Professional Documents
Culture Documents
R002C02LG0201
Issue 01
Date 2010-09-29
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Intended Audience
This document describes the routine maintenance and operation procedures of the HUAWEI
CBS system.
This document is intended for:
l Maintenance engineers
l Technical support engineers
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Contents
2 Backup Strategies.......................................................................................................................2-1
2.1 Usage Instruction.............................................................................................................................................2-2
2.2 Backup Strategy Table....................................................................................................................................2-3
3 Daily Maintenance.....................................................................................................................3-1
3.1 I2000 Alarm Handling....................................................................................................................................3-2
3.2 I2000 Performance Monitoring.......................................................................................................................3-3
3.3 Monitoring the CBS Through the SMAP........................................................................................................3-6
3.4 Reconciling the CBS Through the SMAP.....................................................................................................3-10
3.5 Maintenance Tasks of the Operating Systems..............................................................................................3-12
3.5.1 Checking the Space Usage of File Systems (ATAE)...........................................................................3-14
3.5.2 Checking the Space Usage of File Systems (HP)................................................................................3-15
3.5.3 Checking the Space Usage of File Systems (IBM)..............................................................................3-16
3.5.4 Checking the Usage of the File System Space on the PC Server.........................................................3-17
3.5.5 Checking Memory Usage (ATAE)......................................................................................................3-18
3.5.6 Checking the Size of Free Memory (HP).............................................................................................3-19
3.5.7 Checking Memory Usage (IBM)..........................................................................................................3-19
3.5.8 Checking the Memory Usage on the PC Server...................................................................................3-20
3.5.9 Checking the CPU Usage (ATAE).......................................................................................................3-21
3.5.10 Checking the CPU Usage (HP)..........................................................................................................3-22
3.5.11 Checking the CPU Usage (IBM)........................................................................................................3-23
3.5.12 Checking the CPU Load on the PC Server........................................................................................3-24
3.5.13 Checking the Status of Network Adapters (ATAE)...........................................................................3-25
4 Weekly Maintenance.................................................................................................................4-1
4.1 Backing Up the Log Files (CBP)....................................................................................................................4-3
4.2 Backing Up the Log Files (BMP)...................................................................................................................4-4
4.3 Backing Up the Log Files (SCP).....................................................................................................................4-5
4.4 Backing Up the Log Files (Billing).................................................................................................................4-6
4.5 Backing Up the Log Files (AR&DC)..............................................................................................................4-7
4.6 Backing Up the Log Files (SMP)....................................................................................................................4-8
4.7 Backing Up Log Files on the UVC.................................................................................................................4-9
4.8 Backing Up Log Files on the EVC................................................................................................................4-10
4.9 Backing Up and Clearing History CDRs on the RBI....................................................................................4-11
5 Monthly Maintenance...............................................................................................................5-1
5.1 Maintenance Items Related to Applications....................................................................................................5-2
5.1.1 Changing the Passwords of Running Users ..........................................................................................5-4
5.1.2 Changing the Passwords of SMAP Operators........................................................................................5-5
5.1.3 Backing Up Configuration Files (CBP).................................................................................................5-6
5.1.4 Backing Up Configuration Files (BMP)................................................................................................5-7
5.1.5 Backing Up Configuration Files (Billing)..............................................................................................5-8
5.1.6 Backing Up Configuration Files (AR)...................................................................................................5-9
5.1.7 Backing Up Configuration Files (DC).................................................................................................5-11
5.1.8 Backing Up Configuration Files (SCP)................................................................................................5-12
5.1.9 Backing Up Configuration Files (SMP)...............................................................................................5-13
5.1.10 Backing Up Configuration Files of the GFEP...................................................................................5-14
5.1.11 Backing Up Configuration Files of the RBI.......................................................................................5-16
5.1.12 Backing Up Configuration Files of the iWeb.....................................................................................5-18
5.1.13 Backing Up the Application Program (CBP).....................................................................................5-19
5.1.14 Backing Up the Application Program (BMP)....................................................................................5-21
5.1.15 Backing Up the Application Program (AR&DC)..............................................................................5-22
5.1.16 Backing Up the Application Program (Billing).................................................................................5-24
5.1.17 Backing Up Log Files on the USAU..................................................................................................5-25
5.1.18 Backing Up Log Files on the URP.....................................................................................................5-26
5.1.19 Backing Up Log Files on the iWeb....................................................................................................5-26
5.1.20 Backing Up and Clearing CDR Files on the Billing..........................................................................5-28
5.1.21 Understanding the Service Trend Through iWeb Reports.................................................................5-29
5.1.22 Understanding Key Service Indexes Through the LBI System.........................................................5-31
5.2 Maintenance Items Related to Hardware......................................................................................................5-34
6 Yearly Maintenance...................................................................................................................6-1
6.1 Switching Test.................................................................................................................................................6-2
6.1.1 Testing the Switchover Between Two Nodes (ATAE)..........................................................................6-2
6.1.2 Testing the Switchover Between Two Nodes (HP)...............................................................................6-4
6.1.3 Testing the Switchover Between Two Nodes (IBM)...........................................................................6-14
6.1.4 Testing the Switchover Between the Boards on the USAU.................................................................6-17
6.1.5 Testing the Switchover Between the Boards on the URP....................................................................6-18
6.2 Cleaning the dust (ATAE).............................................................................................................................6-19
6.3 Cleaning the dust (Minicomputers)...............................................................................................................6-20
7 Holiday Maintenance................................................................................................................7-1
7.1 Evaluating the Traffic on the SCP...................................................................................................................7-2
A Appendix...................................................................................................................................A-1
A.1 Critical Operations in the CBS......................................................................................................................A-2
A.2 Impact Analysis Table of CBS Password Change......................................................................................A-11
A.3 Glossary.......................................................................................................................................................A-15
A.4 Acronyms and Abbreviations......................................................................................................................A-24
Figures
Tables
1 Overview
This topic describes the overview to and preparations for routine maintenance.
1.1 Concept of Routine Maintenance
This topic describes the definition, frequency, and objective of routine maintenance.
1.2 Requirements for Routine Maintenance
This topic describes the requirements for routine maintenance.
1.3 Maintenance Tools
This task describes the CBS maintenance tools, functions, corresponding documents, and paths
to the tools and documents.
1.4 Recommendations for Routine Maintenance
This topic describes the recommendations of routine maintenance.
Definition
Routine maintenance is also called predictive maintenance or periodical maintenance. Routine
maintenance is performed periodically when devices are in normal state.
Frequency
Frequency of performing each task is provided according to the following factors:
l Scenario of performing a task
l Risk ratio
l Effects of a risk in different periods
Objective
The objective of routine maintenance is as follows:
l Find potential problems in advance and make the device in proper running state.
l Learn the running status of the system and provide suggestions of the system development.
Physical Environment
l The temperature ranges from 15°C to 25°C. The recommended temperature is 20°C ± 2°
C. The hourly temperature variation is less than 3°C.
l The relative humidity ranges from 40% to 70%. The hourly relative humidity variation is
less than 3%.
l A high-voltage static air cleaner is a recommended device in the minicomputer room.
l Do not put the articles such as user manuals, software application manuals, report paper
and ribbons in the minicomputer room.
Storage
All the components not yet installed must be stored in a suitable storage space.
≥1 ≤ 4 x 107
≥ 1.5 ≤ 4 x 106
≥5 ≤ 4 x 105
Network Security
l The personnel that have no rights are prohibited from touching equipment.
l Avoid using terminals on the LAN to access Internet or play games, so as to avoid illegal
access and viruses.
l Avoid portable computers to connect to the LAN.
System Security
l Strictly control the enabling of the network services.
l The connection status of the network is routinely monitored to ensure that an access to the
network is authorized.
l Passwords of users must be changed periodically, and rights must be strictly controlled for
proper tasks.
Data Security
The backup plan must be carried out strictly to back up the system data periodically.
l Product documents
– Engineering documents of network
– Engineering documents of device
– Engineering documents of upgrade
– Networking diagram
– Equipment room layout
– Specifications of special software
l Technical documents, user documents, and maintenance documents delivered with
equipment. The completion of equipment documents must be ensured. In addition, files
must be updated in time along with device configuration and networking changes so as to
guide the maintenance more effectively.
l The previous routine maintenance tables for comparison must be ensured, so as to check
certain performance data, such as CPU, memory usage.
TabMnt Backs up and deletes the data of large TabMnt VxxxRxxxCxxBxx Installation
tables periodically. and Upgrade Guide
NOTE
You can obtain the paths to the preceding tools and documents at the website http://support.huawei.com.
For the specific paths, see the version matching table released with this version.
2 Backup Strategies
The important data or files in the CBS system need to be backed up periodically so that they can
be restored if necessary. This chapter describes the backup strategies of the core NEs and
neighboring NEs of the CBS system, including the backup strategies of operating systems,
databases, applications, logs, configuration files, and CDRs. Each backup strategy covers the
information such as the backup frequency, storage medium, and the contents to be backed up.
2.1 Usage Instruction
Service engineers need to read the backup strategies before performing backup operations to
obtain the information such as backup frequency, storage medium, and backup contents.
2.2 Backup Strategy Table
The backup strategy table contains the backup strategies of operating systems, databases,
applications, configuration files, logs, and CDRs.
Maintenance engineers need to understand the backup policy, including the information such as
the backup frequency, backup contents, and backup medium. In addition, maintenance engineers
need to understand the specific backup methods. For details about the backup policy, see 2.2
Backup Strategy Table. The backup methods are described in different maintenance cycle
chapters according to the backup frequency. The following is an example:
Example
[Example 1- Find Backup Task According to Backup Frequency] Backing up the database
1. Find the table named "Backup strategy: databases." Read the backup strategies for the
database of the XX NE to understand the backup contents and the backup frequency "every
day."
2. In the chapter related to daily maintenance, find the section related to backing up the
database of the XX NE, and then refer to the backup operation guide in this section.
[Example 2- Find Directly] Backing up the BMP operating system
1. Assume that the on-site BMP uses the ATAE server. full-text search the section related to
backing up the SuSE operating system , and then refer to the backup operation guide in this
section.
2. Maintenance engineers need to know about the backup medium and frequency according
to the table "Backup strategy: operating systems."
NOTE
The values described in this section are recommended values in normal cases. You can change them as
required. For example, the backup frequency relates to the number of subscribers of an office, so you need
to change the backup frequency according to the number of subscribers of this office. Generally, the greater
the number of subscriber is, the more frequent the data needs to be backed up.
Special description:
l Backup retention duration: If no special description is provided, the default retention
duration is to retain the backup files until the next backup is successful.
l Backup retention quantity: If no special description is provided, the default retention
quantity for database files is at least two copies. For backup of other data, at least one copy
of backup files is required.
l Backup level: If no special description is provided, the full backup is required for the
database backup.
l Active and standby nodes: If no special description is provided, all backup contents need
to be backed up on both the active and standby nodes.
CBP Every year; after Full Tape Manual Perform the backup in
each installation backup of special cases on both the
and upgrade root active and standby
volume nodes.
BMP Every year; after Full Tape Manual Perform the backup in
each installation backup of special cases on both the
and upgrade root active and standby
volume nodes.
Billin Every year; after Full Tape Manual Perform the backup in
g each installation backup of special cases on both the
and upgrade root active and standby
volume nodes.
UVC - - - - -
EVC - - - - -
GFEP - - - - -
RBI - - - - -
USA - - - - -
U
URP - - - - -
iWeb - - - - -
DCC - - - - -
Procx
y
Note: The character "-" indicates that the backup is not required.
NOTE
GFEP - - - - -
RBI - - - - -
iWeb - - - - -
DCC - - - - -
Procx
y
Note: The character "-" indicates that the backup is not required.
GFEP - - - - -
RBI - - - - -
iWeb - - - - -
DCC - - - - -
Procx
y
Note: The character "-" indicates that the backup is not required.
Billing Every week Full backup Tape or Manual (or Perform the
(00:00:00-04:00: disk purchase backup on both
00) backup the active and
software) standby nodes.
RBI - - - - -
USAU - - - - -
URP - - - - -
iWeb - - - - -
DCCPr - - - - -
ocxy
Note: The character "-" indicates that the backup is not required.
RBI - - - - -
iWeb - - - - -
DCC - - - - -
Procx
y
Note: The character "-" indicates that the backup is not required.
GFEP - - - - -
RBI - - - - -
DCCProcx - - - - -
y
Note: The character "-" indicates that the backup is not required.
CBP Every week Full backup Tape or disk Manual (or Perform the
(00:00:00-0 purchase backup on
4:00:00) backup both the
software) active and
standby
nodes.
GFEP - - - - -
RBI - - - - -
DCCProc - - - - -
xy
Note: The character "-" indicates that the backup is not required.
SCP Before and Full backup Tape or disk Manual Perform the
after each backup on both
upgrade the active and
standby nodes.
UVC Before and Full backup Tape or disk Manual Perform the
after each backup on both
upgrade the active and
standby nodes.
EVC Before and Full backup Tape or disk Manual Perform the
after each backup on both
upgrade the active and
standby nodes.
GFEP Every day config Tape or disk Automatic Verify that the
directory in backups are
the GFEP successful and
installation are transferred
directory to other media
every month
and before and
after each
upgrade. The
backup media
are unfixed.
USAU - - - - -
URP - - - - -
Note: The character "-" indicates that the backup is not required.
CBP Every month; Full backup Tape or disk (A Manual Perform the
before and single application backup on
after each node is backed up both the
upgrade on the appointed active and
disk space standby
(lvbackup) or nodes.
tape.)
BMP Every month; Full backup Tape or disk (A Manual Perform the
before and single application backup on
after each node is backed up both the
upgrade on the appointed active and
disk space standby
(lvbackup) or nodes.
tape.)
SCP Before and Full backup Tape or disk Manual Perform the
after each backup on
upgrade both the
active and
standby
nodes.
UVC Before and Full backup Tape or disk Manual Perform the
after each backup on
upgrade both the
active and
standby
nodes.
EVC Before and Full backup Tape or disk Manual Perform the
after each backup on
upgrade both the
active and
standby
nodes.
Note: The character "-" indicates that the backup is not required.
3 Daily Maintenance
This topic describes the maintenance items that need to be performed every day. The
maintenance items are the most important. To improve the efficiency, it is recommended that
the tools should be used to perform the maintenance items.
Prerequisite
l The connection of the I2000 client and the NE is normal.
l The I2000 is equipped with the audio or alarm box. In this manner, alarms can be found
through audio and visual prompt.
Context
None.
Procedure
Step 1 Choose Fault > Browse Current Fault Alarms by Status on the I2000 client or click on
the toolbar. You can view alarms in four states, as shown in Figure 3-1.
Step 2 Check detailed information about alarms in Unacknowledged and uncleare to locate the
problem.
l If an alarm needs to be processed, right-click the alarm and choose Acknowledge. The alarm
is moved to Acknowledged and uncleared.
l If an alarm does not exist or does not need to be processed, right-click the alarm and choose
Clear. The alarm is moved to Acknowledged and cleared.
Step 3 Choose Fault > Current Fault Alarms and click the hyperlink in Process Advice. The
maintenance engineers can open Alarm Reference Help, as shown in Figure 3-2.
Step 4 After the maintenance engineers drafts and implements the alarm processing scheme, the alarm
is cleared.
Step 5 Double-click the cleared alarm, and the Detail Information window is displayed. Click
Modify in the lower part of the Alarm Memo text box, enter the alarm maintenance experience,
and click Close.
----End
Example
None.
Exception Handling
None.
Prerequisite
l The connection between the I2000 client and the NE is normal.
l The performance monitoring task is created during installation and commissioning.
Context
Certain important KPI indexes of the CBS need to be monitored in real time. The maintenance
engineers can check the statistics through reports. In addition, they can learn the trend of KPI
indexes through performance monitoring. Table 3-1 shows the important KPI indexes of the
CBS.
1 The rate of The index indicates Number of Five minutes Less than
successful the ratio of the successful 95%
calling number of calls/Number
successful calls to of call
the total number of attempts
calls in a period.
2 The rate of The index indicates Number of Five minutes Less than
successful the ratio of the successful 95%
recharging number of recharges/
successful recharges Number of
to the total number recharges
of recharges in a
period.
3 The rate of The index indicates Number of Five minutes Greater than
offline CDR the ratio of the passby SMS 5%
number of SMS and CDRs +
voice offline CDRs Number of
to the total number passby call
of CDRs in a period. CDRs/
Number of
passby CDRs
+ Number of
normal CDRs
NOTE
The I2000 can monitor other items, for example, the usage of the file system space, the memory usage,
and the CPU load. It is recommended that you should check the items in the CDR pear hours.
Procedure
Step 1 Choose Performance > Performance Monitoring.
Step 2 Choose the Monitoring Task Management tab. The I2000 lists all the created performance
monitoring tasks, as shown in Figure 3-3.
Step 3 After selecting a monitoring task, choose the Monitoring Result Display tab. You can obtain
the trend of the performance change through the column chart or line chart, as shown in Figure
3-4.
Step 4 The maintenance engineers need to check whether the trend of the data is abnormal according
to different performance monitoring tasks.
l For the task of "the rate of successful calling", if the data curve is in the trend of decreasing
and the ratio of the number of successful calls to the total number of calls is less than 95%,
note the task and locate the problem.
l For the task of "the rate of successful recharging", if the data curve is in the trend of decreasing
and the ratio of the number of successful recharges to the total number of recharges is less
than 95%, note the task and locate the problem.
l For the task of "the rate of offline CDR", if the data curve is in the trend of increasing and
the ratio of the number of SMS and voice offline CDRs to the total number of CDRs is greater
than 5%, note the task and locate the problem.
----End
Example
None.
Exception Handling
If performance monitoring tasks are created, the maintenance engineers receive alarm messages
when the performance index is abnormal. Then, they can solve the problem in time. To know
how to process alarms on the I2000, see 3.1 I2000 Alarm Handling.
Prerequisite
l Each NE in the system is connected normally.
l The NE data collected by the system is written into the OM central database.
Context
The monitoring interface focuses on the application running status and load status. The
monitoring interface consists of two layers of view.
l The first-layer view is called monitoring layer 0. It collects the status data of each NE in
the system and displays the real-time running status of the entire system.
l The second-layer view is called monitoring layer 1. It displays the service running status
of an NE and current data of each node.
Table 3-2 describes the detailed alarm information on an NE on the monitoring layer 0.
Procedure
Step 1 Log in to the SMAP.
Step 2 Choose Monitor > Present > Index.
Step 3 The system displays monitoring layer 0, as shown in Figure 3-5. Maintenance engineers can
determine whether a service progress runs normally by checking the color of an icon at this layer.
Step 4 Double-click an NE monitoring icon at monitoring layer 0 to access monitoring layer 1 of this
NE. For example, double-click AR monitoring icon to access AR monitoring layer 1, as shown
in Figure 3-6. Maintenance engineers can monitor the current data and detailed information
about a node.
Step 5 Click at the upper right corner at monitoring layer 0 to access the page for
configuring data such as alarm threshold and CDR stacking alarm threshold, as shown in Figure
3-7.
----End
Example
None.
Exception Handling
Maintenance engineers can handle an alarm or error according to the following thoughts when
finding the alarm or error prompt on the monitoring interface:
Handle a CAPS alarm according to the exception handling of the Evaluating the Traffic on
the SCP.
Handle an error CDR according to the exception handling of the Checking the Offline CDR
on the CBP.
When the bill run data generated by the Billing is incorrect, exception information is recorded
in the corresponding task log. Maintenance engineers can rectify the exception according to the
exception information. To rectify the exception, do as follows:
1. Log in to the Billing.
2. Enable the log function by running setval -l debug.
When the deregistration data generated by the AR is incorrect, exception information is recorded
in the corresponding task log. Maintenance engineers can rectify the exception according to the
exception information. To rectify the exception, do as follows:
1. Log in to the server where the AR is located.
2. Enable the log function by running setval -l debug.
3. Access the log path ${HOME}/log/debug/bmp_debug.log.
If an error occurs when the Invoicing bills are formatted, maintenance engineers need to try to
format the bills again.
Prerequisite
l Each NE in the system is connected normally.
l The NE data collected by the system is written into the OM central database.
Context
Reconciliation can be classified into the following types according to involved NEs:
l Reconciling the number of CDRs between the CBP and the Billing, that is, checking
whether the number of CDRs generated by the CBP is the same as that of the CDRs received
by the Billing
l Reconciling the number of bills between the Billing and the Invoicing, that is, checking
whether the number of bills generated by the Billing is the same as that of bills processed
by the Invoicing
l Reconciling the number of accounts between the Billing and the AR, that is, checking
whether the number of accounts on which the Billing performs bill run is the same as that
of accounts deregistered by the AR
l Reconciling the number of transactions between the DC and the AR, that is, checking
whether the number of transactions performed by the AR is the same as that of the
transactions processed by the DC
l Reconciling the number of transactions between the CBP and the AR, that is, checking
whether the number of transactions performed by the AR is the same as that of the
transactions received by the CBP
NOTE
In addition to the inter-NE reconciliation function, the CBP has the intra-NE reconciliation function to reconcile
the number of online CDRs. The reconciliation formula is as follows: Number of messages + Number of split
messages = Number of charging CDRs + Number of error CDRs + Number of CDRs for subscribers not charged.
l NE reconciliation in the yellow box. Data on these NEs is reconciled by life cycle; that is,
data changes according to the bill cycle selected in the drop-down list box.
l NE reconciliation out of the yellow box. Data on these NEs is reconciled by date; that is,
data changes according to the displayed date.
