Professional Documents
Culture Documents
This guide explains how to view, configure, and acknowledge system alarms. Alarms alert
you to conditions on the servers that can adversely affect server performance. Alarms also
provide important information about the status of servers in the enterprise.
This guide also discusses the logging and auditing features of the system.
Intended audience
This guide is designed to be used by:
Verint and Business Partner professional services staff responsible for the configuration,
operation, or maintenance of systems.
Customers’ IT staff responsible for system maintenance.
Enterprise administrators and system integrators
1.19 In Actions that can be audited for each module, added new
audited events for the Project Rules manager.
1.17 In the topic "Using the system Audit Viewer", removed a list of
suite applications that generate audit trails.
About this guide
1.10 Noted that when the Text Search field is not used in the Audit
Viewer, a maximum of 10000 audit entries are returned.
1.09 Noted that when the Text Search field is used in the Audit Viewer,
a maximum of 5000 audit entries are returned.
1.07 Sections Actions that can be audited for each module and Speech
Analytics Portal System Audits: Added list of events audited in the
Tune Transcript workspace.
Use the Alarm Dashboard to view or acknowledge any active alarm on servers in the
enterprise.
Topics
Desktops - This pane displays a list of all desktops on which the alarm selected in the Enterprise
Alarms pane is active. The Desktops pane displays only when the Show Desktop Alarms filter
option is selected.
Details - This pane provides detailed information about the active alarm selected in the Enterprise
Alarms pane, including the alarm corrective action.
The Alarms Dashboard also includes an Installations tree in the left pane. The Installation Scope
security settings assigned to a user on the User Access Rights screen determine the specific
Installation tree nodes that the user can access. A user can only view active alarms associated with
the Installation tree nodes to which they have access.
Security privileges are assigned to users from the User Management options of the enterprise
portal. For details about user security roles and privileges, see the Workforce Optimization User
Management Guide.
Related topics
Alarm priorities, page 15
View a list of active alarms in the enterprise, page 16
Filtering the list of active alarms, page 22
Viewing all instances of an active alarm, page 29
View a list of servers on which an alarm is active, page 33
View active alarm details and corrective actions, page 40
Acknowledging active alarms, page 43
Alarm priorities
Each active alarm has a priority level. The priority level of an alarm determines the severity of the
alarm and the urgency with which you must correct the condition causing the alarm. The default
alarm priorities include:
Major - Address these alarms immediately. If a major alarm is not addressed, the system fails
either partially or completely.
Minor - Review these alarms and take action if necessary. Minor alarms often indicate problems
that are self-correcting, or that do not have a significant impact on system performance.
Warning - Address these alarms in a timely manner. A Warning alarm indicates that the system
is functioning, but likely not at an optimum level.
Information - These alarms provide important status information but do not require any action
by the administrator.
To correct the condition causing an alarm, you perform the alarm corrective action and then
acknowledge the alarm.
Related topics
View a list of active alarms in the enterprise, page 16
Filtering the list of active alarms, page 22
View active alarm details and corrective actions, page 40
Acknowledging active alarms, page 43
Viewing all instances of an active alarm, page 29
View a list of servers on which an alarm is active, page 33
Alarms in Enterprise Manager Agent and Recorder Manager, page 47
Related information
Alarm Processes (Enterprise Manager Configuration and Administration Guide)
Procedure
1. Click System Monitoring > System Monitor > Alarm Dashboard.
2. A list of active alarms displays in the Enterprise Alarms pane of the Alarm Dashboard.
The Filter options selected in the left pane determine the specific active alarms that display in
the Enterprise Alarms pane. (By default, all active alarms in the enterprise display in the
Enterprise Alarms pane.)
3. To view information about the alarm in other panes of the Alarm Dashboard, click the active
alarm.
Use the Page controls at the bottom of the Enterprise Alarms pane to page through multiple
pages of alarms.
Related topics
Enterprise Alarms pane reference, page 17
Customize the Enterprise Alarms pane column display, page 21
Filtering the list of active alarms, page 22
Viewing all instances of an active alarm, page 29
View a list of servers on which an alarm is active, page 33
View active alarm details and corrective actions, page 40
Acknowledging active alarms, page 43
Export active alarms to a text file, page 45
Alarm priorities, page 15
Sort the data in that column in ascending or descending order. When a column is
sorted, the ascending or descending icon appears in the column heading to indicate how it
is sorted.
To add or remove columns on the Enterprise Alarms pane, select a Column option.
Field Description
Refresh Every Specifies the interval (in minutes) with which the data displayed in
the Alarms Dashboard is refreshed. When this interval elapses, the
dashboard refreshes the display with the latest active alarm data
stored in the Framework Database.
By default, the Alarms Dashboard is refreshed every 60 seconds.
You can click the Refresh icon to refresh the display instantly
rather than waiting for the refresh interval to elapse.
If you select the No Refresh setting, the display refreshes only when
you click the Refresh icon.
Field Description
Export Alarms To export every active alarm to a text file, click this icon . Use the
icon web browser features to save the exported text file to a local or
network directory.
The exported text file is tab-delimited. To view a spreadsheet
containing the list of active alarms, and the alarm attributes
associated with each active alarm, open the text file in Microsoft
Excel .
Use this feature in troubleshooting or other scenarios where it is
useful to capture every currently active alarm in the system in a
spreadsheet.
Enterprise Alarms Filtered icon - This icon displays next to the Enterprise
Alarms pane Alarms heading when you configure Filter options and click the
icons Filter button to apply them. The icon indicates that the dashboard
displays a filtered list of active alarms rather than all active alarms.
Maximize/Minimize icon - To maximize the Enterprise Alarms
pane, click this icon . To minimize the pane, click this icon .
Field Description
Alarm Name Shows the Alarm Name as it appears in the user interface.
Note: Each alarm also has an internal alarm name, which is different
from the Alarm Name that displays in the user interface. The internal
alarm name is used by internal components of the alarm system and
appears in log files.
Last Triggered Lists the date and time at which the most recent instance of the
alarm was triggered.
The time displays in the local time zone of the user viewing the
Alarms Dashboard.
Field Description
Component Displays the software component that triggered the most recent
instance of the alarm.
Page controls To navigate through multiple pages of active alarms, use these
controls at the bottom of the pane:
Related topics
View a list of active alarms in the enterprise, page 16
Customize the Enterprise Alarms pane column display, page 21
Filter pane reference, page 24
Instances pane reference, page 30
Servers pane reference, page 34
Details pane reference, page 41
Change the Priority assigned to an alarm, page 106
Change or create an alarm priority, page 91
Procedure
1. To add or remove a column from the Enterprise Alarms pane:
Point your mouse to any column heading in the Enterprise Alarms pane.
Click the small down-pointing arrow at the right of the column heading.
Point your mouse to the Columns icon , and place a check mark beside the columns you
want to appear in the Enterprise Alarms pane (all columns appear by default).
Clear the check mark for a column if you do not want that column to display in the Enterprise
Alarms pane.
2. To rearrange the order in which columns display in the Enterprise Alarms pane, click in a column
heading and drag the column to the right or the left in the pane.
Related topics
View a list of active alarms in the enterprise, page 16
Enterprise Alarms pane reference, page 17
The exception is the Show Desktop Alarms option of the Desktop filter. When this
option is not selected, no desktop alarms display in the dashboard. Only server alarms
display in the dashboard. When this option is selected, only desktop alarms display in
the dashboard, and server alarms do not display.
For example, assume the Alarm Name option is left blank. In this case, the alarm names of all
active alarms that meet the criteria specified in the other filter options display in the dashboard.
By default, none of the filter options are configured, and all active alarms in the enterprise display
in the dashboard.
If a filter option is configured (that is, at least one of its criteria is selected), only alarms of the
selected criteria display in the dashboard.
For example, if you select one specific Component Name, only the active alarms triggered by the
selected component display in the dashboard.
When you configure Filter options, the combined configuration of all four filter options determines
the alarms that display in the dashboard.
For example, assume that you select only one server node in the Installations filter option, and only
Major in the Priority option. But, you do not select any values for either Alarm Name or
Component Name options.
With this configuration, only the active alarms on the selected server that are of the Major priority
display in the dashboard. All alarm names and all component names associated with these active
alarms display.
Any active alarms in the enterprise that do not meet the combined criteria of all four filter options do
not display in the dashboard.
Related topics
Filter the list of active alarms, page 23
View a list of active alarms in the enterprise, page 16
Procedure
1. Click System Monitoring > System Monitor > Alarm Dashboard.
2. In the Filter pane on the left side:
a. To display only the active alarms with that Alarm Name (Alarm Number) in the dashboard,
select, or type an Alarm Name (or an alarm number).
To display the alarm names of all active alarms in the dashboard, clear the Alarm Name
field.
b. To display only the active alarms triggered by the selected component in the dashboard,
select one or more Component Name options.
To display alarms associated with all components in the dashboard, clear the Component
Names field.
c. If you want only the alarms of specific priorities to display in the dashboard, select one or
more Priority options.
To display the alarms of all priorities in the dashboard, clear the check marks from all the
Priority options.
d. To display only the alarms associated with the selected nodes in the dashboard, select one or
more Installations nodes.
To display the active alarms associated with all nodes in the enterprise in the dashboard,
clear the check mark from all Installations nodes.
e. To display only the desktop alarms in the dashboard, select Show Desktop Alarms. To
display the alarms for only one specific desktop, select that desktop from the drop-down list
in the Desktop filter option.
3. To filter the display of the alarms according to all the criteria selected in step 2, click Filter.
4. (Optional) To clear all filtering settings for all four filter options, click Clear All. If you clear all
filtering settings, and then click Filter, all of the active alarms in the enterprise display in the
dashboard.
Related topics
Filter pane reference, page 24
Filtering the list of active alarms, page 22
View a list of active alarms in the enterprise, page 16
Collapse/Expand You can collapse the Filter pane to hide the pane at the left-side of
Filter pane icons the screen.
To collapse the Filter pane, click the small left-pointing icon
halfway down the pane.
To expand the Filter pane, click the right-pointing icon halfway
down the pane at the left-edge of the screen.
Collapse/Expand You can expand or collapse each Filter option by selecting the icon
Filter options in the upper-right corner of each option.
To collapse an option, select the icon.
To expand an option, select the icon.
Filter Options
Important: When you configure an individual filter option, the combined configuration
of all four filter options determines the alarms that display in the dashboard.
Alarm Name This field lists every alarm in the enterprise in this format: alarm
name (xxxxxx), where xxxxxx is the individual alarm number of the
alarm.
Do either of the following to display information about the active
alarm that has that alarm name in the dashboard:
Select an alarm name from the drop-down list.
Type either an alarm name or an alarm number in the field.
If you type an alarm name, or an alarm number, the field
searches for a matching alarm as you type each character.
If you select or type an alarm name (alarm number) in this field,
click the Filter button to put the filtering change into effect.
By default, no alarm name is selected in this field.
If no alarm name is selected here, all active alarm names that
meet the criteria specified by the other filter options display in the
dashboard.
Component Name To display only the active alarms triggered by the selected
components, select one or more component names.
Note: The term “components” refers to the server software
components that trigger alarms on a server.
Note the following about selecting component names in this field:
To select a component name from the drop-down list, click a
component name so that it is highlighted. You can select
multiple component names.
To cancel the selection of a component name, click a
highlighted component name a second time so that is no longer
highlighted.
Only component names that have active alarms are available in
this option.
If you select a component name in this field, click the Filter button
to put the filtering change into effect.
By default, no component name is selected in this field.
When no component name is selected in this field, the active
alarms triggered by all components, and that meet the criteria
specified by the other filter options, display in the dashboard.
Note: When no component name is selected, the text “Select
Component Names” appears in this field.
Installations To display only the active alarms that are associated with the
selected nodes in the dashboard, select one or more Installation
tree nodes.
Note the following when selecting Installations tree nodes:
To view or hide child nodes, click the small arrow to the left of a
node.
If you select a parent node, all its child nodes are automatically
selected, and the active alarms associated with those nodes
display in the dashboard.
If you unselect a parent node, all its child nodes are also
automatically unselected.
If a parent node contains multiple child nodes, you can select
specific individual child nodes and cancel the selection of other
child nodes.
If you select an Installations node in this field, click the Filter
button to put the filtering change into effect.
By default, no Installation tree nodes are selected in this field.
When no Installation tree nodes are selected, the active alarms
that are associated with all Installation tree nodes, and that meet
the criteria specified by the other filter options, display in the
dashboard.
You cannot select an Installations node if the Show Desktop
Alarms filter option is selected.
Clear a filter option Each of the four filter options has a Clear option underneath its
filter selections.
To clear any selected filtering criteria for the option, click Clear
underneath an individual filter option and then click the Filter
button. In this case, all alarms associated with the cleared filtering
option that meet the criteria of the other configured filter options
display in the dashboard.
For example, if you click Clear underneath the Alarm Name filter
option, all Alarm Names display in the dashboard.
Clear All button To clear all filter settings from all four filter options, click this
button.
When you clear all filter settings from all four filter options, all
active alarms in the enterprise display in the alarm dashboard.
Filter button When you change any filter setting, you must click this button to
implement the change on the dashboard.
When you click the Filter button, the active alarms displayed in the
dashboard reflect the current filter configuration.
Related topics
Filter the list of active alarms, page 23
Filtering the list of active alarms, page 22
View a list of active alarms in the enterprise, page 16
Related topics
View all instances of an active alarm, page 29
Filtering the list of active alarms, page 22
Filter pane reference, page 24
Servers pane reference, page 34
Details pane reference, page 41
Procedure
1. Click System Monitoring > System Monitor > Alarm Dashboard.
2. In the Enterprise Alarms pane, click the specific alarm whose instances you want to view.
3. To display the list of alarm instances, click Instances in the lower left of the dashboard.
If the Instances text appears in a blue font (rather than black) when you point to it
with the mouse, the Instances pane is already selected.
If you click a specific instance of an alarm in the Instances pane, details about the
alarm instance display in the Details pane on the right.
A small arrow icon appears at the top of a column to indicate when the column is
sorted in ascending or descending order.
Use the Filter options in the left pane to display only active alarms that meet
specific criteria.
Use the Page controls at the bottom of a pane to page through multiple pages of
alarms.
Related topics
Viewing all instances of an active alarm, page 29
Instances pane reference, page 30
Click in a column heading to sort the data in that column in ascending or descending
order.
Field Description
Alarm Name Displays the Alarm Name as it appears in the user interface.
