Atmos Administrator's Guide
Atmos Administrator's Guide
Version 1.4.0
Administrator’s Guide
REV A01
EMC Corporation
Corporate Headquarters:
Hopkinton, MA 01748-9103
1-508-435-1000
www.EMC.com
Copyright © 2008 - 2010 EMC Corporation. All rights reserved.
EMC believes the information in this publication is accurate as of its publication date. The information is
subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license.
For the most up-to-date regulatory document for your product line, go to the Technical Documentation and
Advisories section on EMC Powerlink.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com.
All other trademarks used herein are the property of their respective owners.
Preface
Introduction ....................................................................................... 18
ifInOctets ....................................................................................183
ifInUcastPkts..............................................................................184
ifInNUcastPkts ..........................................................................184
ifInDiscards................................................................................184
ifInErrors ....................................................................................184
ifInUnknownProtos ..................................................................184
ifOutOctets .................................................................................185
ifOutUcastPkts...........................................................................185
ifOutNUcastPkts .......................................................................185
ifOutDiscards.............................................................................185
ifOutErrors .................................................................................185
ifOutQLen ..................................................................................186
ifSpecific .....................................................................................186
AT Group.......................................................................................... 186
atTable ........................................................................................186
atEntry ........................................................................................186
atIfIndex .....................................................................................187
atPhysAddress...........................................................................187
atNetAddress.............................................................................187
IP group ............................................................................................ 187
ipForwarding.............................................................................187
ipDefaultTTL .............................................................................188
ipInReceives ...............................................................................188
ipInHdrErrors............................................................................188
ipInAddrErrors..........................................................................188
ipForwDatagrams .....................................................................189
ipInUnknownProtos .................................................................189
ipInDiscards...............................................................................189
ipInDelivers ...............................................................................189
ipOutRequests ...........................................................................189
ipOutDiscards............................................................................190
ipOutNoRoutes .........................................................................190
ipReasmTimeout .......................................................................190
ipReasmReqds ...........................................................................190
ipReasmOKs ..............................................................................190
ipReasmFails..............................................................................191
ipFragOKs ..................................................................................191
ipFragFails..................................................................................191
ipFragCreates.............................................................................191
ipAddrTable...............................................................................191
ipAddrEntry ..............................................................................192
ipAdEntAddr.............................................................................192
ipAdEntIfIndex..........................................................................192
ipAdEntNetMask...................................................................... 192
ipAdEntBcastAddr ................................................................... 192
ipAdEntReasmMaxSize ........................................................... 193
ipRouteTable ............................................................................. 193
ipRouteEntry ............................................................................. 193
ipRouteDest ............................................................................... 193
ipRouteIfIndex .......................................................................... 193
ipRouteMetric1 ......................................................................... 194
ipRouteMetric2 ......................................................................... 194
ipRouteMetric3 ......................................................................... 194
ipRouteMetric4 ......................................................................... 194
ipRouteNextHop ...................................................................... 194
ipRouteType .............................................................................. 195
ipRouteProto ............................................................................. 195
ipRouteAge................................................................................ 195
ipRouteMask ............................................................................. 195
ipRouteMetric5 ......................................................................... 196
ipRouteInfo................................................................................ 196
ipNetToMediaTable ................................................................. 196
ipNetToMediaEntry ................................................................. 197
ipNetToMediaIfIndex .............................................................. 197
ipNetToMediaPhysAddress ................................................... 197
ipNetToMediaNetAddress...................................................... 197
ipNetToMediaType .................................................................. 197
ipRoutingDiscards.................................................................... 198
ICMP group ..................................................................................... 198
icmpInMsgs ............................................................................... 198
icmpInErrors ............................................................................. 198
icmpInDestUnreachs................................................................ 198
icmpInTimeExcds ..................................................................... 198
icmpInParmProbs..................................................................... 199
icmpInSrcQuenchs ................................................................... 199
icmpInRedirects ........................................................................ 199
icmpInEchos .............................................................................. 199
icmpInEchoReps ....................................................................... 199
icmpInTimestamps................................................................... 199
icmpInTimestampReps............................................................ 199
icmpInAddrMasks ................................................................... 200
icmpInAddrMaskReps ............................................................ 200
icmpOutMsgs............................................................................ 200
icmpOutErrors .......................................................................... 200
icmpOutDestUnreachs............................................................. 200
icmpOutTimeExcds.................................................................. 200
icmpOutParmProbs ..................................................................201
icmpOutSrcQuenchs.................................................................201
icmpOutRedirects .....................................................................201
icmpOutEchos ...........................................................................201
icmpOutEchoReps ....................................................................201
icmpOutTimestamps ................................................................201
