You are on page 1of 51

NetNumen™ U31 R18

Unified Element Management System


ZTE Data Collection Operation Guide

Version: V12.13.50

ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright © 2014 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.

Revision History

Revision No. Revision Date Revision Reason

R1.0 2014-11-30 First edition

Serial Number: SJ-20140724091740-025

Publishing Date: 2014-11-30 (R1.0)

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Contents
About This Manual ......................................................................................... I
Chapter 1 ZDC Server Management ......................................................... 1-1
Chapter 2 Logging In to the Web-Based ZDC Management
Platform................................................................................................... 2-1
Chapter 3 Data Collection Management................................................... 3-1
3.1 Managing Templates .......................................................................................... 3-1
3.2 Managing Tasks ................................................................................................. 3-2
3.3 Monitoring Tasks ................................................................................................ 3-3

Chapter 4 Security Management............................................................... 4-1


4.1 User Management.............................................................................................. 4-2
4.1.1 Creating a User........................................................................................ 4-2
4.1.2 Creating a Department ............................................................................. 4-4
4.1.3 Managing Locked Users ........................................................................... 4-4
4.1.4 Managing Logged-In Users ....................................................................... 4-5
4.1.5 Setting the User Blacklist .......................................................................... 4-6
4.1.6 Setting User Account Rules ...................................................................... 4-7
4.2 Role Management .............................................................................................. 4-9
4.2.1 Creating an Operation Set ........................................................................ 4-9
4.2.2 Creating a Role .......................................................................................4-11
4.2.3 Creating a Role Set ................................................................................ 4-13

Chapter 5 Log Management ...................................................................... 5-1


Chapter 6 System Maintenance ................................................................ 6-1
6.1 Backing Up and Restoring Log Data .................................................................... 6-1
6.2 Monitoring the Application Server ........................................................................ 6-6
6.3 Monitoring the Database..................................................................................... 6-8
6.4 Data Flow Monitoring........................................................................................ 6-10
6.4.1 Monitoring Data Exceptions .................................................................... 6-10
6.4.2 Monitoring Data Reaggregation............................................................... 6-12
6.4.3 Monitoring Data Loading......................................................................... 6-13
6.4.4 Monitoring Data Aggregation................................................................... 6-16

Figures............................................................................................................. I
Glossary ........................................................................................................ III

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


This page intentionally left blank.

II

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


About This Manual
Purpose
This manual describes management functions of the ZDC server, including data collection,
security management, log management, and system maintenance.

Intended Audience
This manual is intended for:
l Maintenance engineers
l Debugging engineers

What Is in This Manual


This manual contains the following chapters:

Chapter 1, ZDC Server Describes software functions and management overview of the ZDC
Management Server.

Chapter 2, Logging In Describes how to log in to the Web-based ZDC management platform.
to the Web-Based ZDC
Management Platform

Chapter 3, Data Collection Describes the procedures of template management, task


Management management and task monitoring for data collection on the ZDC
server.

Chapter 4, Security Describes user management and role management functions.


Management

Chapter 5, Log Management Describes how to manage logs and collect data on the ZDC server.

Chapter 6, System Describes the procedures for backup and restoration, monitoring the
Maintenance application server, monitoring the database, and monitoring data
streams.

Conventions
This manual uses the following typographical conventions:

Typeface Meaning

Note: provides additional information about a certain topic.

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


This page intentionally left blank.

II

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 1
ZDC Server Management
The ZDC server software provides the functions of collecting performance data and saving
them in the database, to support data query and report systems.
The following functions are available for managing the ZDC server:
l Managing data collection tasks
l Monitoring the status of the ZDC server
l Monitoring the database status
l Starting up and shutting down the ZDC server
The ZDC server management operations are preformed on a Web-based management
platform UniCare AOS-WebLite.

1-1

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

This page intentionally left blank.

1-2

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 2
Logging In to the Web-Based
ZDC Management Platform
This procedure describes how to log in to the Web-based ZDC management platform
(UniCare AOS-WebLite) before managing the ZDC server.

Note:
A browser of IE8 or later version is recommended to get better display effect.

Steps
1. Open the IE browser, enter http://IP address:21180 (where IP address must
be the actual IP address of the ZDC server) in the URL bar, and then press Enter. The
login page of the UniCare AOS-WebLite is displayed, see Figure 2-1.

Note:
It is recommended to use IE8 or a higher version, to guarantee the display results.
Firefox and Google browsers are also supported.