Note: Each alarm also has an internal alarm name, which is
different from the Alarm Name that displays in the user
interface. The internal alarm name is used by internal
components of the alarm system and appears in log files.
Last Triggered Lists the date and time at which the alarm instances were raised
(or triggered).
The time displays in the local time zone of the user viewing the
Alarms Dashboard.
Field Description
Page controls Use these controls to navigate through multiple pages of active
alarm instances:
Related topics
View all instances of an active alarm, page 29
Viewing all instances of an active alarm, page 29
Acknowledging active alarms, page 43
Procedure
1. Click System Monitoring > System Monitor > Alarm Dashboard.
2. In the Enterprise Alarms pane, click an active alarm.
3. To display the list of servers on which the selected alarm is active, click Servers in the lower left of
the dashboard.
If the Servers text appears in a blue font (rather than black) when you point to it with
the mouse, the Servers pane is already selected.
A small arrow icon appears at the top of a column to indicate when the column is
sorted in ascending or descending order.
To display only active alarms that meet specific criteria, use the Filter options in
the left pane.
To page through multiple pages of alarms, use the Page controls at the bottom of
a pane .
Related topics
Servers pane reference, page 34
Filter pane reference, page 24
Filtering the list of active alarms, page 22
Alarm priorities, page 15
View active alarms from EMA or RM, page 48
Field Description
Maximize/Minimize To maximize the Servers pane, click this icon . To minimize the
icon pane, click this icon .
Alarm Name Shows the Alarm Name as it appears in the user interface.
Note: Each alarm also has an internal alarm name, which is
different from the Alarm Name that displays in the user
interface. The internal alarm name is used by internal
components of the alarm system and appears in log files.
Field Description
Count Displays the number of instances of the alarm that have either
the Active or Ack Pending status on a server.
These alarm statuses include:
Active - Indicates the conditions causing the alarm still exist.
To resolve the alarm, view the alarm details, perform the
corrective action, and acknowledge the alarm.
Ack Pending (date/time) - Indicates that the system is
completing the alarm acknowledgment process, and shows
the date and time when the alarm was acknowledged. This
status displays immediately after an administrator, or the
system, acknowledges an alarm.
Note: The Ack Pending status usually exists for
approximately 30 seconds after alarm acknowledgment.
The status can exist longer when there is much alarm
activity on a server (or in other isolated cases).
Last Triggered Lists the date and time at which the most recent alarm instance
was raised (or triggered) on the server.
The time displays in the local time zone of the user viewing the
Alarms Dashboard.
Related topics
View a list of servers on which an alarm is active, page 33
Acknowledging active alarms, page 43
Alarms in Enterprise Manager Agent and Recorder Manager, page 47
Procedure
1. Click System Monitoring > System Monitor > Alarm Dashboard.
2. In the Filter column, under Desktop, select Show Desktop Alarms.
3. In the drop-down list in the Desktop section of the Filter column, do one of the following:
Select a particular desktop. If you select a particular desktop, only the alarms for that desktop
display in the dashboard.
Do not select a particular desktop. If you do not select a particular desktop, the alarms for all
desktops display in the dashboard.
4. Click the Filter option at the bottom of the Filter column. The alarms for the desktops display in
the dashboard.
5. If you did not select a particular desktop in step 3, do the following:
a. In the Enterprise Alarms pane, click on an active alarm.
b. In the bottom left of the dashboard, click Desktops to display the list of desktops on which
the selected alarm is active. You can also click Instances in the bottom left of the dashboard
to view a list showing each instance of the alarm.
Related topics
Desktops pane reference, page 37
Filter pane reference, page 24
Filtering the list of active alarms, page 22
Click in the column heading to sort the data in ascending or descending order.
Field Description
Maximize/Minimize Click this icon to maximize the Servers pane. Click this icon to
icon minimize the pane.
Alarm Name Shows the Alarm Name as it appears in the user interface.
Note: Each alarm also has an internal alarm name, which is
different from the Alarm Name that displays in the user interface.
The internal alarm name is used by internal components of the
alarm system and appears in log files.
Count Displays the number of instances of the alarm that have either the
Active or Ack Pending status on a server.
These alarm statuses are described below:
Active - Indicates the conditions causing the alarm still exist. You
must view the alarm details, perform the corrective action, and
acknowledge the alarm to resolve the alarm.
Ack Pending (date/time) - Indicates the system is completing
the alarm acknowledgement process, and shows the date and
time when the alarm was acknowledged. This status displays
immediately after an administrator, or the system, acknowledges
an alarm.
Note: The Ack Pending status normally exists for approximately
30 seconds after alarm acknowledgement. The status may exist
longer when there is a lot of alarm activity on a desktop (or in
other isolated cases).
Field Description
Last Triggered Lists the date and time at which the most recent alarm instance was
raised (or triggered) on the desktop.
The time displays in the local time zone of the user viewing the
Alarms Dashboard.
Page controls Use these controls to navigate through multiple pages of desktops:
Related topics
View the active alarms for Desktops, page 37
Procedure
1. Click System Monitoring > System Monitor > Alarm Dashboard.
2. If you want to view details about:
The most recent instance of the alarm, select the alarm in the Enterprise Alarms pane.
A single instance of an alarm, select the instance in the Instances pane.
3. The Details pane displays information about the selected alarm instance, including the corrective
action for the alarm.
Related topics
Details pane reference, page 41
Acknowledging active alarms, page 43
Alarm priorities, page 15
Field Description
Field Description
Last Instance A specific description of the most recent instance of the alarm. This
Details description is the most detailed information available about a
specific instance of the alarm.
If this column is blank, detailed information about the alarm instance
is not available.
Corrective Action Shows the corrective action steps for the alarm.
To correct the alarm condition, follow these steps. Once the alarm
has been corrected, you acknowledge the alarm to prevent the alarm
from displaying as an active alarm. Acknowledged alarms are moved
into Alarm History.
Note: The system automatically corrects and acknowledges some
alarms.
Related topics
View active alarm details and corrective actions, page 40
Acknowledging active alarms, page 43
Change the Priority assigned to an alarm, page 106
Change or create an alarm priority, page 91
You can acknowledge multiple alarms on one server simultaneously from the Enterprise
Manager Agent (EMA) or Recorder Manager (RM) application that resides on the server.
Related topics
Acknowledge an active alarm, page 43
View active alarm details and corrective actions, page 40
Alarm priorities, page 15
Acknowledge multiple alarms simultaneously from EMA or RM, page 55
Related information
Enterprise Manager Configuration and Administration Guide (“Alarm Processes” section)
Procedure
1. Click System Monitoring > System Monitor > Alarm Dashboard.
2. Under Enterprise Alarms, click the alarm that you want to acknowledge.
To display a subset of the active alarms, use the Filter options in the left pane.
To page through multiple pages of alarms, use the Page controls at the bottom of a
pane.
3. Click Servers or Desktops at the bottom left of the dashboard. (Desktops displays only if you
have selected the Show Desktop Alarms filter option.)
4. Under the Acknowledge column, click the acknowledge icon .
Related topics
Acknowledging active alarms, page 43
Procedure
1. Select System Monitoring > System Monitor > Alarm Dashboard.
2. Click the Export Alarms icon .
3. Save the text file using the features of the web browser.
You can open the text file in Microsoft Excel to view a spreadsheet containing the list of active
alarms.
Related topics
Enterprise Alarms pane reference, page 17
Procedure
1. Click System Monitoring > System Monitor > Alarm Dashboard.
2. In the lower left of the Alarm Dashboard, click Servers to display the Servers pane.
3. In the Servers column, click the link to the name of an individual server to open the RM or EMA
application on that server.
If the server is a recorder server, the RM application launches. If the server is any
other type of server, the EMA application launches.
Related topics
View active alarms from EMA or RM, page 48
You can work with alarms in the Enterprise Manager Agent (EMA) or Recorder Manager (RM)
application on an individual server. You can view or acknowledge the active alarms on an
individual server and view the alarm history on an individual server.
When you use the EMA or RM application, you can only work with those alarms
that exist on the individual server that hosts the RM or EMA application you are
using.
If you have multiple servers in your enterprise, use the Alarm Dashboard to work
with active alarms. You can work with any active alarm on any server in the
enterprise from the Alarms Dashboard.
Topics
Procedure
1. Click System Management > Enterprise > Settings.
2. In the Installations tree (left pane), select the specific Server node for which you want to view
alarms.
3. Click Launch.
4. To open the respective application, click either Recorder Manager or Enterprise Manager
Agent.
5. Click Alarms > View Alarms > Active Alarms.
6. To view preliminary information about active alarms on each server role on the server, do the
following:
In the Roles pane, expand the Server node (click the small triangle beside the Server) to display
all server roles on the server.
Click a specific Server Role node. Only active alarms associated with the selected server role
display in the pane on the right side.
7. To view detailed information about an individual alarm (including the alarm corrective action):
Select the alarm and click View (or just double-click the alarm). The Active Alarm Details
screen displays detailed information about the alarm.
To view a drop-down list containing the corrective action for the alarm, click the small right-
pointing arrow that appears to the left of the alarm name.
8. If you have performed the corrective action for the alarm, you can click Acknowledge to
acknowledge the alarm and place it in alarm history.
Related topics
Active Alarms screen reference, page 49
Active Alarm Details screen reference, page 51
Acknowledge an alarm from EMA or RM, page 54
Active alarms and the Alarm Dashboard, page 11
If all the information discussed in the following table does not appear on the screen, the
screen was customized to exclude the missing information. To display the missing
information, use the Customize option above the screen.
Item Description
Last Triggered The date and when the alarm was last raised (triggered). If there are
multiple instances of an alarm, the trigger time of the most recent
alarm instance displays.
Last Alarm Summary description of the alarm. This description is the common
Instance Details description for all instances of an alarm and not based on a specific
alarm instance. For a detailed, instance-specific description, select
the alarm and then click View the alarm, or review the alarm in
alarm history.
Customize Use the customize feature to add or remove columns from the Active
Alarms screen.
To use this feature, select Edit from the Customize drop-down list.
See the Customize window online help for usage details.
Item Description
Refresh Rate Shows the current setting for refresh rate in minutes. Choose 1, 2, 3,
4, 5, 10, 15, or 20 minutes as the automatic refresh rate. At these
times, the RM, or EMA application updates the status of the alarms
on the managed server. Default is 1. You can also click the Refresh
icon to update alarms immediately, without waiting for the
automatic refresh cycle.
Related topics
View active alarms from EMA or RM, page 48
Active Alarm Details screen reference, page 51
Change the Priority assigned to an alarm, page 106
Acknowledge an alarm from EMA or RM, page 54
Active alarms and the Alarm Dashboard, page 11
This table describes the Active Alarm Details screen fields and options:
Item Description
Corrective Action To view a drop-down list containing the corrective action for the
Steps alarm, click the small right-pointing arrow at the left of the alarm
name.
To correct the alarm condition, follow these steps. Once the alarm
has been corrected, you can acknowledge the alarm to place it in
Alarm History.
Last Triggered The date and time and when the alarm was last raised (triggered). If
there are multiple instances of an alarm, the latest trigger date and
time of the alarm instance is displayed.
Details The specific description of the alarm. This description is the most
detailed information available about this specific instance of the
alarm.
Component The component on the selected managed server or server role that
triggered the alarm.
Refresh Rate Shows the current setting for refresh rate in minutes. Choose 1, 2, 3,
4, 5, 10, 15, or 20 minutes as the automatic refresh rate. At these
times, the EMA, or RM application updates the status of the alarms
on the managed server. Default is 1. You can also click the Refresh
icon to update alarms immediately, without waiting for the
automatic refresh cycle.
Procedure
1. Click System Management > Enterprise > Settings.
2. In the Installations tree (left pane), select the specific Server node for which you want to view
alarms.
3. Click Launch.
4. To open the respective application, click either Recorder Manager or Enterprise Manager
Agent.
5. Click Alarms > View Alarms > Active Alarms.
6. In the Roles pane on the left side, select the Server node to view all active alarms on the server.
You can also select a Server Role node to view only the active alarms associated with the selected
server role.
7. Select the alarm whose corrective action you want to view, and click View (or just double-click on
the alarm). The Active Alarm Details screen displays.
8. In the Alarm Name column, click the small right-pointing arrow that appears just to the left of the
alarm name. This action displays a drop-down list containing the corrective action steps for the
alarm.
9. To correct the condition causing the alarm, perform the corrective action steps.
What to do next
Acknowledge an alarm from EMA or RM, page 54
Acknowledge multiple alarms simultaneously from EMA or RM, page 55
Related topics
Active Alarm Details screen reference, page 51
Active alarms and the Alarm Dashboard, page 11
View active alarms from EMA or RM, page 48
Procedure
1. Click System Management > Enterprise > Settings.
2. In the Installations tree (left pane), select the specific Server node for which you want to view
alarms.
3. Click Launch.
4. To open the respective application, click either Recorder Manager or Enterprise Manager
Agent.
5. Click Alarms > View Alarms > Active Alarms.
6. In the Roles pane on the left side, select the Server node to view all active alarms on the server.
You can also select a Server Role node to view only the active alarms associated with the selected
server role.
7. In the Active Alarms tab (right pane), select the alarm you want to acknowledge.
8. Click Acknowledge.
Related topics
Active Alarm Details screen reference, page 51
Active alarms and the Alarm Dashboard, page 11
View alarms in Alarm History, page 56
Acknowledge multiple alarms simultaneously from EMA or RM, page 55
Open Recorder Manager or Enterprise Manager Agent from the Alarm Dashboard, page 46
Procedure
1. Click System Management > Enterprise > Settings.
2. In the Installations tree (left pane), select the specific Server node for which you want to view
alarms.
3. Click Launch.
4. To open the respective application, click either Recorder Manager or Enterprise Manager
Agent.
5. Click Alarms > View Alarms > Active Alarms.
6. In the Roles pane on the left side, select the Server or Server Role node for which you want to
acknowledge multiple (or all) alarms.
7. Do one of the following:
To acknowledge multiple (but not all) alarms simultaneously, hold down the Ctrl key, select
each alarm you want to acknowledge, and click Acknowledge.
You can also select a range of alarms by holding down the Shift key, and clicking the top and
bottom alarm in the range.
To acknowledge all active alarms simultaneously, click Select All, then click Acknowledge.
If you decide not to acknowledge all alarms, click Select None to cancel the selection of all
alarms.