icmpOutTimestampReps .........................................................201
icmpOutAddrMasks.................................................................202
icmpOutAddrMaskReps..........................................................202
TCP group ........................................................................................ 202
tcpRtoAlgorithm .......................................................................202
tcpRtoMin...................................................................................202
tcpRtoMax ..................................................................................203
tcpMaxConn ..............................................................................203
tcpActiveOpens .........................................................................203
tcpPassiveOpens .......................................................................203
tcpAttemptFails.........................................................................203
tcpEstabResets ...........................................................................204
tcpCurrEstab ..............................................................................204
tcpInSegs ....................................................................................204
tcpOutSegs .................................................................................204
tcpRetransSegs...........................................................................204
TCP Connection Table..............................................................204
tcpConnTable.............................................................................205
tcpConnEntry ............................................................................205
tcpConnState..............................................................................205
tcpConnLocalAddress..............................................................205
tcpConnLocalPort .....................................................................206
tcpConnRemAddress ...............................................................206
tcpConnRemPort.......................................................................206
tcpInErrs .....................................................................................206
tcpOutRsts..................................................................................206
UDP group ....................................................................................... 206
udpInDatagrams .......................................................................206
udpNoPorts................................................................................207
udpInErrors................................................................................207
udpOutDatagrams ....................................................................207
udpTable ....................................................................................207
udpEntry ....................................................................................207
udpLocalAddress......................................................................207
udpLocalPort .............................................................................208
EGP group ........................................................................................ 208
egpInMsgs................................................................................. 208
egpInErrors............................................................................... 208
egpOutMsgs ............................................................................. 208
egpOutErrors............................................................................ 208
egpNeighTable......................................................................... 208
egpAs......................................................................................... 211
Transmission group........................................................................ 211
SNMP group.................................................................................... 212
snmpInPkts................................................................................ 212
snmpOutPkts............................................................................. 212
snmpInBadVersions ................................................................. 212
snmpInBadCommunityNames .............................................. 212
snmpInBadCommunityUses................................................... 213
snmpInASNParseErrs .............................................................. 213
snmpInTooBigs ......................................................................... 213
snmpInNoSuchNames............................................................. 213
snmpInBadValues .................................................................... 213
snmpInReadOnlys.................................................................... 214
snmpInGenErrs......................................................................... 214
snmpInTotalReqVars ............................................................... 214
snmpInTotalSetVars................................................................. 214
snmpInGetRequests ................................................................. 214
snmpInGetNexts....................................................................... 215
snmpInSetRequests .................................................................. 215
snmpInGetResponses............................................................... 215
snmpInTraps ............................................................................. 215
snmpOutTooBigs...................................................................... 215
snmpOutNoSuchNames.......................................................... 215
snmpOutBadValues ................................................................. 216
snmpOutGenErrs...................................................................... 216
snmpOutGetRequests .............................................................. 216
snmpOutGetNexts.................................................................... 216
snmpOutSetRequests ............................................................... 216
snmpOutGetResponses ........................................................... 216
snmpOutTraps .......................................................................... 217
snmpEnableAuthenTraps ....................................................... 217
Glossary
Index
Title Page
1 SecurityAdmin and SysAdmin Login Page ............................................... 24
2 TenantAdmin and SubtenantAdmin Login Page...................................... 25
3 SecurityAdmin Dashboard ........................................................................... 26
4 System Dashboard ......................................................................................... 27
5 Tenant Dashboard .......................................................................................... 28
6 Subtenant Dashboard .................................................................................... 29
7 Update My Information ................................................................................ 30
8 Update My Information ................................................................................ 46
9 Tenant List....................................................................................................... 54
10 Upate My Information................................................................................... 69
11 Subtenant List ................................................................................................. 76
12 Policy Specification Page............................................................................... 89
13 Policy Specification Metadata Location Options ....................................... 90
14 Policy Specification Customize Options ..................................................... 93
15 Policy Specification Enable Stripe Options................................................. 95
16 Policy Specification Erasure Code Options ................................................ 96
17 Erasure Code Fragmentation Distribution ................................................. 97
18 Policy Specification Rentention and Deletion Options............................. 99
19 Policy Selector Page ..................................................................................... 100
20 Alert Information ......................................................................................... 111
Preface 17
Preface
Introduction
Audience This document is part of the Atmos documentation set, and is
intended for use by system administrators who are responsible for
installing, configuring, and maintaining Atmos.
Conventions used in EMC uses the following conventions for special notices:
this document
Note: A note presents information that is important, but not hazard-related.
! CAUTION
A caution contains information essential to avoid data loss or
damage to the system or equipment.
! IMPORTANT
An important notice contains information essential to software or
hardware operation.
Typographical conventions
EMC uses the following type style conventions in this document.