Figure 2-1 UniCare AOS-WebLite Login Page

2-1

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

2. Enter the user name and password, and then click Login. The home page of the
UniCare AOS-WebLite is displayed, see Figure 2-2.

Figure 2-2 UniCare AOS-WebLite Home Page

– End of Steps –

2-2

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 3
Data Collection Management
The data collection management allows you to manage performance management (PM)
and configuration management (CM) data collection tasks.
After the ZDC system is installed, task templates are already set by default, and you are
not recommended to modify them.
Table of Contents
Managing Templates ..................................................................................................3-1
Managing Tasks .........................................................................................................3-2
Monitoring Tasks ........................................................................................................3-3

3.1 Managing Templates


The ZDC server provides two templates (PM and CM).
l The PM template is used in a PM report task for periodically extracting performance
data from the data source (EMS), transforming the performance data, and storing the
data in the database.
l The CM template is used in a CM report task for periodically extracting configuration
data from the data source (EMS), transforming the configuration data, and storing the
data in the database.
This procedure describes how to manage the PM and CM templates.

Steps
1. On the UniCare AOS-WebLite home page, select Data Collection > ETL Template
> Template Management from the menu bar. The Template Management tab is
displayed, see Figure 3-1. Two predefined templates are available on the tab.

3-1

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 3-1 Template Management Tab

2. Perform appropriate management operations as required.

To... Do...

Obtain the latest template Click Refresh.


information from the server

Upload a template to the ZDC i. Click Upload. The Upload dialog box is displayed.
server
ii. Add a template file, and then click Upload.

Delete a template Select the desired template, and then click Delete.

Export a template Select the desired template, and then click Export.

– End of Steps –

3.2 Managing Tasks


The ZDC server predefines two tasks (PM and CM) that periodically extracts performance
data and configuration data from the data source (EMS) in accordance with the
corresponding templates. The collected performance data and configuration data are
transformed and stored in the database.

This procedure describes how to manage the PM and CM tasks.

Steps
1. On the UniCare AOS-WebLite home page, select Data Collection > ETL Task >
Task Manager from the menu bar. The Task Manager tab is displayed, see Figure
3-2. Two predefined tasks (CM and PM) are available on the tab.

3-2

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 3 Data Collection Management

Figure 3-2 Task Manager Tab

2. Perform appropriate management operations as required.

To... Do...

Obtain the latest task information Click Refresh.


from the server

Start a task Select the task, and then click Start.

Stop a task Select the task, and then click Stop.

– End of Steps –

3.3 Monitoring Tasks


This procedure describes how to view the statuses of steps in the PM and CM tasks and
how to view the failure cause of a stopped step.

Steps
1. On the UniCare AOS-WebLite home page, select Data Collection > ETL Task >
Task Monitor from the menu bar. The Task Monitor tab is displayed, see Figure 3-3.
The real-time status of each step in the CM task and the PM task is displayed on the
tab.

3-3

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 3-3 Task Monitor Tab

Three types of icons are used to indicate different task statuses:


l (green tick) indicates that the corresponding step is running without error.
l (yellow hourglass) indicates that the corresponding step is suspended.
l (red cross) indicates that the corresponding step stops due to error occurrence.
2. (Optional) To view the details of a stopped step ( ), double-click the step node. The
Step Detail dialog box is displayed, in which the failure cause is displayed in the Detail
column, see Figure 3-4.

Figure 3-4 Step Detail Dialog Box

– End of Steps –

3-4

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 4
Security Management
Security management prevents unauthorized access to the ZDC system and ensures
proper, reliable and continuous system operation. The system administrator can create
security policies and manage user accounts, departments, roles, role sets, and operation
sets. Different permissions can be assigned to individual users. A user can only access
and manage the permitted resources.
The following are basic concepts in security management:

Role
A role specifies management permissions for a user group from two independent aspects:
operation set and management resource.
l The operation set specifies the functional modules of the ZDC system that can be
used by the user group.
For example, an operation set can be defined to allow a role to use the log
management module for log query.
For example, another operation set can be defined to allow a role to use the
maintenance management module for server performance monitoring configuration.
l Management resources are server resources and physical resources that can be
managed by a role.

The operation set and management resources combine to determine the actual
management permissions of a role. For example, if the operation set of a role permits
system maintenance operations and the assigned management resources are server
resources, the role is permitted to perform maintenance operations on the server
resources.

Role Set
A role set is a collection of roles. The permissions of a role set include those of all roles
in the role set.

Operation Set
An operation set is a collection of operations. If an operation set is assigned to a role, this
role is permitted to perform all the operations in the operation set.