Procedure
Step 1 Log in to the SMAP.
Step 2 Choose Monitor > Present > Index.
Step 3 The system displays monitoring layer 0.
Step 4 Click at the upper left corner to access the reconciliation interface, as shown
in Figure 3-8.
Step 6 Click at the upper right corner on the reconciliation page to access the configuration
page, as shown in Figure 3-9. You can configure the alarm thresholds for inter-NE
reconciliation.
----End
Example
None.
Exception Handling
This task is performed to check the status of the two-node cluster. If the status of the two-node
cluster is abnormal, serious security problems may occur in the system, and the switchover of
the two-node cluster may fail or the system is abnormal after the switchover.
3.5.18 Checking the Status of a Two-Node Cluster (HP)
This task enables you to check the status of a two-node cluster. If the status of a two-node cluster
is abnormal, serious security problems may occur in the system.
3.5.19 Checking the Status of a Two-Node Cluster (IBM)
This task enables you to check the status of a two-node cluster. If the status of a two-node cluster
is abnormal, serious security problems may occur in the system.
3.5.20 Checking the Status of the Two-Node Cluster on the PC Server
This topic describes how to check the status of the two-node cluster. If the two-node cluster runs
abnormally, there is a great potential risk on the security of the system. The two-node cluster
may fail to be switched or the system is abnormal after the switchover.
3.5.21 Checking Core Files
This task enables you to check whether core files are generated. If core files are generated, critical
system faults may occur.
Reference Standard
The space usage rate of each file system (especially /, /tmp, /var, ${TELLIN_DIR}, and /
opt) is less than 80%.
l The usage rate of / is less than 80%.
l The available space of /tmp is more than 500 MB.
l The available space of /var is more than 500 MB.
l The available space of /home is more than 500 MB.
l The available space of /opt is more than 800 MB.
Procedure
Step 1 Log in to a server as the root user.
# df -h
The values of Use% indicate the space usage of the file systems.
----End
Exception Handling
If the space usage of each file system exceeds 80%, you need to clean the disk space. Before
deleting files, make sure that the files are unnecessary. If any important file is deleted by mistake,
the system cannot run properly.
The following describes file systems according to their types:
l File systems of an operating system
For example, /, /tmp, /var, /home, and /opt. If the space usage of the file systems of this
type is high, exercise caution when deleting files. It is recommended that you contact
Huawei engineers before deleting files.
You can delete temporary files in /var/tmp and core files.
l File systems of applications
The general causes for high space usage of file systems are as follows:
– Logs increase rapidly, but cannot be backed up or deleted in time.
– The temporary files that are generated during the installation and running of the system
are not deleted in time.
Reference Standard
The space usage rate of each file system (especially /, /tmp, /var, and /opt) is less than 80%.
l The usage rate of / is less than 80%.
l The available space of /tmp is more than 500 MB.
l The available space of /var is more than 500 MB.
l The available space of /opt is more than 800 MB.
Procedure
Step 1 Log in to the active node and standby node as the root user.
Step 2 Check the space usage of file systems.
# bdf
The information similar to the following is displayed:
Filesystem kbytes used avail %used Mounted
on
/dev/vg00/lvol3 143360 59945 78225 43% /
/dev/vg00/lvol1 83733 30705 44654 41% /stand
/dev/vg00/lvol8 1048576 852155 195158 81% /var
/dev/vg00/lvol7 1069056 761592 288301 73% /usr
/dev/vg00/lvol4 1024000 10893 950105 1% /tmp
/dev/vg00/lvol6 2187264 1946813 225572 90% /opt
/dev/vg00/lvol5 2097152 841762 1179942 42% /home
The values of %Used indicate the space usage of the file systems.
----End
Exception Handling
If the space usage of the file systems does not meet the standards, delete unnecessary files to
release the space of the file systems.
CAUTION
Before deleting files, make sure that the files are unnecessary.
Reference Standard
The space usage rate of each file system (especially /, /tmp, /var, and /opt) is less than 80%.
l The usage rate of / is less than 80%.
l The available space of /tmp is more than 500 MB.
l The available space of /var is more than 500 MB.
l The available space of /opt is more than 800 MB.
Procedure
Step 1 Log in to the active node and standby node as the root user.
# df -m
The values of %Iused indicate the space usage of the file systems.
----End
Exception Handling
If the space usage of the file systems does not meet the standards, delete unnecessary files to
release the space of the file systems.
CAUTION
Before deleting files, make sure that the files are unnecessary.
3.5.4 Checking the Usage of the File System Space on the PC Server
This maintenance item helps you monitor the usage of the disk space to prevent the system or
the application running fault that is caused by great disk space usage.
Reference Standard
The usage of each file system space must be less than 80%. Note the usage of /, /tmp, /var, $
{TELLIN_DIR}, and /opt file systems.
NOTE
Precaution
You can use the following two methods to check the space usages of file systems.
l Through I2000
l Through UNIX commands
Procedure
Step 1 Log in as the root user.
Step 2 Check the disk space.
# df -k
The unit of the file system space is KB.
----End
Exception Handling
When the usage of each file system space is greater than 80%, you need to clean the disk space.
Before deleting a file, check whether the file can be deleted. If a file is deleted incorrectly, the
system may not run.
The following describes deletion of files:
Reference Standard
The idle memory is equal to or more than 10% of the total memory.
Procedure
Step 1 Log in to a server as the root user.
Step 2 Check the status of the memory.
# free -t
The information similar to the following is displayed:
total used free shared buffers cached
Mem: 7991 6798 1193 0 255 5990
-/+ buffers/cache: 551 7440
Swap: 2055 0 2055
----End
Exception Handling
If the check result does not meet the check standard, contact Huawei engineers.
Reference Standard
The idle memory is equal to or more than 10% of the total memory.
Procedure
Step 1 Log in to the active node and standby node as the root user.
Step 2 Check the size of free memory.
# top
The information similar to the following is displayed:
Memory: 420380K (211660K) real, 673084K (373396K) virtual, 14214760K free
----End
Exception Handling
If the check result does not meet the check standard, contact Huawei engineers.
Reference Standard
When the memory usage remains unchanged or increases continuously, it indicates that the
memory usage is not proper.
Procedure
Step 1 Log in to the active node and standby node as the root user.
Step 2 Check the size of the memory.
# svmon
The information similar to the following is displayed:
NOTE
----End
Exception Handling
If the check result does not meet the check standard, contact Huawei engineers.
Reference Standard
Ensure that the idle memory is not less than 30% of the total memory.
Precaution
None.
Procedure
Step 1 Log in as the root user.
Step 2 Check the size of the idle memory.
# free -t
The information similar to the following is displayed:
total used free shared buffers cached
Mem: 4147836 4086324 61512 0 140660 2859044
-/+ buffers/cache: 1086620 3061216
Swap: 1048552 0 1048552
Total: 5196388 4086324 1110064
The preceding information indicates that the total memory of the system is 5196388 KB and the
available memory is 1110064 KB.
----End
Exception Handling
The memory usage is great in the following situations:
l The memory leakage occurs on the memory database used by the database server.
l The memory cannot be released because the automatic machine is suspended.
The memory usage varies according to the application; thus, you need to analyze the memory
usage according to the situation.
To obtain the average memory usage, use corresponding functions of the I2000.
Reference Standard
l The average idle rate of the CPU is equal to or more than 25%.
l The CPU usage rate for each process is less than or equal to 70%. Otherwise, record the
process name and the time when the CPU usage rate for the process is more than 70%.
Procedure
Step 1 Log in to the active node and standby node as the root user.
----End
Exception Handling
If the check result does not meet the check standard, perform the following operations:
Step 1 If the CPU usage does not meet the check standard, you need to run the top command to check
whether all the process run properly. If any process runs abnormally, determine whether the
process is necessary. If the process is not necessary, end the process.
Step 2 If the CPU idle rate is less than 25%, it indicates that system hardware performance is poor and
capability expansion is required.
----End
Reference Standard
l The average idle rate of the CPU is equal to or more than 25%.
l The CPU usage rate for a single process is less than or equal to 70%.
Procedure
Step 1 Log in to the active node and standby node as the root user.
# top
TTY PID USERNAME PRI NI SIZE RES STATE TIME %WCPU %CPU COMMAND
? 48 root 152 20 3024K 2688K run 25:43 0.33 0.33 vxfsd
? 1420 root 152 20 162M 56920K run 4:08 0.22 0.21 cimserver
? 4463 root -27 20 47396K 39576K run 14:47 0.18 0.18 cmcld
? 1804 root 152 20 113M 16168K run 1:55 0.14 0.14 vxsvc
? 1413 root 152 20 25416K 3628K run 0:23 0.12 0.12 rpcd
pts/tb 15782 root 178 20 10868K 1000K run 0:00 0.13 0.10 top
? 512 root 152 20 7740K 1948K run 1:37 0.10 0.10 utmpd
? 1640 root 152 20 23820K 2856K run 0:22 0.08 0.08 swagentd
? 38 root 152 20 216K 192K run 8:20 0.06 0.06 schedcpu
? 966 root 152 20 11120K 1356K run 0:04 0.06 0.06 automountd
? 2158 root 154 10 8604K 1180K sleep 20:07 0.05 0.05 psmctd
? 19 root 191 20 144K 128K run 2:07 0.04 0.04
ksyncer_daemon
? 1 root 152 20 1960K 564K run 0:27 0.04 0.04 init
? 40 root 191 20 144K 128K run 0:01 0.04 0.04 cmcd
? 1296 root 152 20 9304K 1420K run 0:00 0.04 0.04 snmpdm
? 0 root 127 20 72K 64K sleep 0:48 0.02 0.02 swapper
? 2 root 128 20 72K 64K sleep 0:16 0.02 0.02 vhand
? 3 root 128 20 72K 64K sleep 2:11 0.02 0.02 statdaemon
? 4 root 128 20 72K 64K sleep 0:11 0.02 0.02 unhashdaemon
? 10 root 152 20 72K 64K sleep 4:30 0.02 0.02 nfsktcpd
? 11 root 152 20 288K 256K run 0:02 0.02 0.02 autofskd
? 12 root 147 20 72K 64K sleep 0:01 0.02 0.02 lvmkd
? 13 root 147 20 72K 64K sleep 0:01 0.02 0.02 lvmkd
? 14 root 147 20 72K 64K sleep 0:01 0.02 0.02 lvmkd
? 15 root 147 20 72K 64K sleep 0:02 0.02 0.02 lvmkd
? 16 root 147 20 72K 64K sleep 0:01 0.02 0.02 lvmkd
? 17 root 147 20 72K 64K sleep 0:01 0.02 0.02 lvmkd
? 20 root 133 20 72K 64K sleep 0:04 0.02 0.02 lvmdevd
? 23 root 100 20 72K 64K sleep 0:28 0.02 0.02 supsched
----End
Exception Handling
If the check result does not meet the check standard, resolve the problem by using the following
methods:
Step 1 If the CPU usage does not meet the check standard, you need to run the top command to check
whether processes run abnormally.
Step 2 If the CPU idle rate is less than 25% and all the processes run properly, it indicates that system
hardware performance is poor and capability expansion is required.
----End
Reference Standard
l The average idle rate of the CPU is equal to or more than 25%.
l The CPU usage rate for a single process is less than or equal to 70%.
Procedure
Step 1 Log in to the active node and standby node as the root user.
# vmstat 1 10
# topas
The information similar to the following is displayed:
Name PID CPU% PgSp Owner
topas 16636 0.0 1.3 root
dtscreen 21034 0.0 0.5 root
dtfile 7590 0.0 1.7 root
syncd 5750 0.0 0.5 root
gil 2838 0.0 0.1 root
xmgc 2064 0.0 0.0 root
aixmibd 46220 0.0 0.6 root
In the preceding information, CPU% indicates the CPU usage of a single process.
----End
Exception Handling
If the check result does not meet the check standard, perform the following operations:
Step 1 If the CPU usage does not meet the check standard, you need to run the topas command to check
whether processes run abnormally.
Step 2 If the CPU idle rate is less than 25% and all the processes run properly, it indicates that system
hardware performance is poor and capability expansion is required.
----End
Reference Standard
The average idle CPU usage cannot be less than 25%.
Precaution
None.
Procedure
Step 1 Log in as the root user.
Step 2 Check the CPU usage.
# top
The information similar to the following is displayed:
Cpu(s): 0.1% us, 0.0% sy, 0.0% ni, 99.9% id, 0.0% wa, 0.0% hi, 0.0% si
----End
Exception Handling
If the check result does not conform to the check standard, do as follows:
Step 1 If the CPU usage does not conform to the check standard, you need to run the top command to
check whether abnormal progresses are running.
Step 2 If the average CPU idle rate is lower than 25%, and no abnormal process exists in the system,
the hardware resources of the system are insufficient. You are then required to expand the
hardware resources.
----End
Reference Standard
The following conditions are met:
l The network adapters on the active node and standby node are in the RUNNING state.
l The transmission rate of each network adapter on the active node and standby node is 100
Mbit/s or 1000 Mbit/s in full-duplex mode, and the working mode is auto-negotiation.
Procedure
Step 1 Log in to the active node and standby node as the root user.
Step 2 Check the status of all network adapters.
# ifconfig -a
The information similar to the following is displayed:
eth0 Link encap:Ethernet HWaddr 00:18:82:35:05:4E
inet addr:192.168.0.185 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::218:82ff:fe35:54e/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2861537 errors:0 dropped:0 overruns:0 frame:0
TX packets:10 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:238299594 (227.2 Mb) TX bytes:748 (748.0 b)
Interrupt:169
Step 3 Check the transmission rates and working modes of the network adapters.
For example, you can run the following command to check the transmission rate and working
mode of the eth0 network adapter:
# ethtool eth0
According to the preceding information, the transmission rate of the network adapter is 1000
Mbit/s in full-duplex mode, and the working mode is auto-negotiation.
----End
Exception Handling
If the status of the network adapters is abnormal, or the transmission rates or working modes of
network adapters are incorrect, contact Huawei datacom engineers to check switch
configurations.
Reference Standard
l The software is in the CLAIMED state.
l The hardware is in the UP state.
l The transmission rate is 100 Mbit/s or 1000 Mbit/s.
l The communication mode is full-duplex.
l The working mode is auto-negotiation.
Procedure
Step 1 Log in to the active node and standby node as the root user.
# lanscan
Step 4 Check the transmission rate, communication mode, and working mode of a network adapter.
# lanadmin -x lan0
l 1000 indicates that the transmission rate of the network adapter is 1000 Mbit/s.
l Full-Duplex indicates that the communication mode of the network adapter is full-duplex.
l Autonegotiation indicates that the working mode of the network adapter is auto-negotiation.
----End
Exception Handling
l If the software or hardware of a network adapter does not work properly, contact HP
engineers.
l If the transmission rate, communication mode, or working mode of a network adapter is
incorrect, you can set the incorrect parameter again provided that services are not affected.
# lanadmin -X auto_on Network adapter No.
For example, run the following command:
# lanadmin -X auto_on 0
If the setting is successful, the information similar to the following is displayed:
WARNING: anincorrect setting couldcause serious network problems!!!
Driver is attempting tosetthenewspeed
Reset will take approximately 11 seconds
Reference Standard
In normal cases, make sure that:
l The network adapters on the active node and standby node are available.
l The transmission rate of each network adapter on the active node and standby node is 100
Mbit/s or 1000 Mbit/s in full-duplex mode, and the working mode is auto-negotiation.
Procedure
Step 1 Log in to the active node and standby node as the root user.
Step 3 Check the transmission rate and working mode of a network adapter.
----End
Exception Handling
l If the network adapter is in the abnormal state, contact IBM engineers.
l If the transmission rate or working mode is incorrect, use the SMIT tool to change the
transmission rate or working mode provided that services are not affected.
# smit chgenet
Select a network adapter whose attributes need to be modified. On the screen that appears,
change the value of Media Speed as required.
Change / Show Characteristics of an Ethernet Adapter
Type or select values in entry fields.
Press Enter AFTER making all desired changes.
[Entry Fields]
Ethernet Adapter ent0
Description 2-Port 10/100/1000 Base-
TX PCI-X Adapter (14108902)
Status Available
Location 07-08
Transmit jumbo frames
no
Enable hardware transmit and receive checksum yes
Media speed Auto_Negotiation
Enable ALTERNATE ETHERNET address
no
ALTERNATE ETHERNET address
[0x000000000000]
Apply change to DATABASE only
no
Enable failover mode disable
NOTE
Reference Standard
In normal condition, make sure that:
l The status of each NIC is RUNNING.
l The transmission rate is 100 Mbit/s full-duplex or 1000 Mbit/s full-duplex and the working
mode is auto-negotiation.
Precaution
None.
Procedure
Step 1 Log in as the root user.
Step 2 Check the status of the network adapter.
# ifconfig -a
Step 3 Check the rate and working mode of the network adapter.
Checking the eth1 network adapter is used as an example.
# ethtool eth1
The information similar to the following is displayed:
Settings for eth1:
Supported ports: [ TP ]
Supported link modes: 10baseT/Half 10baseT/Full
100baseT/Half 100baseT/Full
1000baseT/Full
Supports auto-negotiation: Yes
Advertised link modes: 10baseT/Half 10baseT/Full
100baseT/Half 100baseT/Full
1000baseT/Full
Advertised auto-negotiation: Yes
Speed: 1000Mb/s
Duplex: Full
Port: Twisted Pair
PHYAD: 0
Transceiver: internal
Auto-negotiation: on
Supports Wake-on: umbg
Wake-on: d
Current message level: 0x00000007 (7)
Link detected: yes
Where, the transmission rate of the NIC is 1000 Mbit/s and full-duplex and the working mode
is auto-negotiation.
----End
Exception Handling
If the network adapter is in abnormal state, or the rate and working mode of the network adapter
are incorrect, contact Huawei engineers.
Reference Standard
In normal condition, the status of the two-node cluster is as follows:
l On the host phost1_1:
The ASMainGrp and FaultSpyGrp service group is in ONLINE state.
l On the host phost1_2:
– The ASMainGrp service group is in OFFLINE state.
Precaution
You can check the status of the two-node cluster in the following log files in /var/VRTSvcs/
log:
l engine_A.log: recording operations performed on the VCS and information about the agent
script.
l bmp_spy.log: recording monitoring information about BMP resources.
l informix_spy.log: recording monitoring information about Informix resources.
l oracle_spy.log: recording monitoring information about Oracle resources.
l fault_spy.log: recording monitoring information about FaultSpy resources.
l atae_lvm_volume_group.log: recording monitoring information about
ATAELVMVolumeGroup resources.
Procedure
Step 1 Log in to the active node and the standby node as the root user.
----End
Exception Handling
If the result does not meet the standard, locate the fault by analyzing logs.
If you need to restart the two-node cluster manually, see the HUAWEI CBS Installation Guide
or contact Huawei engineers.
Reference Standard
l The cluster is in the up state.
l The package is in the up or running state.
Procedure
Step 1 Log in to the active node and standby node as the root user.
Step 2 Check the running status of the two-node cluster.
# cmviewcl -v
The information similar to the following is displayed:
CLUSTER STATUS
cluster up
Node_Switching_Parameters:
NODE_TYPE STATUS SWITCHING NAME
Primary up enabled host1a (current)
Alternate up enabled host1b
----End
Exception Handling
If the status of the two-node cluster is abnormal, rectify the problem according to logs.
If the problem persists, contact Huawei engineers.
Reference Standard
The proper status of the two-node cluster is as follows:
l Cluster status
– In the case of the two-node cluster software HACMP5.2, the clstrmgrES, clinfoES,
and clsmuxpdES processes are in the active state on the active node and standby node.
– In the case of the two-node cluster software HACMP5.3 or a later version, the
clstrmgrES and clinfoES processes are in the active state on the active node and
standby node.
– The appspy process is in the active state on the active node and is in the inoperative
state on the standby node.
l Network status
– In the case of the two-node cluster in cold standby mode, the boot IP address on the
active node is in the DOWN state, and other IP addresses are in the UP state.
– In the case of the two-node cluster in hot standby mode, all the IP addresses are in the
UP state.
Precaution
l In the cluster software of HACMP5.3 or a later version, the clsmuxpdES process is
integrated into the clstrmgrES process. Therefore, you cannot find the clsmuxpdES
process.
l If the appspy processes on the active node and standby node are in the inoperative state,
it indicates that the package of the system or the clinfo process on the active node is not
running. In this case, the two-node cluster cannot be switched over.
Procedure
Step 1 Log in to the active node and standby node as the root user.
Step 2 Check the status of the two-node cluster.
1. Check the status of the processes of the two-node cluster.
# lssrc -g cluster
The information similar to the following is displayed:
Subsystem Group PID Status
clstrmgrES cluster 450718 active
clinfoES cluster 503888 active
NOTE
If the preceding command cannot be used, run the /usr/sbin/cluster/clinfo command to restart the clinfo
process.