Normal Used in running (nonprocedural) text for:
• Names of interface elements (such as names of windows,
dialog boxes, buttons, fields, and menus)
• Names of resources, attributes, pools, Boolean expressions,
buttons, DQL statements, keywords, clauses, environment
variables, functions, utilities
• URLs, pathnames, filenames, directory names, computer
names, filenames, links, groups, service keys, file systems,
notifications
Bold Used in running (nonprocedural) text for:
• Names of commands, daemons, options, programs,
processes, services, applications, utilities, kernels,
notifications, system calls, man pages
Used in procedures for:
• Names of interface elements (such as names of windows,
dialog boxes, buttons, fields, and menus)
• What user specifically selects, clicks, presses, or types
Italic Used in all text (including procedures) for:
• Full titles of publications referenced in text
• Emphasis (for example a new term)
• Variables
Courier Used for:
• System output, such as an error message or script
• URLs, complete paths, filenames, prompts, and syntax when
shown outside of running text
Courier bold Used for:
• Specific user input (such as commands)
Courier italic Used in procedures for:
• Variables on command line
• User input variables
<> Angle brackets enclose parameter or variable values supplied by
the user
[] Square brackets enclose optional values
| Vertical bar indicates alternate selections - the bar means “or”
{} Braces indicate content that you must specify (that is, x or y or z)
... Ellipses indicate nonessential information omitted from the
example
Introduction 19
Preface
Where to get help EMC support, product, and licensing information can be obtained as
follows.
Product information — For documentation, release notes, software
updates, or for information about EMC products, licensing, and
service, go to the EMC Powerlink website (registration required) at:
http://Powerlink.EMC.com
Technical support — For technical support, go to Powerlink and
choose Support. On the Support page, you will see several options,
including one for making a service request. Note that to open a
service request, you must have a valid support agreement. Please
contact your EMC sales representative for details about obtaining a
valid support agreement or with questions about your account.
Your comments Your suggestions will help us continue to improve the accuracy,
organization, and overall quality of the user publications. Please send
your opinions of this document to:
[email protected]
Administrative Roles
Administrative Roles 21
Administrative Roles
Roles
The system supports four administrative roles: SecurityAdmin,
SysAdmin, TenantAdmin, and SubtenantAdmin.
defined for their tenant and have no ability to access system resources
except those assigned to their tenant. A TenantAdmin also can do
anything that a SubtenantAdmin can do.
A TenantAdmin registers applications (which involves adding new
applications on the Atmos system by generating a UID/Shared
Secret) and adds policies for the corresponding applications.
A given tenant can have multiple TenantAdmins, but a given
TenantAdmin can be a TenantAdmin for only one tenant.
Authentication
Authentication may depend on the internal authentication source
maintained by the Atmos system (referred to as local authentication)
or an external authentication source maintained by the customer.
(referred to as remote authentication).
The authentication service comprises multiple authentication servers
(one master and several read-only slaves). If the master
authentication server temporarily is unavailable (for example,
because it is down or there is a network disconnection), a failover
process is triggered. This occurs only rarely. Complete failover takes
some time (roughly 15 minutes, depending on the size and
configuration of your system). While failover is in progress, users can
be authenticated against only those authentication servers which are
up. During the failover window, while the master authentication
server is unavailable, write operations (adding and deleting
system-management users) will fail.
Authentication 23
Administrative Roles
Logging In
Access to the GUI is through a browser. Atmos supports Internet
Explorer. For supported versions of the browser and other software
related to Atmos, see the EMC Atmos Installation Guide.
Logging In 25
Administrative Roles
If you forget your password, click the Forgot Password link on the
login page. Your password will be mailed to you, if an email address
is specified for your admin role and an SMTP server is set up.
Dashboards
Since each role has different privileges, each type of admin sees a
different dashboard after logging in.
Security Dashboard When a SecurityAdmin logs into Atmos, the Security Dashboard
appears as shown in Figure 3.
System Dashboard When a SysAdmin logs into Atmos, the System Dashboard appears
as shown in Figure 4.
Dashboards 27
Administrative Roles
Tenant Dashboard When a TenantAdmin logs into Atmos, the Tenant Dashboard
appears as shown in Figure 5.
Dashboards 29
Administrative Roles
SecurityAdmin Tasks
This section explains how the SecurityAdmin uses the Atmos
system-management GUI to manage SecurityAdmins and
SysAdmins.
4. Enter a User Name and click Assign. If the user does not already
exist, you are prompted to add it.
When you create a SysAdmin and specify a Local authentication
source, the server checks whether the user you input exists; if not,
it prompts you to add the user. If you specify a Remote
authentication source, the server does not check whether the user
exists.
In this case, because the authentication source is Local and the user
name does not exist in the system, you are asked to add the new
(local) user.
SecurityAdmin Tasks 31
Administrative Roles
Managing RMGs
Managing RMGs 33
Managing RMGs
Master node
The master node is the first node installed in each installation segment.
It always has -001 appended to its node name. When a new RMG is
added to the system, it has one installation segment, hence one
master node. If more installation segments are added to that RMG
later, there are more master nodes: an RMG with N installation
segments has N master nodes.
The initial master node is the first node installed in the first installation
segment in the first RMG in the system (during system installation).
This is the node where the SysAdmin must login.