4-1

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Department
A department simulates an actual administrative department for easy organization and
management of users. A new user must belong to a department.

User
A user is permitted to access the ZDC system and perform operations in the system. When
creating a user, the system administrator assigns operation permissions to the user by
specifying one or more roles and/or role sets. In addition, the user can be allocated to a
department based on the actual administrative division.
Table of Contents
User Management......................................................................................................4-2
Role Management ......................................................................................................4-9

4.1 User Management


The system administrator is allowed to perform the following user management operations:
l Create, view, modify, and delete a user
l Create, view, modify, and delete a department
l Manage locked users
l Manage logged-in users
l Set the user blacklist
l Set user account rules

4.1.1 Creating a User


This procedure describes how to create a user under a particular department.

Prerequisite
You have logged in to the ZDC system as the system administrator.

Steps
1. On the UniCare AOS-WebLite home page, select Security > User Management
> User and Department from the menu bar. The page for user and department
management is displayed, see Figure 4-1.

4-2

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 4 Security Management

Figure 4-1 User and Department Management Page

2. In the left navigation tree, click a department (for example, Root Department), and
then click Create User. The page for creating a user is displayed, see Figure 4-2.

Figure 4-2 Creating a User

3. Under User Basic Information, set the basic information of the user, including user
name, full name, and password.
4. Under User Rights, select one or more role(s) or role set(s) for the user.

5. Click OK. A message confirming the successful creation is displayed.

6. Click OK. The new user is displayed under the selected department node (for example,
Root Department) in the left navigation tree.

– End of Steps –

4-3

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

4.1.2 Creating a Department


This procedure describes how to create a department.

Prerequisite
You have logged in to the ZDC system as the system administrator.

Steps
1. On the UniCare AOS-WebLite home page, select Security > User Management
> User and Department from the menu bar. The page for user and department
management is displayed.
2. In the left navigation tree, click a department (for example, Root Department), and
then click Create Department. The page for creating a department is displayed, see
Figure 4-3.

Figure 4-3 Creating a Department

3. Under Basic Information, enter a department name and description.


4. Under Department, select a superior department.
5. Click OK. A message confirming the successful creation is displayed.
6. Click OK. The new department is displayed under the selected department node (for
example, Root Department) in the left navigation tree.
– End of Steps –

4.1.3 Managing Locked Users


If a user enters wrong passwords three times continuously when attempting to log in to the
ZDC system, the user account is locked. The locked user can be unlocked by the system
administrator.

4-4

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 4 Security Management

This procedure describes how to view locked user accounts and how to unlock a user
account.

Steps
1. On the UniCare AOS-WebLite home page, select Security > User Management >
Show Locked Users from the menu bar. A list of locked users is displayed, see Figure
4-4.

Figure 4-4 List of Locked Users

2. (Optional) To unlock one or more locked users, select the corresponding check boxes,
and then click the Unlock button. The unlocked user accounts disappear from the list
and can be used to log in to the ZDC system.
– End of Steps –

4.1.4 Managing Logged-In Users


This procedure describes how to view the information of all logged-in users and how to
force a logged-in user to log out of the ZDC system.

The selected logged-in users log out of the system and disappear from the list.

Note:
To force a logged-in user to log out of the system, you must log in to the ZDC system as
the system administrator.

4-5

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Steps
1. On the UniCare AOS-WebLite home page, select Security > User Management >
Login User Management from the menu bar. A list of logged-in users is displayed,
see Figure 4-5.

Figure 4-5 List of Logged-In Users

2. (Optional) To force one or more logged-in users to log out of the system, select the
corresponding check box(es), and then click the Kick User button. A message is
displayed, prompting you to confirm this operation.

3. Click OK.
– End of Steps –

4.1.5 Setting the User Blacklist


Users in the blacklist are not allowed to log in to the system. Only the system administrator
can set the user blacklist.
This procedure describes how to set the user blacklist.

Prerequisite
You have logged in to the ZDC system as the system administrator.

Steps
1. On the UniCare AOS-WebLite home page, select Security > User Management >
User Blacklist from the menu bar. The User Blacklist page is displayed, see Figure
4-6.

4-6

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 4 Security Management

Figure 4-6 User Blacklist Page

2. Perform appropriate operations to set the user blacklist:


l To add a user to the blacklist, click the user in the All Users pane, and then click
.
l To remove a user from the blacklist, click the user in the Users in Blacklist pane,
and then click .
3. Click OK.
– End of Steps –

4.1.6 Setting User Account Rules


This procedure describes how to set user account rules, including the password policy,
account lockout rule, and account policy.