8. You are prompted to verify that you have started all services indicated by the alarms you are
acknowledging. (Many alarms require you to restart a specific service before acknowledging the
alarm.)
Perform this verification, and then click OK.
If you acknowledge multiple alarms simultaneously, it takes time for the system to
process the acknowledgments. In this case, a message appears at the top of the
screen indicating the system is processing the alarms. When the acknowledgment
processing completes, the alarms move from the Active Alarms tab to the Alarm
History tab.
Procedure
1. Click System Management > Enterprise > Settings.
2. In the Installations tree (left pane), select the specific Server node for which you want to view
alarms.
3. Click Launch.
4. To open the respective application, click either Recorder Manager or Enterprise Manager
Agent.
You can also open Recorder Manager or Enterprise Manager Agent from the Alarm
Dashboard. For details, see View active alarms from EMA or RM, page 48.
Related topics
Alarm History screen reference, page 57
Acknowledge an alarm from EMA or RM, page 54
Configure how long acknowledged alarms display in the Alarm History tab, page 90
View active alarms from EMA or RM, page 48
Item Description
Last Triggered The last date and time the alarm was raised (triggered). For multiple
instances of an alarm, the latest trigger date and time of the alarm
instance is displayed.
Acknowledged The date and time when the alarm was placed into alarm history
Date (that is, acknowledged).
Item Description
Page controls Use these controls to view more pages of alarm history.
You can change the number of records that display per page in
Preferences.
Related topics
View alarms in Alarm History, page 56
Configure how long acknowledged alarms display in the Alarm History tab, page 90
Acknowledge an alarm from EMA or RM, page 54
View active alarms from EMA or RM, page 48
Procedure
1. Click System Management > Enterprise > Settings.
2. In the Installations tree (left pane), select the specific Server node for which you want to view
alarms.
3. Click Launch.
4. To open the respective application, click either Recorder Manager or Enterprise Manager
Agent.
5. Click Alarms > View Alarms > Alarm History.
6. In the Roles pane on the left side, select the Server node to view all inactive alarms on the server,
or a Server Role node to view only the inactive alarms associated with the selected server role.
7. Click Clear All with a Server or Server Role node selected to delete all alarms for the selected node
from the alarms history window.
Related topics
View alarms in Alarm History, page 56
Configure how long acknowledged alarms display in the Alarm History tab, page 90
Acknowledge an alarm from EMA or RM, page 54
The Recorder Health Summary provides a visual indicator of Recorder health across the
enterprise. Administrators responsible for managing the recording-related systems use the
Recorder Health Summary to see the health status at a glance and to identify Recorder-
related alarms that require their attention. The Recorder Health Summary is a widget that is
available from the Dashboards module.
Topics
Recorder-related categories
The Recorder Health Summary categorizes alarms into three categories, each of which has a health
assessment.
Recording: Indicates the health and alarm status for recording components. For
example: Consolidator, Content Server, Recorder Ingestion Web Service, Screen Capture, Recorder
Integration Service.
Archive: Indicates the health and alarm status for Archiver and the Archive Web Service.
Recorder analytics: Indicates the health and alarm status for the Real-Time Analytics
(RTA) Framework. The Real-Time Analytics (RTA) Framework includes Identity Authentication and
Fraud Detection (IAFD), metadata detection, and Real-Time Speech Analytics (RTSA). For
example: Biometrics Engine, Metadata Engine, Recorder Analytics Framework.
Sort alarms: Sort the alarm list using a column heading. The list shows all the Recorder-related
alarms totaled by each of the category health indicators.
Automatic refresh: An automatic refresh interval of 60 seconds.
Related topics
Health assessment based on alarm thresholds , page 62
Recorder Health Summary, page 60
Related information
Recorder Health Summary widget (Dashboards Administration and User Guide)
Roles and Privileges Reference
Thresholds
The color code used for a category is based on predefined thresholds. The thresholds are a function
of:
The specific alarm instance. For example, alarm 39018, "Disk Manager Detected Un-Archived Audio
Files".
The frequency of occurrence for the alarm instance.
The thresholds are not configurable. If you require an adjustment to the thresholds, contact your
support representative for assistance.
Related topics
Recorder Health Summary overview, page 61
Procedure
1. Open a dashboard that contains the Recorder Health Summary widget.
2. From the View drop-down list, located in the upper right corner of the widget, select the scope of
what the widget displays.
Enterprise: Displays health status and alarms for all servers to which you have access in the
enterprise. Enterprise is the default setting.
Site: Displays health status and alarms for all servers that belong to the site.
Server: Displays health status and alarms for the selected server.
When you change the scope for the widget, the category tiles and the alarm list update
automatically based on the scope selected.
To see more alarm details, the corrective action, and to acknowledge an alarm, use the Alarm
Dashboard.
Related topics
Acknowledge an active alarm, page 43
Related information
Add a dashboard (Dashboards Administration and User Guide)
Field Description
View Use the drop-down list to set the scope for the information displayed. The
list includes all servers in the enterprise to which you have access. Select a
specific server, a single site, or the entire enterprise (default).
After selecting a scope, Recorder Health Summary updates for only those
alarms in the selected scope.
Recorder Category tiles use colors as visual indicators of health for each category in
category the selected scope. Each tile also displays the total number of active
health tiles alarms for the category.
Categories are:
Recording
Archive
Recorder Analytics
Field Description
Alarm list The alarm list summarizes the active alarms for all categories. Sort the list
in ascending or descending order by clicking a column heading, Reorder
the sequence of the columns by dragging and dropping a column heading.
Alarm: The unique numeric identifier of an alarm.
Alarm Name: The name of the alarm shown in the user interface.
Category: Identifies the Recorder-related category for the alarm.
Component: The specific component from the Category where the
alarm occurred. Examples of components include DiskManager,
RecorderIntegrationService, ArchiveWS, and Biometrics.
Instances: Number of times the alarm has triggered.
Priority: An icon representing the severity and urgency of the alarm.
See the related topics section to learn more about priorities.
Time: Date and time for the most recent instance of the alarm. Time
displays in the local time zone of the user viewing the Recorder
Health Summary widget.
Related topics
Set the scope for the Recorder Health Summary, page 64
Alarm priorities, page 15
Recorder Health Summary overview, page 61
Use alarm notification profiles to notify individual employees or the network management
system when individual alarms are triggered.
Topics
The notification email lists only the UTC time at which an alarm was triggered. The email does
not provide the alarm trigger time in any other time zones.
Related topics
Standard notification profiles, page 69
Make the standard notification profiles operational, page 71
Viewing the list of alarm notification profiles, page 75
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Custom notification profiles, page 84
Test and acknowledge alarms from the Alarm Testing notification profile, page 73
Alarm Testing Four test alarms. There The four test alarms are triggered.
(Use for alarm is one test alarm
testing assigned to each alarm
purposes only) priority (Warning,
Information, Minor,
Major).
Critical Every alarm of the Every alarm of the Major priority that is
Major priority triggered.
Major Every alarm of the Every alarm of the Minor priority that is
Minor priority triggered.
Minor Every alarm of the Every alarm of the Warning priority that
Warning priority is triggered.
employee to be notified of alarms of the Information priority, add that employee to the Information
notification profile, and so on.
If you include the same employee’s e-mail address in more than one notification profile, that
employee may receive multiple e-mails about the same alarm. For example, if an alarm has
both the All Alarms notification profile and the Critical notification profile assigned to it, and
Manuel Ortega appears in both of these notification profiles, Manuel will receive two e-mails
when the alarm is triggered.
What to do next
To make standard notification profiles operational, see Make the standard notification profiles
operational, page 71.
Related topics
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Test and acknowledge alarms from the Alarm Testing notification profile, page 73
Alarm notification profile overview, page 68
Custom notification profiles, page 84
Procedure
1. Add SNMP nodes to the system:
a. Click System Monitoring > System Monitor > Global Alarm Settings.
b. In the SNMP Node Settings section, add every SNMP node that must receive an SNMP trap
when an alarm is triggered.
2. Add employees and SNMP nodes to five standard notification profiles (All Alarms, Critical,
Information, Major, and Minor). For example:
a. Click System Monitoring > System Monitor > Notification Profiles.
b. In the left pane, select the Enterprise node.
c. Select the All Alarms profile, and click Edit.
d. In the E-Mail Address section, select an Organization, and then move the employees you
want to be part of this notification profile into the Selected Employees section.
For example, in the All Alarms profile, move the employees who must be notified of every
alarm that is triggered into the Selected Employees section.
e. In the SNMP Nodes section, move the SNMP nodes that you want to be part of this
notification profile into the Assigned SNMP nodes section.
For example, in the All Alarms profile, move the SNMP nodes that must receive traps when
every alarm is triggered into the Assigned SNMP nodes section.
f. Click Save And Apply to Children.
g. Repeat steps b. through f. above for each remaining standard notification profile (Critical,
Information, Major, Minor).
For example, in the Critical notification profile, specify all employees and SNMP nodes to be
notified if an alarm of the Major priority is triggered. In the Major profile, specify all
Employees and SNMP nodes to be notified if an alarm of the Minor priority is triggered, and
so on.
Related topics
SNMP MIB files, page 122
Standard notification profiles, page 69
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Editing notification profiles at different nodes of the Installations tree, page 78
Alarm notification profile overview, page 68
Custom notification profiles, page 84
Procedure
1. Go to System Monitoring. Under System Monitor, select Notification Profiles.
2. Under Installations (left pane), select the Enterprise node.
3. Click on the Alarm Testing (Use for alarm testing purposes only) notification profile once so
that it is highlighted.
4. Click Raise Test Alarms in the lower-right of the screen.
5. Access the Alarm Dashboard, by clicking Alarm Dashboard in the upper-left of the screen.
6. In the Filter (left hand) pane, under Component Name, select Enterprise Manager. Then click
Filter at the bottom of the Filter pane.
7. In the Alarm Dashboard, verify that the four test alarms appear in the Enterprise Alarms pane.
There is one test alarm for each alarm priority. The test alarms have names such as Test Alarm
(Major priority) and Test Alarm (Minor priority). If the four test alarms appear in the Enterprise
Alarms pane, the alarms were raised successfully.
8. (Optional) If you specified an email address in the Alarm Testing notification profile, verify that an
emails were sent to the specified email address. If you specified an SNMP node in the Alarm
Testing notification profile, verify that SNMP traps were sent to the SNMP node.
9. To acknowledge the four test alarms (acknowledge the test alarms in the same browser session in
which you raised them):
a. From the Alarm Dashboard, select Notification Profiles near the top of the screen.
b. Under Installations (left pane), select the Enterprise node, if necessary.
c. Click on the Alarm Testing (Use for alarm testing purposes only) notification profile once
so that it is highlighted.
d. Click Acknowledge Test Alarms in the lower-right of the screen.
e. Access the Alarm Dashboard, by clicking Alarm Dashboard in the upper-left of the screen.
f. In the Alarm Dashboard, verify that the four test alarms no longer appear in the Enterprise
Alarms pane. If the four alarms no longer appear, the alarms were acknowledged
successfully.
Related topics
Change the email address and SNMP node assignments, page 80
Make the standard notification profiles operational, page 71
Related topics
View the list of alarm notification profiles, page 75
Editing notification profiles at different nodes of the Installations tree, page 78
Alarm notification profile overview, page 68
Procedure
1. Go to System Monitoring. Under System Monitor, select Notification Profiles.
2. In the Installations tree (left pane), select the Enterprise node. The list of all alarm notification
profiles in the enterprise displays in the Notification Profiles List.
3. In the Installations tree, you can select lower nodes of the Installations tree (Site Group, Site, or
Server). Select the lower nodes to display the notification profiles that are assigned to alarms at
each node of the Installations tree.
Related topics
Viewing the list of alarm notification profiles, page 75
Notification Profiles List screen reference, page 76
In the pane on the left side, click an Installation tree node to see how the notification profiles are
configured for that node.
Each field of the Notification Profiles List screen is described in this table.
Field Description
Profile Name Shows the names assigned to the alarm notification profiles. The
standard notification profiles are All Alarms, Critical, Information,
Major, and Minor.
An Alarm Testing notification profile is available to users with the
appropriate security privilege to test that the alarm system is
working.
Assigned to Alarm Shows a Yes/No list indicating whether the notification profile is
assigned to any alarms.
By default, each of the alarm notification profiles is assigned to
multiple alarms. Notification profiles are assigned to alarms based
on the priority of each alarm.
To view the notification profiles assigned to alarms, go to System
Monitoring. Under System Monitor, select Alarm Settings.
SNMP Nodes Shows the name of the SNMP (Simple Network Management
Protocol) nodes that are assigned to this notification profile.
These SNMP nodes are notified (by means of SNMP trap) when an
alarm with this profile assigned to it is triggered.
By default, SNMP nodes are not assigned to any of the notification
profiles. You must manually assign the SNMP nodes to notification
profiles (by editing the notification profile).
Field Description
To E-Mail Shows the email addresses that are assigned to this alarm
Addresses notification profile. Each email address is separated by a comma or
semicolon. There can be zero or many addresses listed here.
These email addresses are notified when this profile is assigned to
an alarm and the alarm is triggered.
By default, no email addresses are assigned to any of the
notification profiles.
Inherited From Shows the node of the Installations tree from which the
configuration of the notification profile is inherited.
Notification profiles can be configured differently at each node of
the Installations tree, and the notification profile configuration can
be inherited by the child nodes.
Related topics
Test and acknowledge alarms from the Alarm Testing notification profile, page 73
View the list of alarm notification profiles, page 75
Standard notification profiles, page 69
Make the standard notification profiles operational, page 71
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Editing notification profiles at different nodes of the Installations tree, page 78
Custom notification profiles, page 84
Alarm notification profile overview, page 68
Related topics
Editing notification profiles at different nodes of the Installations tree, page 78
Change the email address and SNMP node assignments, page 80
Related topics
Example: Editing notification profiles at different nodes of the Installations tree, page 78
Change the email address and SNMP node assignments, page 80
You want the Rome administrators to be notified of alarms on the Rome Site servers, but not of the
alarms on the Milan Site servers.
To achieve this configuration, you edit the notification profiles differently at the Milan and Rome Site
nodes of the Installations tree.
For example:
1. Go to System Monitoring. Under System Monitor, select Notification Profiles.
2. In the left pane, select the Milan Site node.
3. With the Milan Site node selected in the left pane, select the All Alarms profile in the right pane.
4. In the All Alarms profile, do the following:
In the E-Mail Address section, move only the Milan administrators into the Selected Employees
box. (Do not include any Rome administrators in this box.)