Adding an RMG
An RMG is a collection of segments that share a single domain and
location identifier. There are three main steps to add an RMG:
◆ Step 1: Launch Atmos Installation on the Master Node (VMware
or physical hardware)
◆ Step 2: Install the Atmos Appliance on the Master Node
◆ Step 3: Add the New RMG
For more information on adding a new RMG, see the EMC Atmos
Installation Guide.
Adding an RMG 35
Managing RMGs
Field Description
Platform type Select your platform type from the dropdown list:
• Server with DAE (external disk cabinet)
• Server without DAE (internal storage only)
• VMWare (VMWare node, no real disks)
Field Description
Subnet Mask Enter a subnet mask that identifies the local network
addresses defined for the IP Range.
Default Gateway Enter the gateway address. This is critical if you plan
to access Atmos through the public network.
Hostname Prefix Enter the hostname prefix associated with the IS. The
system adds a hyphen after the prefix and before a
three-digit, system-generated serial number.
The following characters are valid for this field:
• The first character must be an alphabetic
character.
• Characters following the first character can be one
or more: alpha (a-z,A-Z), number (0-9), dot (.),
underscore (_), hyphen (-).
• The last character must be an alphabetic
character or a number.
DNS Server Enter the IP address of the name server on the public
interfaces.
Use the slider bar to specify whether Atmos will perform more
large-file operations or small-file operations. Since each
object/file has a fixed amount of metadata, large files have less
metadata as a percentage of their size than small files. The ratio
specified here determines the number of drives per node
allocated to metadata versus user data.
Choose one of the following ways to proceed:
• Click Next, and a default, overall configuration pattern is
auto-generated for the system.
• Click Manual Customize to configure each node in the
system. Use the Manual Customize page to define the disk
ratio, placement, and action-type storage requirements for
each node. Your policy specifications must reflect the storage
definitions defined in this setup.
The Manual Customize page is shown below.
Field Description
Disk ratio The initial value in this field reflects your slider bar settings on the
Application Configuration page.
In a valid metadata:data disk ratio, the metadata part of the ratio is less
than or equal to the data part of the ratio.
When you enter a valid ratio, it gets propagated to the grayed-out fields in
the Disk Ratio column.
Placement Specify how the storage service allocates new objects to the physical disks
under its management by selecting one of the following values from the
dropdown:
• OPTIMAL — Round robin: rotate requests equally among all available
storage disks. This is the default.
• GREEN — Only one or a few disks are active; the rest are spun down for
energy conservation. When the active disks fill up, the spun-down disks
are woken up and used.
• BALANCED — Pick the disk with the most available space.
Field Description
Action Type This specifies the data-at-rest services applied to Storage Servers:
• None — No services; normal writes and reads. This is the default.
• Checksum — The Storage Server generates a checksum for all data
saved on it. When the data is read, the checksum is verified. When the
data is re-written, the old data also is verified.
• Compression — Data is compressed on write and decompressed on
read. This conserves disk space but introduces processing overhead on
the server, so typically it has a negative impact on performance.
Compression can be used successfully for objects that are written once
and accessed rarely.
• Deduplication — Deduplication: multiple copies of the data are
removed, and only one copy of the data is maintained. This is intended to
conserve storage capacity.
• CompressionDedup — Combination of Compression and
Deduplication.
4. Click Discover New Nodes, and the master node in the first
installation segment in the RMG interrogates the RMG for slave
nodes that respond (via IPMI, Intelligent Platform Management
Interface) but are not in the list of installed nodes. These are nodes
that are physically connected to the system and to power, but are
not yet installed or powered on.
The list of new nodes is presented. Use Install or Install All
Nodes to install new nodes individually or collectively.
Modifying a SysAdmin
To view or modify SysAdmin information, login as a SysAdmin and
click Update My Information in the Navigation pane. The Update My
Information page appears as shown in Figure 8. Use this page to
change passwords and other information about your SysAdmin
account.
Required fields are marked with red asterisks on the page.
Managing Tenants
Managing Tenants 53
Managing Tenants
Listing Tenants
Login as SysAdmin, then click Tenant List in the Navigation pane.
The Tenant List page appears as shown in Figure 9.
This Tenant List page shows a Tenant Admin named t1admin already
was created. Each Name in the Tenant List is a tenant ID; each tenant
has a unique ID that is required at login. You first create a tenant, then
assign TenantAdmins to the tenant.
In this example, for the tenant named t2, the Tenant Admin column
indicates No Tenant Admin, meaning no TenantAdmin role is
assigned to this tenant. To complete this tenant, you must assign a
TenantAdmin role and one or more nodes to this tenant. For more
information, see “Creating a TenantAdmin” on page 65 and “Adding
Nodes to a Tenant” on page 70.
Creating a Tenant
When you create a tenant in the system-management GUI, a default
subtenant automatically is created under it. That default subtenant
has the same name, ID, and Authentication Source as the tenant.
Default subtenants cannot be deleted.
Creating a Tenant 55
Managing Tenants
How to create a 1. Login as SysAdmin, then click Create Tenant in the Navigation
tenant pane. The Create Tenant page appears.