----End
Exception Handling
If the check result does not meet the check standard, perform the following operations:
Step 1 Run the smit clstart command to restart the cluster software if the cluster software is not started
on the active node or standby node, that is, not all the clstrmgrES, clsmuxpdES, and
clinfoES processes are displayed after you run the lssrc -g cluster command.
Step 2 Run the startsrc -s appspy command to activate the appspy process if the appspy process on
the active node is in the inactive state.
----End
Reference Standard
The two-node cluster runs normally and no error message is displayed.
Precaution
Perform the following operations on the active and standby nodes.
Procedure
Step 1 Log in to the active node or the standby node as the root user.
Step 2 Run the following command to check the running status of the two-node cluster:
# hastatus -sum
A node-01 RUNNING 0
A node-02 RUNNING 0
If the State column of each node is displayed as RUNNING, it indicates that the status of the
cluster is normal.
----End
Exception Handling
If the result does not meet the standard, analyze the fault according to logs, and then locate the
cause. The log files of the two-node cluster are in /var/VRTSvcs/log. Run the more command
to check the logs of the two-node cluster, and then locate the cause of the exception. If you need
to restart the two-node cluster manually, see the HUAWEI CBS Installation Guide or contact
Huawei engineers.
Reference Standard
No core files exist.
Precaution
Perform the following operations on the active node and standby node: (The operations may
affect system performance. Therefore, perform the operations when the traffic is low.)
Procedure
Step 1 Log in to a server as the root user.
Step 2 Search for core files.
# find / -name "*core*" -print
----End
Exception Handling
If core files are generated, contact Huawei engineers.
Reference Standard
In normal condition, the status is as follows:
l Status of the communication between the active node and standby node of the SMDB
The difference between the values of MsgID and AckMsgID must be less than 1.
Otherwise, it indicates that an exception occurs in the communication between the active
node and standby node of the SMDB.
l Status of the SMDB
The System Mode of the active node is Primary, and the System Mode of the standby node is
Secondary.
Precaution
None.
Procedure
Step 1 Log in to the system as the smdb user.
Step 2 Run the following command to check the status of the memory database:
% mdstatus -s
The information similar to the following is displayed:
Shared memory System Info
----End
Exception Handling
If the check result does not meet the standard, contact Huawei engineers.
Reference Standard
The sum of Free Size is greater than 20% of the sum of Total Size for each space.
Precaution
None.
Procedure
Step 1 Log in to the active node and standby node as the smdb user.
Step 2 Run the following command:
% mdstatus -sp
The information similar to the following is displayed:
Spaces Information:
Name Type Create Time Total Size Free
Size
------------------------------- --------- ------------------- ----------
---------
dspace0 data 2009-10-22 21:52:30 16.00 MB 15.81 MB
space1 data 2009-10-22 21:52:30 20.00 MB 20.00 MB
------------------------------- --------- ------------------- ----------
---------
ispace0 index 2009-10-22 21:52:30 16.00 MB 16.00 MB
------------------------------- --------- ------------------- ----------
---------
hspace0 hash 2009-10-22 21:52:30 20.00 MB 6.39 MB
Check whether the available memory of each space occupies more than 20%.
----End
Exception Handling
If the remaining space is less than 20% of the total space, locate the fault. If the fault cannot be
located, contact Huawei engineers. Check whether the database space needs to be increased. To
increase the space, you can refer to the following steps. (The following commands are for
reference only. Please use the command parameters according to the actual situation.)
Step 1 Log in to the active node and standby node as the smdb user.
Step 2 Run the following command to access the mdsql tool operation interface:
% mdsql
Step 3 Run the following command to create a space:
The command format for creating a space is as follows:
create space space_name type [temp] data|hash|index size value
NOTE
Assume that you need to create a space named test0, the type is data, and the size is 17 MB. The
relevant command is as follows:
admin#dbsql> create space test0 type data size 17 ;
If the command is run successfully, the following information is displayed:
create space test0 succeeded.
----End
Prerequisite
The available space size of the backup directory must be greater than the size of the SMDB.
Context
None.
Procedure
Step 1 Log in to the active node of the CBP system as the smdb user.
BackupDir: indicates the backup directory of the SMDB, specified by the DBFilePath parameter in the
$HOME/smdb/cfg/smdb_config.cfg file.
The value of Total Database Size displayed on the screen indicates the size of the SMDB.
Running this command is to start the backup. To check whether the backup is complete, run the mdbackup
-s command to see the progress.
If the SMDB runs in single-node mode, you need to run the mdmode -s primary -f command to change
to the active-node mode. After the mdb_pmon process starts the mdb_dwrt process, you can perform the
level-0 backup.
----End
Exception Handling
If any exception occurs, do as follows:
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Reference Standard
The listener is in the READY or UNKNOWN state.
Procedure
Step 1 Log in to the active node as the oracle user.
% lsnrctl status
----End
Exception Handling
l If the following information is displayed after you run the lsnrctl status command, it
indicates that the listener is not started:
TNS-12541: TNS:no listener
In this case, run the lsnrctl start command to start the listener.
l If other error information is displayed after you run the lsnrctl status command, contact
Huawei engineers.
Reference Standard
The value of the %Used column for every tablespace is less than 75%.
Precaution
None.
Procedure
Step 1 Log in to the active node as the oracle user.
----End
Exception Handling
If the remaining space of a tablespace is insufficient, enlarge the size of the file system or LV
to increase the tablespace or delete unnecessary history data to lower the usage of the tablespace.
Reference Standard
If the following information is displayed, it indicates that port number 1521 of the Oracle
database is being listened on properly:
tcp 0 0 10.10.11.3.1521 *.* LISTEN
NOTE
The content in bold indicates the floating IP address and port number of the server where the Oracle database
is installed.
Procedure
Step 1 Log in to the active node as the oracle user.
Step 2 Check the status of the listening port.
% netstat -an | grep LISTEN | grep 1521
If the information similar to the following is displayed, it indicates that the staus of the listening
port is normal:
tcp 0 0 10.10.11.3.1521 *.* LISTEN
----End
Exception Handling
If the status of the listening port is abnormal, perform the following operations:
1. Check whether the Listener process is started.
lsnrctl status
The following information is displayed:
Connecting to (DESCRIPTION=(ADDRESS=(PROTOCOL=IPC)(KEY=EXTPROC1521)))
STATUS of the LISTENER
------------------------
Alias LISTENER
Version TNSLSNR for Linux: Version 11.1.0.6.0 - Production
Start Date 24-MAR-2010 11:04:59
Uptime 1 days 3 hr. 32 min. 43 sec
Trace Level off
Security ON: Local OS Authentication
SNMP OFF
Listener Parameter File /opt/oracle/product/11.1/network/admin/listener.ora
Listener Log File /opt/oracle/diag/tnslsnr/bme232/listener/alert/
log.xml
Listening Endpoints Summary...
(DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(KEY=EXTPROC1521)))
(DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=bme232)(PORT=1521)))
Services Summary...
Service "ora" has 1 instance(s).
Instance "ora", status READY, has 1 handler(s) for this service...
The command completed successfully
NOTE
In normal cases, you do not need to restart the database after the Listener process is started.
2. If the Listener process is started, check whether the port number for the Listener process
in $ORACLE_HOME/network/admin/listener.ora is 1521.
vi $ORACLE_HOME/network/admin/listener.ora
The following information is displayed:
LISTENER =
(DESCRIPTION_LIST =
(DESCRIPTION =
(ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC1521))
(ADDRESS = (PROTOCOL = TCP)(HOST = bme232)(PORT = 1521))
Reference Standard
l The listener.log file does not contain error information that starts with ORA-, TNS-, or
dead lock.
l The size of the listener.log file does not exceed 50 MB.
Procedure
Step 1 Log in to the active node and standby node as the oracle user.
Step 2 Search for the listener.log file.
find . -name "listener.log"
The information similar to the following is displayed:
./product/11g/db/log/diag/tnslsnr/bme233/listener/trace/listener.log
./diag/tnslsnr/bme233/listener/trace/listener.log
----End
Exception Handling
l If the listener.log file contains error information that starts with ORA-, TNS-, or dead
lock, report the error information to Huawei engineers.
l If the size of the listener.log file exceeds 50 MB, it is recommended that you clear the file.
For example, delete the content "echo > listener.log", but do not delete the listener.log file.
NOTE
Prerequisite
None.
Context
CAUTION
The level-0 backup operation is performed at idle time, generally finished within four hours after
00:00.
This section provides only backup solution. For the method and procedure of backup (charged),
contact Huawei marketing.
Procedure
Step 1 Visit http://support.huawei.com, and apply for the permission to download documents from this
website.
Step 2 For the backup solution, see the ENIP V100R003C02-Special Topic-CBS Oracle11g Database
Backup and Recovery at http://support.huawei.com.
----End
Exception Handling
If any exception occurs, do as follows:
Reference Standard
l In shared disk mode:
The database on the active node is in the On-Line state.
l In HDR mode:
– The database on the active node is in the On-Line (Prim) state and the database on the
standby node is in the Read-Only (Sec) state.
– The State parameter for HDR synchronization is set to on.
Precaution
In shared disk mode, you need to check only the active node. In HDR mode, you need to check
both the active node and standby node.
Procedure
Step 1 Log in to the active node and standby node as the informix user.
Step 3 In HDR mode, run the following command to check the HDR synchronization status.
% onstat -g dri
Data Replication:
Type State Paired server Last DR CKPT (id/pg)
primary on host_online1_net 976 / 2339
DRINTERVAL 30
DRTIMEOUT 30
DRLOSTFOUND /opt/informix/etc/dr.lostfound
----End
Exception Handling
If the check result does not meet the check standard, check the status of the Informix database
every 3 seconds. If the status of the Informix database is abnormal, run the following commands
to restart the database and then check the status again:
% onmode -ky
% oninit
% onstat -
Reference Standard
The total usage rate of the workdbs data space is equal to or less than 80%.
NOTE
The formula used to calculate the usage of all workdbs data spaces is as follows: [(Sum of values in the
size column - Sum of values in the free column)/Sum of values in the size column] x 100%
Precaution
In shared disk mode, you need to check only the active node. In HDR mode, however, you need
to check both the active node and standby node.
Procedure
Step 1 Log in to the system as the informix user.
% onstat -d
If the information similar to the following is displayed, pay attention to the values in the size
and free columns, and use the preceding formula to calculate the usage of all the workdbs data
spaces.
l IBM
Chunks
address chunk/dbs offset size free bpages flags
pathname
700000010340bf8 4 4 10 318216 311324 PI-- /dev/
rlvworkdbs1
700000010184228 6 4 10 393216 393213 PI-- /dev/
rlvworkdbs2
700000010184558 8 4 10 393216 393213 PI-- /dev/
rlvworkdbs3
l HP and ATAE
Chunks
address chunk/dbs offset size free bpages flags pathname
c000000007ce2b20 4 4 20 1000000 959348 PO-- /dev/vgphydb/
rlvworkdbs1
c000000007ce2e60 6 4 20 1000000 999997 PO-- /dev/vgphydb/
rlvworkdbs2
700000010184558 8 4 10 393216 393213 PI-- /dev/vgphydb/
rlvworkdbs3
----End
Exception Handling
If the total usage of all the workdbs data spaces does not meet the requirement, perform the
following operations to increase data spaces:
Step 1 Add the logical volume (LV) of the raw type according to the disk space usage.
l IBM
# mklv -t raw -e x -y lvworkdbs1 phydbvg 32 hdisk3
l HP
# lvcreate -n lvworkdbs1 -l 32 /dev/phydbvg
l ATAE
# vxassist -g vgphydb -U gen make lvworkdbs1 Size vgphydb_1
NOTE
l The value lvworkdbs1 indicates the name of a new LV, phydbvg and vgphydb are the names of the
VGs to which workdbs belongs, and vgphydb_1 is the name of the disk that corresponds to
vgphydb.
l The value 32 indicates the number of logical partitions (LPs). The formula used to calculate the number
of LPs is LV size/LP size.
----End
Reference Standard
The following contents must exist at the beginning of etc/log_full.sh:
ontape -a<
n
!
Precaution
Both the active node and standby node are checked in HDR mode.
Procedure
Step 1 Log in to the active node and the standby node as the informix user.
Step 2 Run the following command:
% view etc/log_full.sh
----End
Exception Handling
If the check result does not meet the standard, do as follows:
Step 1 If you do not back up logs by storing them, you need to add the four lines of statements to the
file and ensure that the logbak.sh timed task does not exist in crontab; otherwise, the HDR may
be abnormal.
Step 2 If you back up logs by storing them, the four lines of statements are not needed. Ensure that the
logbak.sh timed task exists in crontab.
----End
Prerequisite
None.
Context
l The database is backed up to the tape drive.
l When the ontape interactive backup is adopted, view the online.log file. If the following
information is displayed, it indicates that the backup is successful.
Archive on rootdbs, logdbs, phydbs, workdbs Completed
Procedure
Step 1 Log in to the system as the informix user.
----End
Exception Handling
If any exception occurs, do as follows:
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Reference Standard
The service manager of SQL Server 2000 runs normally.
Precaution
None.
Procedure
Step 1 Double-click , which represents the service manager of SQL Server 2000, on the BAM
server. The SQL Server2000 Service Manager dialog box is displayed.
Step 2 Select SQL Server Agent from the Services drop-down list box.
If Then
If the icon in the white round of the left It indicates that the service manager of SQL
window is a green triangle as shown in Server 2000 runs normally.
Figure 3-10
If the icon in the white round of the left It indicates that the service manager of SQL
window is a red block as shown in Figure Server 2000 stops running. Click Start/
3-11 Continue. The manager refreshes the service.
Figure 3-10 Window where the service manager of SQL Server 2000 is running
Figure 3-11 Window where the service manager of SQL Server 2000 stops running
----End
Exception Handling
If the SQL Server2000 server manager stops running, click Start/Continue to restart the service.
Reference Standard
The usage of each tablespace cannot exceed 70%.
Precaution
None.
Procedure
Step 1 Log in to the console as the user of the database.
Step 2 Select the database and check the properties. Then, select data files and check the usage of the
database, as shown in Figure 3-12.
----End
Exception Handling
If the usage of a tablespace is greater than 70%, you need to add data files to the tablespace
immediately in the following way:
Log in to the console to select the database. Right-click the shortcut menu and choose
Properties. Click the Data Files tab in the dialog box that is displayed and add a data file, as
shown in Figure 3-13.
Prerequisite
l The BAM runs normally.
l The Microsoft SQL Server 2000 runs normally.
Context
Before expansion, upgrade, and loading, you must back up the BAM database and registry table
manually. In this case, you are advertised to use independent backup media. To back up data
through the backup media, ensure that the database is backed up manually. You can back up the
database manually in the following ways:
Procedure
Step 1 Choose Start > Programs > Microsoft SQL Server > Enterprise Manager.
Step 2 Right-click the displayed window and select the database that needs to be backed up, as shown
in Figure 3-14.
Step 3 Choose All Tasks > Backup Database.... The window shown in is displayed.
Figure 3-15 Selecting the database and backup mode in the SQL server backup window
Figure 3-16 Window of determining the file path and file name of the backup data
Step 4 When you back up the data, select the file name and device to be backed up and click OK. Then,
the system starts to back up data. After the system backs up data successfully, the system displays
a message indicating that the backup is complete.
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
l If the disk space is insufficient, clear the disk space or increase the disk space.
l If the disk space is sufficient, go to the next step.
2. Contact Huawei engineers.
Reference Standard
The DB2 database has been started.
Precaution
None.
Procedure
Step 1 Log in to the host where the DB2 database is installed as the administrator of the DB2 server
(for example, dasadm1), and then run the following command:
db2admin start
If the following information is displayed, it indicates that the DB2 management server has been
started normally:
SQL4409W The DB2 Administration Server is already active.
Step 2 Log in to the host where the DB2 database is installed as the instance user of the DB2 database
(for example, db2inst1), and then run the following command:
db2 get instance
Step 3 Check the current instance (Generally, the instance is db2inst1.), and then run the following
command:
db2start
If the following information is displayed, it indicates that the instance has been started normally:
12/20/2005 17:44:44 0 0 SQL1026N The database manager is already active.
SQL1026N The database manager is already active.
Step 4 Assume that the name of the database is db123. Log in to the host where the DB2 database is
installed as the instance user of the DB2 database (for example, db2inst1), and then run the
following command:
db2 connect to db123
If the following information is displayed, it indicates that the DB2 database is connected
successfully:
Database Connection Information
Database server = DB2/LINUX 8.2.0
SQL authorization ID = DB2INST1
Local database alias = db123
----End
Exception Handling
If the service of the DB2 database does not start, log in to the DB2 database as the db2inst1
user. Then, run the db2start command to start the instance of the DB2 database.
Reference Standard
The remaining space must be equal to or greater than 20% of the total tablespace.
Precaution
None.
Procedure
Step 1 Log in to the database as the DB2 instance user to install the device.
db2
Step 3 Run the following command to connect to the DB2 database:
connect to db123
Step 4 Run the following command to check detailed information about all the tablespaces of the
database:
list tablespaces show detail
The following information is displayed:
Tablespace ID = 2
Name = USERSPACE1
Type = Database managed space
Contents = Any data
State = 0x0000
Detailed explanation:
Normal
Total pages = 25600
Useable pages = 25568
Used pages = 6752
Free pages = 18816
High water mark (pages) = 6752
Page size (bytes) = 4096
Extent size (pages) = 32
Prefetch size (pages) = 32
Number of containers = 1
CAUTION
Free pages indicates the remaining pages of a tablespace and the size of each page is 4 KB.
Step 5 You can check information about a specified tablespace container according to the Tablespace
ID that is queried in step 4. Assume that information about tablespace container 2 is queried.
Then run the following command:
list tablespace containers for 2
The detailed information about the tablespace container is as follows:
Container ID = 0
Name = /opt/db2/tsdata/userspace1
Type = File
Total pages = 25600
Useable pages = 25568
Accessible = Yes
CAUTION
The number of remaining pages of the tablespace container is the number of usable pages
subtracted from the number of total pages. The size of each page is 4 KB.
----End
Exception Handling
If the usage of a tablespace exceeds 70%, data files are added to the tablespace.
Reference Standard
The number of started containers in the CBP is the same as the setting in the ${HOME}/config/
node.cfg file.
Precaution
For the CBP two-node cluster in hot standby mode, perform the following operations on the
active node and standby node.
For the CBP two-node cluster in cold standby mode, the following steps need to be performed
only on the active node.
Procedure
Step 1 Log in to the CBP system as the cbp user.
Step 2 Run the following command to check the CBP system process status.
cbp% p
The information similar to the following is displayed:
----End
Exception Handling
If the status of the CBP processes is abnormal, check process start logs or contact Huawei
engineers.
Reference Standard
The number of started containers in the BMP is the same as the setting in the ${HOME}/config/
node.cfg file.
Precaution
None.
Procedure
Step 1 Log in to the BMP system as the bmp user.
Step 2 Run the following command to check the BMP system process status.
bmp% p
If the system displays information similar to the following, it indicates that the status of the BMP
processes is normal.
UID PID PPID C STIME TTY TIME ALIASNAME
bmp 20358 1 0 Sep27 ? 00:01:43 Monitor 0
bmp 20405 20358 0 Sep27 ? 00:02:44 Center 1
bmp 20280 1 0 Sep27 ? 00:00:34 configDaemon
bmp 20090 1 0 Sep27 ? 00:00:04 icdcomm
bmp 20156 1 0 Sep27 ? 00:00:00 idagent
bmp 20150 1 0 Sep27 ? 00:00:00 idcenter
bmp 20317 1 0 Sep27 ? 00:00:47 idlproxy
bmp 20298 1 0 Sep27 ? 00:00:51 namingDaemon
bmp 17486 1 0 Sep27 ? 00:00:00 ExprServer -d
bmp 29446 1 0 Sep27 ? 00:00:00 Apache -k
bmp 14986 14960 3 Sep27 ? 01:31:21 jboss 1
bmp 17386 1 0 Sep27 ? 00:06:53 monitor_jboss
After the processes of the BMP are started, all the process IDs remain unchanged.
----End
Exception Handling
If the status of the BMP processes is abnormal, check process start logs or contact Huawei
engineers.
Reference Standard
The counts of the sdf processes, scf processes, and sbf processes are the same as the values of
NrOfSDF, NrOfSCF, NrOfSBF set in the ${TELLIN_DIR}/config/nodesys.cfg file
respectively.
Precaution
For the SCP two-node cluster in hot standby mode, perform the following operations on the
active node and standby node.
For the SCP two-node cluster in cold standby mode, the following steps need to be performed
only on the active node.
Procedure
Step 1 Log in to the SCP system as the scu user.
Step 2 Run the following command to check the SCP system process status.
scu% p
NOTE
The counts of the sdf processes, scf processes, and sbf processes are the same as the values of NrOfSDF,
NrOfSCF, NrOfSBF set in the ${TELLIN_DIR}/config/nodesys.cfg file respectively.
After the processes of the SCP are started, all the process IDs remain unchanged.
----End
Exception Handling
If the status of the SCP processes is abnormal, check process start logs or contact Huawei
engineers.
Reference Standard
On the DCC proxy, the Monitor, DiamAdapte, lom, and icdcomm processes have been started.
Precaution
None.
Procedure
Step 1 Log in to the active and standby nodes as the dcc user.
dcc% p
If the following information is displayed on the active node, it indicates that the DCC proxy
service has been started.
