© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release 4.6.0 Alarms Administration.

Slides:



Advertisements
Similar presentations
Copyright © 2006 Help Desk Systems, Inc. All rights reserved. Overview of Help Desk Systems Inc. (HDSI) HDSI offers a hosted, web based trouble ticket.
Advertisements

Setting up an E-Larm A Step by Step Tutorial Engineering Consultants Group, Inc.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
BayTech Global Power Management GPM Software for BayTech Remote Power Controllers  Discovers BayTech devices on existing subnet  Build Logical and Functional.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Customizing Word Microsoft Office Word 2007 Illustrated Complete.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Performance Dashboard.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Alarms List ReliaTel.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Basic Administrator Training – Release Classes,
DB Audit Expert v1.1 for Oracle Copyright © SoftTree Technologies, Inc. This presentation is for DB Audit Expert for Oracle version 1.1 which.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Basic Administrator Training – Release Entities.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Basic Administrator Training – Release Adding Users.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Priority Traceroute.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Voice Quality Dashboard.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
MagicInfo Pro Server Software All control, content, and scheduling is performed within the MagicInfo Pro Server software previously installed. Before.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Basic Administrator Training – Release Interface.
FireRMS SQL Audit, Archiving & Purging Presented by Laura Small FireRMS Quality Assurance.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. ACCESS 2007 M I C R O S O F T ® THE PROFESSIONAL APPROACH S E R I E S Lesson 4 – Creating New.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Alarms Suppression and.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 1 Exploring Microsoft Office Word 2007 Chapter 7 The Advanced User Robert Grauer, Keith Mulbery,
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Microsoft Outlook 2010 New Features. Improved Interface “The Ribbon”
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
TxEIS Security A role-based solution October 2010.
Event Management & ITIL V3
1 of 8 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Tools Menu and Other Concepts Alerts Event Log SLA Management Search Address Space Search Syslog Download NetIIS Standalone Application.
Overview Managing a DHCP Database Monitoring DHCP
Setting up/Managing Bank Personnel Intuit Financial Services University Business Financial Solutions Certification.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Office Server Specific Web content management –Page structure, layouts, and controls –Publishing.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Five Managing Addresses.
® BayTech The Power to Control Global Power Management.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Office of Housing Choice Voucher Program Voucher Management System – VMS Version Released October 2011.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Blacklisted Alarms ReliaTel.
PestPac Software. Leads The Leads Module allows you to track all of your pending sales for your company from the first contact to the close. By the end.
© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Performance Dashboard.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Access Plus ReliaTel.
30 Copyright © 2009, Oracle. All rights reserved. Using Oracle Business Intelligence Delivers.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
© Copyright TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Alarms List Management.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Introduction ReliaTel.
© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Operator Training – Release Maps ReliaTel ® Operator.
Interactions & Automations
© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release AccessPlus ReliaTel.
© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Scheduled Traceroutes.
American Diploma Project Administrative Site Training.
American Diploma Project Administrative Site Training.
Lesson 17 Mail Merge. Overview Create a main document. Create a data source. Insert merge fields into a main document. Perform a mail merge. Use data.
Quality Education for a Healthier Scotland New Features of the Clinical Knowledge Publisher May 2016.
How to develop a VoIP softphone in C# by using OZEKI VoIP SIP SDK This presentation demonstrates the first steps concerning to how to develop a fully-functional.
Inquiry Tracking. Inquiry Tracking :: Logon Non-Weidmuller employees use the first initial of your first name and your full last name. (i.e. bjones for.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
SQL Database Management
Multi-host Internet Access Portal (MIAP) Enhancement Guide
ReliaTel® Basic Administrator Training Performance Reporting Release 4
Chapter 9: Managing Groups, Folders, Files, and Object Security
Ch 10. Maintaining and Automating SQL Server
Presentation transcript:

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration ReliaTel ® Administrator Training Alarms Administration Release Training - Version 1.0

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Alarm Types 2

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Alarms can be categorized by type as a means to facilitate analysis. In each alarm type you can create alarm attributes. Attributes are Normal, Extended, and Password: Normal is used for short text messages, and is limited to 80 characters. Extended is used for long text messages, and is limited to 4,000 characters. Password is used for a one-lined hidden attribute and is limited to 80 characters. 3 Alarm Types