In the SNMP Nodes section, move only the Milan SNMP nodes into the Assigned SNMP Nodes
box. (Do not include any Rome SNMP nodes in this box.)
Click Save and Apply to Children. (This action applies the change to all the server nodes in the
Milan Site.)
5. In the left pane, select the Rome Site node.
6. With the Rome Site node selected in the left pane, select the All Alarms profile in the right pane.
7. In the All Alarms profile, do the following:
In the E-Mail Address section, move only the Rome administrators into the Selected Employees
box. (Do not include any Milan administrators in this box.)
In the SNMP Nodes section, move only the Rome SNMP nodes into the Assigned SNMP Nodes
box. (Do not include any Milan SNMP nodes in this box.)
Click Save and Apply to Children. (This action applies the change to all the server nodes in the
Rome Site.)
Related topics
Change the email address and SNMP node assignments, page 80
Editing notification profiles at different nodes of the Installations tree, page 78
Standard notification profiles, page 69
Viewing the list of alarm notification profiles, page 75
Notification Profiles List screen reference, page 76
Procedure
1. Go to System Monitoring. Under System Monitor, select Notification Profiles.
2. Select the Installations tree node from which you want to edit the notification profile (Enterprise,
Site Group, Site, or Server). The node that you select determines the managed servers to which
the notification profile changes apply.
3. Click Edit.
4. Edit the fields on the Notification Profile screen as needed.
5. Do one of the following:
Click Save. When you click Save, the changes are applied to the selected node. If a child node
has not been previously altered from its default state and saved, the changes are also applied
to the child node.
If a child node has been previously altered and saved, changes are not applied to the child
node when you click the Save button.
To ignore any changes, click Revert to Parent. The Site Group, Site, or Server that is currently
selected in the Installation tree then inherits the settings of its parent Site, or Site Group.
To apply the changes to the selected node and all its child nodes, click Save and Apply to
Children. The changes are always applied to the child nodes.
To return to the settings that existed the last time the screen was saved, click Revert.
Related topics
Notification Profile configuration screen reference, page 81
Custom notification profiles, page 84
Standard notification profiles, page 69
Make the standard notification profiles operational, page 71
Field Description
Profile Name Type the name you want to assign to the alarm notification profile.
Field Description
Assigned to Read-only field that indicates if the Profile Name has been assigned to
Alarms any alarms.
Email Address
Employees - If you are adding employees to the notification profile, click the Select
Organization Group icon to the right of the Organization field. Then select the
Organization that contains the employees you want to add.
All employees in the selected Organization display in the Available
Employees window.
Additional Email Type other email addresses you want to associate with the notification
Addresses profile. Separate multiple entries with a comma or semicolon. There
can be many addresses listed here or the field can be left blank.
When an alarm associated with this notification profile is triggered, the
Enterprise Manager also sends an email notification to these email
addresses.
Typically, email addresses listed here are not available in an employee
user profile. For example, some users want personal email addresses
listed here so that they also receive alarm notification emails at their
personal email addresses.
SNMP Nodes
Field Description
Available SNMP Shows a list of all SNMP servers/nodes that are specified in the Global
nodes Alarm Settings.
To assign an available SNMP node to this notification profile, select it
and then click the right-pointing arrow. This action moves the node into
the Assigned SNMP nodes box.
When an alarm associated with this notification profile is triggered, an
SNMP trap is sent to this SNMP node.
Assigned SNMP Shows the SNMP nodes that have been assigned to the current
nodes notification profile. These SNMP nodes receive SNMP traps when an
alarm to which this notification profile is assigned is triggered.
To remove an Assigned SNMP node from this notification profile, select
it and then click the left-pointing arrow. This action moves the node into
the Available SNMP nodes box.
Related topics
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Editing notification profiles at different nodes of the Installations tree, page 78
Add v1/v2c SNMP nodes for notification profiles, page 91
Change the email address and SNMP node assignments, page 80
Custom notification profiles, page 84
Related topics
Example: Custom notification profile usage, page 84
Workflow: Custom notification profile configuration, page 85
Create a custom notification profile, page 85
Mike and Alison each receive e-mails when either of the two alarms is triggered. If their names are
not included in any other notification profiles, Mike and Alison are not notified of any other alarms.
This example illustrates only one use of custom profiles. You can use custom profiles in any way that
suits the needs of your enterprise.
Related topics
Custom notification profiles, page 84
Workflow: Custom notification profile configuration, page 85
Create a custom notification profile, page 85
Workflow
1. Add SNMP nodes to the system (if they are not already added).
2. Create the custom notification profile.
3. Add email addresses and SNMP nodes to the custom notification profile.
4. Enable E-mail notification and SNMP notification (if they are not already enabled).
5. Assign the custom notification profile to the appropriate alarms.
Related topics
Custom notification profiles, page 84
Example: Custom notification profile usage, page 84
Create a custom notification profile, page 85
Add v1/v2c SNMP nodes for notification profiles, page 91
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Enable E-Mail and SNMP Notifications for notification profiles, page 90
Make the standard notification profiles operational, page 71
Procedure
1. Choose System Monitoring >System Monitor>Notification Profiles.
2. In the Installations tree (left pane), select the Enterprise node. You can create a custom
notification profile only from the Enterprise node.
3. Click Create.
4. Complete the fields on the Notification Profile configuration screen.
5. Click Save.
What to do next
Assign the custom notification profile to one or more alarms. See Change the notification profiles
assigned to an alarm, page 108.
Related topics
Notification Profile configuration screen reference, page 81
Workflow: Custom notification profile configuration, page 85
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Custom notification profiles, page 84
Make the standard notification profiles operational, page 71
Procedure
1. Choose System Monitoring >System Monitor>Notification Profiles.
2. In the Installations tree (left pane), select the Enterprise node. The list of alarm notification profiles
displays in the pane on the right side.
You can only delete alarm notification profiles from the Enterprise node of the Installation tree.
3. In the Notification Profile window, select the profile to be deleted.
4. Click Delete. A warning displays if the profile is associated to any alarms.
5. Click OK to confirm the deletion. The profile is deleted and is no longer assigned to any alarms.
Related topics
Alarm notification profiles, page 67
You can configure global alarm settings that apply to all alarms or individual alarm settings
that apply to a single alarm.
Topics
Related topics
Configure Audible Notifications for all alarms, page 89
Enable E-Mail and SNMP Notifications for notification profiles, page 90
Configure how long acknowledged alarms display in the Alarm History tab, page 90
Change or create an alarm priority, page 91
Add v1/v2c SNMP nodes for notification profiles, page 91
Add v3 SNMP nodes for notification profiles, page 92
Global Alarm Settings screen reference, page 94
Procedure
1. Choose System Monitoring > System Monitor > Global Alarm Settings.
2. To enable audible notification, select the Audible Notification check box. To disable audible
notification, clear the check box.
3. Click Save.
Related topics
Global Alarm Settings screen reference, page 94
Configure Audible Notification for an individual alarm, page 105
Procedure
1. Choose System Monitoring > System Monitor > Global Alarm Settings.
2. To enable notification profiles to send emails to employees when alarms are triggered, select the
E-Mail Notification check box
To make email notifications unavailable, clear the check box.
3. To enable notification profiles to send traps to SNMP nodes in the NMS when alarms are
triggered, select the SNMP Notification check box.
To make SNMP trap notifications unavailable, clear the check box.
4. Click Save.
Related topics
Alarm notification profiles, page 67
Global Alarm Settings screen reference, page 94
Procedure
1. Choose System Monitoring > System Monitor > Global Alarm Settings.
2. In the Maximum number of days to store alarm in history setting, enter the number of days
that an acknowledged alarm displays in the Alarm History screen.
3. Click Save.
Related topics
Global Alarm Settings screen reference, page 94
View alarms in Alarm History, page 56
Acknowledging active alarms, page 43
Clear alarms in Alarm History, page 59
Procedure
1. Choose System Monitoring > System Monitor > Global Alarm Settings.
2. In the Alarm Priority Settings section, do one of the following:
To edit the name of an existing alarm priority, type a new name for the priority in the Name
box.
To add a new alarm priority:
Click the Add button.
In the Priority column, provide a priority number for the alarm. The number must be 4 or
higher. (The default priorities use numbers 0 through 3. You cannot change these default
priority numbers.)
3. Click Save.
4. If you created a new priority, you must manually assign the priority to an alarm.
Related topics
Global Alarm Settings screen reference, page 94
Change the Priority assigned to an alarm, page 106
Configure Global Alarm Settings, page 89
Procedure
1. Choose System Monitoring > System Monitor > Global Alarm Settings.
2. In the SNMP Node Settings > SNMP Nodes section of the screen:
a. Click Add.
b. In the Name column, type the name of an SNMP trap configuration.
c. In the SNMP Manager Host column, type the host name or IP address of the SNMP server to
which the SNMP trap is sent.
d. In the Trap Port column, type the port on which the SNMP server listens for connections
(usual default port is 162).
e. In the Community column, type the name used to identify the group to which SNMP devices
and management stations belong.
f. In the Version drop-down, select v1/v2c.
g. To add another SNMP node, repeat steps a. through f.
3. Click Save.
What to do next
Assign the SNMP node(s) you added to the appropriate notification profile(s).
Related topics
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Global Alarm Settings screen reference, page 94
Alarm notification profiles, page 67
Configure Global Alarm Settings, page 89
Add v3 SNMP nodes for notification profiles, page 92
Procedure
1. Choose System Monitoring > System Monitor > Global Alarm Settings.
2. In the SNMP Node Settings > V3 Node Settings section of the screen, complete the four fields as
noted here. The values entered in these fields are common to every v3 SNMP Node that you add
in step 3.
a. In the Query Port field, enter the port on the SNMP agent to which SNMP queries are sent
during the discovery and monitoring processes (usual default port is 161).
b. In the Authentication Protocol field, select the protocol used to authenticate all SNMPv3
Trap messages.
c. In the Privacy Protocol field, select the protocol used to encrypt all SNMPv3 Trap messages.
d. In the Privacy Password field, enter the password used to encrypt all SNMPv3 Trap
messages. A password is required when the Privacy Protocol field has a value other than
None.
3. In the SNMP Node Settings > SNMP Nodes section of the screen add individual SNMP nodes:
a. Click Add.
b. In the Name column, type the name of an SNMP trap configuration.
c. In the SNMP Manager Host column, type the host name or IP address of the SNMP server to
which the SNMP trap is sent.
d. In the Trap Port column, type the port on which the SNMP server listens for connections
(usual default port is 162).
e. In the Community column, type the name used to identify the group to which SNMP devices
and management stations belong.
f. In the Version drop-down, select v3.
g. In the User Name field, enter the User Name used to authenticate SNMPv3 messages for this
node. This field is required when the Authentication Protocol field (completed in step 2) has
a value other than None.
h. In the Password field, enter the password used to authenticate SNMPv3 messages for this
node. This field is required when the Authentication Protocol field (completed in step 2) has
a value other than None.
i. To add another SNMP node, repeat steps a. through h.
4. Click Save.
What to do next
Assign the SNMP node(s) you added to the appropriate notification profile(s).
Related topics
Changing the email addresses and SNMP nodes assigned to a notification profile, page 78
Global Alarm Settings screen reference, page 94
Alarm notification profiles, page 67
Configure Global Alarm Settings, page 89
Add v1/v2c SNMP nodes for notification profiles, page 91
Field Description
Alarm Settings
Audible Select this option if you want a sound to accompany every alarm that
Notification is triggered. This option is selected by default. If this option is
selected, you can still make audible notification unavailable for
individual alarms.
If you clear the check mark from this option, audible notification for
all alarms is made unavailable. This behavior cannot be changed at
the individual alarm level. (The audible notification field is
unavailable at the individual alarm level.)
E-Mail Select this option if you want the alarm system to send email
Notification notifications to specific people when an alarm is triggered.
To support email notifications, you must also configure notification
profiles. The notification profiles assigned to each alarm determine
who receives the email notifications.
This setting is not selected by default and emails are not sent when
alarms are triggered.
SNMP Select this option if you want the alarm system to send SNMP
Notification (Simple Network Messaging Protocol) traps to the Network
Management System (NMS) when alarms are triggered.
To support SNMP notifications, you must also set up notification
profiles. The notification profiles assigned to each alarm determine
the SNMP nodes to which SNMP traps are sent.
This field is not selected by default and SNMP traps are not sent
when alarms are triggered.
Max days to store After an alarm is acknowledged, the system makes the alarm
alarm history inactive and places it in alarm history.
Type the maximum number of days that an alarm is displayed in
alarm history. The default for this field is 7 days. After this period,
the inactive (acknowledged) alarm is deleted from alarm history.
Field Description
Name Shows the name of the alarm priority. By default, there are four
alarm priorities: Information (0), Warning (1), Minor (2), and Major
(3), representing severity levels for each alarm.
You can change the name of an alarm priority by typing a new name
in the Name box and clicking Save. Changing a priority name on this
screen also changes the priority name on other user interface
screens where the priority appears.
You can also add new alarm priorities or delete unassigned alarm
priorities that you have created.
Is used Shows Yes if the alarm priority has been applied to an alarm, and No
if it has not been applied to an alarm.
By default, each of the four standard priorities is applied to alarms.
Query Port Specifies the port on the SNMP agent to which SNMP queries are
sent during the discovery and monitoring processes. This port
number is required. The default port is port 161.
Field Description
Privacy Protocol Specify the protocol used to encrypt all SNMPv3 messages. Possible
values are:
None
DES
AES128
The default value is None.
Privacy Password Specify the password used to encrypt all SNMPv3 messages. You
must enter a password here when the Privacy Protocol field
specifies a setting other than None.
The minimum length of the password is eight characters and the
maximum length is 200. The password can include upper-case
letters, lower-case letters, and numbers. The password is encrypted
using CCL encryption.
SNMP Nodes Complete these fields to add individual v1, v2c, or v3 SNMP nodes to
the system
Name Type the name of an SNMP trap configuration, such as Atlanta SNMP
server. The name can be a maximum of 100 characters,
SNMP Manager Type the host name or IP address of the server to which the SNMP
Host trap message is sent. This value can be a maximum of 100
characters.
Trap Port Type the port number on which the SNMP server specified in the
SNMP Manager Host setting listens for SNMP traps. The default
port is port 162.