UID PID PPID C STIME TTY TIME COMMAND
dcc 684220 1 0 00:15:43 - 0:35 Monitor 0
dcc 380968 684220 0 00:15:45 - 0:41 DiamAdapte 120
dcc 495830 1 0 00:15:40 - 0:32 lom
dcc 573608 1 0 10:47:36 - 0:00 filemirror
dcc 577788 1 0 22:49:28 - 1:17 icdcomm
The system of the standby node displays the following running status of the processes:
UID PID PPID C STIME TTY TIME COMMAND
dcc 1507500 1 0 11:53:43 - 0:04 Monitor 0
dcc 684102 1507500 2 11:53:44 - 0:05 DiamAdapte 120
dcc 389236 1 0 11:53:39 - 0:03 lom
dcc 491612 1 0 11:53:38 - 0:00 icdcomm
----End
Exception Handling
If an exception occurred in the process and the problem cannot be solved after the restart, contact
Huawei engineers.
Reference Standard
The information about the background process is displayed.
For example, the following information is displayed if the cmdmgr process is normal:
b2ins 20669 1 0 10:25 ? 00:00:00 cmdmgr -n 101
Procedure
Step 1 Log in to a server through Telnet.
Step 2 Run the following command to perform the routine check:
ps -fu ${LOGNAME} | grep XXX | grep -v grep
NOTE
----End
Exception Handling
If a process ends, restart the process.
The following takes the cmdmgr process as an example to describe how to restart a process:
1. Log in to the server where the Billing background process runs as the Billing background
user through Telnet.
2. Run the cmdmgr command to restart the process.
NOTE
Before restarting the process, run the process name —h command to view Syntax.
Reference Standard
The connection status of each port is ESTABLISHED.
Precaution
None.
Procedure
Step 1 Log in to the active node as the cbp user.
Step 2 Run the following command to check the status of the RCOMMAdapter port of the CBP:
% netstat -an | grep 8060
The information similar to the following is displayed:
tcp4 0 0 10.10.11.3.8060 *.* LISTEN
NOTE
Here, the port number 8060 is only for reference. To view the specific port number, use the configadm
tool.
key1:
ENIP.Common.SMCenter.ftp.username
value1:
enip
key2:
ENIP.Common.SMCenter.TransferType
value2:
……
ENIP.Individual.DOID://0000000A/000000B4/00004650/00004650.RCOMM.Server.PORT.
value70:
8060
……
Step 3 Run the following command to check the status of the icdcomm port of the CBP:
% netstat -an | grep -w 8888
NOTE
Here, the port number 8888 is only for reference. For the specific port number, see the value of
ICDTCPPORT in the ${HOME}/config/icdcomm.cfg file.
----End
Exception Handling
Check whether the RCOMMAdapter and the icdcomm service are started. If you still cannot
solve the problem, contact Huawei engineers.
Reference Standard
The connection status of each port is ESTABLISHED.
Precaution
None.
Procedure
Step 1 Log in to the active node as the bmp user.
Step 2 Run the following command to view the status of the port for the WebService to send product
management requests:
% netstat -an | grep 8686
NOTE
Here, the port number 8686 is only for reference. For the specific port number, see the value of port in the
WebService manage interface section in the ${HOME}/jboss/server/default/deploy/jbossweb-
tomcat55.sar/server.xml file.
Step 3 Run the following command to check the status of the RCOMMAdapter port of the BMP:
% netstat -an | grep 8060
NOTE
Here, the port number 8060 is only for reference. To view the specific port number, use the configadm
tool.
% configadm
===============================================
ENIP config admin: Main
===============================================
[1] Key-value config data operations
[2] Config table operations
[3] Backup-Restore operations
[0] Exit
key1:
ENIP.Common.SMCenter.ftp.username
value1:
enip
key2:
ENIP.Common.SMCenter.TransferType
value2:
...
ENIP.Individual.DOID://0000000A/000000B4/00004650/00004650.RCOMM.Server.PORT.
value70:
8060
...
Step 4 Run the following command to check the status of the icdcomm listen port of the BMP:
% netstat -an | grep 8888
The previous information indicates that the port number 8888 of the local host is listened and
the local host is connected to different hosts through this port.
NOTE
Here, the port number 8888 is only for reference. For the specific port number, see the value of
ServerPort in the ${HOME}/config/icdcomm.cfg file.
----End
Exception Handling
Check whether the Jboss, RCOMMAdapter and the icdcomm service are started. If you still
cannot solve the problem, contact Huawei engineers.
Reference Standard
The connection status of each port is ESTABLISHED.
Precaution
l In HDR mode, you need to check the ports only on the active node and check the connection
port between the active node and standby node.
l In shared disk mode, you need to check the ports only on the active node.
Procedure
Step 1 Log in to the active node as the scu user.
Step 2 Obtain port numbers for the SCU connecting to the SAU, SMP, and FEP by checking the port
settings in the scusys.cfg file in $TELLIN_DIR/config/.
----End
Exception Handling
If the check result does not meet the check standard, do as follows:
Step 2 Ping the peer IP address to verify that the network works normally.
Step 3 Verify that the applications of the peer node are running normally.
----End
Reference Standard
Each interface is connected normally and the connection status is ESTABLISHED.
Precaution
None.
Procedure
Step 1 Log in to the active node and standby node of the DCC proxy as the dcc user.
Step 2 Check the icdcomm.cfg file to obtain the port number of the ICDComm link.
1. dcc% cat ${HOME}/config/icdcomm.cfg
ICDTCPPORT=8816
2. Run the following command to check the connection of the interface specified by the
preceding port number.
dcc% netstat -an | grep 8816
3. If the system displays ESTABLISHED, it indicates that the interface connection is normal.
tcp 0 0 10.10.14.13:8816 0.0.0.0:*
LISTEN
tcp 0 0 10.10.14.13:8816 10.10.13.13:5674 ESTABLISHED
Step 3 Check the NMAdptCfg.xml file to obtain the listening port number of the UOA connected to
NMAdapter0.
1. dcc% cat ${HOME}/config/NMAdptCfg.xml
<NMACfg uoaipaddr="10.10.10.1" uoaport="6800"/>
2. Run the following command to check the connection of the interface specified by the
preceding port number.
dcc%netstat –an | grep 6800
3. If the system displays ESTABLISHED, it indicates that the interface connection is normal.
tcp 0 0 10.10.14.13:6800 0.0.0.0:*
LISTEN
tcp 0 0 10.10.14.13:6800 10.10.13.13:54295 ESTABLISHED
Step 4 Check the DiamBaseConfig.xml file to obtain the port number of the DCC proxy.
1. dcc% cat ${HOME}/config/DiamBaseConfig.xml
LocalInfo Port="6553"
2. Run the following command to check the connection of the interface specified by the
preceding port number.
dcc% netstat -an | grep 6553
3. If the system displays ESTABLISHED, it indicates that the interface connection is normal.
----End
Exception Handling
None.
Reference Standard
The keyword error, warning, emerg, alert, and critical do not exist in the log files.
Precaution
None.
Procedure
Step 1 Log in to the active node as the cbp user.
Only the last 1000 rows of run logs in each log file are required:
For example, to read the last 1000 rows of run logs in the rDiamMsgRating_c900.log file, run
the following command:
----End
Exception Handling
Locate the fault according to error information. For log details, see the HUAWEI ENIP Log
Reference. If the fault persists, contact Huawei engineers.
Reference Standard
The keyword error and warning do not exist in the log files.
Precaution
None.
Procedure
Step 1 Log in to the active node as the bmp user.
----End
Exception Handling
Locate the fault according to error information. For log details, see the HUAWEI ENIP Log
Reference. If the fault persists, contact Huawei engineers.
Reference Standard
The keyword error and warning do not exist in the log files.
Precaution
For the SCP two-node cluster in hot standby mode, perform the following operations on the
active node and standby node.
For the SCP two-node cluster in cold standby mode, the following steps need to be performed
only on the active node.
Procedure
Step 1 Log in to the active node as the scu user.
l If a process relates to a single node, the rule for naming the log file is <Module
Name>_<Process Number>.run. For example, manager_0.run.
l If a process relates to multiple nodes, the rule for naming the log file is <Module
Name>_<Node Number>_<Process Number>.run. For example, scf_0_1.run.
----End
Exception Handling
Locate the fault according to error information. For log details, see the HUAWEI ENIP Log
Reference. If the fault persists, contact Huawei engineers.
Reference Standard
There are no records of ERROR, EMERGENCY, ALERT, and CRITICAL in the run log.
Precaution
None.
Procedure
Step 1 Log in to the active node of the DCC proxy as the dcc user.
Step 2 Run the following command to access the run log directory:
dcc% cd log/run
Step 3 Check the rDiamAdapter_c120.log log and check whether error logs exist.
dcc% more rDiamAdapter_c120.log | grep ERROR
----End
Exception Handling
Locate the fault according to the error information. If the fault persists, contact Huawei engineers.
Reference Standard
Check whether the GFEP run log contains the WARNING and ERROR information by viewing
log files.
Precaution
None.
Procedure
Step 1 Log in to the GFEP active node as the GFEP user.
Step 2 Access the GFEP log directory.
% cd $HOME/fep/log
Step 3 Check whether the GFEP run log contains the WARNING and ERROR information by viewing
log files.
% view genfep.log
----End
Exception Handling
Locate the fault according to the error information. If the fault persists, contact Huawei engineers.
Reference Standard
The logs in the log directory do not contain error or warning information.
Precaution
None.
Procedure
Step 1 Log in to the RBI host as an RBI user.
%cd $RBI_DIR/log/log
Step 3 Check whether the run logs of the RBI contain the error or warning information.
%view RBIManage0_000000.log
%view Usf0_000000.log
%view RBICollect_*.log
%view RBISend_*.log
----End
Exception Handling
If any error information exists in the logs, locate the error as follows:
The preceding error information indicates that the connection between the client
10.164.106.39 and the RBI is abnormal. The error is generally due to incorrect client
configurations. In this case, check the client configurations.
3. If the error persists, contact Huawei engineers.
Reference Standard
The number of CDRs that are generated on the current day is in the normal range. That is,
compared with the number of CDRs that are generated yesterday, the number of CDRs that are
generated on the current day does not decrease significantly. Generally, if the number of CDRs
decreases by more than 5%, you can consider this situation abnormal. The significant decrease
in special days such as holidays, however, can be considered normal.
Precaution
None.
Procedure
Step 1 Log in to the CBP as a CBP user.
%cd ${CBP_CDRPATH}/output/pps/normal
NOTE
If a backup directory has been planned, you can search the backup directory for CDRs. For the path to each
type of CDR, see the HUAWEI OCS Call Detail Record Reference.
Step 3 Run the following commands to count the CDRs of the current day and yesterday respectively
by taking 2009-08-11 and 2009-08-10 as examples:
%wc -l rec20090811*.unl
%wc -l rec20090810*.unl
Step 4 Compare the number of CDRs that are generated on the two days and determine whether the
number of CDRs of 2009-08-11 decreases significantly according to experiential data. If yes,
see Exception Handling.
----End
Exception Handling
If the number of CDRs of a day is abnormal, perform the following steps:
l If no, contact Huawei engineers and inform them of the value by which the number of
CDRs decreases, or keep observing the change of the number of CDRs.
Reference Standard
The error CDR directory of the offline CDRs on the CBP does not contain offline CDR files.
NOTE
Generally, when a fault occurs in the CBP or an exception occurs in the message link, the system passes
by services. After the CBP is recovered or the message link becomes normal, the SCP sends DCC messages
to request the CBP to perform authentication and charging and sends the CDRs that are generated during
the passby to the CBP for rating. Therefore, all the required fees are collected from subscribers.
Precaution
None.
Procedure
Step 1 Log in to the CBP as a CBP user.
Step 2 Access the error CDR directory of a specific service in the offline CDR subdirectory. Here, the
offline CDR directory of the voice service is used as an example.
%cd ${CBP_CDRPATH}/input/scpabr/voice/err
Step 3 Run the ls command to check whether certain files exist in the error directory. If yes, it indicates
that offline CDRs exist.
----End
Exception Handling
If certain offline CDRs exist, perform the following steps:
1. Open an offline CDR file, and then determine whether an exception occurs according to
the meanings and value ranges of the fields in the CDR by referring to the HUAWEI CBS
Call Detail Record Reference. For example, if the value of the field indicating the deducted
fee is 0, or the value of the field indicating the policy ID for rating is incorrect, you can
infer that an exception occurs.
2. Pack the offline CDR file and submit it to Huawei engineers.
Reference Standard
No records with running result being failed are displayed on the Query Result tab page.
Procedure
Step 1 Log in to the SMAP.
Step 2 Choose System > Task > BMP task Execution Result.
Step 3 Select failed from the Execution result drop-down list box.
Step 4 Click Query to check whether any failure records are displayed on the Query Result tab page.
----End
Exception Handling
If certain failure records are displayed on the Query Result tab page, contact Huawei
maintenance engineers and provide the query result.
Reference Standard
Task logs do not record any exceptions.
Procedure
Step 1 Log in to the SMAP.
Step 2 Choose Account Receivable > Query > Task Log
Step 3 Select the task type and running time, and then click Query. The system displays the
corresponding logs.
Step 4 In the logs record any exceptions, click to view the details.
----End
Exception Handling
If exceptions occur in the running of a task, all the exceptions are recorded in the corresponding
task logs. You can handle the exceptions based on exception information.
If the system displays a message similar to "The G/L code is not found," the cause is that the G/
L code is not configured. To solve this problem, access the AR menu, choose Setting > G/L
Account, and then configure the G/L code.
Reference Standard
The SSMFEP process exists, and the process ID remains unchanged.
Precaution
None.
Procedure
Step 1 Log in to the SCP as the scu user.
Step 3 Run the preceding command again, and then check whether the process exists and whether the
process ID changes. If the process does not exist or the process ID changes, see Exception
Handling.
----End
Exception Handling
The crontab starts the monitoring process every half an hour to monitor the running of the
SSMFEP process. If the SSMFEP process does not exist, the monitoring process starts the
SSMFEP process. If the SSMFEP process exists, the monitoring process exits, and no manual
processing is required.
Reference Standard
The value of Connection State of the devices whose Connection ID is greater than 20 is OPEN.
NOTE
The connection IDs that are smaller than or equal to 20 are internal system IDs. When you check the connections
between the GFEP and other devices, you need to pay attention to only the connection IDs that are greater than
20.
The value of Connection ID varies according to the device that the GFEP is connected to. When the GFEP is
connected to the SMSC, two connection IDs exist. You can view the IP address and port number of the peer
device corresponding to each connection ID by choosing Browse > Connection Information….
Precaution
None.
Procedure
Step 1 Start and log in to the GFEP client.
Step 2 Right-click Connection in the navigation tree, and then choose State….
The Connection State window shown in Figure 3-17 is displayed.
Step 3 Check the connections between the GFEP and other devices. For example, check that the status
of the connection between the GFEP and the SMSC is OPEN.
----End
Exception Handling
If the GFEP is disconnected from a device, perform the following steps:
1. Log in to the GFEP host as a GFEP user.
2. Run the following command to obtain the running status of the GFEP server, and then check
whether the four important processes of the GFEP server exist:
%fep stat
gfep 29909 1 0 05:17:11 - 0:00 ./keeper
gfep 29911 1 1 05:17:11 - 54:42 ./genfep
gfep 29908 1 0 05:17:11 - 0:25 ./dbServer
gfep 24964 1 0 05:17:12 - 0:43 ksh ./collect.sh
Run the preceding command repeatedly to check whether the four processes are normal. If
a process is abnormal or does not exist, perform the following step.
3. Run the following commands in sequence to restart the GFEP.
%fep stop
%fep start
Reference Standard
The CDRs in the source path are transferred to the destination path.
Figure 3-18 shows the source path and destination path of the sending module on the RBI client.
Figure 3-18 Source path and destination path of the sending module on the RBI client
Precaution
None.
Procedure
Step 1 Log in to the RBI host as an RBI user.
Step 2 Run the following command to view the source path of the CDRs to be transferred by the RBI.
The command uses the background configuration file as an example.
%view $RBI_DIR/config/RBISend.cfg
The WorkDir configuration item in the background configuration file indicates the source path
of the CDRs to be transferred by the RBI.
Step 3 Access the source directory of the CDRs to check whether the directory contains CDRs that are
not transferred in time.
The RBI transfers the CDRs in real time. If there are CDRs generated 30 minutes before, the
CDRs may be not transferred in time. You can perform the following steps to further check
whether the CDRs are transferred in time. If the RBI transfers the CDRs in time, you do not
need to perform the following steps.
Step 4 Access the log directory of the RBI.
%cd $RBI_DIR/log/log
Step 5 View the log file and check that there is no error information similar to error move remote file
xxx unmoveremote to xxx fail.
%view RBISend_*.log
----End
Exception Handling
If the log contains error information, it indicates that the CDRs are not transferred in time. In
this case, locate the exception as follows:
1. Check that the information such as the IP address, access user, and path in the file
$RBI_DIR/config/RBISend.cfg are the same as those of the actual environment.
2. Check that the source directory of each sending module or filtering module on the local
RBI node is different. If the source directories of certain sending modules or filtering
modules are the same, the CDR files of a certain sending module or a certain filtering
module may be sent to another path.
4 Weekly Maintenance
This topic describes the maintenance items that need to be performed every week. All the
maintenance items are performed manually.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who back up files has the write and execute permissions to the backup directory.
Context
None.
Procedure
Step 1 Log in to the active node of the CBP system as the cbp user.
Step 2 Run the following command to compress the log files.
In the following command, the log file package is named cbp.log090710.tar.
% tar -cvf cbp.log090710.tar ${HOME}/log/*
Step 3 Store the log file package to the planned backup directory, such as the mount directory /
backup of lvbackup.
% mv cbp.log090710.tar /backup
Step 4 Run the following command to delete the log files that are backed up.
% rm -rf ${HOME}/log/*
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
None.
Procedure
Step 1 Log in to the active node of the BMP system as the bmp user.
Step 3 Store the log file package to the planned backup directory, such as the mount directory /
backup of lvbackup.
% mv bmp.log090710.tar /backup
Step 4 Run the following command to delete the log files that are backed up.
% rm -rf ${HOME}/log/*
----End
Exception Handling
If any exception occurs, do as follows:
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
None.
Procedure
Step 1 Log in to the active node of the SCP system as the scu user.
Step 3 Store the log file package to the planned backup directory, such as the mount directory /
backup of lvbackup.
% mv scu.log.tar /backup
Step 4 Run the following command to delete the log files that are backed up.
% rm -rf ${TELLIN_DIR}/log/*
----End
Exception Handling
If any exception occurs, do as follows:
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who back up files has the write and execute permissions to the backup directory.
Context
None.
Procedure
Step 1 Log in to the active node of the Billing system as the billing user.
Step 3 Store the log file package to the planned backup directory, such as the mount directory /
backup of lvbackup.
% mv billing.log090710.tar /backup
Step 4 Run the following command to delete the log files that are backed up.
% rm -rf ${HOME}/BILLING/log/*
----End
Exception Handling
If any exception occurs, do as follows:
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
None.
Procedure
Step 1 Log in to the active node of the AR&DC system as the ar user.
Step 3 Store the log file package to the planned backup directory, such as the mount directory /
backup of lvbackup.
% mv ar.log090710.tar /backup
Step 4 Run the following command to delete the log files that are backed up.
% rm -rf ${HOME}/log/*
----End
Exception Handling
If any exception occurs, do as follows:
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
None.
Procedure
Step 1 Log in to the active node of the SMP system as the smp user.
Step 2 Run the following command to compress the log files.
In the following command, the log file package is named smp.log090710.tar.
% tar -cvf smp.log090710.tar ${HOME}/smp_run/log/*
Step 3 Store the log file package to the planned backup directory, such as the mount directory /
backup of lvbackup.
% mv smp.log090710.tar /backup
Step 4 Run the following command to delete the log files that are backed up.
% rm -rf ${HOME}/smp_run/log/*
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
None.
Context
You need to manually back up important log files to the tape drive periodically. You can back
up common log files as required. During backup, you need to move the log files to the backup
directory, and then compress, pack, and back up the log files to the tape drive.
Generally, you cannot delete log files manually. You can delete the log files only after they are
backed up.
Procedure
Step 1 Log in to the UVC as the scu user.
% mv uvc.log090710.tar /backup
% rm -f ${TELLIN_DIR}/log/*.log
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
None.
Context
You need to manually back up important log files to the tape drive periodically. You can back
up common log files as required. During backup, you need to move the log files to the backup
directory, and then compress, pack, and back up the log files to the tape drive.
Generally, you cannot delete log files manually. You can delete the log files only after they are
backed up.
Procedure
Step 1 Log in to the EVC as the scu user.
% mv evc.log090710.tar /backup
% rm -f ${TELLIN_DIR}/log/*.log
----End
Exception Handling
If any exception occurs, do as follows:
Prerequisite
l The disk or tape for storing the backup data has sufficient space.
l The user who backs up CDRs has the write and execute permissions on the backup directory.