Field Description
LDAP Servers The LDAP servers are where the secrets are stored. The
format is: <ldap node1>:<port>[, <ldap node2>:<port>] ...
Note: There is no default port. The <port> must be specified.
Creating a Tenant 57
Managing Tenants
Configuring an LDAP 1. When creating a tenant, click Add next to the Authentication
server for remote Source field. The Remote LDAP Configuration page appears.
authentication
Field Description
Field Description
Port Number Port number for communicating with the LDAP server.
User Search Path Distinguished name at which to begin user searches on the
LDAP server.
Group Search Path Distinguished name at which to begin group searches on the
LDAP server.
User Object Class Object class that identifies users in the LDAP hierarchy.
Group Object Class Object class that identifies groups in the LDAP hierarchy.
3. Click Save.
Downloading the You can download the ldapSecretStore.tar from the EMC Powerlink
schema files website:
http://www.powerlink.EMC.com
Creating a Tenant 59
Managing Tenants
Configuring existing This section describes how to configure existing OpenLDAP servers
OpenLDAP servers with the LDAP keystore (secret store) schema.
Prerequisites:
◆ OpenLDAP 2.4.x is installed as documented by OpenLDAP.
◆ OpenLDAP 2.4.x is configured to run in dynamic configuration
mode. For more information about dynamic configuration mode,
see the OpenLDAP Administrator Guide.
◆ If the existing OpenLDAP servers are deployed in
master/multiple-slaves mode, data syncronization must be
configured.
◆ If there is a network firewall between the OpenLDAP server and
the Atmos nodes, be sure to configure it to allow LDAP traffic to
pass. The default LDAP port is 389.
◆ Download the schema scripts (ldapSecretStore.tar) from EMC
Powerlink website.
◆ Ensure admin rights to the OpenLDAP server.
To integrate the schema scripts into OpenLDAP, follow the steps
below:
1. Stop the existing OpenLDAP servers.
2. Untar the ldapSecretStore.tar file from the EMC Powerlink
website and store the files in the following directories:
• /etc/maui/ldapkeyst/schema24.ldif
• /etc/maui/ldapkeyst/atmoskeystore.ldif
• /usr/local/maui/bin/ldapkeystcfg
3. Import the Atmos keystore schema into each OpenLDAP server
using the following command:
ldapkeystcfg -i schema -d <slapd_conf_dir> -f
<path_of_atmoskeystore.ldif>
For example:
ldapkeystcfg -i schema -d /etc/openldap/slapd.d -f
atmoskeystore.ldif
5. Add the Atmos keystore root entry into the master OpenLDAP
server using the following command:
ldapkeystcfg -i rootentry -r <bind_dn> -b <base_dn> [-p
<ldap_port>]
For example:
ldapkeystcfg -i rootentry -r
cn=admin,ou=atmos,dc=emc,dc=com -b dc=emc,dc=com
Configuring new This section describes how to configure new OpenLDAP servers with
OpenLDAP servers the LDAP keystore schema. These steps assume that the OpenLDAP
software is installed.
Prerequisites:
◆ Install OpenLDAP 2.4.x as documented by OpenLDAP. It is
recommended that OpenLDAP 2.4.23 be installed.
◆ If there is a network firewall between the OpenLDAP server and
the Atmos nodes, be sure to configure it to allow LDAP traffic to
pass. The default LDAP port is 389.
◆ Download the schema scripts (ldapSecretStore.tar) from EMC
Powerlink website.
◆ Ensure admin rights to the OpenLDAP server.
To expand the OpenLDAP schema, follow the steps below:
1. Untar the ldapSecretStore.tar file from the EMC Powerlink
website and store the files in the following directories:
• /etc/maui/ldapkeyst/schema24.ldif
• /etc/maui/ldapkeyst/atmoskeystore.ldif
• /usr/local/maui/bin/ldapkeystcfg
2. To configure the master LDAP server, run the following
command as root:
/usr/local/maui/bin/ldapkeystcfg -m
Creating a Tenant 61
Managing Tenants
Starting the OpenLDAP To Start the OpenLDAP servers, run the following command:
servers
<path_of_slapd> -F /var/local/maui/ks/conf/slapd.d -h
"ldap:///"
Stopping the To Stop the OpenLDAP servers, run the following command:
OpenLDAP servers
killall slapd
Configuring AD for To use AD as an external shared secret store (keystore), follow the
UID secret storage steps below.
1. download the ADSecretStore.zip file from the EMC Powerlink
website:
http://www.powerlink.EMC.com
For example:
ldifde -i -f atmoskeystore_ADschema.ldif -v -c
"cn=Configuration,dc=X"
"cn=Configuration,DC=MAUI,DC=CIG,DC=COM"
For example:
ldifde -i -f atmoskeystore_ADroot.ldif -v -c
"cn=atmosks,dc=X" "cn=atmosks,DC=MAUI,DC=CIG,DC=COM"
Making the shared To ensure that the external shared secret store is always available, the
secret store highly external LDAP or AD server should be configured for HA. Refer to
available the OpenLDAP or AD documentation for more information on
making these products highly available.