Community Type the name used to identify the group to which SNMP devices
and management stations belong. The community name acts as a
weak password that is required for the NMS to consider the trap
valid. This value can be a maximum of 100 characters.
Field Description
User Name This field is used only for SNMPv3 nodes. Specify the user name
used to authenticate SNMPv3 messages for this node. You must
enter a user name in this field when the Authentication Protocol
field specifies a value other than None.
The minimum length of the user name is six characters and the
maximum length is 32. You can use upper-case letters, lower-case
letters, and numbers in this field.
Password This field is used only for SNMPv3 nodes. Specify the password used
to authenticate SNMPv3 messages for this node. You must enter a
password in this field when the Authentication Protocol field
specifies a value other than None.
The minimum length of the password is eight characters and the
maximum length is 200. You can use upper-case letters, lower-case
letters, and numbers in the password. The password is encrypted
using CCL encryption.
Related topics
Configure Audible Notifications for all alarms, page 89
Configure Audible Notification for an individual alarm, page 105
Alarm notification profiles, page 67
Enable E-Mail and SNMP Notifications for notification profiles, page 90
Configure how long acknowledged alarms display in the Alarm History tab, page 90
Change or create an alarm priority, page 91
Add v1/v2c SNMP nodes for notification profiles, page 91
Add v3 SNMP nodes for notification profiles, page 92
Related topics
Installation tree hierarchy and alarm configuration, page 99
View the list of alarms for each Installations node, page 101
Enable an alarm, page 104
Configure Audible Notification for an individual alarm, page 105
Change the Priority assigned to an alarm, page 106
Schedule an alarm, page 107
Change the notification profiles assigned to an alarm, page 108
Edit multiple alarms simultaneously, page 115
Configuring alarm filters, page 117
Reset alarms to their default settings, page 121
Example: Configure an alarm to behave differently on one server than on other servers
Assume that the “Proxy Detected” alarm is important for one server in your enterprise, but you do
not want any other servers to trigger this alarm.
Save, Save and Apply to Children, Revert to Parent, and Revert Buttons
When you select an Installation tree node on the Configure Alarms screen, and make a configuration
change, you can select one of four buttons to save or revert the changes.
The four buttons are Save, Save and Apply to Children, Revert to Parent, and Revert. The function of
each of these buttons is described here.
Save - To apply the changes to the selected node, click this option.
If the child nodes were never previously altered and saved, the changes are also applied to the
child nodes.
If the child nodes were previously altered and saved, the changes are not applied to the child
nodes.
Save and Apply to Children - To apply the changes to the selected node and all its child nodes,
click this option. The changes are always applied to the child nodes.
Revert to Parent - To change all settings to be the same as the parent node of currently selected
node, click this option.
Revert - To return the alarm settings to the settings that existed the last time the screen was saved,
click this option.
If you are making alarm configuration changes, and you decide you do not want to keep the
changes, you must click Revert before you click Save.
Related topics
Configuring individual alarm settings, page 99
Procedure
1. Click System Monitoring > System Monitor > Alarm Settings.
The Configure Alarms screen displays a list of the alarms according to the View (filter)
selected in the upper-right corner of the screen. The All filter, which displays all
servers and all alarms, is selected by default.
2. Select the node of the Installations tree for which you want to view a list of alarms. Select the:
Enterprise node to view a list of all alarms on all managed servers installed in the enterprise.
A Site Group node to view a list of all alarms on all managed servers installed in a site group.
A Site node to view a list of all alarms on all managed servers in the site.
A Server node to view a list of all alarms on a specific managed server. (The alarms listed
depend on the server roles active on that server.)
3. The list of alarms, and information about each alarm, displays in the right pane.
At the bottom of the screen, use the Page arrow controls to navigate through multiple pages of
alarms.
Related topics
Configure Alarms screen reference, page 102
Configuring individual alarm settings, page 99
Field Description
View To create, edit, or delete an alarm filter, use the View drop-down
menu above the screen.
Field Description
Search Alarm To search for terms or phrases, use the Search Alarm field in the
upper-right corner. These terms or phrases exist in either the Alarm
Name or the Description fields of the Configure Alarms screen.
The search returns all instances of the entire phrase that is entered in
the Search Alarm field.
For example, assume that you enter “playback attempts” in the search
field and click Go. The search returns every alarm that includes the
entire phrase “playback attempts” in either its Alarm Name or
Description field.
Such a search does not return alarms that have only the term
“playback” or only the term “attempts” in the Alarm Name or
Description field.
To search for alarms that include only the term “playback” in the
Alarm Name or Description fields, enter only the term “playback” in
the search field.
Enabled A Yes value indicates that the alarm is active. A No value indicates that
the alarm is not active. If No is selected, the alarm cannot be
triggered.
Field Description
Inherited From The Site Group, Site, or Server node from which the alarm settings
(not the actual alarms) are inherited.
You can configure settings for individual alarms at the Enterprise, Site
Group, Site, or Server node of the Installations tree. The lower nodes
of the Installations tree can then inherit the alarm configuration. (If
you click the Save and Apply to Children button after changing the
configuration of an alarm, the lower nodes of the Installations tree
inherit the configuration settings.)
You can select a lower node of the Installations tree and change (or
edit) the configuration for the alarm at the lower node. This capability
allows you to configure the same alarm to behave differently for
different Site Groups, Sites, or Servers.
When you select a node in the Installations tree, the Inherited From
column shows the node from which the selected node is inheriting the
alarm configuration.
If the Inherited From field displays the same node that is selected in
the Installations tree, the individual alarm settings are configured at
the selected node. The alarm settings are not inherited from a higher
node in the Installations tree.
Roles Affected The server roles affected by the condition that this alarm reports. For
example, an archive configuration error would affect the functioning
of the Centralized Archiving role on a server.
Related topics
Configuring individual alarm settings, page 99
Installation tree hierarchy and alarm configuration, page 99
Configuring alarm filters, page 117
View the list of alarms for each Installations node, page 101
Enable an alarm
You can enable (activate) an individual alarm or make the alarm unavailable (deactivate the alarm).
If you enable an alarm, the alarm is triggered whenever the error condition associated with the alarm
exists on any managed server.
If you make an alarm unavailable, the alarm is never triggered.
Procedure
1. Choose System Monitoring > System Monitor > Alarm Settings.
2. In the Installations tree (left pane), select the Installations tree node (Enterprise, Site Group, Site,
or Server) from which you want to enable the alarm or make the alarm unavailable.
3. In the Configure Alarms screen, select the alarm(s) you want to enable or make unavailable:
To select a single alarm, click that alarm.
To select multiple alarms, do one of the following:
Hold down the Ctrl key and click multiple alarms.
Click Select All to select all alarms on the currently displayed page of alarms. (Alarms not
visible on the currently displayed page are not selected.)
4. Click Edit.
5. To enable an alarm, select the Enabled check box.
To make the alarm unavailable, clear the check box.
6. Click the Save, Save and Apply to Children, or a Revert option as appropriate.
Related topics
Configure Alarm screen reference, page 110
Edit multiple alarms simultaneously, page 115
Installation tree hierarchy and alarm configuration, page 99
Save, Save and Apply to Children, Revert to Parent, and Revert Buttons, page 100
Configuring alarm filters, page 117
Configuring individual alarm settings, page 99
If audible notifications are made unavailable for all alarms in the Global Alarm Setting tab,
you cannot enable audible notification for an individual alarm. In this case, the Audible
Notification check box is unavailable for the individual alarms.
Procedure
1. Choose System Monitoring > System Monitor > Alarm Settings.
2. In the Installations tree (left pane), select the Installations tree node from which you want to
configure alarm audible notifications (Enterprise, Site Group, Site, or Server).
3. In the Configure Alarms screen, select the alarms for which you want to enable audible
notifications or make audible notifications unavailable.
To select a single alarm, click that alarm.
To select multiple alarms, do one of the following:
Hold down the Ctrl key and click multiple alarms.
Click Select All to select all alarms on the currently displayed page of alarms. (Alarms not
visible on the currently displayed page are not selected.)
4. Click Edit.
5. To enable audible notification for an alarm, select the Audible Notification check box.
To make audible notifications unavailable for an alarm, clear the check box.
6. Click the Save, Save and Apply to Children, or a Revert option as appropriate.
Related topics
Configure Alarm screen reference, page 110
Edit multiple alarms simultaneously, page 115
Installation tree hierarchy and alarm configuration, page 99
Save, Save and Apply to Children, Revert to Parent, and Revert Buttons, page 100
Configuring alarm filters, page 117
Configuring individual alarm settings, page 99
If you manually edit an alarm priority, and the alarm priority changes as part of either a KB,
update release, or other new release, the manually edited priority resets to the new default
value.
Procedure
1. Choose System Monitoring > System Monitor > Alarm Settings.
2. In the Installations tree (left pane), select the Installations tree node from which you want to
assign priorities to alarms (Enterprise, Site Group, Site, or Server).
3. In the Configure Alarms screen, select the alarms for which you want to change the priority
assignment.
Related topics
Configure Alarm screen reference, page 110
Edit multiple alarms simultaneously, page 115
Installation tree hierarchy and alarm configuration, page 99
Save, Save and Apply to Children, Revert to Parent, and Revert Buttons, page 100
Change or create an alarm priority, page 91
Configuring alarm filters, page 117
Configuring individual alarm settings, page 99
Schedule an alarm
You can schedule the specific days, and time periods within each day, during which an alarm can be
triggered.
If you create a schedule for an alarm, the alarm can be triggered only during the scheduled times. The
alarm is never triggered outside its scheduled times, even if the error condition associated with the
alarm occurs.
Procedure
1. Choose System Monitoring > System Monitor > Alarm Settings.
2. In the Installations tree (left pane), select the Installations tree node from which you want to
schedule an alarm (Enterprise, Site Group, Site, or Server).
3. In the Configure Alarms screen, select the alarms you want to schedule.
To select a single alarm, click that alarm.
To select multiple alarms, do one of the following:
Hold down the Ctrl key and click multiple alarms.
Click Select All to select all alarms on the currently displayed page of alarms. (Alarms not
visible on the currently displayed page are not selected.)
4. Click Edit.
In the Start Time and End Time fields, you can also type a time in the
hh:mm:AM/PM format, rather than using the clock icon.
6. Click the Save, Save and Apply to Children, or a Revert option as appropriate.
Related topics
Configure Alarm screen reference, page 110
Edit multiple alarms simultaneously, page 115
Installation tree hierarchy and alarm configuration, page 99
Save, Save and Apply to Children, Revert to Parent, and Revert Buttons, page 100
Alarm notification profiles, page 67
Configuring alarm filters, page 117
Configuring individual alarm settings, page 99
Procedure
1. Choose System Monitoring > System Monitor > Alarm Settings.
2. In the Installations tree (left pane), select the Installations tree node from which you want to
assign notification profiles to alarms (Enterprise, Site Group, Site, or Server).
3. In the Configure Alarms screen, select the alarms to which you want to assign or unassign
notification profiles.
To select a single alarm, click that alarm.
To select multiple alarms, do one of the following:
Hold down the Ctrl key and click multiple alarms.
Click Select All to select all alarms on the currently displayed page of alarms. (Alarms not
visible on the currently displayed page are not selected.)
4. Click Edit.
Related topics
Configure Alarm screen reference, page 110
Edit multiple alarms simultaneously, page 115
Installation tree hierarchy and alarm configuration, page 99
Save, Save and Apply to Children, Revert to Parent, and Revert Buttons, page 100
Alarm notification profiles, page 67
Configuring alarm filters, page 117
Configuring individual alarm settings, page 99
Item Description
Enabled To enable an alarm or to make an alarm unavailable, use this check box.
If a check mark appears in the box, the alarm is enabled (active).
To make the alarm unavailable (deactivate the alarm), clear the check
mark from the check box.
When enabled, the alarm is triggered (made active) when the condition
associated with it exists on a managed server.
When an alarm is made unavailable, the alarm cannot be triggered.
Each alarm is enabled by default.
If you are simultaneously editing multiple alarms, an asterisk (*) can
appear in this field. The asterisk indicates that the alarms you are editing
have different values configured for this field.
Item Description
Audible Check to indicate that the alarm is to give off a warning sound when
Notification triggered. To prevent the alarm from giving off a warning sound when
triggered, clear the check mark.
If audible notifications are made unavailable in the Global Alarm Settings,
this setting is unavailable and cannot be enabled.
If you are simultaneously editing multiple alarms, an asterisk (*) can
appear in this field. The asterisk indicates that the alarms you are editing
have different values configured for this field.
Priority Name Select a priority level for this alarm. The default priority levels are listed
here in order of their severity.
Major (most severe)
Warning
Minor
Information (least severe)
You can add new a new alarm priority if necessary.
If you are simultaneously editing multiple alarms, an asterisk (*) can
appear in this field. The asterisk indicates that the alarms you are editing
have different values configured for this field.
An alarm priority can change as part of a new release. If you manually edit
an alarm priority, and the alarm priority changes as part of either a KB,
update release, or other new release, the manually edited priority resets
to the new default value.
Item Description
Trigger Delay Specifies the Trigger Delay interval for an alarm (in seconds).
This setting is disabled (either empty or set to zero) by default. Usually,
you can accept the default and leave this setting disabled.
This setting is an advanced setting that is needed only in particular
circumstances. This setting prevents administrators from being notified of
alarms that require no action by the administrator to resolve.
The Trigger Delay interval specifies the number of seconds that passes
between the detection of an alarm and the time that the user is notified of
the alarm. (The user is notified either through the appearance of the alarm
in the user interface, an email notification, or an SNMP notification).
Specify a Trigger Delay value only when a particular alarm repeatedly
turns on and then off and requires no action by the administrator to
resolve it.
Sometimes, the typical operating conditions in an environment can cause
a specific alarm to be repeatedly turned on and off. For example, if your
environment frequently experiences short network disconnections that
trigger an alarm, configure this setting to prevent administrators from
being repeatedly notified of the alarm.
If you specify a value for this setting, the recommended value is 10
seconds. Sometimes you need to experiment with this value to determine
the appropriate delay period.
When this setting is disabled, there is no Trigger Delay and the alarm is
raised as soon as it is detected.
If you are simultaneously editing multiple alarms, an asterisk (*) can
appear in this field. The asterisk indicates that the alarms you are editing
have different values configured for this field.
Resend Delay Specifies the number of seconds that the Alarm Service waits to resend an
SNMP notification for an unacknowledged alarm.