Context
NEs have the mechanism of automatically backing up and clearing history CDRs.
l The SCP periodically invokes the billadm program to delete the CDRs that are generated
N days before, in which N is specified by BAKRECORD_KPDAYS.
l The CBP periodically runs the script for deleting CDRs periodically through the
crontab. When the RBI is available, the RBI takes away the CDRs so that the CDRs can
be deleted and backed up on the RBI.
NOTE
The frequency of backing up and clearing the history CDRs of an office depends on the size of the directory for
storing CDRs and the number of subscribers of the office. If there are a large number of subscribers, you need
to back up and clear history CDRs every day.
Table 4-1 describes the key configuration files and configuration items of the RBI. You can
obtain the CDR backup paths on the RBI through the configuration items, and then clear the
CDR files from the backup paths periodically.
RBICollect.cfg RemoteDir Path of external NEs, from which the RBI obtains the
CDRs.
CollectBackup Path where the RBI backs up the collected files. This path
Dir needs to be cleared periodically.
SendBackupDi Directory of the CDRs that are backed up on the RBI host.
r Because the files transferred by the RBI are collected
from other NEs, and the backup path is already set on the
collection module, no backup is required during transfer.
Therefore, you do not need to set this directory. If you set
this directory, this directory needs to be cleared
periodically.
NOTE
The RBICollect.cfg and RBISend.cfg files are stored in the path $RBI_DIR/config.
Procedure
Step 1 Log in to the active node of the RBI as the RBI user.
Step 2 Run the following command to check the directory of the CDRs that are backed up on the local
RBI host:
%view $RBI_DIR/config/RBICollect.cfg
The CollectBackupDir configuration item in the RBICollect.cfg file indicates the directory of
the CDRs that are backed up on the local RBI host.
Step 3 Move the CDRs that are backed up locally to the specified directory for backing up CDRs or
back up them to the tape drive.
----End
Exception Handling
If an exception occurs during the backup, perform the following steps:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
5 Monthly Maintenance
This topic describes the maintenance items that need to be performed every month. Most of
maintenance items are performed manually.
This task is to back up the configuration files of the RBI before or after you modify the
configuration files or perform an upgrade through the RBI client. The purpose is to ensure that
the configuration files can be restored when an error occurs. In addition, you need to move the
backup files to other media to prevent insufficient disk space.
5.1.12 Backing Up Configuration Files of the iWeb
This topic describes how to back up configuration files, log files, and project files manually
before and after the upgrade. After the files are backed up successfully, you can move them to
other media through Export.
5.1.13 Backing Up the Application Program (CBP)
This task is performed to back up the CBP application program regularly. Thus, the application
program can be restored in case of exceptions. In addition, the backup files need to be stored on
other media to prevent insufficient disk space.
5.1.14 Backing Up the Application Program (BMP)
This task is performed to back up the BMP application program regularly. Thus, the application
program can be restored in case of exceptions. In addition, the backup files need to be stored on
other media to prevent insufficient disk space.
5.1.15 Backing Up the Application Program (AR&DC)
This task is performed to back up the AR&DC application program regularly. Thus, the
application program can be restored in case of exceptions. In addition, the backup files need to
be stored on other media to prevent insufficient disk space.
5.1.16 Backing Up the Application Program (Billing)
This task is performed to back up the Billing application program regularly. Thus, the application
program can be restored in case of exceptions. In addition, the backup files need to be stored on
other media to prevent insufficient disk space.
5.1.17 Backing Up Log Files on the USAU
This topic describes how to back up the log files in specified directories and to delete the log
files after backing up them.
5.1.18 Backing Up Log Files on the URP
This topic describes how to back up the log files in specified directories and to delete the log
files after backing up them.
5.1.19 Backing Up Log Files on the iWeb
This topic describes how to back up configuration files, log files, and project files manually
before and after the upgrade. After the files are backed up successfully, you can move them to
other media through Export.
5.1.20 Backing Up and Clearing CDR Files on the Billing
This topic describes how to back up the CDR files in history bill cycles to the storage space and
how to clear the CDR files that are already backed up.
5.1.21 Understanding the Service Trend Through iWeb Reports
This topic describes how to understand the changes and trend of service data such as the number
of new users, the total recharge amount, and CAPS.
5.1.22 Understanding Key Service Indexes Through the LBI System
The LBI system provides a basic KPI function to display carrier-concerned indexes in figures
and tables. In this way, carriers can understand the key indexes and their changes.
Prerequisite
The running users are as follows:
l BMP system: The running users bmp and smp of the BMP system
l CBP system: The running user cbp of the CBP system; The running user smdb of the SMDB
l SCP system: The running user scu of the SCP system
Context
CAUTION
Certain passwords are saved in the configuration files. When you change a password, remember
to modify the configuration file that contains the password. If only the password is changed and
the configuration file is not modified, severe abnormality such as database access failure may
occur. When a customer service engineer changes a password, remember to confirm that the
configuration files should be modified. For details on analysis of user passwords, see A.2 Impact
Analysis Table of CBS Password Change.
You need to perform this maintenance item on both the active and standby nodes. Perform this
maintenance item on the active node first, and then perform this maintenance item on the standby
node when the services on the active node run normally.
The following procedure takes the operation of changing the password for the user bmp as an
example.
Procedure
Step 1 Log in to the BMP system as the root user.
Step 2 Run the following command to change the running user password.
# passwd bmp
Step 3 Set the new password according to the system prompts.
----End
Exception Handling
If an exception occurs during password change, for example, the database cannot be connected,
check the following:
1. Whether the configuration files and database tables that involve the user password are
modified
2. Whether the encrypted text is generated through the correct encryption method and entered
in the configuration file
If the preceding configurations are correct, but the fault persists, perform the following steps:
1. Restore all the files and database tables that are modified and use the old password to ensure
the normal running of the system.
2. Record the password change process, and send the changed password and modified files
and database tables to Huawei engineers.
Context
The sysadmin user is the super user of the SMAP and has all the menu rights and function rights
of the SMAP. The sysadmin user can create other users including business operators and can
change the passwords of other users.
Procedure
Step 1 Enter the URL of the SMAP in the address box of the browser, for example, http://
10.10.10.1:8080
TIP
You can click Verify to verify whether the new password can be used.
Step 6 Log in to the server as the SMAP operator again to verify that the password is changed
successfully.
----End
Exception Handling
If the SMAP operator forgets the login password, or the system displays a message indicating
that the password is incorrect during login of the SMAP operator, perform the following steps:
1. Log in as the sysadmin user.
2. Choose System Console > System Management > User in the navigation tree of the
SMAP.
3. Set the conditions for querying the SMAP operator. In the query results, click the password
resetting button in the desired record. The Reset Password page is displayed.
4. Modify the password.
5. Click Save.
6. Log in to the server as the SMAP operator again to verify that the password is changed
successfully.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up.Take the operation in the active
node for example.The standby node don't need to be backed up for the cold two-node cluster.
Procedure
Step 1 Log in to the active node of the CBP system as the cbp user.
Step 2 Run the following command to compress the configuration files in the relevant CBP directories:
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
----End
Exception Handling
If any exception occurs, do as follows:
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up.Take the operation in the active
node for example.The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI ENIP Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the BMP system as the bmp user.
Step 2 Run the following command to compress the configuration files in the relevant BMP directories:
% tar -cvf bmp.config.conf20090710.tar ${HOME}/config
% tar -cvf bmp.addons.conf20090710.tar ${HOME}/add-ons/config
% tar -cvf bmp.jboss.conf20090710.tar ${HOME}/jboss/server/default/conf
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv bmp.config.conf20090710.tar /backup
% mv bmp.addons.conf20090710.tar /backup
% mv bmp.jboss.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up. Take the operation in the active
node for example. The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI CBS Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the Billing system as the billing user.
Step 2 Run the following command to compress the configuration files in the relevant Billing
directories:
% tar -cvf billing.config.conf20090710.tar ${BILLING_HOME}/config/
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv billing.config.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up. Take the operation in the active
node for example. The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI CBS Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the AR system as the ar user.
Step 2 Run the following command to compress the configuration files in the relevant AR directories:
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv ar.jboss.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up. Take the operation in the active
node for example. The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI CBS Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the DC system as the dc user.
Step 2 Run the following command to compress the configuration files in the relevant DC directories:
% tar -cvf dc.jboss.conf20090710.tar ${JBOSS_HOME}/server/default/deploy/smap.ear/
default.war/WEB-INF/classes/conf/
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv dc.jboss.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up.Take the operation in the active
node for example.The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI ENIP Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the SCP system as the scu user.
Step 2 Run the following command to compress the configuration files in the relevant SCP directories:
scu% tar -cvf scu.config.conf20090710.tar ${TELLIN_DIR}/config
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
scu% mv scu.config.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up.Take the operation in the active
node for example.The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI ENIP Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the SMP system as the smp user.
Step 2 Run the following command to compress the configuration files in the relevant SMP directories:
% tar -cvf smp.config.conf20090710.tar ${HOME}/sms_run/config
% tar -cvf smp.cfg.conf20090710.tar ${HOME}/sms_run/cfg
% tar -cvf smp.inetcfg.conf20090710.tar ${HOME}/sms_run/bin/inetcfg.cfg
% tar -cvf smp.license.conf20090710.tar ${HOME}/sms_run/bin/license.dat
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv smp.config.conf20090710.tar /backup
% mv smp.cfg.conf20090710.tar /backup
% mv smp.inetcfg.conf20090710.tar /backup
% mv smp.license.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
The disk or tape for storing the backup data has sufficient space.
Context
During the startup of the GFEP, the backup script starts automatically, and the system
performance is not affected. Table 5-1 describes the method of backing up the GFEP
configuration files.
collect.sh Pack files in backup of config directory Every day The backup
The script starts the GFEP installation in the GFEP data of only
automatically directory. installation the latest
during the [Name format]: directory seven days is
startup of the GFEP.backup.config.YY reserved,
GFEP. _MM_DD_HH_MM_SS and the
_Weekday.tar.gz backup data
that is
generated
seven days
before is
deleted.
Procedure
Step 1 Log in to the GFEP host as the GFEP user.
%cd $HOME/fep/backup
Step 3 Check whether the backup is successful. Figure 5-2 shows the backup data of the seven days.
Step 4 Maintenance engineers are advised to move the backup files to other media according to the
situation of the office.
----End
Exception Handling
If an exception occurs during the backup, perform the following steps:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
The disk or tape for storing the backup data has sufficient space.
Context
Before modifying a configuration file or performing an upgrade, you can back up the
configuration file through the RBI client. You can back up the configuration files of the following
modules as required:
l RBIManage
l RBICollect
l RBISend
l RBIFilter
l RBICompress
l RBICombine
Procedure
Step 1 Log in to the RBI client, namely, URBIConfig.
Step 2 Choose Main Control module in the navigation tree, as shown in Figure 5-3.
The system displays the backup confirm dialog box. Click Yes in the dialog box.
Step 4 In the dialog box, enter Note name of the file that needs to be backed up, as shown in Figure
5-4.
Step 5 Click OK. The system displays a message indicating that the backup is successful. The
configuration files of the module are backed up in the path config/backup of the RBI user.
NOTE
If there are too many files in config/backup, you need to delete the discarded backup files.
Step 6 It is recommended that maintenance engineers move backup files to other media according to
the situation of the office.
----End
Exception Handling
If an exception occurs during the backup, perform the following steps:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
Maintenance engineers must have the right of Maintenance.
Context
The iWeb page provides the backup menu, as shown in Figure 5-5. Maintenance engineers can
set Schedule so that the system backs up configuration files periodically.
Procedure
Step 1 Log in to the iWeb system.
Step 4 In the displayed window, enter the backup name and click Ok.
Step 5 Maintenance engineers can back up files in *.bat to a specified place as follows:
1. In the list, select the check box of one item before backup. You can select only one item.
2. Click Export.
3. In the displayed dialog box, click Save after confirming that the preceding configuration
is correct.
4. In the displayed dialog box, select the storage place. You can change the backup name.
Then click Save.
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation affects the I/O of the disk and the existing network greatly. In this case,
you need to perform backup in idle time, for example, 00:00 to 04:00.
Before backing up the application programs, ensure that the operation is approved and to be
performed by a dedicated person.
This section provides only directories to be backed up and the backup solution. For the method
and procedure of backup (charged), contact Huawei marketing.
The application programs are backed up in full backup mode. Both the active node and standby
node need to be backed up.
Procedure
Step 1 Log in to the active node and standby node of the CBP as the root user.
l /enip
l /corefiles
l /hwshare
l /opt/informix
l /oracle
l /enip
l /corefiles
l /hwshare
l /opt/informix
l /oracle
Step 3 Store the application program package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv enip.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node and the standby node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation affects the I/O of the disk and the existing network greatly. In this case,
you need to perform backup in idle time, for example, 00:00 to 04:00.
Before backing up the application programs, ensure that the operation is approved and to be
performed by a dedicated person.
This section provides only directories to be backed up and the backup solution. For the method
and procedure of backup (charged), contact Huawei marketing.
The application programs are backed up in full backup mode. Both the active node and standby
node need to be backed up.
Procedure
Step 1 Log in to the active node and standby node of the BMP as the root user.
Step 2 Compress the files in the relevant BMP directories.
l /enip
l /corefiles
l /hwshare
l /opt/informix
l /opt/informix/temp
l /oracle
l /corefiles
l /hwshare
Step 3 Store the application program package to the planned backup directory, such as the mount
directory /backup of lvbackup.
----End
Exception Handling
If any exception occurs, do as follows:
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation affects the I/O of the disk and the existing network greatly. In this case,
you need to perform backup in idle time, for example, 00:00 to 04:00.
Before backing up the application programs, ensure that the operation is approved and to be
performed by a dedicated person.
This section provides only directories to be backed up and the backup solution. For the method
and procedure of backup (charged), contact Huawei marketing.
The application programs are backed up in full backup mode. Both the active node and standby
node need to be backed up.
Procedure
Step 1 Log in to the active node and standby node of the AR&DC as the root user.
Step 3 Store the application program package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv jboss.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation affects the I/O of the disk and the existing network greatly. In this case,
you need to perform backup in idle time, for example, 00:00 to 04:00.
Before backing up the application programs, ensure that the operation is approved and to be
performed by a dedicated person.
This section provides only directories to be backed up and the backup solution. For the method
and procedure of backup (charged), contact Huawei marketing.
The application programs are backed up in full backup mode. Both the active node and standby
node need to be backed up.
Procedure
Step 1 Log in to the active node and standby node of the Billing as the root user.
Step 2 Compress the files in the relevant Billing directories.
The directories on the Billing to be backed up are as follows:
l ${BILLING_HOME}/bin
l ${BILLING_HOME}/config
l ${BILLING_HOME}/ebill
l ${BILLING_HOME}/install
l ${BILLING_HOME}/lib
l ${BILLING_HOME}/ShareLib
l ${BILLING_HOME}/tool
Step 3 Store the application program package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv bin.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
Prerequisite
None.
Context
None.
Procedure
Step 1 Log in to the PC of the USAU.
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
l If the disk space is insufficient, clear the disk space or increase the disk space.
l If the disk space is sufficient, go to the next step.
2. Contact Huawei engineers.
Prerequisite
None.
Context
None.
Procedure
Step 1 Log in to the PC where the URP is installed.
Step 3 Copy important log files AlarmMaskLog and DeviceAlarmLog to other disks or storage media.
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
l If the disk space is insufficient, clear the disk space or increase the disk space.
l If the disk space is sufficient, go to the next step.
2. Contact Huawei engineers.
Prerequisite
Maintenance engineers must have the right of Maintenance.
Context
The iWeb page provides the backup menu, as shown in Figure 5-6. Maintenance engineers can
set Schedule so that the system backs up configuration files periodically.
Procedure
Step 1 Log in to the iWeb system.
Step 4 In the displayed window, enter the backup name and click Ok.
Step 5 Maintenance engineers can back up files in *.bat to a specified place as follows:
1. In the list, select the check box of one item before backup. You can select only one item.
2. Click Export.
3. In the displayed dialog box, click Save after confirming that the preceding configuration
is correct.
4. In the displayed dialog box, select the storage place. You can change the backup name.
Then click Save.
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
None.
Precaution
None.
Procedure
Step 1 Log in to the server through Telnet.
----End
Related Information
None.
Prerequisite
The WEBRPT module is already installed and you can access the iWeb reports through the URL.
Context
You must focus on the changes of the following service data:
l Number of new subscribers
l Total recharge amount
l Call times
The names of the reports related to the preceding three types of data are as follows:
l Report of subscribers
l Report of cardrecharge
l Report of cashrecharge
l Call times status daily report
Through iWeb, you can check different data reports in the Report menu. You can also use the
Schedule menu and report templates to customize reports for different periods.
The following takes customizing the Number of Monthly New Users report as an example to
describe how to understand the service trend through iWeb reports.
Procedure
Step 1 Log in to the iWeb page through a browser.
Step 2 Click Schedule.
Step 3 Click .
Step 4 In the new interface, configure the basic data for the report.
1. On the General tab page, input the information as shown in Figure 5-7.
2. On the Template tab page, choose Report of Subscribers as the data and style template.
3. On the Distribution tab page, three report generation methods are available:
l Sending the generated report through Email: In this case, you need to input the Email
address.
l Releasing as a public report: Choose the Publish Report check box, input the
description, select the importance of the report, and select the directory to store the
report.
l Transmitting through FTP: Choose the FTP check box and then input information such
as the IP address.
Through the preceding procedure, you can also customize monthly templates for the total recharge amount and
the call times reports. Through the monthly data, you can know the trend of data.
----End
Exception Handling
If the iWeb server runs normally but cannot be accessed through the IE browser, rectify the fault
as follows:
l If the agent server is enabled on the client, set the server URL in the IE browser to the
exceptional Web address when the agent server is used.
l If the firewall is enabled on the computer where the report server is installed, set the port
number of the report system to the exceptional port number when the firewall is enabled
or disable the firewall.
Prerequisite
The LBI system have been installed and you can access the LBI reports through the URL.
Context
The basic KPIs of the LBI system include the following:
l KPI of Product Ordered Subscribers
l KPI of Newly-added&Lost Subscribers
l KPI of Bill Statistic
Table 5-2 describes the basic KPIs.
The following procedure describes how to query the KPI of Newly-added&Lost Subs report
for service data in the LBI system to understand the key service indexes.
Procedure
Step 1 Log in to the LBI system through the Microsoft Internet explorer.
Step 3 Click to display the report data on the left side of the resource management page.
Step 4 Choose Data > System Resource > KPI to display the KPI reports, as shown in Figure 5-8.
----End
Exception Handling
If the LBI system runs normally but cannot be accessed through the Microsoft Internet explorer,
rectify the fault as follows:
l If the agent server is enabled on the client, set the server URL in the Microsoft Internet
explorer to the exceptional Web address when the agent server is used.
l If the firewall is enabled on the computer where the report server is installed, set the port
number of the report system to the exceptional port number when the firewall is enabled
or disable the firewall.
Reference Standard
The reference standards are as follows:
The use of the cleaning tape must be recorded after it is used. Do not use expired tape.
Context
Table 5-3 lists the relationship between the cleaning cycle and the using frequency of the tape
drive.
Table 5-3 Relationship between the cleaning cycle and the using frequency of the tape drive
1 8
2 4
3 3
4 1
Procedure
Step 1 Insert the cleaning tape to the tape drive. Then the system cleans the tape drive automatically.
Step 2 During cleaning, the green light is on. After cleaning the tape drive is complete, the green light
is off.
----End
Exception Handling
If the cleaning indicator turns yellow and blinks, it indicates that the magnetic head is dirty. You
must clean it immediately.
If the tape is ejected in a short time, it indicates that the cleaning fails. You must insert the tape
again.
Reference Standard
The number of available tapes can be used for at least one month.
Context
None.
Procedure
Step 1 The number of available tapes needs to be audited by the owner.
----End
Exception Handling
If the available tapes are not enough, buy new tapes.
Reference Standard
None.
Context
The UPS works normally, and the power modules are normal.
Procedure
Step 1 Check the status of the UPS.
Step 2 Check whether there are sundries around the power modules.
----End
Exception Handling
l If the power supply module is abnormal, contact the power supply department to solve the
problem.
l If the UPS is faulty, use the standby UPS.
Reference Standard
None.
Context
The UPS works normally, and the power modules are normal.
Procedure
Step 1 Check the status of the UPS.
Step 2 Check whether there are sundries around the power modules.
----End
Exception Handling
l If the power supply module is abnormal, contact the power supply department to solve the
problem.
l If the UPS is faulty, use the standby UPS.
Reference Standard
The reference standards are as follows:
l The surfaces of cabinets and racks must be clean, neat, and dustless.
l The cabinet fans run normally without any noise.
Context
None.
Procedure
Step 1 Check the surfaces and insides of the cabinets and ensure that they are clean.
Step 2 Check the cabinet fans and ensure that they are clean.
----End
Exception Handling
None.
Reference Standard
l No virus is found after the virus scanning.
l No infected files are found at the maintenance terminal.
Context
None.
Procedure
Step 1 Log in to the SMAP client as the user that has the administrator authority.
----End
Exception Handling
None.
Reference Standard
None.
Context
None.
Procedure
Step 1 Ask relevant professional engineers to verify the device maintenance contract.
----End
Exception Handling
If the contract has expired, please contact Huawei marketing to renew the contract.
6 Yearly Maintenance
The maintenance items that need to be performed more than once a year are listed.