Note: If all of the external LDAP servers are stopped within a short period of
time, Atmos will not be accessible via Web Services for the next 1000 requests,
even if the LDAP servers are restarted. This is done to avoid performance
issues if there are many read requests. To restore the LDAP servers sooner,
use the Apache service httpd graceful command on the failed node.
Creating a Tenant 63
Managing Tenants
Renaming a Tenant
When you rename a tenant, the name of its default subtenant also is
changed.
1. Login as SysAdmin, then click Tenant List in the Navigation
pane. The Tenant List page appears.
2. Under the Actions column, click Edit next to the tenant you want
to rename. The Tenant Information page appears.
Creating a TenantAdmin
Once you create a tenant, you must assign the TenantAdmin role
within this tenant to one or more users. A given tenant can have
multiple TenantAdmins, but a given TenantAdmin can be a
TenantAdmin for only one tenant.
Follow these steps:
1. Login as SysAdmin, then click Tenant List in the Navigation
pane. The Tenant List page appears.
Creating a TenantAdmin 65
Managing Tenants
2. Click Edit for the Tenant you need to modify. The Tenant
Information page appears.
3. Click Add Tenant Admin. The Add New Admin page appears.
4. Enter the User Name for this TenantAdmin, and click Save.
When you create a TenantAdmin and the authentication source
associated with the tenant is Local, the server checks whether the
user you input exists; if not, it prompts you to add the user. If the
authentication source for the tenant is Remote, the server does not
check whether the user exists.
5. Click OK to add the new (local) user to the system. You are
prompted to enter the password and other information about the
account.
Creating a TenantAdmin 67
Managing Tenants
Modifying a TenantAdmin
To view or modify TenantAdmin information, login as a
TenantAdmin and click Update My Information in the Navigation
pane. The Update My Information page appears as shown in
Figure 10. Use this page to change passwords and other information
about your TenantAdmin account.
Required fields are marked with red asterisks on the page.
Deleting a TenantAdmin
1. Login as SysAdmin, then click Tenant List in the Navigation
pane. The Tenant List page appears.
2. Click Edit for the Tenant you need to modify. The Tenant
Information page appears.
3. In the Tenant Admins area, in the row for the TenantAdmin you
want to remove, click Remove Role.
4. In the pop-up dialog asking you to confirm, click OK.
Deleting a TenantAdmin 69
Managing Tenants
2. Click Edit for the Tenant you need to modify. The Tenant
Information page appears.
3. Under Access Nodes, click Add Access Nodes. The Assign Node
To Tenant page appears.
4. On the left, select the check box(es) for the node(s) you want to
add for this tenant.
5. For each selected node, check Web Service and/or a File System
option, as required.
6. Check Multi Subtenant Access if you want all subtenants under
this tenant to have access to the namespace via the selected
node(s). If you do not check this, only the default subtenant under
this tenant will have access.
7. Click Save. You are returned to the Tenant Information page. The
selected node name now appears in the Access Nodes list for the
tenant you modified.
Require SSL for Web Use Require SSL for Web Service connections to enable and disable
Service the Secure Sockets Layer (SSL) protocol on access nodes using Web
connections Services. When enabled, Atmos SOAP and REST interfaces can only
be accessed by HTTPS (plain HTTP requests are refused). When
disabled, Atmos SOAP and REST interfaces can be accessed by HTTP
and HTTPS.
SSL should be enabled unless one of the following is true:
◆ You secured the connection between the client and server in
another way.
◆ Performance is more important than privacy protection for the
data passing between the client and server (for example, if you
are passing unimportant test data).
To change the SSL enablement setting for Web-service access on all
nodes assigned to this tenant, follow the steps below. To change the
SSL enablement setting for Web-service access on all nodes, see
“Configuring Security System-wide (Enabling/Disabling SSL)” on
page 49.
1. On the Tenant Information page, click Require SSL for Web
Service connections (in the Operations area). Note: This link
always is active, but if you click it before any node is assigned to
the tenant for Web Service access, you get an error message.
2. Specify the setting using the Enable or Disable button
(whichever is active).
3. Click Back to return to the Tenant Information page.
Configuring SSL Servers use certificates for creating an SSL while communicating with
Certificates for a each other over networks. By default, Atmos uses a self-signed
Tenant certificate for SSL connections. For the best security, we recommend
you replace the default Atmos certificate with one of your own,
signed by your trusted Certificate Authority (CA).
To configure your own SSL certificates for Web-service access on all
nodes assigned to this tenant, follow the steps below. To configure
SSL certificates on all nodes, login as SysAdmin. On the System
Dashboard, in the Operations area, click SSL Configuration. Continue
with step 2 below.
