarm dump files. The default path
is %IMAPROOT%\server\dump.
Delete the outdated and useless log dump files. The default path
is %IMAPROOT%\server\dump.
Confidential Information of Huawei.
35
and
Data
Step
Action
Delete the outdated and useless database backup files. The default path
is %IMAPROOT%\server\var\backup.
Delete the outdated and useless U2000 running logs. The default path
is %IMAPROOT%\serve\log.
Delete other outdated and useless files, such as installation files and patch files of earlier
versions.
1.4
Action
36
and
Data
Step
Action
On the desktop of the computer that the network management system maintenance suite
locates in, double-click the U2000 NMS Maintenance Suite icon, the Login dialog box is
displayed.
Enter the user and password of the network management system maintenance suite. The
user and password are both admin.
Click Login. Successfully log in to the network management system maintenance suite
client.
37
and
Data
Step
1.2
Action
Step
Action
In the network management system maintenance suite client, select the Instance tab.
Click the
system.
2
1.3
Step
38
Action
On the network management system maintenance suite client, choose System >
Synchronizing the NMS Information. The Synchronize Data dialog box is displayed.
and
Data
Step
Action
Click OK. The progress bar of data synchronization is displayed. Wait until a message is
displayed indicating that data synchronization is complete.
1.4
Adding component
Step
Action
On the NMS Maintenance Suite client, choose Deploy > Add Component from the
main menu. The Add Component dialog box is displayed.
39
and
Data
Step
Action
Wait until the dialog box is displayed to prompt the message "Succeeded in adding the
component."
Click OK.
1.5
Deleting component
Step
Action
On the client of the NMS Maintenance Suite, choose Deploy > Remove Component
1
from the main menu. The Remove Component dialog box is displayed.
2
1.6
Step
Action
In the U2000 NMS maintenance suite, select Deployment Package tab, then click the
package you want to adds. Choose Deploy > Add Instance from the Main Menu or right
click to select Add Instance. The Add Instance dialog box is displayed.
40
and
Data
Step
Action
Click OK. Wait. The The instance is successfully added dialog box is displayed.
1.7
Step
Action
On the network management system maintenance suite client, select the instance whose
information you want to modify.
Choose Deploy > Modify the instance name and description from the Main Menu, and
the Modify the instance name and description dialog box is displayed.
Click OK and wait until the prompt is displayed indicating that the instance information is
successfully modified.
Click OK.
1.8
Step
Action
In the network management system maintenance suite client, click the Instance tab.
Choose Deploy > Delete Instance from the main menu or right-click the instance that
Confidential Information of Huawei.
41
and
Data
Step
Action
you want to delete and choose Delete Instance from the shortcut menu.
4
Wait. The The instance is successfully deleted dialog box is displayed indicating that
the instance is successfully deleted. Click OK.
1.9
Step
Action
Click the General tab to perform the basic configuration of CORBA instance.
Click the Advanced tab to perform the advanced configuration of CORBA instance.
Click OK.
Action
In the network management system maintenance suite client, choose System > Exit.
The Exit dialog box is displayed.
42
iManager U2000
Troubleshooting
www.huawei.com
Objectives
Page 1
Contents
1. General Thoughts About U2000 Troubleshooting
2. Typical Troubleshooting Cases on Windows OS
3. Typical Troubleshooting Cases on Solaris OS
4. Veritas Troubleshooting Cases
Page 2
Database Fault
Installation and
startup of Sybase
Installation and
startup of MS SQL
Server
U2000 Software
Fault
Software installation
Server startup
Client startup
Connection between
server and client
Others
Page 3
Localization
Client
sequence
Server
1. operating system
2. database
Database
3. server
4. client
OS
U2000 software
architecture
Page 4
Abnormal end of OS
Virus infection
Man-made mistake
Method
Page 5
Cause
The database has been installed ever and there are some
leftover information in OS.
The free space of the disk is not enough.
Method
Fail to
start
Cause
Method
Page 6
Cause
Method
Fail to
start
server
Cause
Method
Page 7
Method
Page 8
Page 9
Page 10
Contents
1. General Thoughts About U2000 Troubleshooting
2. Typical Troubleshooting Cases on Windows OS
3. Typical Troubleshooting Cases on Solaris OS
4. Veritas Troubleshooting Cases
Page 11
Case 1
Phenomenon Description
......