6.1 Switching Test
This topic describes the switching test.
6.2 Cleaning the dust (ATAE)
You need to clean the dust periodically to keep the systems running stably.
6.3 Cleaning the dust (Minicomputers)
You need to clean the dust periodically to keep the systems running stably.
Prerequisite
The active node and standby node are in the normal state.
Before the switchover of the two-node cluster, make sure that calls can be made successfully,
CDRs can be generated successfully, the SMDBs on the active node and standby node, and the
physical database are in the normal state, and the data can be synchronized successfully between
the two nodes.
The system space usage is smaller than 80%. The CBP and BMP services are normal and the
CPU and memory usage are normal.
Context
CAUTION
l The switchover of the two-node cluster affects the existing network greatly. In this case,
you need to perform switchover in idle time.
l Before two-node cluster switchover, ensure that the operation is approved and to be
performed by a dedicated person.
You can perform the two-node cluster switchover by using the following methods:
On the CBP, you can stop the SMDB to trigger the switchover of the two-node cluster.
The ATAE manages the two-node cluster through the Cluster Manager. This topic takes the
BMP&SMP two-node cluster in cold standby mode and the Oracle nonRAC local database for
example to describe the switchover procedure. For the switchover of other NEs, see the
installation guide of the matching version.
Procedure
Step 1 Start the Cluster Manager.
Step 2 On the left of the Cluster Explorer page, right-click the service group OracleGroup and choose
Switch To > Standby node. Then the service group is switched to the other node.
On the left of the Cluster Explorer page, select service groups and click the Status tab page to
view the status.
l The OracleGroup is in ONLINE state on the new active node and in OFFLINE state on the
new standby node.
l The FaultSpyGroup is in ONLINE state both on the two nodes.
----End
Exception Handling
If the switchover of the two-node cluster fails, do as follows to collect the fault information and
send the information to Huawei R&D engineers for fault location:
NOTE
Package the collected information to vcsconf.linux191.tar.gz. The field linux191 indicates the host
name.
4. Run the following command to check whether the information is successfully collected:
# cd /tmp/back
# ls
ENIP_V100R003C03B614_HA_Install.tar.gz install
ENIP_V100R003C03B614_HA_OCS_RUN_ATAE.tar.gz vcsconf.linux191.tar.gz
5. Send the collected information to Huawei R&D engineers for fault locating.
Prerequisite
The active node and standby node are in the normal state.
Before the switchover of the two-node cluster, make sure that calls can be made successfully,
CDRs can be generated successfully, the SMDBs on the active node and standby node, and the
physical database are in the normal state, and the data can be synchronized successfully between
the two nodes.
The system space usage is smaller than 80%. The CBP and BMP services are normal and the
CPU and memory usage are normal.
Context
CAUTION
l The switchover of the two-node cluster affects the existing network greatly. In this case, you
need to perform switchover in idle time.
l Before two-node cluster switchover, ensure that the operation is approved and to be
performed by a dedicated person.
You can perform the two-node cluster switchover by using the following methods:
l Stop the application to trigger a switchover.
l Stop the database server to trigger a switchover.
NOTE
On the CBP, you can stop the SMDB to trigger the switchover of the two-node cluster.
This topic takes the BMP&SMP two-node cluster in cold standby mode and the Oracle nonRAC
local database for example to describe the switchover procedure. For the switchover of other
NEs, see the installation guide of the matching version.
Procedure
Step 1 Stop an application to trigger a switchover of the two-node cluster.
1. Log in to host1a as the bmp user.
2. Stop the BMP.
% stop_bmp.sh
3. Log in to host1b as the root user. Check whether bmppkg is switched to host1b.
# cmviewcl -v
If bmppkg is switched to host1b, you see the following information:
PACKAGE STATUS STATE AUTO_RUN NODE
bmppkg up running enabled host1b
The lan900 is the logical network interface name of the APA network adapter on host1b.
The displayed information indicates that the floating IP address is already bound to the
lan900.
5. Log in to host1b (active node after the switchover) and host1a (standby node after the
switchover) as the oracle user, and then check the status of the database.
% /oracle/crs/bin/crs_stat -t
Name Type Target State Host
------------------------------------------------------------
ora....T1.lsnr application ONLINE ONLINE host1a
ora.host1a.gsd application ONLINE ONLINE host1a
ora.host1a.ons application ONLINE ONLINE host1a
6. Check the status of the related applications on host1b (active node after the switchover).
a. Log in to host1b as the bmp user, and then check whether the processes of the BMP
are started.
%p
If the BMP is normal, you see the information similar to the following:
UID PID PPID C STIME TTY TIME ALIASNAME
bmp 20358 1 0 Sep27 ? 00:01:43 Monitor 0
bmp 20405 20358 0 Sep27 ? 00:02:44 Center 1
bmp 20280 1 0 Sep27 ? 00:00:34 configDaemon
bmp 20090 1 0 Sep27 ? 00:00:04 icdcomm
bmp 20156 1 0 Sep27 ? 00:00:00 idagent
bmp 20150 1 0 Sep27 ? 00:00:00 idcenter
bmp 20317 1 0 Sep27 ? 00:00:47 idlproxy
bmp 20298 1 0 Sep27 ? 00:00:51 namingDaemon
bmp 17486 1 0 Sep27 ? 00:00:00 ExprServer -d
bmp 29446 1 0 Sep27 ? 00:00:00 Apache -k
bmp 14986 14960 3 Sep27 ? 01:31:21 jboss 1
bmp 17386 1 0 Sep27 ? 00:06:53 monitor_jboss
c. Switch to the smp user, and then check whether the processes of the SMP are started.
%p
The SMP has been started. The preceding information is only an example. The
displayed process information varies with the actual situation. View the log files in
$SMS_DIR/log and make sure that the SMP is started properly.
d. Switch to the root user, and then check whether the spy.sh monitor process is running.
% su - root
# ps -ef | grep spy.sh | grep monitor
If the spy.sh monitor process is running, you see the information similar to the
following.
root 18591 17990 1 11:23:25 ? 3:50 /usr/bin/ksh /etc/cmcluster/bmppkg/
spy.sh monitor
7. Check the status of the related applications on host1a (standby node after the switchover).
a. Log in to the standby node as the bmp user, and then check whether the processes of
the BMP are started.
% su - bmp
%p
If the BMP on the standby node is not started, you see the following information:
p: Command not found
b. Switch to the smp user, and then check the processes of the SMP.
% su - smp
%p
If the SMP on the standby node is not started, you see the following information:
p: Command not found
c. Switch to the uoa user, and then check the processes of the UOA.
% su - uoa
%p
If the UOA on the standby node is not started, you see the following information:
uoa_lma has not exist, maybe something is wrong with it
d. Switch to the root user, and then check whether the spy.sh standby process is running.
% su - root
# ps -ef | grep spy.sh | grep standby
If the spy.sh standby process is running, you see the information similar to the
following:
The lan900 is the logical network interface name of the APA network adapter on host1b.
The displayed information indicates that the floating IP address is already bound to the
lan900.
12. Log in to host1a (active node after the switchover) and host1b (standby node after the
switchover) as the oracle user, and then check the status of the database.
% /oracle/crs/bin/crs_stat -t
Name Type Target State Host
------------------------------------------------------------
ora....T1.lsnr application ONLINE ONLINE host1a
ora.host1a.gsd application ONLINE ONLINE host1a
ora.host1a.ons application ONLINE ONLINE host1a
ora.host1a.vip application ONLINE ONLINE host1a
ora....T2.lsnr application ONLINE ONLINE host1b
ora.host1b.gsd application ONLINE ONLINE host1b
ora.host1b.ons application ONLINE ONLINE host1b
ora.host1b.vip application ONLINE ONLINE host1b
ora.orc.db application ONLINE ONLINE host1b
ora....c1.inst application ONLINE ONLINE host1a
ora....c2.inst application ONLINE ONLINE host1b
ora...._orc.cs application ONLINE ONLINE host1b
ora....rc1.srv application ONLINE ONLINE host1b
13. Check the status of the related applications and monitoring process on host1a (the active
node after the switchover).
a. Log in to host1a as the bmp user, and then check whether the processes of the BMP
are started.
%p
If the BMP is normal, you see the information similar to the following:
UID PID PPID C STIME TTY TIME ALIASNAME
bmp 20358 1 0 Sep27 ? 00:01:43 Monitor 0
bmp 20405 20358 0 Sep27 ? 00:02:44 Center 1
bmp 20280 1 0 Sep27 ? 00:00:34 configDaemon
bmp 20090 1 0 Sep27 ? 00:00:04 icdcomm
bmp 20156 1 0 Sep27 ? 00:00:00 idagent
bmp 20150 1 0 Sep27 ? 00:00:00 idcenter
bmp 20317 1 0 Sep27 ? 00:00:47 idlproxy
bmp 20298 1 0 Sep27 ? 00:00:51 namingDaemon
bmp 17486 1 0 Sep27 ? 00:00:00 ExprServer -d
bmp 29446 1 0 Sep27 ? 00:00:00 Apache -k
bmp 14986 14960 3 Sep27 ? 01:31:21 jboss 1
bmp 17386 1 0 Sep27 ? 00:06:53 monitor_jboss
c. Switch to the smp user, and then check whether the processes of the SMP are started.
%p
The status of each process is displayed as follows:
UID PID PPID C STIME TTY TIME CMD
smp 192868 524942 0 23:08:36 - 0:33 136_sms_scp_agent -noinput
smp 196654 524942 0 23:08:11 - 1:38 111_smpker -noinput 1
smp 229912 524942 0 23:08:17 - 0:04 115_sms_kernel_agent -noinput
smp 233506 524942 0 23:07:56 - 2:57 100_oamagent -noinput
smp 254480 1 0 23:07:51 - 0:07 sms_cfg_center -noinput
smp 258788 524942 0 23:07:59 - 0:03 101_sms_access_agent -noinput
smp 266598 524942 0 23:08:02 - 0:04 103_sms_db_agent -noinput
smp 274774 524942 0 23:08:14 - 1:38 112_smpker -noinput 2
smp 295400 524942 0 23:08:24 - 0:03 127_sms_log_serv -noinput
smp 307506 524942 0 23:08:08 - 1:38 110_smpker -noinput 0
smp 332108 524942 0 23:08:05 - 0:04 105_sms_secu_serv -noinput
smp 340022 524942 0 23:08:30 - 0:03 129_sms_pois_serv -noinput
smp 372932 524942 0 23:08:27 - 0:02 128_sms_fs_serv -noinput
smp 385348 524942 0 23:08:33 - 0:13 133_sms_mml_agent -noinput
smp 430164 524942 0 23:08:20 - 0:05 125_sms_serv_center -noinput
smp 524942 1 0 23:07:54 - 0:01 sms_lca -noinput
The SMP has been started. The preceding information is only an example. The
displayed process information varies with the actual situation. View the log files in
$SMS_DIR/log and make sure that the SMP is started properly.
d. Switch to the root user, and then check whether the spy.sh monitor process is running.
% su - root
14. Check the status of the related applications and monitoring process on host1b (the standby
node after the switchover).
a. Log in to the standby node as the bmp user, and then check whether the processes of
the BMP are started.
% su - bmp
%p
If the BMP on the standby node is not started, you see the following information:
p: Command not found
b. Switch to the smp user, and then check the processes of the SMP.
% su - smp
%p
If the SMP on the standby node is not started, you see the following information:
p: Command not found
c. Switch to the uoa user, and then check the processes of the UOA.
% su - uoa
%p
If the UOA on the standby node is not started, you see the following information:
uoa_lma has not exist, maybe something is wrong with it
d. Switch to the root user, and then check whether the spy.sh standby process is running.
% su - root
# ps -ef | grep spy.sh | grep standby
If the spy.sh standby process is running, you see the information similar to the
following:
root 18593 17992 1 11:23:25 ? 3:50 /usr/bin/ksh /etc/cmcluster/bmppkg/
spy.sh standby
# cmviewcl - v
4. Check whether the floating IP address for external services is bound to host1b.
In the preceding information, lan900 is the logical network interface name of the APA
network adapter on host1b, and the command response indicates that the floating IP address
is bound to lan900.
5. Log in to host1b (active node after the switchover) and host1a (standby node after the
switchover) as the oracle user, and then check the status of the database.
% /oracle/crs/bin/crs_stat -t
Name Type Target State Host
------------------------------------------------------------
ora....T1.lsnr application ONLINE ONLINE host1a
ora.host1a.gsd application ONLINE ONLINE host1a
ora.host1a.ons application ONLINE ONLINE host1a
ora.host1a.vip application ONLINE ONLINE host1a
ora....T2.lsnr application ONLINE ONLINE host1b
ora.host1b.gsd application ONLINE ONLINE host1b
ora.host1b.ons application ONLINE ONLINE host1b
ora.host1b.vip application ONLINE ONLINE host1b
ora.orc.db application ONLINE ONLINE host1b
ora....c1.inst application ONLINE ONLINE host1a
ora....c2.inst application ONLINE ONLINE host1b
ora...._orc.cs application ONLINE ONLINE host1b
ora....rc1.srv application ONLINE ONLINE host1b
6. Check the status of the related applications and monitoring process on host1b (the active
node after the switchover).
a. Switch to the bmp user, and then check whether the processes of the BMP are started
normally.
%p
If the BMP is normal, you see the information similar to the following:
UID PID PPID C STIME TTY TIME ALIASNAME
bmp 20358 1 0 Sep27 ? 00:01:43 Monitor 0
bmp 20405 20358 0 Sep27 ? 00:02:44 Center 1
bmp 20280 1 0 Sep27 ? 00:00:34 configDaemon
bmp 20090 1 0 Sep27 ? 00:00:04 icdcomm
bmp 20156 1 0 Sep27 ? 00:00:00 idagent
bmp 20150 1 0 Sep27 ? 00:00:00 idcenter
bmp 20317 1 0 Sep27 ? 00:00:47 idlproxy
bmp 20298 1 0 Sep27 ? 00:00:51 namingDaemon
bmp 17486 1 0 Sep27 ? 00:00:00 ExprServer -d
bmp 29446 1 0 Sep27 ? 00:00:00 Apache -k
bmp 14986 14960 3 Sep27 ? 01:31:21 jboss 1
bmp 17386 1 0 Sep27 ? 00:06:53 monitor_jboss
c. Switch to the smp user, and then check whether the processes of the SMP are started.
%p
The status of each process is displayed as follows:
UID PID PPID C STIME TTY TIME CMD
smp 192868 524942 0 23:08:36 - 0:33 136_sms_scp_agent -noinput
smp 196654 524942 0 23:08:11 - 1:38 111_smpker -noinput 1
smp 229912 524942 0 23:08:17 - 0:04 115_sms_kernel_agent -noinput
smp 233506 524942 0 23:07:56 - 2:57 100_oamagent -noinput
smp 254480 1 0 23:07:51 - 0:07 sms_cfg_center -noinput
smp 258788 524942 0 23:07:59 - 0:03 101_sms_access_agent -noinput
smp 266598 524942 0 23:08:02 - 0:04 103_sms_db_agent -noinput
smp 274774 524942 0 23:08:14 - 1:38 112_smpker -noinput 2
smp 295400 524942 0 23:08:24 - 0:03 127_sms_log_serv -noinput
smp 307506 524942 0 23:08:08 - 1:38 110_smpker -noinput 0
smp 332108 524942 0 23:08:05 - 0:04 105_sms_secu_serv -noinput
smp 340022 524942 0 23:08:30 - 0:03 129_sms_pois_serv -noinput
smp 372932 524942 0 23:08:27 - 0:02 128_sms_fs_serv -noinput
smp 385348 524942 0 23:08:33 - 0:13 133_sms_mml_agent -noinput
smp 430164 524942 0 23:08:20 - 0:05 125_sms_serv_center -noinput
smp 524942 1 0 23:07:54 - 0:01 sms_lca -noinput
The SMP has been started. The preceding information is only an example. The
displayed process information varies with the actual situation. View the log files in
$SMS_DIR/log and make sure that the SMP is started properly.
d. Switch to the root user, and then check whether the spy.sh monitor process is running.
% su - root
7. Check the status of the related applications and monitoring process on host1a (the standby
node after the switchover).
a. Log in to the standby node as the bmp user, and then check whether the processes of
the BMP are started.
% su - bmp
%p
If the BMP on the standby node is not started, you see the following information:
p: Command not found
b. Switch to the smp user, and then check the processes of the SMP.
% su - smp
%p
If the SMP on the standby node is not started, you see the following information:
p: Command not found
c. Switch to the uoa user, and then check the processes of the UOA.
% su - uoa
%p
If the UOA on the standby node is not started, you see the following information:
uoa_lma has not exist, maybe something is wrong with it
d. Switch to the root user, and then check whether the spy.sh standby process is running.
% su - root
# ps -ef | grep spy.sh | grep standby
If the spy.sh standby process is running, you see the information similar to the
following:
root 18593 17992 1 11:23:25 ? 3:50 /usr/bin/ksh /etc/cmcluster/bmppkg/
spy.sh standby
----End
Exception Handling
If the switchover fails, check the following logs to locate the fault:
Prerequisite
The active node and standby node are in the normal state.
Before the switchover of the two-node cluster, make sure that calls can be made successfully,
CDRs can be generated successfully, the SMDBs on the active node and standby node, and the
physical database are in the normal state, and the data can be synchronized successfully between
the two nodes.
The system space usage is smaller than 80%. The CBP and BMP services are normal and the
CPU and memory usage are normal.
Context
CAUTION
l The switchover of the two-node cluster affects the existing network greatly. In this case, you
need to perform switchover in idle time.
l Before two-node cluster switchover, ensure that the operation is approved and to be
performed by a dedicated person.
You can perform the two-node cluster switchover by using the following methods:
On the CBP, you can stop the SMDB to trigger the switchover of the two-node cluster.
However, you cannot stop the network database to trigger the switchover of the two-node cluster.
This topic takes the BMP&SMP two-node cluster in cold standby mode and the Oracle nonRAC
local database for example to describe the switchover procedure. For the switchover of other
NEs, see the installation guide of the matching version.
Procedure
Step 1 Stop an application to trigger a switchover of the two-node cluster.
1. Log in to the active node and standby node as bmp user and see Table 6-1 to check whether
the status of the two-node cluster is normal.
Cluster processes The status of the cluster The status of the cluster
processes is active. processes is active.
Network status The status of the active IP The status of the active IP
address of the active node is address of the active node is
DOWN, and the status of DOWN, and the status of
other IP addresses is UP. other IP addresses is UP.
Application The BMP, SMP, and UOA The BMP, SMP, and UOA
are started. are not started.
2. Run the following command to stop the BMP as the bmp user:
% stop_bmp.sh
The switchover duration varies according to the host performance and data volume. After
the switchover of the two-node cluster, the original active node host1a works as the standby
node, and the original standby node host1b works as the active node.
3. See Table 6-2 to check whether the status of the two-node cluster is normal after the
switchover.
Cluster processes The status of the cluster The status of the cluster
processes is active. processes is active.
Network status The status of the active IP The status of the active IP
address of the active node is address of the active node is
DOWN, and the status of DOWN, and the status of
other IP addresses is UP. other IP addresses is UP.
Application The BMP, SMP, and UOA The BMP, SMP, and UOA
are started. are not started.
----End
Exception Handling
If the switchover fails, check the following logs to locate the fault:
Prerequisite
There is the risk on this operation. The operation personnel must be familiar with the device and
understand the running status of the device. In addition, the master and slave system run
normally. Before switchover, contact Huawei Engineers. Then, perform the operation if
approved.
CAUTION
l The maintenance before switchover needs to be performed in the time range when the traffic
is small, such as 2:00 am to 4:00 am. You can select the time as required. Ensure that the
communication is not interrupted and services are not affected during switchover.
l Before switchover, ensure that the system runs normally, the slave board is normal, and the
data is backed up.
l The switchover cannot be performed frequently. It is recommended that the switchover be
performed once half a year.
Operation Procedure
Maintenance Item Operation Instructions Standards
Switchover of the host Run the SWP BRD command to l The master board is reset.
system test the switchover of main l The slave board becomes the
boards. master board and the master
board becomes the slave
board.
l The system runs normally
after the switchover is
complete.
l The system displays alarm
messages during the
switchover between boards.
Exception Handling
l When the switchover between the active and standby boards fails, and the system cannot
process services normally, you need to reload each board from the BAM to restore the
service.
l If the function of the new active board cannot be restored, you need to immediately run the
SWP BRD command to switch this board back to the standby board.
Prerequisite
There is the risk on this operation. The operation personnel must be familiar with the device and
understand the running status of the device. In addition, the switchover should be performed
when the master and slave system run normally. Before switchover, contact Huawei Engineers.
Then, perform the operation if approved.
CAUTION
l The maintenance before switchover needs to be performed in the time range when the traffic
is small, such as 2:00 am to 4:00 am. You can select the time as required. Ensure that the
communication is not interrupted and services are not affected during switchover.
l Before switchover, ensure that the system runs normally, the slave board is normal, and the
data is backed up.
l The switchover cannot be performed frequently. It is recommended that the switchover be
performed once half a year.