1. On the Tenant Information page, click Update Web Service SSL
Certificate (in the Operations area). The Update Web Service SSL
Certificate page appears.
Certificate Key File A file which stores the PEM-encoded RSA Private Key.
Certificate Key Password The secret to unencrypt the Certificate Key File. If this
is not provided, the non-encrypted private key is
accepted.
Server Certificate File A PEM-encoded file that contains the server’s certificate.
The Server Certificate File contains just the certificate.
Certificate of Trusted Root CA The public certificate of the trusted root CA certificate.
This is the certificate that Atmos trusts. All clients that
communicate with Atmos must present a certificate
signed by the same CA or signed by a CA that can be
linked back to the trusted CA.
Certificate Chain of CAs A file that contains a set of certificates that allows the
SSL protocol to check and validate the integrity of the
certificate presented to it. The root CA certificate must
be the first certificate in the chain file, followed by one or
more intermediary CA certificates.
Server Certificate File A file which stores the PEM-encoded file that contains
the server’s certificate. The Server Certificate File
contains both the certificate and the private key.
Certificate of Trusted Root CA The public certificate of the trusted root CA certificate.
This is the certificate that Atmos trusts. All clients that
communicate with Atmos must present a certificate
signed by the same CA or signed by a CA that can be
linked back to the trusted CA.
Certificate Chain of CAs\ A file that contains a set of certificates that allows the
SSL protocol to check and validate the integrity of the
certificate presented to it. The root CA certificate must
be the first certificate in the chain file, followed by one or
more intermediary CA certificates.
4. Click Submit.
Managing Subtenants 75
Managing Subtenants
Listing Subtenants
Login as TenantAdmin. The Tenant Dashboard appears. The Subtenant
List area is shown in Figure 11.
Creating a Subtenant
When you create a tenant, a default subtenant automatically is
created under it. That default subtenant has the same name, ID, and
Authentication Source as the tenant. Default subtenants cannot be
deleted.
Creating a Subtenant 77
Managing Subtenants
Field Description
Field Description
Default Policy Specification The default policy to be used for this subtenant.
Access Nodes for NFS/CIFS Lists nodes with the NFS or CIFS service which can be
accessed by this subtenant.
Policy Selectors Lists the policy selectors that are associated with the
subtenant
3. Under UID, enter a new ID, which is unique for this subtenant.
4. Optionally, enter an email address. This is used to email the secret
key, if that action is specified on the Subtenant Dashboard.
5. Click Add. The Subtenant Information page appears, listing the
new UID and the Shared Secret that the system generated for it.
Give this information to your application developer for use in
authenticating access to the system for Web-service requests.
The shared secret can be disabled, enabled, or regenerated. When a
shared secret is disabled, the user is no longer able to access the
system through web services. To restore access, enable the shared
secret. A shared secret can also be regenerated. The user will need the
new shared secret in order to access the system. There is no way to
revert to a previous shared secret once a new one has been generated.
Creating a SubtenantAdmin
1. Login as TenantAdmin. The Tenant Dashboard appears.
2. In the Subtenant List area, click Edit for a given subtenant. The
Subtenant Information page appears.
3. In the Subtenant Admins area, click Add. Add New Admin page
appears.
4. Enter the User Name for this SubtenantAdmin, and click Save.
When you create a SubtenantAdmin and the authentication
source associated with the tenant is Local, the server checks
whether the user you input exists. If the user does not exist, it
prompts you to add the user. If the authentication source for the
tenant is Remote, the server does not check whether the user
exists.
In this case, because the authentication source is Local and the
user name does not exist in the system, you are asked to create the
new (local) user.
Creating a SubtenantAdmin 81
Managing Subtenants
5. Click OK to add the new (local) user to the system. You are
prompted to enter the password and other information about the
account.
Deleting a SubtenantAdmin
1. Login as TenantAdmin. The Tenant Dashboard appears.
2. In the Subtenant List area, click Edit for a given subtenant. The
Subtenant Information page appears.
3. In the Subtenant Admins area, in the row for the
SubtenantAdmin you want to remove, click Remove Role.
4. In the pop-up dialog asking you to confirm, click OK.
Deleting a SubtenantAdmin 83
Managing Subtenants
Managing Policies
Managing Policies 85
Managing Policies
Overview
Policy management involves defining a passive strategy for storing,
retrieving, and managing objects and metadata. In the Atmos system,
objects may include any type of binary content. Atmos relies on the
Policy Manager to process this content, and it enables you to
associate a policy with every object-management event. In addition,
you associate metadata with objects as a way to understand their
organization. As a result, you can achieve passive automation of
object management for a variety of events, according to media type
and related user or system metadata.
The TenantAdmin determines the nature of policies that run on the
system. Policies implemented by a TenantAdmin apply only to the
nodes defined for the tenant into which the TenantAdmin is placed.