The Alarm Service sends an SNMP notification when it detects an alarm. If
this setting is selected, the system resends this SNMP notification at
regular intervals until the alarm is acknowledged.
The SNMP Notification option must be selected in the Global Alarm
Settings tab for this option to be in effect.
This setting is blank by default. When this setting is blank, the SNMP
notification is not re-sent.
If you are simultaneously editing multiple alarms, an asterisk (*) can
appear in this field. The asterisk indicates that the alarms you are editing
specify different values for this field.
Item Description
Scheduling Allows you to schedule the alarm. You can specify the days of the week,
and the times of the day, that the alarm is in effect. To open the Time
window and set times, or to type times in the format hh:mm:AM/PM, click
the Clock icon.
The alarm can only be triggered during the times in which it is scheduled
to be in effect. By default, an alarm is configured to be in effect seven days
a week, 24 hours a day.
If you are simultaneously editing multiple alarms, an asterisk (*) can
appear in this field. The asterisk indicates that the alarms you are editing
specify different values for this field.
Alarm when This option does not appear for all alarms.
threshold is If applicable, use this option to specify a value, or threshold, at which the
above/below * alarm is triggered.
Each alarm is different. Some alarms are triggered when the value rises
above the specified threshold (threshold is above). Other alarms are
triggered when the value falls below the specified threshold (threshold is
below).
Item Description
Buttons When you change alarm configuration settings, you select an Installation
tree node and make the configuration changes. These buttons determine
how the configuration changes are applied to the child nodes of the
selected Installations tree node.
Save - To apply the changes to the selected node, click this option.
If the child nodes were never previously altered and saved, the
changes are also applied to the child nodes.
If the child nodes were previously altered and saved, the changes are
not applied to the child nodes.
Save and Apply to Children - To apply the changes to the selected
node and all of its child nodes, click this option. The changes are always
applied to the child nodes.
Revert to Parent - To change all settings to be the same as the parent
node of currently selected node, click this option .
Revert - to return the alarm settings to the settings that existed the last
time the Alarm Settings screen was saved, click this option. The screen
remains open and you can continue to change it.
Cancel - To close the Alarm Settings screen without saving changes,
click this option.
* These fields appear only for alarms that have thresholds. For alarms that do not have a
threshold, these fields do not display.
Related topics
Installation tree hierarchy and alarm configuration, page 99
Enable an alarm, page 104
Configure Audible Notification for an individual alarm, page 105
Change the Priority assigned to an alarm, page 106
Change or create an alarm priority, page 91
When simultaneously editing multiple alarms, note the following about the Edit Alarms screen:
Only the alarm settings that are common to all the alarms that you selected in step 3 display
and are available for editing.
If the alarms you selected currently have different values configured for this field, an asterisk
(*) appears as a value for a field
If you replace an asterisk with a specific value, all the alarms you have selected will have the
same value for the field.
If a specific value appears for a field (and not an asterisk), all the alarms you selected currently
have this same value specified for the field.
5. Change the values on the Edit Alarms screen as needed. Only the values that you change on the
Edit Alarms screen are applied to every alarm you selected in step 3.
6. Click the Save, Save and Apply to Children, or a Revert option as appropriate.
Related topics
Alarm configuration options, page 88
Configuring individual alarm settings, page 99
Configure Alarm screen reference, page 110
Save, Save and Apply to Children, Revert to Parent, and Revert Buttons, page 100
For example, you can create an alarm filter that displays only Enabled alarms that have the Major
priority level and are associated with the Integration Service server role.
You can also edit and delete alarm filters. You can edit or delete any alarm filter created by an
administrator. You cannot edit or delete the All alarm filter.
Related topics
Create an alarm filter, page 117
Create Filter screen reference, page 118
Edit an alarm filter, page 119
Delete an alarm filter, page 120
Procedure
1. Click System Monitoring > System Monitor > Alarms Settings.
2. Click the View menu above the right pane of the screen, and then select CreateFilter.
3. In the Create Filter screen, specify the alarm characteristics to include in the filter.
When this filter is selected in the user interface, only the alarms that have the characteristics that
you select display in the Configure Alarms screen.
4. Do one of the following:
Click Save As to save the alarm filter as a new filter and provide it with a name. The new name
then appears as a selection in the View menu.
Click Default Filter to have this alarm filter appear as the default selection in the View area.
Click Clear to clear all fields and start over from scratch.
Related topics
Create Filter screen reference, page 118
Configuring alarm filters, page 117
Item Description
Enabled/Disabled Select one of the following to determine whether the alarm filter
displays enabled alarms, disabled alarms, or both:
Enabled Only - Displays only alarms that are currently
enabled. Enabled alarms are triggered whenever the condition
associated with the alarm exists on a managed server.
Disabled Only - Displays only alarms that are currently
disabled. Disabled alarms are never triggered.
All - Displays all alarms (both enabled and disabled).
Priority Select a specific priority if you want the alarm filter to display only
alarms of that priority. Choices include Information, Warning,
Major, and Minor, or any other alarm priority that has been
created in the Global Alarm Settings tab.
Roles Affected Select specific server roles if you want the alarm filter to display
only alarms that affect those server roles.
To include a server role in the alarm filter, select a server role in
the Available Roles pane. Click the right-pointing arrow to move
the role into the Selected Roles pane.
To remove server roles from the alarm filter, click the server role
in the Selected Roles pane. Click the left-pointing arrow to move
the role into the Available Roles pane.
Related topics
Create an alarm filter, page 117
Edit an alarm filter, page 119
Delete an alarm filter, page 120
Configure Global Alarm Settings, page 89
Procedure
1. Click System Monitoring > System Monitor > Alarms Settings.
2. Click the View menu on the right side of the screen, and select the alarm filter you want to edit.
3. Click the View menu in the right side of the screen again and select Edit Filter.
4. In the Create Filter screen, specify the alarm characteristics to include in the filter.
Related topics
Create Filter screen reference, page 118
Configuring alarm filters, page 117
Procedure
1. Click System Monitoring > System Monitor > Alarms Settings.
2. Click the View menu in the right corner of the screen, and select the alarm filter you want to
delete.
3. Click the View menu in the right corner of the screen again and select Edit Filter.
4. Click Delete.
Related topics
Configuring alarm filters, page 117
Procedure
1. Click System Monitoring > System Monitor > Alarm Settings.
2. In the Installations tree (left pane), select the Enterprise node.
3. Click the Reset button. A message appears indicating that all alarm and profile settings are reset
to their default values.
4. Click OK.
Related topics
Alarm configuration options, page 88
Configure Alarm screen reference, page 110
Change or create an alarm priority, page 91
Add v1/v2c SNMP nodes for notification profiles, page 91
If you want servers to notify the Network Management System (NMS) when alarms are
triggered, you must deploy the SNMP MIB files and configure notification profiles.
Deploy the SNMP MIB files before configuring the notification profiles.
Topics
Related topics
SNMP MIB files, page 122
What to do next
Copy the MIB files, page 123
Procedure
1. Copy the five MIB files to the appropriate folder on the server running your SNMP configuration
tool. These files include:
WITS-CSFAMILY-MIB.mib
WITS-CS-MIB.mib
WITS-PRODUCTS-MIB.mib
WITS-TRAP-MIB.mib
WITS-TRAP-MIBv1.mib
For example, if you are using the Castle Rock SNMPc Network Manager, copy the MIB files to
<Install Path>\SNMPc Network Manager\mibfiles on the server running the Castle Rock
SNMPc Network Manager.
What to do next
Complete the procedure Enable the SNMP configuration tool to use the MIB files, page 124.
The following example illustrates how to perform this procedure using the Castle Rock SNMPc
Network Manager. If you use a different SNMP configuration tool in your enterprise, use this
example procedure as a guideline. Follow the specific instructions provided in the
documentation for the configuration tool used in your environment.
To enable the Castle Rock SNMPc Network Manager to use the MIB files, you perform two tasks:
1. Compile the MIB files, page 124.
2. Configure the Event Filter, page 126
Procedure
1. Open Start > Programs > SNMPc Network Manager > Startup System.
2. In the SNMPc management console, choose Config > MIB database.
What to do next
Complete the task Configure the Event Filter, page 126
Procedure
To complete this task, you set up one Event Filter for each severity: Major, Minor, Information and
Warning. The following steps show how to set up the Major filter.
1. In the left pane of the SNMPc Management Console, select the Event tab and go to witsTraps.
3. Go to alarmTrap.
8. Under the Actions tab, set the Priority as Major-Yellow from the drop-down box.
10. Repeat these steps for all other severities; Minor, Information, and Warning.
As you define each filter, assign:
The proper Event Name on the General tab (Minor, Information and Warning)
The correct Var Value on the Match tab (Minor, Information and Warning)
The appropriate Priority on the Actions tab.
Common Data
Related topics
SNMP MIB files, page 122
SNMPv3 discovery
The SNMPv3 discovery feature is supported. If your Network Management System (NMS) provides a
SNMPv3 agent discovery feature, you can use this feature to populate your NMS with all the SNMP
agent nodes and their respective EngineIDs.
Related information
For more details, see RFC3414 section 4.
SNMPv3 queries
The agent supports several SNMPv3 read class operations. Most NMS software provides a standard set
of MIBs that allows you to query the parameters listed below by name. Querying the parameters by
name saves you from having to supply the actual OID. If your NMS does not provide any of these
standard MIBs, obtain the relevant MIB listed in the ‘Located ’ column. Install the MIB according to your
NMS software instructions.
Related information
For more details about read class operations, see RFC3411 section 2.8.
Alarms Spreadsheet
An alarm spreadsheet is available that lists every alarm the system can raise.
Topics
Alarm attributes
In the Alarms Spreadsheet, one alarm is listed in each row of the spreadsheet. The spreadsheet
columns list the attributes of each alarm.
List of alarm attributes described for each alarm in the Alarms Spreadsheet
A description of each alarm attribute listed in the spreadsheet is provided here.
This same information also appears on the Alarm Attribute Help tab of the Alarms
Spreadsheet
2 - Minor
3 - Major
These priority numbers and text values (Information, Warning, Minor, Major) are configurable by
the administrator.
Alarm Summary: A summary of the problem causing the alarm.
Alarm Details: Provides detailed information about the alarm.
Corrective Action:Explains how to correct or resolve the problem causing the alarm.
Advanced Corrective Action: Describes more corrective procedures if the initial attempts to
correct the alarm fail.
The system acknowledges the alarm when the average value of the Windows performance
counter is above (if trigger rule is below) or below (if trigger rule is above) the acknowledge
threshold.
The average is calculated over a period using this formula:
cyclemultiplier * cycle time seconds.
difference - The alarm is raised when the Windows performance counter differs by a configured
threshold. The alarm is acknowledged when the counter differs less than the configured
acknowledge threshold.
This element is not used with all alarms.
Rate Counter: The On value indicates that the counter is a Windows Performance monitor rate
counter. This element is not used with all alarms.
Threshold: The threshold at which the alarm is triggered. Some alarms are triggered when the
value rises above this threshold while other alarms are triggered when the value falls below this
threshold. This value is configurable by the administrator. Not all the alarms have thresholds.
Acknowledge Threshold:Specifies the value at which the system automatically acknowledges the
alarm. Generally, a certain amount of separation exists beneath this value and the Threshold value.
This separation exists to prevent the repeated triggering and acknowledgment of alarms when a
value wavers back and forth across a specific threshold.
For example, you can set an alarm Threshold to above 3000 and the Acknowledge Threshold to
below 2000. In this configuration, the alarm is triggered when the value exceeds 3000. The alarm is
automatically acknowledged when the value goes back below 2000.
In this example, the alarm is not acknowledged until the value is safely below the threshold at
which it was triggered. Setting the two values too close together can cause the repeated triggering
and acknowledgment of the alarm if the system wavers back and forth across the threshold value.
Trigger Delay: Specifies the number of seconds that passes between the detection of an alarm and
the time that the user is notified of the alarm. (The user is notified of the alarm either through the
appearance of the alarm in the user interface, an email notification, or an SNMP trap).
This setting is an advanced setting that is needed only in particular circumstances. This setting
prevents administrators from being notified of alarms that require no action by the administrator
to resolve.
System logs
Topics
Item Description
Log Server Shows the server(s) in which the log files are being configured. For
(dropdown menu) example, shows Localhost if you accessed Log Manager from a local
Recorder, or shows a list of selectable managed servers if you accessed
Log Manager from Enterprise Manager.
Active Toggle between Yes and No, which are options that enable or disable the
generation of logs for the named file.
3. Highlight the log configuration file that you want to make active, and then click Activate. See the
related topics for information on viewing the log files once they have been activated.
Related topics
Viewing Log Files, page 147
You can create a new customized view, or edit an existing customized view of the displayed
information.
If you are customizing the view of the Audit Viewer, an asterisk can display to the
right of a property. The asterisk indicates that the property is a name that is
available for selection in the Details: Name option of the Audit Viewer search
configuration screen.
3. Use the up/down arrows (to the right of the Selected Properties pane) to control the left-to-right
order in which properties display in the customized view, as discussed below:
Move a property to the top of the Selected Properties list to make it appear at the left-most
position in the Active Alarms tab.
Move a property to the bottom of the Selected Properties list to make it appear at the right-
most position in the Active Alarms tab.
4. Do one of the following:
Click Save to save changes to an existing customized view.
Click Save As to save the configuration as a new customized view. You are prompted to
provide a name for the new customized view. After you provide a name, the new customized
view name appears as a selectable option in the Customize drop-down list at the top of the
Active Alarms display.
Related topics
Log file types and storage directories, page 150
Active log files, page 151
Zipped log files, page 151
Log file zipping process, page 152
Automatic deletion of zipped log files, page 152
Configure log file storage for application, EMA, and RM logs, page 153
Configure log file storage for WFO logs, page 156
View stored log files, page 158
EMA log
(application log) %IMPACT360DATADIR%Logs\EMA
WFO*** log
(wfo.log4j.log)
%IMPACT360DATADIR%Logs\ProductionServer
WFO coherence
log
rm.debug_2013_05_03_07_26_59.zip
wfo.log4j-2013_05_03_07_26_59.zip
Usually, only one zip file is created for each day and all active log files that reach their size
limit on that day are stored in that zip file. However, if you open the current day’s zip file to
view the individual log files it contains, an additional zip file can be created for that day. For
more information, see View stored log files, page 158.