Operation Procedure
Maintenance Item Operation Instructions Standards
Switchover of the host Run the SWP BRD command to l The master board is reset.
system test the switchover of main l The slave board becomes the
boards. master board and the master
board becomes the slave
board.
l The system runs normally
after the switchover is
complete.
l The system displays alarm
messages during the
switchover between boards.
Exception Handling
l When the switchover between the active and standby boards fails, and the system cannot
process services normally, you need to reload each board from the BAM to restore the
service.
l If the function of the new active board cannot be restored, you need to immediately run the
SWP BRD command to switch this board back to the standby board.
Reference Standard
The air filter shelf, air filter gauze, fan tray, air deflector, and blades should be clean.
Context
If the appearance of devices is covered with dust, or if the air inlets and outlets of the system
are blocked with dust, the heat dissipation performance of the system will be degraded, which
affects the stability of the system. Therefore, cleaning dust from devices is important in routine
maintenance.
To ensure stability of a device, clean all the boards in a cabinet regularly (at least once a year).
Ensure that every device is clean.
CAUTION
Cleaning blades is a risky operation. Make sure that:
l Antistatic measures are taken during all operations.
l The detergent complies with the related national standards. This prevents damage to the
blades.
l Do not insert or pull out cables during cleaning.
Procedure
Step 1 Determine which components need to be cleaned.
Components to be cleaned
l Cleaning air filter shelf
l Cleaning the air filter gauze
l Cleaning the air deflectors
l Cleaning the fan tray
l Cleaning blades
----End
Exception Handling
None.
Reference Standard
The air filter shelf, air filter gauze, fan tray, air deflector should be clean.
Context
If the appearance of devices is covered with dust, or if the air inlets and outlets of the system
are blocked with dust, the heat dissipation performance of the system will be degraded, which
affects the stability of the system. Therefore, cleaning dust from devices is important in routine
maintenance.
To ensure stability of a device, clean all the boards in a cabinet regularly (at least once a year).
Ensure that every device is clean.
CAUTION
Stopping and cleaning minicomputers are important operations. Ensure that this operation is
performed by a professional person.
Do not insert or pull out cables during cleaning.
Procedure
Step 1 Determine which components need to be cleaned.
Components to be cleaned
Common method:
Use a clean cotton yarn cloth, ESD-preventive soft brush, and a vacuum cleaner to wipe the dust
off the fan blades and the circuit boards in the backup fan tray.
----End
Exception Handling
None.
7 Holiday Maintenance
This topic describes the maintenance items that need to be performed comprehensively before
holiday to ensure normal running of the system on holiday.
Prerequisite
l The average traffic on each office is different. The maintenance engineers need to learn the
volume of daily traffic in normal situations.
l Understand the maximum volume of traffic supported by the system according to the
technical scheme provided by Huawei marketing personnel for deployment.
Context
If there are multiple SCPs, the traffic on the SCPs needs to be evaluated respectively.
Procedure
Step 1 Log in to the SCP active node as the scu user.
The SCP displays the CAPS value every minute. For example, Platform CAPS: 11.12.
Step 4 Obtain detailed data and draw the trend of the CAPS value change, including detailed time and
value corresponding to the CAPS.
NOTE
The maintenance engineers are recommended to check the CAPS data every day. They can collect CAPS values
on the SCP through Huawei tool Collect Data. The frequency is optional.
----End
Exception Handling
If the CAPS value is lower than the normal value, perform the following checking. For the
unsolved problems, contract Huawei engineers.
1. Checking the Space Usage of File Systems, if the usage of the file system space is high,
you need to clear the disk space.
2. Checking the Memory Usage, check whether the automatic machine is suspended.
3. Checking the CPU Usage. Check whether an exceptional process exists. You can delete
this process after the analysis.
The maintenance engineers need to back up applications, configuration files, and databases
before upgrade and expansion. In this manner, the configuration and data can be recovered
rapidly after the upgrade.
Prerequisite
l This solution adopts backup by tape. Before backup, verify that the tape has sufficient
available space.
l Verify that the available space of the /tmp directory is at least 8.8 MB. You can run the df
-k command to check whether the file system has sufficient available space. If the available
space is insufficient, run the following command (for reference) to increase the space. For
details of the planning, see the HUAWEI ENIP Installation Guide.
# chfs -a size=+200000 /tmp
Context
CAUTION
The backup operation is performed at idle time, generally finished within four hours after 00:00.
This section provides only backup solution. For the method and procedure of backup (charged),
contact Huawei marketing.
The operating system is backed up in full backup mode. Both the active node and standby node
need to be backed up.
There are two backup modes. You can select one.
Procedure
Step 1 In command line mode
1. Log in to the active node and standby node as the root user.
2. Run the following command to back up the operating system:
# mksysb -i /dev/rmt0
3. After the backup is complete as required, take out the tape and save it.
Step 2 In smit mode
1. Log in to the active node and standby node as the root user.
2. Run the following command to back up the operating system:
# smitty mksysb
The information similar to the following is displayed:
Back Up the System
……
* Backup DEVICE or FILE [/dev/rmt0]
+/
Create MAP files? no +
EXCLUDE files? no +
List files as they are backed up? no +
Verify readability if tape device? no +
Generate new /image.data file? yes +
EXPAND /tmp if needed? no +
Disable software packing of backup? no +
Backup extended attributes? yes +
Number of BLOCKS to write in a single output []
#
(Leave blank to use a system default)
----End
Exception Handling
If the backup fails, locate the fault according to the error message displayed after the backup
command is run. If the fault persists, contact Huawei engineers.
Prerequisite
l This solution adopts backup by tape. Before backup, verify that the tape drive is connected
normally. That is, the host is connected to the tape drive through the SCSI cable and the
tape drive is also connected to the Terminator.
Run the following command to check whether the tape drive is connected normally:
# ioscan -fnC tape
The system displays information similar to the following:
Class I H/W Path Driver S/W State H/W Type Description
=====================================================================
tape 1 0/1/1/1.1.0 stape CLAIMED DEVICE HP C5683A
/dev/rmt/1m /dev/rmt/c3t1d0BESTn
/dev/rmt/1mb /dev/rmt/c3t1d0BESTnb
/dev/rmt/1mn /dev/rmt/c3t1d0DDS
/dev/rmt/1mnb /dev/rmt/c3t1d0DDSb
/dev/rmt/c3t1d0BEST /dev/rmt/c3t1d0DDSn
/dev/rmt/c3t1d0BESTb /dev/rmt/c3t1d0DDSnb
CAUTION
If the tape drive cannot be identified, you need to install the tape driver. Do as follows: Run
the sam command, and then choose Peripheral Devices > Tape Drives > Actions >
Add. Perform operations as prompted.
Context
CAUTION
The backup operation is performed at idle time, generally finished within four hours after 00:00.
This section provides only backup solution. For the method and procedure of backup (charged),
contact Huawei marketing.
The operating system is backed up in full backup mode. Both the active node and standby node
need to be backed up.
Procedure
Step 1 Log in to the active node and standby node as the root user.
Step 2 Run the following command to back up the operating system:
# make_tape_recovery -Av
NOTE
l For the operating system whose version is earlier than HPUX11.00, run the make_recovery command
to back up the operating system.
l If the system configurations vary, you need to back up the operating system again.
Step 3 After the backup is complete as required, take out the tape and save it.
----End
Exception Handling
If any exception occurs, contact Huawei engineers.
Prerequisite
The software source name for making mirror files is Make mirror file 1.0. The system can
automatically make this software source, so manual making is not required.
The space of /mirror-file on the USM server is sufficient for storing mirror files.
Context
The operating system is backed up in full backup mode. Both the active node and standby node
need to be backed up.
The SuSE operating system is backed up through the mirroring function of the USM. The
mirroring function of the USM is to make a mirror file for all the data on the hard disk of a server
blade. The data includes the partitioning information, operating system, and application system
on the hard disk.
The mirror files are stored in the /mirror-file directory on the USM server. Through the mirror
management function of the USM, you can check the information about the mirror file, such as
the size, creation time, and storage path, and delete the unnecessary mirror files.
CAUTION
The mirror function of the USM is to copy all the data on a server blade to another server blade.
After restoration, you can check the running status of the server blade according to the actual
requirements of applications.
The backup operation is performed at idle time, generally finished within four hours after 00:00.
Ensure that services running on the network are not affected.
This section provides only manual backup solution. For the method and procedure of backup
(charged), contact Huawei marketing.
Procedure
Step 1 Making Mirror Templates.
1. Choose Deployment > Template Management. The Template Management page
appears.
2. Click Add. The Customize Template page appears.
3. Enter the template name, such as Make Mirror Template.
4. Click Add Software. The Add Software page appears.
5. Select Make mirror file 1.0 from Software list, and click OK. The Customize
Template page appears.
6. Click Edit to set the parameters for making mirror files.
The parameter description is as follows:
l Mirror name: name of a mirror file that is successfully made, which cannot be duplicated
with existing mirror file names. The name is composed of numbers, letters, underscore
(_), and hyphen (-), and starts with a letter. For example, set this parameter to
linux9sp2.
l Description: additional information about a mirror file.
7. Click OK. The Customize Template page appears.
8. Click Submit. The system notifies whether to add software sources in the correct sequence.
Click OK.
If the task progress bar displays 100%, it indicates that mirror backup task is performed
successfully. Choose Deployment > Mirror Management. The Mirror Management page
appears. You can check the mirror files in the mirror file list.
----End
Exception Handling
If the backup fails, check wrapper.log file in /var/log/ATAE of the USM server according to
the error information displayed on the USM GUI to locate the problem. If the fault persists,
contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation affects the I/O of the disk and the existing network greatly. In this case,
you need to perform backup in idle time, for example, 00:00 to 04:00.
Before backing up the application programs, ensure that the operation is approved and to be
performed by a dedicated person.
This section provides only directories to be backed up and the backup solution. For the method
and procedure of backup (charged), contact Huawei marketing.
The application programs are backed up in full backup mode. Both the active node and standby
node need to be backed up.
Procedure
Step 1 Log in to the active node and standby node of the CBP as the root user.
Step 2 Compress the files in the relevant CBP directories.
The directories on the CBP active node to be backed up are as follows:
l /enip
l /corefiles
l /hwshare
l /opt/informix
l /oracle
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node and the standby node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation affects the I/O of the disk and the existing network greatly. In this case,
you need to perform backup in idle time, for example, 00:00 to 04:00.
Before backing up the application programs, ensure that the operation is approved and to be
performed by a dedicated person.
This section provides only directories to be backed up and the backup solution. For the method
and procedure of backup (charged), contact Huawei marketing.
The application programs are backed up in full backup mode. Both the active node and standby
node need to be backed up.
Procedure
Step 1 Log in to the active node and standby node of the BMP as the root user.
l /enip
l /corefiles
l /hwshare
l /opt/informix
l /opt/informix/temp
l /oracle
l /corefiles
l /hwshare
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node and the standby node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation affects the I/O of the disk and the existing network greatly. In this case,
you need to perform backup in idle time, for example, 00:00 to 04:00.
Before backing up the application programs, ensure that the operation is approved and to be
performed by a dedicated person.
This section provides only directories to be backed up and the backup solution. For the method
and procedure of backup (charged), contact Huawei marketing.
The application programs are backed up in full backup mode. Both the active node and standby
node need to be backed up.
Procedure
Step 1 Log in to the active node and standby node of the AR&DC as the root user.
Step 2 Compress the files in the relevant AR&DC directories.
The directories on the AR&DC to be backed up are as follows: /${JBOSS_HOME}
The following describes how to back up the ${JBOSS_HOME} directory.
% tar -cvf jboss.tar /${JBOSS_HOME}
Step 3 Store the application program package to the planned backup directory, such as the mount
directory /backup of lvbackup.
The following describes how to save the /jboss directory.
% mv jboss.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node and the standby node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation affects the I/O of the disk and the existing network greatly. In this case,
you need to perform backup in idle time, for example, 00:00 to 04:00.
Before backing up the application programs, ensure that the operation is approved and to be
performed by a dedicated person.
This section provides only directories to be backed up and the backup solution. For the method
and procedure of backup (charged), contact Huawei marketing.
The application programs are backed up in full backup mode. Both the active node and standby
node need to be backed up.
Procedure
Step 1 Log in to the active node and standby node of the Billing as the root user.
Step 2 Compress the files in the relevant Billing directories.
The directories on the Billing to be backed up are as follows:
l ${BILLING_HOME}/bin
l ${BILLING_HOME}/config
l ${BILLING_HOME}/ebill
l ${BILLING_HOME}/install
l ${BILLING_HOME}/lib
l ${BILLING_HOME}/ShareLib
l ${BILLING_HOME}/tool
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node and the standby node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for storing the backup data has sufficient space.
l The user who backs up application programs has the write and execute permissions on the
backup directory.
Context
On the GFEP client, back up the configuration through the interface, including the protocol,
connection, heartbeat script configuration, database setting, setting of the routing table, log
setting, and setting of the timing operation, as shown in Figure 8-1.
Procedure
Step 1 Log in to the GFEP client.
Step 3 Select the path to the file from which the configuration information (including protocols and
scripts) needs to be exported, as shown in Figure 8-2.
NOTE
You are advised to name the file in the format version number + creation time.
%fep stop
Step 6 Access the fep directory.
%cd fep
Step 7 Back up the FEP application.
%cp -r /home/gfep/fep /home/gfep/fep_bakyyyymmdd
Step 8 When the backup is complete, maintenance engineers can move the backup directory to other
storage media.
----End
Exception Handling
If an exception occurs during the backup, perform the following steps:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
The configuration files of AR are backed up once every month or before and after the system
upgrade. Thus, the files can be restored in case of exceptions. In addition, the backup files need
to be stored on other media to prevent insufficient disk space.
8.3.5 Backing Up Configuration Files (DC)
The configuration files of DC are backed up once every month or before and after the system
upgrade. Thus, the files can be restored in case of exceptions. In addition, the backup files need
to be stored on other media to prevent insufficient disk space.
8.3.6 Backing Up Configuration Files (SCP)
The configuration files of SCP are backed up once every month or before and after the system
upgrade. Thus, the files can be restored in case of exceptions. In addition, the backup files need
to be stored on other media to prevent insufficient disk space.
8.3.7 Backing Up Configuration Files on the EVC
The EVC needs to back up configuration files on the SCP before and after the upgrade.
8.3.8 Backing Up Configuration Files on the UVC
This topic describes how to back up the configuration files of the SCP on the UVC before and
after the upgrade.
8.3.9 Backing Up Configuration Files of the GFEP
The GFEP automatically backs up the config directory every day. This task is to check that the
configuration files are backed up successfully every month and before or after an upgrade. The
purpose is to ensure that the configuration items can be restored when an error occurs. In addition,
you need to move the backup files to other media to prevent insufficient disk space.
8.3.10 Backing Up Configuration Files of the RBI
This task is to back up the configuration files of the RBI before or after you modify the
configuration files or perform an upgrade through the RBI client. The purpose is to ensure that
the configuration files can be restored when an error occurs. In addition, you need to move the
backup files to other media to prevent insufficient disk space.
8.3.11 Backing Up Configuration Files of the iWeb
This topic describes how to back up configuration files, log files, and project files manually
before and after the upgrade. After the files are backed up successfully, you can move them to
other media through Export.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up.Take the operation in the active
node for example.The standby node don't need to be backed up for the cold two-node cluster.
Procedure
Step 1 Log in to the active node of the CBP system as the cbp user.
Step 2 Run the following command to compress the configuration files in the relevant CBP directories:
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
----End
Exception Handling
If any exception occurs, do as follows:
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up.Take the operation in the active
node for example.The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI ENIP Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the BMP system as the bmp user.
Step 2 Run the following command to compress the configuration files in the relevant BMP directories:
% tar -cvf bmp.config.conf20090710.tar ${HOME}/config
% tar -cvf bmp.addons.conf20090710.tar ${HOME}/add-ons/config
% tar -cvf bmp.jboss.conf20090710.tar ${HOME}/jboss/server/default/conf
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv bmp.config.conf20090710.tar /backup
% mv bmp.addons.conf20090710.tar /backup
% mv bmp.jboss.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up. Take the operation in the active
node for example. The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI CBS Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the Billing system as the billing user.
Step 2 Run the following command to compress the configuration files in the relevant Billing
directories:
% tar -cvf billing.config.conf20090710.tar ${BILLING_HOME}/config/
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv billing.config.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up. Take the operation in the active
node for example. The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI CBS Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the AR system as the ar user.
Step 2 Run the following command to compress the configuration files in the relevant AR directories:
% tar -cvf ar.jboss.conf20090710.tar ${JBOSS_HOME}/server/default/deploy/smap.ear/
default.war/WEB-INF/classes/conf/
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv ar.jboss.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up. Take the operation in the active
node for example. The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI CBS Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the DC system as the dc user.
Step 2 Run the following command to compress the configuration files in the relevant DC directories:
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
% mv dc.jboss.conf20090710.tar /backup
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
l The disk or tape for backup has sufficient available space.
l The user who backs up files has the write and execute permissions to the backup directory.
Context
CAUTION
The backup operation is performed in idle time.
Both the active node and standby node need to be backed up.Take the operation in the active
node for example.The standby node don't need to be backed up for the cold two-node cluster.
For details of configuration files, see the HUAWEI ENIP Configuration File Reference. This
document describes the paths, functions, configuration methods of the configuration files.
Procedure
Step 1 Log in to the active node of the SCP system as the scu user.
Step 2 Run the following command to compress the configuration files in the relevant SCP directories:
scu% tar -cvf scu.config.conf20090710.tar ${TELLIN_DIR}/config
Step 3 Store the configuration file package to the planned backup directory, such as the mount
directory /backup of lvbackup.
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
None.
Context
None.
Procedure
Step 1 Log in to the SCP as the scu user.
Step 2 Run the following command to back up the config directory of the SCP:
%cd $HOME
%mkdir evcBAK_(early version number)
%cp $HOME/config/ evcBAK_(early version number)/
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
Prerequisite
Ensure that no recharge cards are configured or no customized task is run before backup.
Context
None.
Procedure
Step 1 Log in to the SCP as the scu user.
Step 2 Run the following command to back up the config directory of the SCP:
%cd $HOME
Step 4 Run the following command to back up the following important configuration files in $
{HOME}/smp_run/bin:
%cd ${HOME}/smp_run/bin
Step 5 Run the following command to back up the cfg directory in ${HOME}/sms_run:
%cd ${HOME}/sms_run
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
The disk or tape for storing the backup data has sufficient space.
Context
During the startup of the GFEP, the backup script starts automatically, and the system
performance is not affected. Table 8-1 describes the method of backing up the GFEP
configuration files.
collect.sh Pack files in backup of config directory Every day The backup
The script starts the GFEP installation in the GFEP data of only
automatically directory. installation the latest
during the [Name format]: directory seven days is
startup of the GFEP.backup.config.YY reserved,
GFEP. _MM_DD_HH_MM_SS and the
_Weekday.tar.gz backup data
that is
generated
seven days
before is
deleted.
Procedure
Step 1 Log in to the GFEP host as the GFEP user.
%cd $HOME/fep/backup
Step 3 Check whether the backup is successful. Figure 8-3 shows the backup data of the seven days.
Step 4 Maintenance engineers are advised to move the backup files to other media according to the
situation of the office.
----End
Exception Handling
If an exception occurs during the backup, perform the following steps:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
The disk or tape for storing the backup data has sufficient space.
Context
Before modifying a configuration file or performing an upgrade, you can back up the
configuration file through the RBI client. You can back up the configuration files of the following
modules as required:
l RBIManage
l RBICollect
l RBISend
l RBIFilter
l RBICompress
l RBICombine
Procedure
Step 1 Log in to the RBI client, namely, URBIConfig.
Step 2 Choose Main Control module in the navigation tree, as shown in Figure 8-4.
The system displays the backup confirm dialog box. Click Yes in the dialog box.
Step 4 In the dialog box, enter Note name of the file that needs to be backed up, as shown in Figure
8-5.
Step 5 Click OK. The system displays a message indicating that the backup is successful. The
configuration files of the module are backed up in the path config/backup of the RBI user.
NOTE
If there are too many files in config/backup, you need to delete the discarded backup files.
Step 6 It is recommended that maintenance engineers move backup files to other media according to
the situation of the office.
----End
Exception Handling
If an exception occurs during the backup, perform the following steps:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
Prerequisite
Maintenance engineers must have the right of Maintenance.
Context
The iWeb page provides the backup menu, as shown in Figure 8-6. Maintenance engineers can
set Schedule so that the system backs up configuration files periodically.
Procedure
Step 1 Log in to the iWeb system.
Step 2 Choose Maintenance > Backup & Restore.
Step 3 Click Backup.
Step 4 In the displayed window, enter the backup name and click Ok.
Step 5 Maintenance engineers can back up files in *.bat to a specified place as follows:
1. In the list, select the check box of one item before backup. You can select only one item.
2. Click Export.
3. In the displayed dialog box, click Save after confirming that the preceding configuration
is correct.
4. In the displayed dialog box, select the storage place. You can change the backup name.
Then click Save.
----End
Exception Handling
If any exception occurs, do as follows:
1. Check whether the disk space of the backup directory is sufficient.
(1) Log in to the active node as the root user.
(2) Check the disk space.
l IBM/ATAE
# df -m
l HP
# bdf
The value of Use% or %Used displayed on the screen indicates the usage of a file
system. The space usage of each file system must be less than 80%.