Prerequisite
You have logged in to the ZDC system as the system administrator.

Steps
1. On the UniCare AOS-WebLite home page, select Security > User Management >
Customize User Account Rule from the menu bar. The Customize User Account
Rule page is displayed, see .Figure 4-7

4-7

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 4-7 Customize User Account Rule Page – Password Policy

2. Set the parameters as required under Password Policy.


3. Expand the Account Lock Rule node (Figure 4-8), and then set the account lockout
rule.

Figure 4-8 Account Lock Rule

4. Expand the Account Policy node (Figure 4-9), and then set the account policy.

4-8

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 4 Security Management

Figure 4-9 Account Policy

5. Click OK.

– End of Steps –

4.2 Role Management


The following role management functions are available:
l Create, view, modify, and delete an operation set
l Create, view, modify, and delete a role
l Create view, modify, and delete a role set

4.2.1 Creating an Operation Set


An operation set is a collection of operation permissions. If a role is assigned an
operation set, a user assigned this role has all operation permissions in the operation set.
User-defined operation sets can be modified and deleted.

This procedure describes how to create an operation set.

Steps
1. On the UniCare AOS-WebLite home page, select Security > Role Management >
Operation Set from the menu bar. The Operation Set page is displayed, see Figure
4-10.

4-9

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 4-10 Operation Set Page

2. Click the Create button. The Operation Set Detail page is displayed, see Figure 4-11.

Figure 4-11 Operation Set Detail Page

3. Under Basic Information, enter a name and description for the operation set.

4. Under Operation Set Configuration Information, select the required operations in


the operation tree.
5. Click OK. A message confirming the successful creation is displayed.

6. Click OK. The new operation set is displayed on the Operation Set page, see Figure
4-12.

4-10

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 4 Security Management

Figure 4-12 New Operation Set

– End of Steps –

4.2.2 Creating a Role


A role defines user permissions, including operation permissions and management
resources. Roles are the basis for users and role sets. User-defined roles can be
modified and deleted.
This procedure describes how to create a role.

Steps
1. On the UniCare AOS-WebLite home page, select Security > Role Management >
Role and Role Set from the menu bar. The page for role and role set management is
displayed, see Figure 4-13.

Figure 4-13 Role and Role Set Management Page

4-11

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

2. Click the Role node in the left navigation tree, and then click the Create Role button.
The page for creating a role is displayed, see Figure 4-14.

Figure 4-14 Creating a Role

The roles are described as follows:


l Administrator role: This role has unrestricted full permissions upon the NM system
and the managed network, including the permission of modifying core information
such as system accounts. It is a predefined role and cannot be modified.
l Maintenance role: This role has all other permissions upon the NM system and
the managed network, except for the permission of modifying security information
in the NM system. It is a predefined role and cannot be modified.
l Operator role: This role is allowed to modify common configurations, but not
allowed to perform backup and restoration maintenance operations upon the NM
system, or modify sensitive resource configurations. It is a predefined role and
cannot be modified.
l Supervisor role: This role is allowed to browse network information, such as report
making or data query operations, but not allowed to modify configurations. It is a
predefined role and cannot be modified.

3. Under Basic Information, enter a name and description for the role.
4. Under User Rights, repeat the following procedure to add operation permissions on
the required resources:

a. Click a resource type in the Resource Tree.


b. Click an operation right in the Operation Set list.

5. Click OK. A message confirming the successful creation is displayed.

6. Click OK. The new role is displayed under the Role node in the left navigation tree,
see Figure 4-15.

4-12

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 4 Security Management

Figure 4-15 New Role

– End of Steps –

4.2.3 Creating a Role Set


A role set is the collection of several roles. A user assigned a role set has the operation
permissions specified by all the roles in the role set. Assigning a role set reduces the effort
needed to assign multiple roles. You can modify and delete role sets as required.

This procedure describes how to create a role set.

Steps
1. On the UniCare AOS-WebLite home page, select Security > Role Management >
Role and Role Set from the menu bar. The page for role and role set management is
displayed.
2. Click the Role Set node in the left navigation tree, and then click the Create Role Set
button. The page for creating a role set is displayed, see Figure 4-16.

4-13

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 4-16 Creating a Role Set

3. Under Basic Information, enter a name and description for the role set.
4. Under Role Set Assignment, add the required roles from the Roles that can be
allocated list to the Allocated Roles list.
5. Click OK. A message confirming the successful creation is displayed.
6. Click OK. The new role set is displayed under the Role Set node in the left navigation
tree, see Figure 4-17.