When the maximum disk space allotted for a particular log type is reached, zip files of that log type
are automatically deleted.
Zip files are deleted one at a time and this deletion continues until the amount of space consumed by
the log files falls below the configured threshold. The oldest zip file is the first deleted.
Related topics
Configure log file storage for application, EMA, and RM logs, page 153
Configure log file storage for WFO Logs, page 155
You can configure two aspects of log file storage for the Application, EMA, and RM log types:
The size at which an active log file is zipped
The maximum amount of disk space allotted for log files
These two aspects of log file storage are configured by manually editing parameters in an XML file
(either a core.xml file or a debugFile.xml file). The XML files that you edit to configure log file storage
for each log type are at these locations:
EMA error log and applications log
-%IMPACT360SOFTWAREDIR%Conf\applications\EMA\logconfig\core.xml
EMA debug log -%IMPACT360SOFTWAREDIR%Conf\applications\EMA\logconfig\debugFile.xml
RM error log -%IMPACT360SOFTWAREDIR%Conf\applications\RM\logconfig\core.xml
RM debug log -%IMPACT360SOFTWAREDIR%Conf\applications\RM\logconfig\debugFile.xml
In each of the four XML files above, you can change the following parameters to change log file
storage behavior. These parameters appear in each XML file as shown below:
To illustrate the process of configuring log file storage, the following example explains how to make
changes to the log file storage for both the EMA error log and the applications log:
1. Use a text or XML editor to open the core.xml file at this
location:%IMPACT360SOFTWAREDIR%\Conf\applications\EMA\logconfig
2. The file appears as shown below. Locate the MaxFileSize and MaxDiskSpaceInMb
parameters located within the <appender name=”file” attribute.
3. Locate the following section of code:
<appender name="file" class="com.verint.web.ema.log.EMALogAppender">
<param name="File" value="${DATADIR}/logs/EMA/ema.error.log" />
<param name="MaxFileSize" value="20MB" />
<param name="MaxDiskSpaceInMb" value="500" />
<param name="MaxZipFileSizeInPct" value="20" />
4. Do one or both of the following:
For <param name=”MaxFileSize” value=”20MB” /> change value= to a different
value to change the size at which the active EMA error log file and the active applications log file
is zipped.
For <param name=”MaxDiskSpaceInMb” value=”100” /> change value= to a
different value to change the amount of disk space allotted for the EMA error log and the
applications log zip files.
For example, if you change value= to “200”, the EMA error log is allotted 200MB of disk
space and the applications log is allotted a separate 200 MB of space.
5. Save the core.xml file.
The EMA debug log, RM error log, and RM debug log are configured as described above,
except you must edit a different XML file to configure each log type as noted at the beginning
of this topic.
You can configure two aspects of log file storage for these WFO logs: wfo.logrj4.log, coherence.log,
and error.log:
The size at which an active log file is zipped
The maximum amount of disk space allotted for zipped log files
Related topics
Log Viewer configuration and log configuration files, page 155
Configure log file storage for WFO logs, page 156
Each of these Log Manager page configurations has an associated WFO log configuration XML file in
this location:
%VERINT_WEBLOGIC_DOMAIN_HOME%config\logconfig
The WFO log configuration files in the .\logconfig directory have the same name as the Log Manager
page log configuration with which they are associated. For example, the log configuration XML file for
the core.xml Log Manager page configuration is named core.xml, the log configuration XML file for
the debugFile.xml Log Manager page configuration is named debugFile.xml, and so on.
The settings in each of the WFO log configuration XML files control how WFO log zip files are handled
when the corresponding log configuration is selected on the Log Manager page.
For example:
If the core.xml configuration is selected in the Log Manager page, the settings in the associated
core.xml log configuration XML file (in the .\logconfig directory) control how WFO log zip files are
stored.
If the debugFile.xml configuration is selected in the Log Manager page, the settings in the associated
debugFile.xml log configuration XML file (in the .\logconfig directory) control how WFO log zip files
are stored, and so on.
To change how WFO log zip files are handled, you can modify the WFO log configuration XML files.
Related topics
Configure log file storage for WFO logs, page 156
For example, the two parameters above are configured, by default, to limit the maximum
amount of disk space consumed. As configured above, one zipped WFO log file is limited to 100
MB (.20 x 500 = 100).
<param name="MaxFileSize" value="20MB" /> - The value= attribute specifies the
size at which an active log file is zipped. The default setting is 20 MB.
Edit these three parameters as needed to change the wfo.log4j.log zip file storage behavior.
3. Locate the following section of code. This section of code controls log storage for the
coherence.log zip files.
<appender name="cohfile"
class="com.bluepumpkin.common.logging.zip.ZipLogAppender">
<param name="File"
value="${DATADIR}/Logs/ProductionServer/coherence.log" />
<param name="MaxDiskSpaceInMb" value="200" />
<param name="MaxZipFileSizeInPct" value="20" />
<param name="QueCapacity" value="20" />
<param name="MaxFileSize" value="5MB" />
The parameters for the coherence.log zip files work in exactly the same way as the parameters
described in step 2 for the wfo.log4j.log zip files. The example above shows the default values
for these parameters.
Edit the three parameters (MaxDiskSpaceInMb, MaxZipFileSizeInPct,
MaxFileSize) as needed to change the coherence.log zip file storage behavior.
4. Locate the following section of code. This section of code controls log storage for the error.log zip
files.
<appender name="errordump"
class="com.bluepumpkin.common.logging.zip.ZipErrorDumpAppender">
<param name="File"
value="${DATADIR}/Logs/ProductionServer/error.log" />
<param name="MaxDiskSpaceInMb" value="500" />
<param name="MaxZipFileSizeInPct" value="20" />
<param name="MaxFileSize" value="20MB" />
The parameters for the error.log zip files work in exactly the same way as the parameters
described in step 2 for the wfo.log4j.log zip files. The example above shows the default values
for these parameters.
Edit the three parameters (MaxDiskSpaceInMb, MaxZipFileSizeInPct,
MaxFileSize) as needed to change the error.log zip file storage behavior.
As noted previously, the configuration procedure is the same for each of the seven WFO log
configuration XML files. The only difference is in the specific WFO log configuration XML file that you
alter.
When a particular log configuration is selected in the Log Manager page, the settings in the WFO log
configuration XML file associated with that log configuration control how the WFO log zip files are
handled.
Audit trail
Audit trail provides a record of the actions performed in the applications. It allows contact
centers to track who logged into the system, performed a search, played back contacts,
evaluated or flagged contacts, assigned and completed training materials, and deleted items
from the application. Audit actions are also logged for the Framework Application.
Topics
Related topics
Specifying the Audit Viewer search criteria, page 161
If you do not provide values for any of the fields on this screen, when you view the audit trail, every
possible audit trail item is displayed for all users.
When a text string is entered in the Text Search field, the Audit Viewer can display a maximum of
5000 records (or rows).
When the Text Search search field is not used, the Audit Viewer can display a maximum of 10000
records (or rows).
Procedure
1. Go to System Monitoring > Audit Viewer > Audit Viewer.
2. In the Actor (User Name), type the Username for the user who performed the action you are
auditing.
3. In the Module drop-down list box, select the module in which the actions you are auditing took
place.
4. In the Action drop-down list box, select the audit-able action. The actions available depend on the
Module that is selected.
5. In the Object Name field, type the name of the object in the module upon which the action was
performed. For example, if John Smith logs in and changes the password of Sonja Graff, the
Username of employee Sonja Graff is the Object Name and the Username of John Smith is the
Actor (Username).
6. In the Time of Event and Impact Time Frame boxes, click the calendar icons at the right. Then
select the start and end dates for the action.
7. Complete the Details fields (optional).
a. In the Name field, select an audit property key from the drop down list.
This field is an optional field that is available if either the Module or Action fields are
populated. The Name is the name of a property key in a database table. The values that are
available in the Name field depend on the combination of items that are selected in the
Module and Action fields.
This field works in combination with the Value field below to return specific audit entries.
b. In the Value field, select a value associated with the option selected in the Name field.
This field is an optional field that is available if either the Module or Action fields are
populated and works in combination with the Name field. The values that are available
depend on the key selected in the Name field.
For example, assume Security is selected as the Module, Sign in is selected as the Action,
and Platform is selected as the Name. In this scenario, the Value field has three options:
All, Web, and Mobile. The All value will return sign in audit entries from both the Web and
Mobile platforms.
Using this field can slow the Audit Viewer performance when returning audit entries.
When this field is used, a maximum of 5000 audit records (or rows) are returned.
8. In the Text Search field, enter a text string to filter the returned audit entries to only those audit
entries that contain the text string.
This field is unavailable if any value other than "All" is specified in the Details: Name field.
Using this field can slow Audit Viewer performance when returning audit entries.
When this field is used a maximum of 5000 audit records (or rows) are returned.
9. To see an audit trail based on the specified search criteria, click Search.
Related topics
Viewing the audit trail, page 167
Field Description
Actor The Username of the person who made the configuration change or
(Username) performed the action that is being audited.
For example, if John Smith logs in and changes the password of Sonja Graff,
the Username of John Smith is the actor and the Username of employee
Sonja Graff is the Object Name.
Notes:
The Username for a user is specified on the User Management >
Security > Usernames screen.
In a multi-tenant enabled environment, the Service Provider
Administrator (SPA) can impersonate a tenant user and access
applications on behalf of the tenant user. When a SPA impersonates a
tenant user and performs an action that creates an audit entry, this field
indicates that the username who performed the action was
"SPA username on behalf of tenant username".
Module The name of the audit-able action (for example, Change Password). This
value is set using a drop-down menu. The actions available depend on the
module that is selected.
Action The name of the software module where the action occurred (for
example, Security). This value is set using a drop-down menu. (Module
here does not refer to the top-level modules of the suite, such as App
Admin.)
Object Name The name of the object that was updated. This value depends on the audit
entry action.
For example, for the action Change Password, the object name is the
Username of the user whose password was changed. If John Smith logs in
and changes the password of Sonja Graff, the Username of employee
Sonja Graff is the Object Name and the Username of John Smith is the
Actor (Username).
Note: The Username for a user is specified on the User Management >
Security > Usernames screen.
Time of Event The time when the audited event/action occurred. This value can be set
using a Date and Time range selector.
Field Description
Impact Time This time frame specifies the beginning time from which a changed item is
Frame valid to the ending time for which a changed item is valid. This value is not
used for all audited actions.
Consider the example of an employee profile. An Employee Profile
specifies a Start Date and an End Date for an employee. In the profile, the
Start Date can be populated while the End Date is left blank.
If no End Date is specified for the employee in the employee profile, no End
Date must be specified for the employee in the Impact Time Frame End
Date field.
In general:
If you are searching for an audited item that has no end date specified,
you must leave the End Date empty in the Impact Time Frame setting.
If you are searching for an audited item that has no start date specified,
you must leave the Start Date empty in the Impact Time Frame setting.
If you are specifying a Start Date in the Impact Time Frame, the Start
Date must be earlier than or equal to the start date of the item being
audited.
If you are specifying an End Date in the Impact Time Frame, the End
Date must be later than or equal to the end date of the item being
audited.
Field Description
Details In the Name field, select an audit property key from the drop down list.
This field is an optional field that is available if either the Module or
Action fields are populated. The Name is the name of a property key
in a database table. The values that are available in the Name field
depend on the combination of items that are selected in the Module
and Action fields.
This field works in combination with the Value field below to return
specific audit entries.
For example, assume you want to return audit entries that show the
log in and log out activity from the web portal or from mobile
applications.
To return the log in entries for the web portal, you would select
Security as the Module, and Sign in as the Action. Then you would
select Platform in the Name field and Web in the Value field, and click
Search.
To return the log out entries for the web portal, you would specify the
same Audit Viewer search criteria, except you would select Sign out as
the Action.
To return the log in entries for mobile applications, you would select
Security as the Module, and Sign in as the Action. Then you would
select Platform in the Name field and Mobile in the Value field, and
click Search.
To return the log out entries for mobile applications, you would specify
the same Audit Viewer search criteria, except you would select Sign
out as the Action.
Using this field can slow the Audit Viewer performance when returning
audit entries.
In the Value field, select a value associated with the option selected in
the Name field.
This field is an optional field that is available if either the Module or
Action fields are populated and works in combination with the Name
field. The values that are available depend on the key selected in the
Name field.
For example, assume Security is selected as the Module, Sign in is
selected as the Action, and Platform is selected as the Name. In this
scenario, the Value field has four options: All, Desktop, Web, and
Mobile. The All value will return sign in audit entries from the
Desktop, Web, and Mobile platforms.
Using this field can slow the Audit Viewer performance when returning
audit entries.
When this field is used, a maximum of 5000 audit records (or rows) are
returned.
Field Description
Text Search Enter a text string to filter the returned audit entries to only those audit
entries that contain the text string.
Text Search is an optional field that is available only if both the Module
and Action fields are populated. This field allows you to refine the audit
trail results by searching for particular text strings in the property values
of a database table. The text string entered does not have to be an exact
match. For example, if the property value in the database table has
entries such as "User_Test_username" and "User_Test_LastName" and
"User_Test" is entered in the Text Search field, both entries would be
returned. If "LastName" was entered in the Text Search field, only the
"User_Test_LastName" entry would be returned.
This field is unavailable if any value other than "All" is specified in the
Details: Name field.
Field Description
Actor (User Name) The Username of the person who made the
configuration change or performed the action that is
being audited.
For example, if John Smith logs in and changes the
password of Sonja Graff, the Username of John Smith is
the actor and the Username of employee Sonja Graff is
the object.
Notes:
The Username for a user is specified on the User
Management > Security > Usernames screen.
In a multi-tenant enabled environment, the Service
Provider Administrator (SPA) can impersonate a
tenant user and access applications on behalf of the
tenant user. When a SPA impersonates a tenant user
and performs an action that creates an audit entry,
this field indicates that the username who performed
the action was "SPA username on behalf of tenant
username".
Object Name The name of the object that was updated. This value
depends on the audit entry action.
For example, for the action Change Password, the
object name is the Username of the user whose
password was changed. If John Smith logs in and
changes the password of Sonja Graff, the Username of
employee Sonja Graff is the object and the Username of
John Smith is the actor.
Note: The Username for a user is specified on the User
Management > Security > Usernames screen.
Time of Event The time when the audited event/action occurred. This
value can be set using a Date and Time range selector.
Field Description
Impact Time Frame This time frame specifies the beginning time from which
a changed item is valid to the ending time for which a
changed item is valid. This value is not used for all
audited actions.
