Cool Solutions

Rule-Based Alarm Management System: A Use Case Approach



By:

February 16, 2006 12:00 am

Reads: 6190

Comments:1

Score:0

Contents

Introduction
Why the Rule-Based Alarm Management System
Understanding the Rule-Based Alarm Management System
Use cases for the Rule-Based Alarm Management System
Conclusion

Introduction

One of the primary goals of network administrators in managing networks is to keep track of all the managed devices and networks, and to make sure that they are functioning properly. Administration of an enterprise network is always a challenging task for network administrators. An administrator needs to monitor the critical servers around the clock and provide solutions as soon as a critical event occurs.

The Alarm Management System of Novell ZENworks Server Management alerts administrators about events from the network, like the SNMP traps, to allow administrators to proactively resolve network problems occurring in the network.

Rule-based Alarm Management, an enhancement over the Alarm Management System, allows the system administrator to process, store and monitor alarms by configuring a set of rules on the management server.

Why the Rule-Based Alarm Management System

In a managed enterprise network, where several thousand nodes need to be managed, the chances of getting a huge number of alarms is very high, and it would be difficult for an administrator to manage the alarms based on any of the following:

  1. Server IP address that triggers the alarms
  2. Severity of the alarms
  3. Time at which the alarm is received
  4. Type of the alarms

The Rule-Based Alarm Management System helps to make the administrator’s job easier by giving certain alarms specific actions. You segregate the alarms based on Source Address, severity of alarm, alarm type and time intervals and set the preferred actions.

Understanding the Rule-Based Alarm Management System

The Rule-Based Alarm Management System helps you in managing the alarms by creating rules on the management server which help in processing and storing the alarms. It provides a centralized location for processing and viewing the alarms generated by devices throughout the network. It also allows you to specify different actions for each condition, as explained later in use cases.

A Rule consists of :

  1. Properties
  2. Conditions
  3. Actions

Properties

Properties contain the name and description of a rule. This information is visible to the Administrator, along with the date and time the rule is created and last modified, when a rule is selected.


16897-1_0.gif

Click to enlarge.

Figure 1: Properties Page

Conditions

A rule consists of multiple conditions which can be configured to process incoming alarms. At least one condition must be specified to create a rule.
Conditions includes:

  1. Source Addresses
  2. Severity, State and Specific Alarms
  3. Time intervals


16897-2_0.gif>/a>
Click to enlarge.

Figure 2: Conditions Page

For detailed information about conditions see the ZENworks 7 Server Management Administration Guide

Actions

Rules allow you to perform specified actions when alarm occurs. One action must be defined to create a rule. The following actions can be configured while creating a rule:

  1. SMTP Mail Notification
  2. Launching an External Program
  3. SNMP Traps Forwarding
  4. Alarm Forwarding
  5. Alarm Archiving, Show on Ticker bar, Beep on Console, Auto handle and User Assignment


16897-3_0.gif

Click to enlarge.

Figure 3: Actions Page

Use cases for the Rule-Based Alarm Management System

Use Case 1

The Acme Corp. has a large network. The system administrator of Acme Corp. is concerned about the events on some of the critical servers that maintain the inventory of Acme Corp. If any alarms are generated from these servers, the administrator is required to notify the Inventory Problem Solving team by SMTP mail notification.

The Rule-Based Alarm Management System can address the above requirement, as follows:

  1. In the Alarm Disposition view, create a new rule.
  2. Set the rule name and the description.
  3. Add the critical server’s address in the Conditions.


16897-4_0.gif

Click to enlarge.

Figure 4: Assigning Source Address

  1. Set the action to be performed on the incoming alarms, as below.


16897-5_0.gif

Click to enlarge.

Figure 5: SMTP Mail Notification

  1. Save the Rule.

Now the administrator can segregate the events from a specified critical server and can also notify the concerned team to take corrective action.

Use Case 2

The System Administrator of Acme Corp. is concerned about problems on some of the inventory servers. There are two requirements in this use case.

  1. Problems on some of the inventory servers need to be addressed by the general problem resolution team.
  2. If a server is raising an event of type “File Read Err , By Server” while reading the sys:\ Inventory_dat.txt file, then the generated event should be forwarded to an application running on server 1.1.2.1 that listens to the incoming SNMP events.

The above requirement of the System Administrator of Acme Corp. can be addressed by the Rule-Based Alarm Management System. This requires two rules to be created, one for each of the above requirements.

The first rule can be created as in the Use case 1.

The second rule can be created as follows:

  1. In the Alarm disposition view, create a new rule.
  2. Set the rule name and the description.
  3. Select the Alarm corresponding to the type “File Read Err , By Server”.


16897-6_0.gif

Click to enlarge.

Figure 6: Specific Alarm Selection

  1. Set Advanced option for the selected trap.


16897-7_0.gif

Click to enlarge.

Figure 7: Advanced Alarm Configuration

  1. Set the fileName as “inventory_dat.txt”.
  2. Set the VolumeName as “SYS”.
  3. Set the actions as “SNMP Trap Forwarding”.


16897-8_0.gif

Click to enlarge.

Figure 8: SNMP Trap Forwarding

  1. Add the target address 1.1.2.1 to receive the incoming SNMP Event.
  2. Save the configuration.

Note: The order in which the rule appears in the rules tab is taken as the precedence for applying the rule.
Now the Administrator can easily take action on the critical requirements to keep the system intact.

Use Case 3

The system administrator has to notify the a help desk engineer through email, with the appropriate engineer depending on the time the alarm is received. If the alarm is received between 10 AM and 10 PM, engineer Sam should be notified and if the Alarm is received between 10 PM and 10 AM, Engineer Bob should be notified.

The above requirement can be satisfied by creating two rules:

  1. A rule for help desk engineer Sam.
  2. A rule for help desk engineer Bob.

This can be done as below:

  1. Create the new rule, as in Use case 1.
  2. Create two users: Sam and Bob.


16897-9_0.gif

Click to enlarge.

Figure 9: User Creation

  1. Give valid SMTP server IP Address
    Note: The test button can be used to test the SMTP service on the specified server.
  2. Set the new rule for the user Sam.
  3. Set the severity of the alarm as critical in the condition.


16897-10_0.gif

Click to enlarge.

Figure 10: Setting the Severity

  1. Set the time interval required in the condition.


16897-11_0.gif

Click to enlarge.

Figure 11: Time Interval as Conditions

  1. Set the action for engineer Sam to be sent the notification.

With this procedure, the administrator can assign the critical alarm to the
help desk engineer Sam when it is raised from 10:00 (10 am) to 22:00 (10 pm).
Another rule can be created by copying the above rule and by editing the rule with the user as Bob and the time between 22.00 to 10.00. Engineer Bob can then be informed of critical alarms at the specified time.


16897-12_0.gif

Click to enlarge.

Figure 12: User Assignment

Now the alarms are forwarded to the appropriate help desk engineer based on time of day.

Conclusion

In this Appnote, we have discussed the Rule-Based Alarm Management System component of ZENworks 7 Server Management using use cases. It explains how the Rule-Based Alarm Management System will help system Administrators manage rules for alarms with various conditions to specify actions.

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Categories: Uncategorized

Disclaimer: This content is not supported by Novell. It was contributed by a community member and is published "as is." It seems to have worked for at least one person, and might work for you. But please be sure to test it thoroughly before using it in a production environment.

1 Comment

  1. By:Anonymous

    This post is very helpful. I suggest that every businesses use this for easy network management.

    _______________________________
    Submitted by: Alarm

    VA:F [1.9.22_1171]
    Rating: 0.0/5 (0 votes cast)

Comment

RSS