Figure 4-17 New Role Set

– End of Steps –

4-14

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 5
Log Management
Logs contain useful information for tracking system status, locating faults, and tracing user
operations. The ZDC system provides log management functions that allow you to query
operation logs, security logs, and/or system logs for the current day or all logs in the system.
The procedures for querying different types of logs are similar. The following example
shows how to query operation logs in the ZDC system. After a successful query, you can
export the queried logs and view the details of log records.

Steps
1. On the UniCare AOS-WebLite home page, select Log > Operation Log > All
Operation Log from the menu bar. The All Operation Log tab is displayed, see
Figure 5-1. All operation log records are listed on the tab.

Figure 5-1 All Operation Log Tab

2. To query specific log records, perform the following operations:


a. Click the Condition button. The query condition area is displayed, see Figure 5-2.

5-1

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 5-2 Query Condition Area

b. Set query conditions, and then click OK. The tab is refreshed and only the log
records meeting the query conditions are displayed.
3. To export the query results to a file, perform the following operations:
a. Click the Export button, and then select a file format from the drop-down menu.
The File Download dialog box is displayed.
b. Click Save. The Save As dialog box is displayed.
c. Select a path for saving the query results, enter a file name, and then click Save.
4. To view the details of a log record, click the corresponding cell in the Command
Function column. The log details are displayed, see Figure 5-3.

Figure 5-3 Log Details

5-2

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6
System Maintenance
The following system maintenance operations are allowed:
l Back up, delete, and restore log data in the ZDC system
l Monitor the application server of the ZDC system
l Monitor the database server of the ZDC system
l Monitor data flows
Table of Contents
Backing Up and Restoring Log Data...........................................................................6-1
Monitoring the Application Server ...............................................................................6-6
Monitoring the Database ............................................................................................6-8
Data Flow Monitoring ...............................................................................................6-10

6.1 Backing Up and Restoring Log Data


The ZDC system predefines three tasks for backing up and restoring log data. By setting
and executing the tasks, you can:

l Back up and/or delete specific log data


l Restore log data from a backup file
l Set the periodic backup task, and view execution omissions and logs
This procedure describes how to set and execute the three log backup and restoration
tasks.

Steps
1. On the UniCare AOS-WebLite home page, select System Maintenance > Backup
from the menu bar. The Backup and Restore page is displayed, see Figure 6-1.

6-1

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 6-1 Backup and Restore Page

2. Perform the following operations to set the backup task for backing up and/or deleting
log data:
a. In the left navigation tree, click Log Data Backup and Deletion under Backup
Task. The task parameters are displayed in the right pane, see Figure 6-2.

Figure 6-2 Backup Task

b. Under Backup and Delete Param Config, configure the parameters as required.

c. Click Execute. The execution results are displayed under Executing Result, see
Figure 6-3.

6-2

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6 System Maintenance

Figure 6-3 Execution Results of the Backup Task

3. Perform the following operations to set and execute the restoration task for restoring
log data from a backup file:

a. In the left navigation tree, click Restore of The Log Data under Restore Task.
The task information is displayed, see Figure 6-4.

Figure 6-4 Restore Task

b. Select the desired backup file from the Choose File list.
c. Click Execute. The restoration results are displayed under Executing Result,
see Figure 6-5.

6-3

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 6-5 Execution Results of the Restoration Task

4. Perform the following operations to set and view the periodic backup task:
a. In the left navigation tree, click Timing Task of The Log Data under Time Task.
The task information is displayed in the right pane, see Figure 6-6.

Figure 6-6 Periodic Backup Task

b. (Optional) Click Modify, select or clear the check box corresponding to a log type,
and then click Save.
If another user modifies the task information, you can click Refresh to refresh the
task information displayed on the page.

c. Click Check Leak Task. The Check Leak Task dialog box is displayed, showing
the execution omissions of the periodic backup task, see Figure 6-7.

6-4

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6 System Maintenance

Figure 6-7 Check Leak Task Dialog Box

d. Click View Log. The View Log dialog box is displayed, showing the execution
logs of the periodic backup task, see Figure 6-8.

Figure 6-8 View Log Dialog Box

– End of Steps –

6-5

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

6.2 Monitoring the Application Server


The system monitoring function allows you to monitor the application server of the ZDC
system, including the CPU, memory, hard disk, and processes of the application server.
The real-time information of the application server can be displayed in line chart, bar chart,
and pie chart.
This procedure describes how to view the information of the application server.