Consider the example of an employee profile. An
Employee Profile specifies a Start Date and an End Date
for an employee. In the profile, the Start Date can be
populated while the End Date is left blank.
If no End Date is specified for the employee in the
employee profile, no End Date must be specified for the
employee in the Impact Time Frame End Date field.
In general:
If you are searching for an audited item that has no
end date specified, you must leave the End Date
empty in the Impact Time Frame setting.
If you are searching for an audited item that has no
start date specified, you must leave the Start Date
empty in the Impact Time Frame setting.
If you are specifying a Start Date in the Impact Time
Frame, the Start Date must be earlier than or equal to
the start date of the item being audited.
If you are specifying an End Date in the Impact Time
Frame, the End Date must be later than or equal to
the end date of the item being audited.
default, 20 audit entries appear on a single page of the Audit Viewer screen. You can change
the number of entries that appear on a single page by selecting the icon and specifying a
value between 1 and 500.
You can return to the Audit Viewer search page by clicking Back to Search.
5. To rerun the last search query, click Rerun Search.
Field Description
Actor (User Name) The Username of the person who made the configuration
change or performed the action that is being audited.
For example, if John Smith logs in and changes the
password of Sonja Graff, the Username of John Smith is
the actor and the Username of employee Sonja Graff is the
Object Name.
Notes:
The Username for a user is specified on the User
Management > Security > Usernames screen.
In a multi-tenant enabled environment, the Service
Provider Administrator (SPA) can impersonate a tenant
user and access applications on behalf of the tenant
user. When a SPA impersonates a tenant user and
performs an action that creates an audit entry, this field
indicates that the username who performed the action
was "SPA username on behalf of tenant username".
Object Name The name of the object that was updated. This value
depends on the audit entry action.
For example, for the action Change Password, the object
name is the Username of the user whose password was
changed. If John Smith logs in and changes the password
of Sonja Graff, the Username of employee Sonja Graff is
the object and the Username of John Smith is the actor.
Note: The Username for a user is specified on the User
Management > Security > Usernames screen.
Time of Event The time when the audited event/action occurred. This
value can be set using a Date and Time range selector.
Field Description
Impact Time Frame This time frame specifies the duration for which a changed
item is valid. This value is not used for all audited actions.
Consider the example of an employee profile. An
Employee Profile specifies a Start Date and an End Date for
an employee. In the profile, the Start Date can be
populated while the End Date is left blank.
If no End Date is specified for the employee in the
employee profile, no End Date must be specified for the
employee in the Impact Time Frame End Date field.
In general:
If you are searching for an audited item that has no end
date specified, you must leave the End Date empty in
the Impact Time Frame setting.
If you are searching for an audited item that has no
start date specified, you must leave the Start Date
empty in the Impact Time Frame setting.
If you are specifying a Start Date in the Impact Time
Frame, the Start Date must be earlier than or equal to
the start date of the item being audited.
If you are specifying an End Date in the Impact Time
Frame, the End Date must be later than or equal to the
end date of the item being audited.
Related topics
Viewing the audit trail, page 167
You cannot export the data specified in the Text Search field to the CSV file. You also have
the option to include or exclude the Details Name and Details Value data in the CSV file.
Procedure
1. Go to System Monitoring > Audit Viewer > Audit Viewer.
2. In the Actor (User Name), type the Username for the user who performed the action you are
auditing.
3. In the Module drop-down list box, select the module in which the actions you are auditing took
place.
4. In the Action drop-down list box, select the audit-able action. The actions available depend on the
Module that is selected.
5. In the Object Name field, type the name of the object in the module upon which the action was
performed.
6. In the Time of Event and Impact Time Frame boxes, click the calendar icons at the right. Then
select the start and end dates for the action.
7. Complete the Details fields (optional).
a. In the Name field, select an audit property key from the drop down list.
This field is an optional field that is available if either the Module or Action fields are
populated. The Name is the name of a property key in a database table. The values that are
available in the Name field depend on the combination of items that are selected in the
Module and Action fields.
This field works in combination with the Value field below to return specific audit entries.
For example, assume you want to return audit entries that show the log in and log out
activity from the web portal or from mobile applications.
To return the log in entries for the web portal, you would select Security as the Module, and
Sign in as the Action. Then you would select Platform in the Name field and Web in the
Value field, and click Search.
To return the log out entries for the web portal, you would specify the same Audit Viewer
search criteria, except you would select Sign out as the Action.
To return the log in entries for mobile applications, you would select Security as the
Module, and Sign in as the Action. Then you would select Platform in the Name field and
Mobile in the Value field, and click Search.
To return the log out entries for mobile applications, you would specify the same Audit
Viewer search criteria, except you would select Sign out as the Action.
Using this field can slow the Audit Viewer performance when returning audit entries.
b. In the Value field, select a value associated with the option selected in the Name field.
This field is an optional field that is available if either the Module or Action fields are
populated and works in combination with the Name field. The values that are available
depend on the key selected in the Name field.
For example, assume Security is selected as the Module, Sign in is selected as the Action,
and Platform is selected as the Name. In this scenario, the Value field has four options: All,
Web, Mobile, and Desktop. The All value will return sign in audit entries from the Web,
Mobile, and Desktop platforms.
When this field is used, a maximum of 5000 audit records (or rows) are returned.
8. To export the audit trail that you have configured above, click Export. The audit trail is exported to
a CSV file.
Related topics
Viewing the audit trail, page 167
More modules can display than actually exist in your system. If a module displays for which
you have no license, ignore that module.
The following table lists the audit modules and the actions that can be audited for each module:
Module Action
Module Action
Attributes Create
Delete
Update
Update Custom Data Mapping
Update UDF Mapping
Module Action
Module Action
Module Action
Module Action
Employee Create
Delete
Terminate
Update
Module Action
Module Action
Module Action
Module Action
Module Action
Module Action
Organization Create
Delete
Update
Module Action
Publishing Publish
Unpublish
Module Action
Module Action
Updated Person
Updated Print
Updated UI Filter
Uploaded File
Module Action
Scheduling Create
Delete
Scheduler Completed
Scheduler Started
Update
Module Action
Module Action
Module Action
Module Action
Related topics
Interactions Audit Trail information, page 195
Form Fillout Audit Trail information, page 199
Form Designer Audit Trail information, page 202
Project Rules Manager Audit Trail information, page 204
Assignment Manager Audit Trail information, page 204
DAS API Audit Trail information, page 205
Audit Trail file viewing, page 216
Sent an interaction User sent the interaction in Contact ID—ID of the sent
an email. contact
Interaction ID—ID of the
sent interaction
Employee Name
Audio—Media
components sent
(Yes/No)
Screen—Media
components sent
(Yes/No)
Email Address—
Destination email address
Set the retention for a In the Flag Manager, user set Flag ID
flagged folder the 'Retention in Flagged Retention value
Folder' value for a flagged
folder.
Form Custom Data/Status User disabled the Form Custom Data/Status Field
disabled Custom Data or Status Name
options.
Form Custom Data/Status User enabled the Form Custom Data/Status Field
enabled Custom Data or Status Name
option Reason created
Rating Set created User created a Rating Set. Rating Set name
Status
Rating Set deleted User deleted a Rating Set. Rating Set Name
Added Value to Rating Field User added a new value to Value Name
the Rating Set in Shared From
Data. To
Removed Value from Rating User deleted a value from Value Name
Field the Rating Set in Shared
Data.
Set Entities Values For Group Set entity values for group. Group ID
Set Entities Values For Role Set entity values for role. Role ID
Get Media File by Session ID User retrieved an interaction Request Source Address
file according to the Site ID
interaction’s Session ID. Session ID
Media Type - type of the
file such as Audio, Screen
or VAD
Decrypt-True for
decrypted, False for
encrypted
Format-empty for regular
format, Portable for
standard format
Get Media File by Recording User retrieved an interaction Request Source Address
Details file according to the Module
interaction’s recording Channel
details. Start Time
Media Type - type of the
file such as Audio, Screen
or VAD
Decrypt-True for
decrypted, False for
encrypted
Format-empty for regular
format, Portable for
standard format
Related topics
Speech Analytics System Audit Trail, page 211
Text Analytics System Audit Trail, page 214
Related topics
Speech Analytics Search Activity logged information, page 209
Examples of user search Audit Trail logs, page 210
Session ID Session ID
Breadcrumbs History of all search activities performed. This field will show
the breadcrumbs that appear in the Speech Analytics portal.
The character length of the Breadcrumbs field is
unlimited.
Related topics
Speech Analytics Search Activity Audit Trail information, page 208
Set Filters
06/22/10 09:16:48.484 (+02) ; Ctgapp(40000000) ; o0vuheqdtrqe4u55irq1bd55 ; 1 ; User Search
Activity ; Speech Analytics ; Set Filters ; TimeZone = <None> , LocalStartTime <= 04/01/10 01:59:59.000
, LocalStartTime >= 03/01/10 02:00:00.000 ; All Interactions > Filters set; 12
Where: the user set a filter on the start time between the 03/01/10 and 04/01/10. The breadcrumbs
show a search of All Interactions, and then the filter was set.
Clear Filters
06/22/10 09:12:38.625 (+02) ; Ctgapp(40000000) ; o0vuheqdtrqe4u55irq1bd55 ; 1 ; User Search
Activity ; Speech Analytics ; Clear Filters ; ; charge charged charges charging > C > Filters set > Filters
cleared; 23
Where: the user cleared the previously set filter.
Related topics
Speech Analytics Search Activity Audit Trail information, page 208
ClearAll
Selected
Export Charts Report User selected Export Chart Data from Project ID
any Analyze workspace. Project Name
Report Name
Additional Info:
Report Format
option
Rename
no conflicts)
Aborted (if the process
was stopped)
Inactive
Published
Published
Term Trend: Get Noisy In the Discover Trends workspace, user Project ID
Terms clicks Manage in the Terms & Phrases to Username
view list of hidden terms in project. List of hidden terms
Tune User reviewed suggested text and did ID and Name of user who
Transcript: Approve one of the following: approved suggestion
Suggestion Edited suggested fix and then selected Transaction ID
Approve.
Approved suggested fix.
Tune User goes to Review Suggestion form to ID and Name of user who
Transcript: Review review suggested text. reviewed suggestion
Suggestion Transaction ID
Tune User reviewed suggested text and ID and Name of user who
Transcript: Reject selected Reject. rejected suggestion
Suggestion Transaction ID
Save Search User selected Save Search to save and reuse Tenant (Store) ID
the current search criteria as a saved search. Project ID
Saved Search Name
Edit Category User selected a category from the list of Tenant (Store) ID
Definitions categories in the Analyze Content or Project ID
Interactions workspaces, and then selected Category Name
Edit Category Definitions to modify the
category.
Delete Category User selected a category from the list of Tenant (Store) ID
categories in either the Analyze Content or Project ID
Interactions workspaces, and then selected Category Name
Delete to remove the category.
Export Category User selected Export Category Data in either Tenant (Store) ID
Data the Analyze Content or Interactions Project ID
workspaces. Language
Export Interaction User selected Export Interaction Data from Tenant (Store) ID
Data either the Analyze Content or Interactions Project ID
workspaces to export all or a subset of Export Interaction Data
results from the current search. Option:
All
Edit Project User selected a Text Project in the Configure Tenant (Store) ID
Configuration Projects workspace, and then selected the Project ID
Configure option to modify settings. Project Name
Language
Model Name
Retention Period
Troubleshooting
Topics
Troubleshooting procedures
This section describes the individual troubleshooting procedures for alarms.
Topics
Email notifications are not sent when an alarm is triggered, page 218
Preventing the “Error Retrieving Performance Counter” alarm in mixed language server
configurations, page 218
Related topics
Make the standard notification profiles operational, page 71
Change the notification profiles assigned to an alarm, page 108
You can view these performance counter names by running the perfmon.exe utility
(available at <root>:\Windows\SysWOW64\). In the perfmon.exe utility, select Data Collector
Sets > System > System Performance and then select Performance Counters
For the performance counter to operate successfully with the Alarmer component, the performance
counter names displayed in the perfmon.exe utility must match the Alarmer component
configuration.
A mixed language server configuration causes performance counter names to display in two different
languages: some in the language of the operating system and others in the language of the language
pack or third-party software.
Assume that the Alarmer component is asked to query a Windows performance counter, and the
counter name is not in the language expected by the Alarmer configuration. In this scenario, the
Alarmer assumes that the counter does not exist, and raises the "Error Retrieving Performance
Counter" alarm.
Procedure
1. The “Error Retrieving Performance Counter” alarm specifies the display name of the alarm it could
not query. Identify the alarm display name indicated by the “Error Retrieving Performance
Counter” alarm.
2. Locate the alarm definition XML file that contains the alarm display name identified in step 1, as
noted here:
All alarm XML definition files reside in the following directory on the server on which the
Framework Applications server role is active: <installdirectory>\Conf\alarm
Manually search through the alarm definition XML files in the <installdirectory>\Conf\alarm
directory until you locate the alarm display name identified in step 1. (The name is located
inside an <a:fullname><a:/fullname> element in one alarm definition within the file).
3. When you have located the single alarm XML definition file that contains the alarm identified in
step 1, edit the file as follows:
a. Locate the individual alarm definition of the alarm identified in step 1. The alarm definition is
enclosed within the <componentalarm></componentalarm> tags.
b. Within the alarm definition, make these two changes:
In the <a:objectname translang=”On”>Process</a:objectname> tag, change the On value to
Off.
In the <a:countername translang=”On”>Private Bytes</a:countername> tag, change the On
value to Off.
You can verify which counter language is being published by running the
perfmon.exe utility. Using this utility, search for the object that matches the
<objectname> value and the counter name that matches the <countername> value.
4. At the top of the alarm definition XML file, increment the version number.
Locate the <systemmonitordefinition> tag at the top of the file.
Within the <systemmonitordefinition> tag, increment the version= value by 1. For example, if
version=”15101”, change it to version=”15102.”
5. Save the updated alarm definition XML file. Wait for the Enterprise Manager application to update
the AlarmConfig.xml file with the new information.
Never edit the AlarmConfig.xml file. This file is automatically regenerated and
overwritten by the Enterprise Manager application.
6. From the Windows desktop, start the Windows Services Administrative Tool and restart the
Recorder Alarm Service.
Restarting this service causes the Alarmer component to retranslate any necessary counter
names.