(3) If the usage is higher than 80%, you need to increase the disk space or delete outdated
files from existing disks through FTP. Then back up log files again.
2. If the fault persists, contact Huawei engineers.
The maintenance table is the summary table of the maintenance items that need to be performed
by maintenance engineers.
9.1 Daily Maintenance Table
The daily maintenance table is the summary table of the maintenance items that need to be
performed at least once a day. In this case, the maintenance engineers can perform the
maintenance items after tailoring certain maintenance items as required.
9.2 Weekly Maintenance Table
The weekly maintenance table is the summary table of the maintenance items that need to be
performed at least once a week. The maintenance engineers can perform the maintenance items
after tailoring them as required.
9.3 Monthly Maintenance Table
The monthly maintenance table is the summary table of the maintenance items that need to be
performed at least once a month. The maintenance engineers can perform the maintenance items
after tailoring them as required.
9.4 Yearly Maintenance Table
The yearly maintenance table is the summary table of the maintenance items that need to be
performed at least once a year. The maintenance engineers can perform the maintenance items
after tailoring them as required.
9.5 Holiday Maintenance Table
The holiday maintenance table is the summary table of the maintenance items that need to be
performed at least once before the holiday. The maintenance engineers can perform the
maintenance items after tailoring them as required.
9.6 List of Maintenance Items for Upgrade
The maintenance table for upgrade is the summary table of maintenance items that need to be
performed before upgrade. The maintenance engineers can perform the maintenance items after
tailoring them as required.
Office name:
Date:
Checked by:
Duty contents
Remaining problems:
Supervisor check:
Office name:
Date:
Checked by:
Yes
Backing up log files on the CBP No
Duty contents
Remaining problems:
Supervisor check:
Office name
Date:
Checked by:
Duty contents
Remaining problems:
Supervisor check:
Office name:
Date:
Checked by:
Duty contents
Remaining problems:
Supervisor check:
Office name:
Date:
Checked by:
Duty contents
Remaining problems:
Supervisor check:
Office name:
Date:
Checked by:
Duty contents
Remaining problems:
Supervisor check:
A Appendix
Precautions
In routine maintenance, precautions include but not limit to the following points:
l Maintain the system by using foreground maintenance systems, for example, the service
management access point (SMAP). You can modify system-level parameters only after
being approved. If you need to modify system-level parameters, back up the parameters
beforehand and make sure the modifications are correct.
l Run more or cat to check data in the configuration file. You cannot run vi to modify a file
without permission. If you need to modify a file, back up the parameters beforehand and
make sure that the modifications are correct.
l You can perform the following operations only after being approved by carriers:?
Informix Database
oncheck -pt Print the data structure of the system. The checked
tables are added with shared locks.
Operation Description
onmode -d { standard|primary The data replication mode is cut down. Other users
Name of the data service |secondary may not be able to access the database. Therefore, run
Name of the data service } this command only during emergencies.
Changing the password of the Change the password of the database, you need to
database change the configurations of the network elements that
connect the database.
Backing up the database If you back up the database when the call traffic is
heavy, the system performance is affected.
Oracle Database
Operation Description
SQL> alter system set parameter name = Modify spile. For example, modify archive
parameter value scope = spfile; paths.
SQL> DROP TABLESPACE name of the Data space is deleted and data is missing.
data space INCLUDING CONTENTS
AND DATAFILES;
Changing the password of the database Change the password of the database. In this
case, you need to change the configurations
of the NEs that connect the database.
Backing up the database. If you back up the database when the call
traffic is heavy, the system performance is
affected.
ATAE
Operation Description
haconf -dump -makero Stop the VCS, processes and applications for
hastop -all monitoring the two-node cluster; Unbind
floating IP addresses; Deactivate LVs and
VGs.
rm * Delete files.
Changing the system time You can change the system time only after
being approved. Otherwise, time of service
blades can be different from the system time.
Then, serious problems occur.
Changing the time zone and DST of the Charging errors and call interruptions may
system occur if you perform these operations when
data exists in the SMDB.
Changing the transmission rate and working These operations may cause that the network
mode of network adapters communications are interrupted.
HP Minicomputer
Operation Description
rm * Delete files.
Changing the system time Time of service blades can be different from
the system time if the system time is modified
against rules. In this case, serious problems
occur.
Modifying the time zone and DST of the Charging errors and call interruptions may
system occur if you perform these operations when
data exists in the SMDB.
Operation Description
Changing the transmission rate and working These operations may cause that the network
mode of network adapters communications are interrupted.
IBM Minicomputer
rm * Delete files.
Operation Description
Changing the system time Time of service blades can be different from
the system time if the system time is changed
against rules. In this case, serious problems
occur.
Changing the time zone and DST of the Charging errors and call interruptions may
system. occur if you perform these operations when
data exists in the SMDB.
Changing the transmission rate and working These operations may cause that the network
mode of network adapters. communications are interrupted.
SCP
Operation Description
BMP
Back up and store files and directories whose Startup of the JBOSS becomes abnormal.
suffixes are not .bak in $HOME/jboss/
server/default/deploy.
CBP
Running kill -9 to end CBP processes that This operation causes the SMDB to be
access the SMDB abnormal.
SMDB
Operation Description
Using the mdsql tool of the SMDB to perform Use the mdsql tool of the SMDB to perform
the operations including update, delete, the operations including update, delete,
drop and alter. drop and alter. For example, perform these
operations on table spaces.
Running kill to end a parent process and Run kill to end a parent process and
container0 during the restart of a service container0 during the restart of a service, and
the switchover is triggered.
BMP
bmp enip Installation and If you obtain CDRs as this user, the RBI is
running user of involved. In this case, the corresponding
the BMP. password is required on the RBI configuration
page.
userdb enip User name for See the password change impact analysis of the
accessing the sysdb user of the BMP.
BMP user
database.
CBP
dbXXX: enip User name for See the password change impact analysis of the
XXX is accessing the sysdb user of the BMP.
the CBP CBP physical
node. database on the
CBPDB blade
when the
network
database is
used.
SMP
smp tellin Installation and The SMP uses the sms user to access the database
running user of to change the password. The application is not
the SMP. affected.
SCP
sms tellin FTP user name The following modules are involved:
of the SCP. l BUS: The FTP configuration file
ftphelper.xml needs to be modified.
In LDS mode, the login-config.xml file needs
to be modified.
l SMP: The commserv db process of the SMP
is affected. You need to restart this process
after using the dbcfgtool tool to synchronize
the password.
l SMPSER: The license update is affected. The
FTP password in the platform configuration
file inetcfg.cfg needs to be changed.
l RBI: If connections are configured, the
password needs to be changed on the
configuration page.
GFEP
Informix Informix Installation and Offices that do not use the SMS discrete number
running user of scheme: Password change does not affect the
the Informix application.
database. Offices that use the discrete number scheme: The
login-config.xml file needs to be modified, and
the JBOSS needs to be restarted.
A.3 Glossary
A
Account An entity through which a customer can pay for the
telecommunications services provided by a carrier. An
account is the minimum unit for billing settlement.
Account accumulation A process of accumulating the fees of a CDR to relevant
account items according to different fee types.
Account book A book that records the information about the income and
expense of each fee item in the account by class. An
account matches one or more account books. An account
book often records the information such as account
number, bill cycle, and account book subject.
B
Basic fee A fee that a subscriber pays for the telecommunication
through a network or channel of a carrier regardless of a
specific service. It is also called channel fee. The charge
rate of the basic fee is often fixed.
Basic fee for voice service The local call fees or roaming fees that a subscriber needs
to pay a carrier when the subscriber uses the network of
the carrier to make or answer calls. When a subscriber
makes or answers a call on the registered mobile local
network, that is, in the home area, the local call fees are
deducted. When the subscriber roams to other mobile local
networks, the roaming fee is deducted.
Bill A list through which a carrier provides the service fee
information periodically for a subscriber. A bill records the
information such as the final balance and the fees for using
the services and products. Bills are classified into detail
bills and summary bills. A carrier charges a subscriber
according to the information on the bill.
Bill cycle The interval for charging service fees from subscribers.
The interval can be set according to the operation strategy
of a carrier and is often one month. When a bill cycle ends,
the CBS system calculates the fees that a subscriber needs
to pay in the bill cycle and generates a bill.
Bill run A process of calculating the billing result such as the
monthly fee, discount, incentive, usage summary, free unit,
rebate, and other charge and credit (OCC).
Blacklist A list that records the information about the customers with
restricted transactions. The customers in the blacklist are
forbidden to use certain services. The carrier can add the
customers who are in arrears for a long period, break
contracts, or have little credit to the blacklist.
BMP A network element of the CBS system that manages the
operation of services, such as product management,
charging management, resource management.
Brand A name that a carrier defines after segmenting the market
and combining the products according to the ages,
consumption habits, and consumption levels of customers.
A carrier combines products and sells the combination to
specified customer groups by brand to make profits.
C
Call control A function of processing a call, consisting of creating,
monitoring, maintaining, connecting, and releasing a call
and providing service features.
Call forwarding An operation performed by a service agent to forward a
call to the IVR process or other service agents in the
customer service center when the service agent processes
a call. A call can be forwarded to the IVR process in either
of the following modes: hang-up forwarding and blind
forwarding. A call can be forwarded to an agent in any of
the following modes: talk forwarding, connect forwarding,
blind forwarding, and three-party forwarding. A call can
be forwarded to a specified service agent in the mode of
specified forwarding.
Call screening A service of call control. If the service is enabled for a
subscriber, the subscriber can maintain a screening table
that records the information such as discrete numbers,
number segments, areas, time segments, and passwords.
Before a call is connected, the CBS system determines
whether to continue the call according to the current
attribute of the calling subscriber and the information such
as the screening table, screening type, screening strategy,
and screening mode.
F
Familiarity number A mobile number that a subscriber sets, which can enjoy a
preferential tariff when a call is made between this mobile
number and the mobile number of the subscriber. The
number of familiarity numbers that a subscriber can set is
determined by the carrier. Special numbers such as a
customer service number cannot be set as familiarity
numbers.
Fee item A detailed item of the consumption fees of a subscriber.
For example, the local call fee item and national toll call
fee item.
Free resources A resource that a carrier provides for subscribers for free
use. Free resources include a certain number of short
messages, the call duration, and the data traffic.
G
Group condition The rule for distinguishing scenarios or subscriber objects.
For a certain service that a carrier provides, the charge fees
vary according to the scenario or subscriber object.
H
Hot billing A process of performing the real-time bill run and
generating a bill before the end of a bill cycle as requested
by a subscriber. The bill records the consumption of the
subscriber in the bill cycle.
I
Instantiation A process of defining the tariff of a product when the
product is created, including the operations of selecting the
matching service and defining the tariff for the service.
M
Main product A product that a subscriber must subscribe to during the
registration according to the system settings and that is
bound with the basic fee of a brand.
MO barred A specific state in the life cycle of a subscriber. It is also
called suspension. A subscriber in this state can only
answer calls.
N
Network element A network device that actually exists and has the basic
information such as an IP address, port number, user name,
and password.
Northbound interface A software interface that the I2000 provides for superior
NMSs or the third-party integrated analysis software
(namely, the external system).
O
Offline charging A charging mechanism where the charging information
does not affect the service provisioning in real time. The
offline charging is based on bills, that is, the system
performs rating and fee deduction according to the
collected original call records of subscribers.
Online charging A charging mechanism for monitoring the account balance
online in real time. When the account balance of a
subscriber is used up, the system prevents the subscriber
from using the service. In this case, the risk of owing fees
is reduced.
CBS A system that implements the convergence of online
charging and offline charging, voice service charging and
data service charging, prepaid subscriber management and
postpaid subscriber management. The CBS system
provides the functions such as rating, subscriber balance
management, and real-time monitor.
Organization An abstract concept. It refers to the structure of enterprise
organizations. Organizations are hierarchically connected.
Point The credit amount that a subscriber can obtain based on the
contribution of the subscriber to a carrier. The points are
converted according to the consumption amount of a
subscriber. The subscriber can use the points to exchange
for certain product or products.
Pool period A period in which a subscriber of an account that is in
Disable state does not recharge the account after the
deletion period An account in this period is in Pool state.
A subscriber in Pool state cannot perform any operations.
The CBS system deletes the subscriber account and
reclaims the number resources after the pool period.
Postpaid service A service that requires customers to pay for calls or other
services in advance. When a customer uses a certain
service that is provided by a carrier, the network performs
real-time charging on the service usage. The usage fee is
deducted from the prepayment.
Prepaid service A service that requires customers to pay for calls or other
services in advance. When a customer uses a certain
service that is provided by a carrier, the network performs
real-time charging on the service usage. The usage fee is
deducted from the prepayment.
Price event The action of using the telecommunications network
resources and the services. For example, a voice call and a
message transfer between users, the information
interaction between subscribers and application systems,
the roaming service, the interconnection service between
carriers, and other events that carriers want to charge fees.
Price Plan A set of pricing policies provided by a carrier for a group
of telecommunications services. The charging system can
calculate the fees for using the service based on the service
usage and pricing plan of a subscriber.
Product A combination of one or more services with predefined
tariff. Carriers can directly sell the combination of services
to customers.
Promotion A flexible marketing strategy that a carrier uses to attract
subscribers. When a subscriber meets certain conditions,
for example, the service consumption of the subscriber
reaches a preset value or the subscriber subscribes to a
product, the subscriber can enjoy preferential policies.
R
Recharge To add an amount or a service volume to an account of the
service system through a valued card or by cash.
S
SCP A physical entity in the intelligent network that implements
a service control function.
T
Tariff A term related to the pricing and discount policies of a
product. Generally, the tariffs are classified into usage
tariff, rental tariff, discount tariff, and reward tariff.
Tariff policy The policy used to define the rule condition, charging rate,
and charging action for different tariffs. One or multiple
policies exist for a product. For example, after a subscriber
subscribes to a GPRS package, a monthly rental of 20
dollars is charged each month. If the monthly rental is
charged successfully, the subscriber can use the GPRS
service. When the subscriber answers calls, no fee is
charged. For the GPRS package, three policies exist:
monthly rental policy, policy of using the GPRS service
for free, and policy of charging the called party free.
Tariff policy template A set of tariff rules, which abstract the tariff service logic
with common attributes and encapsulate complicated
logic. Template is short for tariff policy template. The
templates are used to customize the calculation rules of
rating, fee deduction, and accumulation about a charging
event. The CBS system determines whether to perform an
action according to template conditions to implement the
corresponding tariff policy.
Time schema The time condition that needs to be met when a tariff is
defined so that different charging rates are adopted in
different time segments.
Transfer account balance A process of transferring the account balance of an account
to another account.
U
Upper limit The maximum consumption amount that a carrier sets for
a subscriber in a bill cycle. If the consumption amount if a
subscriber exceeds the maximum consumption amount
that the carrier sets, the CBS system still deducts the
maximum consumption amount that the carrier sets.
W
White list A set of lists for controlling whether a subscriber can log
in to the CBS system or use telecommunications services.
Only subscribers in this list can log in to the CBS system
or use telecommunications services.
A
AAA Authentication, Authorization, and
Accounting
ABNF Augmented Backus Naur Form
AC Apply Charging
ACK Acknowledgement
ACR Apply Charging Report
AIP Advanced Intelligent Peripheral
AoC Announce of Charge
API Application Programming Interface
APN Access Point Name
AS Application Server
ATI Automatic Transmitter Identification
ATM Automatic Teller Machine
AVP Attribute Value Pairs
B
BME Business Management Environment
BMP Business Management Point
BSS Business Support System
C
CAA Client Access Agent
CAC Charging Area Cell
CAP CAMEL Application Part
CAZ Charging Area Zone
CBE Convergent Billing Engine
CBP Convergence Billing Point
CBCP Convergent Billing Configuration Point
CBS Convergent Billing System
CC Customer Care
CCF Call Control Function
CCBS Custom Care & Billing Solution
CCA Credit Control Answer
CC&BM Customer Care and Business Management
CCR Credit Control Request
CDMA Code Division Multiple Access
CDR Call Detail Record
CDRSC Call Detail Record Store and Convert
CF Call Forwarding
CFC Call Froward Conditional
CFU Call Froward Unconditional
CNL National Location Code
COS Class of Service
CP Content Provider
CRM Customer Relationship Management
CTD Cell and Time Distribution
CTI Computer Telephony Integration
CS Circuit Switched
CSI CAMEL Subscription Information
CSP Communication Service Provider
CUG Closed User Group
D
DCC Diameter Credit Control
DCCA Diameter Credit Control Application
DNS Domain Name Server
DP Detection Point
DR Delivery Report
DSC Digital Speaking Clock
DSL Digital Subscriber Line
DTMF Dual Tone Multi-Frequency
E
EDGE Enhanced Data rates for GSM Evolution
ENIP Enhanced Network Intelligent Platform
ETL Extraction, Transformation, Loading
eTOM enhanced Telecom Operations Map
F
FA Foreign Agent
FCI Full Configuration Interaction
FEID Front End ID
FEP Front End Processor
FEPID Front End Processor ID
FN Familiarity Number
FPH Free Phone
FQDN Fully Qualified Domain Name
FTP File Transfer Protocol
G
GFEP General Front End Processor
GGSN Gateway GPRS Support Node
GLR Gateway Location Register
GMSC Gateway Mobile Switching Center
H
HLR Home Location Register
HTTP Hypertext Transfer Protocol
I
ICCID Integrated Circuit Card Identity
ICS Incoming Call Screen
ID Identity
IDD International Direct Dialing
IDP Initial Detection Point
IMEI International Mobile Station Equipment
Identity
IMS IP Multimedia Subsystem
IMSI International Mobile Subscriber Identity
IN Intelligent Network
INAP Intelligent Network Application Protocol
IP Internet Protocol
IP Intelligent Peripherals
IPCG IP Charging Gateway
IPv4 Internet Protocol version 4
IPv6 Internet Protocol version 6
IR International Roam
ISDN Integrated Services Digital Network
ISO International Standard Organization
ISUP ISDN User Part
ITU-T International Telecommunication Union -
Telecommunication Standardization Sector
IVR Interactive Voice Response
L
LAC Location Area Code
LN Love Number
M
MAP Mobile Application Part
MCC Mobile Country Code
MCN Multiple Subscriber Number
MCN Missed Call Notification
MDCC Mobile Data Service Control Center
MDMC Mobile Data Service Management Center
MDN Mobile Directory Number
MDSP Mobile Data Service Platform
MF Master File
MML Man-Machine Language
MMS Multimedia Message Service
MMSC Multimedia Message Service Center
MMSO MMS Originator
MMSR MMS Recipient
MNC Mobile Network Code
MO Mobile Originated
MSC Mobile Switching Center
MSISDN Mobile Station International ISDN Number
MT Mobile Terminated
N
NAI Network Access Identifier
NAS Network Access Server
NE Network Element
NGN Next Generation Network
NM Network Management
NP Number Portability
NTP Network Time Protocol
O
OCP Online Charging Point
CBS Online Charging System
OSS Operation Support System
P
P2P Point to Point
PA Play Announcement
PBX Private Branch Exchange
PC Pricing Catalogue
PDP Packet Data Protocol
PDU Protocol Data Unit
P-FPH Personal Free Phone
PHS Personal Handyphone System
PID Process ID
PIN Personal Identification Number
PLMN Public Land Mobile Network
PMN Public Mobile Network
POP Post Office Protocol
PPS Prepaid Service
PRM Partner Relationship Management
PS Packet Switched
PSI Payment Server Interface
PSTN Public Switched Telephone Network
Q
QoS Quality of Service
R
RADIUS Remote Authentication Dial-In User Service
S
SCF Service Control Function
SCP Service Control Point
SCTP Stream Control Transmission Protocol
SCU Service Control Unit
SDR Special Drawing Rights
SDU Service Data Unit
SGSN Serving GPRS Support Node
SIGTRAN Signaling Transport
SIP Session initiation Protocol
SIM Subscriber Identity Module
SMAP Short Message Access Protocol
SMOI Service Management Open Interface
SMP Service Management Point
SMPP Short Message Peer to Peer
SMS Service Management System
SMS Short Message Service
SMSC Short Message Service Center
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SP Service Provider
SRF Specialized Resource Function
T
TCAP Transaction Capabilities Application Part
TCP Transfer Control Protocol
TDM Time Division Multiplex
TDMA Time Division Multiple Access
TD-SCDMA Time Division-Synchronous Code Division
Multiple Access
TLS Transport Layer Security
TUP Telephone User Part
U
UAP U-SYS universal access platform
UCB USSD Call Back
UOA Uniform OM Agent
URI Uniform Resource Identifier
URL Universal Resource Locator
URP Universal Resource Platform
USAU Universal Signaling Access Unit
USSD Unstructured Supplementary Service Data
UTC Universal Time Coordinated
UVC Uniform Voucher Center
UVS Uniform Voice Solutions
V
VAT Value-added tax
VC Voucher Center
VLR Visitor Location Register
VMS Voice Mail System
VoIP Voice over IP
W
WAP Wireless Application Protocol
WCDMA Wideband Code Division Multiple Access
WIFI Wireless fidelity
WIMAX Worldwide Interoperability for Microwave
Access
WIN Wireless Intelligent Network
WISG Wireless Integrated Service Gateway