Steps
1. On the UniCare AOS-WebLite home page, select System Maintenance > System
Monitor > Host Monitor from the menu bar. The page for system monitoring is
displayed, see Figure 6-9. By default, the Application Server node is selected in
the left navigation tree and the real-time information of all application servers’ CPUs
and memories is displayed in line chart in the right pane.

Figure 6-9 System Monitoring Page – Application Server

2. In the left navigation tree, click the desired application server under Application
Server, for example, 10.62.100.110. The real-time information of the application
server is displayed in the right pane, including the operating system, IP address,
physical memory, disk usage, total disk size, CPU usage, memory usage, and the
total space and free space of each disk partition, see Figure 6-10.

6-6

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6 System Maintenance

Figure 6-10 Real-Time Information of an Application Server

3. In the left navigation tree, click Console 1 under an application server (for example,
10.62.100.110). All processes related to the ZDC server are displayed in the right
pane, see Figure 6-11.

Figure 6-11 Console Processes

4. In the left navigation pane, click a process under Console 1, for example, AOS
Process 1. The real-time information of the process is displayed in the right pane,
including the process version, JVM parameters, CPU usage, and memory usage,
see Figure 6-12.

6-7

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 6-12 AOS Process 1

– End of Steps –

6.3 Monitoring the Database


This procedure describes how to view the basic information, transaction information, and
tablespace information of the database.

Steps
1. On the UniCare AOS-WebLite home page, select System Maintenance > System
Monitor > Database Monitor from the menu bar. The Database Monitor tab is
displayed, see Figure 6-13.

Figure 6-13 Database Monitor Tab

6-8

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6 System Maintenance

2. Select Status from the Information Type list, and then click Query. The basic
information of the database is displayed on the Status sub-tab, see Figure 6-14.

Figure 6-14 Status Sub-Tab

3. Select Transaction from the Information Type list, and then click Query. The
transaction information of the database is displayed on the Transaction sub-tab, see
Figure 6-15.

Figure 6-15 Transaction Sub-Tab

4. Select DBSpace from the Information Type list, and then click Query. The
information of all tablespaces in the database is displayed on the DBSpace sub-tab,
see Figure 6-15.

6-9

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 6-16 DBSpace Sub-Tab

– End of Steps –

6.4 Data Flow Monitoring


6.4.1 Monitoring Data Exceptions
This procedure describes how to monitor exceptions in data loading and aggregation
processes.

Steps
1. On the UniCare AOS-WebLite home page, select System Maintenance > Data Flow
Monitor > Data Exception Monitor. The Data Exception Monitor page is displayed,
see Figure 6-17.

6-10

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6 System Maintenance

Figure 6-17 Data Exception Monitor Page

2. Click a data type (for example, Data Loading Exception) in the left navigation pane.
The Data Loading Exception tab is displayed in the right pane, see Figure 6-18.

Figure 6-18 Data Loading Exception Tab

3. Set query conditions, and then click the Query button. The information of exceptions
occurring during data loading is displayed, see Figure 6-19.

6-11

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 6-19 Data Loading Exceptions

– End of Steps –

6.4.2 Monitoring Data Reaggregation


This procedure describes how to monitor data reaggregation and initiate a reaggregation
process for re-collecting performance data.

Steps
1. On the UniCare AOS-WebLite home page, select System Maintenance > Data Flow
Monitor > Data Reaggregation Monitor. The Data Reaggregation Monitor tab is
displayed, see Figure 6-20.

Figure 6-20 Data Reaggregation Monitor Tab

2. Set query conditions, such as product, data type, granularity, start time, and end time.
Then, click the Query button. The performance data meeting the query conditions is
displayed, see Figure 6-21.

6-12

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6 System Maintenance

Figure 6-21 Performance Data Query Results

3. Select the tables corresponding to the performance data to be reaggregated, and


then click the ReAggr button. The Reaggregation Process Details dialog box is
displayed, showing the reaggregation results of the selected performance data, see
Figure 6-22.

Figure 6-22 Reaggregation Process Details Dialog Box

– End of Steps –

6.4.3 Monitoring Data Loading


The data loading monitoring function allows you to view the data loading and collection
results during a day based on the time granularity. This procedure describes how to view
the data loading results.

Steps
1. On the UniCare AOS-WebLite home page, select System Maintenance > Data Flow
Monitor > Data Loading Monitor. The Data Loading Monitor tab is displayed, see
Figure 6-23.