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Message Alerting (MA) Tables & Rules 4

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Provides enhanced control of alarms received by ReliaTel. Providing the message alerting tables allows the user to give more definitive visual text, alarm level designation, multi-message alerting, as well as an automatic response (as desired) to each alarm condition. If an alarm is triggered, and its MA table rule does not exist, a ‘default’ visual alarm is triggered. The General tab enables you to provide a name for the MA table and select either the tracked or untracked option: Tracked alarm–The alarm will be cleared automatically by the system when a new alarm is received. Only the current alarm will be displayed; no alarms that were previously received will be displayed. Operator intervention to clear the alarm is not required. Untracked alarm–Operator intervention will be required to clear the alarm. 5 Message Alerting (MA) Tables

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration MA Table Rules define the individual alerts/alarms, including: Severity (CRI, MAJ,MIN, or FYI) Action: Automated task when an alarm is triggered, acknowledged, or cleared. Notifiable Flag: If this check box is selected ReliaTel will send a notification, if notification rules are assigned. Count: The number of alarm events that must occur before an alarm is generated (e.g. 10 SNMP traps per alarm) Interval: The value in this field sets the range within which one or more alarms must be received before an alarm event is generated by ReliaTel. Alarm Type: As explained in previous slide. 6 Message Alerting (MA) Table Rules

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Practical examples of editing MA Table Rules: Changing the alarm level on a specific trap from FYI to MIN Turning on/off notification on a specific alarm Automatically inhibiting alarms on an entity after a specific alarm is received (action). Generate 1 alarm for every 10 ‘authentication Failure’ traps received. 7 Message Alerting (MA) Table Rules

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Patterns 8

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Patterns are used by ReliaTel to manage and parse the data received for an entity. Pattern Types include: Alerting–Message Alerting patterns are used to trigger alerts upon detection of the specified pattern in the incoming message stream. Logging–Logging patterns are used to normalize the incoming data stream, dividing it up into messages that are subsequently stored in the log database. Scanning–Scanning patterns are designed to detect and extract data (usually numeric) from the incoming data stream, such as from a PBX. Mostly used for Performance Reports and Monitors. 9 Patterns

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Foundation Kits 10

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Foundation Kits are packages individually installed on your application that include a combination of the following: Class Patterns MA Tables and Rules Foundation Kits provide a complete set of basic monitoring rules, patterns and scripts designed for specific device types. Foundation Kits include functionality to automatically monitor and generate alarms based on key device operation and health metrics of many popular PBX's, switches, servers, and communications network devices. For a partial list of foundation kits, please visit: nfo/ReliaTel_Support/rel_foundation_kits.php nfo/ReliaTel_Support/rel_foundation_kits.php Please contact Tone Technical Support for to inquire about devices not on this list. 11 Foundation Kits

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Automation 12

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Actions allow administrators to run tasks automatically at a pre- determined date and time. The action must be scheduled. The action is basically a shell script. Any commands, which can be scheduled, can be included in an action. Examples include: Automatically clear alarms Run SNMP Walks on devices for performance reports Run test INADS on a PBX To view the available actions, go to ‘General Administration’. Under ‘Automation’, select ‘Actions’ 13 Automation - Actions

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Alarm Suppression 14

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Alarm Suppression Set-up Stops alarms from being displayed in the Alarm List Thresholds: Total alarms (all alarms by count, regardless of severity), or Total alarms by individual severity levels (CRI, MAJ, MIN, FYI) Suppression is set up by the ReliaTel administrator Operators have ‘read-only’ view of suppressed alarms Flexibility in setting up Class level – set at class, inherited by all entities of the class Entity level – can override class values Entity level – can set alarm suppression for an individual entity, without first being set up at the Class level 15

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Class Level Set-up Setting up the Alarm Suppression feature at the Class level Default value for all classes is ‘Never.’ 16

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Options Optional suppression selections Never – default Total – all alarms Severity – by severity levels By severity – options: Select all levels or Select one or more levels individually 17 Never TotalBy Severity