U2000 Client1
U2000 ClientN
U2000 Server
Page 12
Case 1
Can not
be local
Page 13
Case 2
Phenomenon Description
A U2000 NMS and SQL are
running on the same computer
normally, an operator creates a
new Windows user, then switches
user, logins again, server cant be
started.
Page 14
Case 2
Page 15
Case 2
Page 16
Case 2
Page 17
Case 2
Page 18
Case 3
Phenomenon Description
Page 19
10
Case 3
Handling Process
1 Rerun the setup program ,and select the upgrade, then SQL
Page 20
Case 4
Phenomenon Description
The following IP address error occurs during the U2000 LCT installation.
Page 21
11
Case 5
Phenomenon Description
Cause Analysis
Page 22
Case 6
Phenomenon Description
On the U2000 NM, certain NEs are logged in and out frequently.
Cause Analysis
Handling Process
1. Check whether the number of NEs is within the NMS management capability.
Refer to the performance indexes indicated in iManager U2000 Description.
2. Check whether the disk space usage on the server exceeds 80%. If yes,
free up the disk. Backup and delete related files to free up disk space.
Page 23
12
Case 7
Phenomenon Description
Cause Analysis
2. Data Communication Network (DCN) failure between the NMS and NEs.
Page 24
Contents
1. General Thoughts About U2000 Troubleshooting
2. Typical Troubleshooting Cases on Windows OS
3. Typical Troubleshooting Cases on Solaris OS
4. Veritas Troubleshooting Cases
Page 25
13
Case 1
Phenomenon Description
Cause Analysis
Page 26
Case 1
Handling Process
1. Power on the workstation, press STOP+A, switch to OK interface
2. Put the Solaris installation CD into CD-ROM
3. Input #boot cdrom -s ,boot system from CD-ROM
4. Run fsck y and restart workstation again, but the fault still exists.
5. Switch to OK interface again, input #df -k ,check whether the
information of slices are correct (referring to the installation record ),then
find information of slices are wrong.
Page 27
14
Case 1
Handling Process
6Execute format command to repair the slices table, as follows:
# format
Searching for disks...done
Page 28
Case 2
Phenomenon Description
Page 29
15
Case 3
Phenomenon Description
Cause Analysis
Page 30
Case 3
Handling Process
Page 31
16
Case 4
Phenomenon Description
Cause Analysis
When modify the IP of workstation, not only modify host IP, but
also need to modify database IP, otherwise database can not
run.
Page 32
Contents
1. General Thoughts About U2000 Troubleshooting
2. Typical Troubleshooting Cases on Windows OS
3. Typical Troubleshooting Cases on Solaris OS
4. Veritas Troubleshooting Cases
Page 33
17
AppService abnormality
Page 34
Case 1
AppService abnormality
If AppService stopped abnormally, the VCS will try to restart them. If
restarting fails, under the rules the system will switch to the secondary
node. The recovery strategies are as follows:
Page 35
18
Case 2
Data replication abnormality (RVG resource abnormality)
Run the following commands:
# vxprint v
# vradmin -g datadg repstatus datarvg
And the status of the data volume is not ACTIVE or ENABLED, the
status of datarvg and datarlk is RECOVER, That means data replication
is abnormal.
Page 36
Case 3
Dual-Active Recovery
When the network between the primary and secondary nodes is interrupted more
than 10 minutes, the secondary node will take over the server. Then the HA system
is running in a dual-active status that the primary and secondary nodes are both
active servers.
In the case of dual-active, the U2000 server processes are all running on both
primary and secondary nodes.
After the connection recovered from the fault, the system is running in a healing
status.
Healing status checking:
#vradmin -g datadg repstatus datarvg
Config Errors:
129.9.1.1: Primary-Primary
configuration
Page 37
19
Case 4
Run the following command to forcibly disable the VCS on the primary and
secondary nodes.
# hastop -all -force
Restart the primary and secondary nodes after the data replication is
complete.
Page 38
Summary
Page 39
20
Thank you
www.huawei.com
21