6-13

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 6-23 Data Loading Monitor Tab

2. Select a product type from Product, select a data type from Data Type, select a
measurement type from Measurement Type, select a date in Date, select All or
Problematic from Filter, and then click the Query button. The loading results of the
required data are displayed, see Figure 6-24.

Figure 6-24 Queried Data Loading Results

If the original collection granularity of performance data is 15 minutes, the horizontal


axis displays numeric values ranging from 0 o’clock through 23 o’clock and the vertical
axis displays four time points in an hour for each measurement type: 0, 15 minutes,
30 minutes, and 45 minutes.
The following describes four possible data loading results in a cell:

l Loaded:

6-14

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6 System Maintenance

à Loaded indicates that the number of performance data records obtained from
the data loading table of the corresponding time period is the same as the
number of performance objects in the configuration table.
à If the number of performance data records obtained from the data loading
table of the corresponding time period is greater than 0, the number of records
in the configuration table is 0.
l Part Loaded indicates that the number of performance data records obtained
from the data loading table of the corresponding time period is smaller than the
number of performance objects in the configuration table.
l Over Loaded indicates that the number of performance data records obtained
from the data loading table of the corresponding time period is greater than the
number of performance objects in the configuration table.
l Hole indicates that the corresponding time point is not reached yet, or the time
point has been reached but the data loading table has no data.
Part Loaded and Over Loaded indicate data loading exceptions. Hole at a historical
time point also indicates a data loading exception. If Problematic is selected from the
Filter list, the data loading exception at a time point will be displayed in a row.
If the pointer is moved over a cell, a callout is displayed, indicating the number of
obtained performance data records in the data loading table at the corresponding time
point and the number of performance objects in the configuration table.
3. Click a cell in Part Loaded or Over Loaded status. The Subnet Details dialog box is
displayed, showing the data loading details of each subnetwork at the corresponding
time point, see Figure 6-25.

Figure 6-25 Subnet Details Dialog Box

In the Subnet Details dialog box, each record is displayed in the format of Subnet ID
x%(A/B), where x=A/B. A is the number of performance data records related to the
subnetwork in the performance table. B is the number of performance objects related
to the subnetwork in the configuration table.
– End of Steps –

6-15

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

6.4.4 Monitoring Data Aggregation


The data aggregation monitoring function allows you to view the data aggregation results
within a specified period of time based on different time granularities. This procedure
describes how to view the data aggregation results.

Steps
1. On the UniCare AOS-WebLite home page, select System Maintenance > Data
Flow Monitor > Data Aggregation Monitor. The Data Aggregation Monitor tab is
displayed, see Figure 6-26.

Figure 6-26 Data Aggregation Monitor Tab

2. Select a product type from Product, select a data type from Data Type, select a
granularity from Granularity, select a measurement type from Measurement Type,
select a date in Date, select All or Problematic from Filter, and then click the Query
button. The data aggregation results are displayed, see Figure 6-27.

6-16

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Chapter 6 System Maintenance

Figure 6-27 Queried Data Aggregation Results

l If Hour is selected from the Granularity list, the horizontal axis displays numeric
values ranging from 0 o’clock through 23 o’clock. The vertical axis displays
the measurement type(s). Each cell indicates the result of aggregating the
corresponding performance data in an hour.
l If Day is selected from the Granularity list, the horizontal axis displays
the selected date and the previous six days. The vertical axis displays
the measurement type(s). Each cell indicates the result of aggregating the
corresponding performance data in a day.
l If Week is selected from the Granularity list, the horizontal axis displays the first
day of the week in which the selected date is located and the first days of the
previous 11 weeks. The vertical axis displays the measurement type(s). Each
cell indicates the result of aggregating the corresponding performance data in a
week.
l If Month is selected from the Granularity list, the horizontal axis displays the first
day of the month in which the selected date is located and the first days of the
previous 11 months. The vertical axis displays the measurement type(s). Each
cell indicates the result of aggregating the corresponding performance data in a
month.
The following describes four possible data aggregation results in a cell:

l Aggregated indicates that the number of performance data records obtained from
the data aggregation table of the corresponding time period is the same as the
number of performance objects in the configuration table.
l Part Aggregated indicates that the number of performance data records obtained
from the data aggregation table of the corresponding time period is smaller than
the number of performance objects in the configuration table.
l Over Aggregated indicates that the number of performance data records
obtained from the data aggregation table of the corresponding time period is
greater than the number of performance objects in the configuration table.