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Entity Level Set-up – Inherited from Class Thresholds set at Class level, inherited at Entity level Inherited thresholds will always reflect values at the Class level, except Entity values overriding Class level values will not change 18 Class - Never Class - Total Class – By Severity Entity - NeverEntity - Total Entity – By Severity

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Entity Level Set-up – Entity Edits Suppression thresholds inherited from the class can be overridden at the Entity level – overrides are entity-specific, not ‘global’ 19 Class - Never Class - TotalClass - By Severity Entity Overrides 1.Total – Select Total: Enter new threshold value for total alarms for this entity 2.Level – Select Per Level: Enter threshold values for one or more severity levels 1.Never – Select Never: Alarm suppression won’t apply to this entity 2.Level – Select Per Level: Enter threshold values for one or more severity levels 1.Never – Select Never: Alarm suppression won’t apply to this entity 2.Total – Select Total: Enter new threshold value for total alarms for this entity 3.Level – Select Per Level: Increase or decrease threshold values; remove one or more threshold values

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Alarm List – Suppressed Alarms Example of alarms being suppressed for an entity This is what operators and administrators will see when alarms reach the threshold Suppression by severity level displays a similar message Clearing alarms to below the threshold will allow more alarms to appear until the threshold is reached again 20

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Alarm Suppression – Class default values For several classes, entities of that class will inherit suppression values (example below) Remember that these values can be edited at the Class level or edited at the individual entity level. 21 SeverityThreshold Number Critical active alarms50 Major active alarms100 Minor active alarms400 FYI active alarms1,000

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Blacklisted Alarms 22

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Blacklisted Alarms Purpose Target inconsequential alarms that divert Operator resources from operationally important events Reduce alarm ‘clutter’ in the Alarm List Block targeted alarms from appearing in the Alarm List Scope By entity only (not by class or center) Flexibility Two-step process to blacklist a single alarm event Use regular expressions to add a range of alarm events Operators have the necessary permission to blacklist alarms (single and regular expression) Displayed in the interface Dedicated page Audit trail 23

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Targeting an Alarm From the Alarm List, target the alarm you want blacklisted and add it Action completed – Use Manage to view 24

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Hit Count and Removing an Alarm from the List Hit count increments for alarms on the blacklist Options for managing a blacklisted alarm on the Alarm List (both instances, hit count will increment) Leave original alarm visible - will impact ACK/CLR statistics Clear original alarm - only appears on the Blacklist, with hit count; does not appear on the Alarm List after clearing 25

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Copy, New, and Delete Copying a rule - example Left-click a rule 2. Click Copy 3. Add matcher text 4. Select entity 5. Click Apply

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Copy, New, Delete Copying a rule - example Blacklist alarm added for a new entity Hit count for new blacklisted alarm Note – this new blacklisted alarm will be blocked from the Alarm List, even when the first alarm is triggered. 27

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Copy, New, Delete New blacklist rule 1. Click New. 2. Enter Alarm Matcher text. 3. Select entity. 4. Click Apply. Deleting a blacklisted rule 1. Select blacklisted rule. 2. Click Delete. 3. Click OK. Alarm is no longer blocked from the Alarm List. 28

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Opening the Blacklist Rules Page – Option 1 Option 1 – Viewing the complete list (all entities) To view the entire list of blacklisted rules, open from any alarm in the Alarm List 29 This entity has no blacklisted alarms – that’s OK

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Opening the Blacklist Rules Page – Option 2 Option 2 – Viewing a list filtered by an entity Open the Blacklist Rules page from an entity – this automatically filters the list. 30 Filter set

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Regular Expression Blacklist Rules Blacklist rules for alarms can also be created using regular expressions. 1. In the Alarm List Blacklist Rules page click New. 2. Enter the regular expression and select the Regular Expression check box. 3. Select the entity. 4. Click Apply. Examples 31

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Regular Expression Blacklist Rules Sample regular expression blacklist rules added 32

© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration Find Matching Rules Use Find Matching to locate the blacklist rule that placed the alarm on the blacklist 33