- About This Guide
- Ultra M Overview
- Hardware Specifications
- Software Specifications
- Networking Overview
- Deploying the Ultra M Solution
- Health Monitoring in the Ultra M Solution
- Network Definitions (Layer 2 and 3)
- Ultra M MIB
- Ultra M Component Event Severity and Fault Code Mappings
- Ultra M Troubleshooting
- Using the UCS Utilities Within the Ultra M Manager
- ultram_ucs_utils.py Help
- Sample FMD Configuration File
Sample FMD Configuration File
The sample fault management descriptor (FMD) configuration file provides AutoIT with the necessary information for configuring health monitoring through a network service descriptor (NSD) configuration file activated through AutoDeploy.
Caution |
This is only a sample configuration file provided solely for your reference. You must create and modify your own configuration file according to the specific needs of your deployment. |
nsd blr-bgl15
fmd fmd-blr
vim-orch-identity vim-orch-id-blr
!
vim vim-orch-id-blr
api-version v2
auth-url http://192.168.10.1:5000/v2.0
user openstack
tenant admin
!
secure-token openstack
user $8$UJs47fsQ1i1T71osYwO+wFRj79O2bUIQtGI+Jv+Xc6Q=
password $8$1tfw7vpnJKztjx6PneESzQJ1e3Qz5KhMnVt2y9ArqRE=
!
secure-token os-login
user $8$r8aZRlWoN3JN8czUofGs2eXMD3ZDOUeUGVCsZDu87ew=
password $8$6Zj5yVjOxIeKXFqMPl3EsCAU80wOS1FvI6QfNVp1pjs=
!
secure-token autoit-nfvi-admin
user $8$b0omJaBlEWe5uP1wq3+thoSSFTNq65LmhMui0hMqfhM=
password $8$j4HT9/V5Ww8xII36iOY+DS3GD7UBYUrGVfEB4i0RbiY=
!
secure-token autoit-nfvi2-admin
user $8$U+Bym8O56+oowjEXHXgC/wkX8bgkoLCFreSMeo9uAz4=
password $8$15V9FW0PDe2fgBIxtLE98/2vy1Z2Ns5vIRYkyDyeSG4=
!
secure-token nfvi-login
user $8$Rh+7C1BvgmCE2O6tZVqXPz8RtjFYmGb8xd5XY4ZV/nw=
password $8$lM+6HCkhjSM9AX8D++35F/CQfI5/0OOWLFYRCB2y5D8=
!
secure-token login
user $8$CdqKq6es3f2yVtFaOy6ZB1VxFR7BJTsXh0ojZqg/xW4=
password $8$7/ag39+Qw8XapzY6ijzntf7Hvebbq0YEalYeHnQ6Pqc=
!
secure-token scm-admin
user $8$weWIhrbLqoV8dq9VuMrT1zO0cbngB12W3A1BSPFeTX8=
password $8$mhbx7OpTDhD4sIt2/wM9KVAGjNAbBiWPdJU5QRcw3k4=
!
secure-token scm-oper
user $8$PXqvExP/rzVepLSnuB5uKt/FXz73/YL4yP9Q0Tqbt4c=
password $8$DSyzHE6PZVLptyoI48Y2GRS0IY0D5wl0KFP88GVx4aU=
!
secure-token scm-security
user $8$9dhhL8UxFaFK0HAV15BwOnZ/wMJ+Y/nC7CTeigMEegg=
password $8$k4gfP27grFNqK4wdjjUL6iloJGXfAQswWhyIph+XbxM=
!
secure-token em_login
user $8$UdD6nOI1dvBH+yliqLOL46cQRmGBMVRB5GFEX3M/LS8=
password $8$9SXDc2OjaulrijV5ripRPHCp3p9gKH154m1ZX48RgIw=
!
secure-token staros
user $8$NAd0RRbfvrPrN7KBdxJKbW0/PVMYYgvejzVemMSvPG0=
password $8$JKWanV1gEW2ivmH0afZ3TASo+KmjLF1UvRHExtkZT+M=
!
secure-token esc_netconf
user $8$u+ARmNdO3YrjHz/UeBlmMeGbHH1R12Vg8zLyRFSJV/o=
password $8$uFfZUDm3QqedFvTnZZx6jotSnjJ/uUaAJXIQMBicpLw=
!
secure-token esc_login
user $8$hbbCEIg+A77OkjyK1Js4bGh5tXoM9byhfjP7vNdYiY4=
password $8$I67RNVBIeUiBiOlm0sHIetFhqLZK+IELQ/kG3yATgt4=
!
scm scm
admin scm-admin
oper scm-oper
security scm-security
!
snmp-user test
auth md5 $8$AIKR4Cx10phDn5M9QdXdIgnvKy6QcS/WwE7AruZAytc=
priv cbc-des $8$IqaVBLqHhppPeAsn5w+gcxCIRzEPG5LDXi5lrkUYHng=
!
fmd fmd-blr
domain hardware
monitoring suppress-hw-affected-dn [ sys/rack-unit-1 sys/rack-unit-2 ]
monitoring suppress-hw-fault-id [ F0438 F0743 F0748 ]
syslog uas-proxy
!
domain vim
syslog uas-proxy
!
domain uas
monitoring suppress-uas-fault [ ha-event cluster-ha ]
!
domain vnfm
monitoring suppress-uas-fault [ overall ]
!
domain vnf-EM
monitoring suppress-uas-fault [ api-endpoint ha-event cluster-ha ]
!
domain vnf
monitoring suppress-uas-fault [ overall ]
!
snmp enterprise-id 9
snmp v2c disabled
snmp v3 enabled
snmp v3 user test
snmp v3 target 10.105.159.172
port 162
user test
!
!