6-17

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

l Hole indicates that the corresponding time point is not reached yet, or the time
point has been reached but the data aggregation table has no data.
If the pointer is moved over a cell, a callout is displayed, indicating the number of
obtained performance data records in the aggregation table at the corresponding time
point and the number of performance objects in the configuration table.
– End of Steps –

6-18

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Figures
Figure 2-1 UniCare AOS-WebLite Login Page .......................................................... 2-1
Figure 2-2 UniCare AOS-WebLite Home Page ......................................................... 2-2
Figure 3-1 Template Management Tab...................................................................... 3-2
Figure 3-2 Task Manager Tab ................................................................................... 3-3
Figure 3-3 Task Monitor Tab...................................................................................... 3-4
Figure 3-4 Step Detail Dialog Box ............................................................................. 3-4
Figure 4-1 User and Department Management Page ................................................ 4-3
Figure 4-2 Creating a User........................................................................................ 4-3
Figure 4-3 Creating a Department............................................................................. 4-4
Figure 4-4 List of Locked Users ................................................................................ 4-5
Figure 4-5 List of Logged-In Users ............................................................................ 4-6
Figure 4-6 User Blacklist Page.................................................................................. 4-7
Figure 4-7 Customize User Account Rule Page – Password Policy........................... 4-8
Figure 4-8 Account Lock Rule ................................................................................... 4-8
Figure 4-9 Account Policy ......................................................................................... 4-9
Figure 4-10 Operation Set Page ............................................................................. 4-10
Figure 4-11 Operation Set Detail Page.................................................................... 4-10
Figure 4-12 New Operation Set............................................................................... 4-11
Figure 4-13 Role and Role Set Management Page ................................................. 4-11
Figure 4-14 Creating a Role.................................................................................... 4-12
Figure 4-15 New Role ............................................................................................. 4-13
Figure 4-16 Creating a Role Set.............................................................................. 4-14
Figure 4-17 New Role Set....................................................................................... 4-14
Figure 5-1 All Operation Log Tab .............................................................................. 5-1
Figure 5-2 Query Condition Area .............................................................................. 5-2
Figure 5-3 Log Details............................................................................................... 5-2
Figure 6-1 Backup and Restore Page ....................................................................... 6-2
Figure 6-2 Backup Task ............................................................................................ 6-2
Figure 6-3 Execution Results of the Backup Task ..................................................... 6-3
Figure 6-4 Restore Task............................................................................................ 6-3
Figure 6-5 Execution Results of the Restoration Task ............................................... 6-4
Figure 6-6 Periodic Backup Task............................................................................... 6-4

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


NetNumen™ U31 R18 ZTE Data Collection Operation Guide

Figure 6-7 Check Leak Task Dialog Box.................................................................... 6-5


Figure 6-8 View Log Dialog Box................................................................................ 6-5
Figure 6-9 System Monitoring Page – Application Server.......................................... 6-6
Figure 6-10 Real-Time Information of an Application Server ..................................... 6-7
Figure 6-11 Console Processes ................................................................................ 6-7
Figure 6-12 AOS Process 1 ...................................................................................... 6-8
Figure 6-13 Database Monitor Tab ............................................................................ 6-8
Figure 6-14 Status Sub-Tab ...................................................................................... 6-9
Figure 6-15 Transaction Sub-Tab .............................................................................. 6-9
Figure 6-16 DBSpace Sub-Tab ............................................................................... 6-10
Figure 6-17 Data Exception Monitor Page............................................................... 6-11
Figure 6-18 Data Loading Exception Tab ................................................................ 6-11
Figure 6-19 Data Loading Exceptions ..................................................................... 6-12
Figure 6-20 Data Reaggregation Monitor Tab.......................................................... 6-12
Figure 6-21 Performance Data Query Results......................................................... 6-13
Figure 6-22 Reaggregation Process Details Dialog Box .......................................... 6-13
Figure 6-23 Data Loading Monitor Tab .................................................................... 6-14
Figure 6-24 Queried Data Loading Results ............................................................. 6-14
Figure 6-25 Subnet Details Dialog Box ................................................................... 6-15
Figure 6-26 Data Aggregation Monitor Tab.............................................................. 6-16
Figure 6-27 Queried Data Aggregation Results....................................................... 6-17

II

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential


Glossary
CPU
- Central Processing Unit
EMS
- Element Management System
JVM
- Java Virtual Machine
URL
- Uniform Resource Locator

III

SJ-20140724091740-025|2014-11-30 (R1.0) ZTE Proprietary and Confidential

You might also like