The TenantAdmin determines how object data is treated within
Atmos based on a variety of conditions, including object types and
events. Events associated with objects include creation, deletion,
versioning, sorting, and updating. You can define discrete policies
that automatically manage your stored data assets by specifying
storage services, data transformations, placement strategies,
workflows, and lifecycle management, all through the placement and
definition of policies.
Policy definition is complex, so EMC recommends that you design
your policies carefully and thoroughly, before implementing them.
Begin by familiarizing yourself with the information in this chapter to
see which design decisions must be made for each policy.
data), with one replica compressed. The Silver policy specifies two
synchronous replicas at specific locations. The Bronze policy is
intended for data that is used only infrequently and for which
inexpensive storage is required. It specifies two synchronous replicas
(to minimize the chance of losing data) and compression, but no
location. It allows the system to determine where the data is located.
Policy definitions have two main components:
◆ Policy Selector—this defines the conditions under which a policy
is triggered. These conditions are specified as expressions using
user or system metadata. For example, the Gold policy might
have a condition that the user ID is “VP.” In this case, any data
requests by a Vice President will be handled subject to the Gold
policy, which is backed up with significant storage resources, so
the Vice President’s data requests are handled very quickly. The
Silver policy might have a condition that there is a metadata tag
of “Finance.” If the user has set a metadata tag indicating that this
data is for the Finance department, the Silver policy applies to it.
The Bronze policy might have a condition that the data is email
that has not been accessed for three months.
◆ Policy Specification—this defines what happens when a policy is
selected for use. Policy specifications include the following:
• Number, type (synchronous or asynchronous), and location of
replicas.
• Transformations applied to replicas, such as compression and
deduplication.
• Striping across servers and/or across disks on a server.
• Server attributes, such as “green” specifies that most disks are
spun down for energy conservation.
• A retention period, during which data cannot be modified.
• A deletion period (also called an expiration period), after
which the data is deleted.
• Location of metadata. This affects the selection of an MDS.
• Whether all the replicas are internal or they are federated.
Federated replicas are distributed across a combination of
internal Atmos systems and external systems (for example,
Atmos onLine).
You can view a policy as an if-then statement: the policy selector is
the “if” clause, and the policy specification is the “then” clause.
Default policy
Whenever a tenant is created (during Atmos installation or later), a
default policy specification is created for that tenant. The default
policy specification, named “default,” is listed on the Tenant
Dashboard. It is defined to have two synchronous replicas, with no
location or server attribute constraints. It is applied to all objects that
do not match any user-defined policy selector. The TenantAdmin can
modify the default policy specification for a tenant. The default
policy for a tenant applies to all subtenants under that tenant. An
Atmos system can operate with only the default policy.
Policy Specifications
The Policy Specification page, shown in Figure 12, is used to define
policy specifications. This page is accessed by logging into Atmos as a
TenantAdmin and clicking Add in the Policy Specifications area.
Metadata location Atmos divides objects (or files) into two parts: user data and
metadata. User data is application data, such as Word files, text files,
movies, and MP3 files. User data is managed by the Storage Service
(SS). Metadata is stored on disks managed by the Metadata Service
(MDS). There are two types of metadata:
◆ System metadata—this includes filename, file size, modification
date, creation date, access-control lists, and object ID.
◆ User metadata—this comprises arbitrary, custom, name-value
pairs. Examples of user metadata is artist name (for MP3 data)
and customer type.
Policy Specifications 89
Managing Policies
Field Description
sameAs Store the object's metadata information in the same location as the data.
otherThan Store the object's metadata information in a different location from the data.
ANY For the Web-service object interface, this is a location at or close to the
client, for the Web-service namespace interface or file-system interface,
this is the location of the subtenant root directory.
RMG A specific RMG location that you defined when adding RMGs.
Replicas Two types of replicas may be created and associated with objects:
synchronous and asynchronous. A given object may have both types
of replicas.
Policy Specifications 91
Managing Policies
replicas. When the client completes the updates, the API returns a
close request, which is sent to the MDS. That close request contains
information about what the client did while they had the object open,
for example, which blocks were written (made “dirty”) and which, if
any, blocks failed. The MDS closes the object and acknowledges that
to the client.
In the background, the MDS creates a new request for the Job Service
(JS). The JS is responsible for all asynchronous data-maintenance
tasks, like asynchronous replication and consistency checking. It runs
on most Atmos nodes and is an application that sits on top of the
client.
Every policy must specify at least one replica, and a policy can
specify an unlimited number of replicas. Any Atmos SS can host a
replica.
When defining replica requirements, be sure that the specified
resources are available in the system. Before a policy is created,
Atmos verifies that the specified Server Attributes are actually
available. The Location specification determines how resources are
checked.
For example, if the location is specified as a constant, such as Boston,
then Atmos checks the nodes in Boston for the specified resources. If
Boston does not have the resources, an error is returned indicating
that the resources were not found. If the location is specified by the
$client variable, and there are three locations in the system: Boston,
Denver, and London, then Atmos checks the nodes at Boston, Denver,
and London for the specified resources. All three locations are
checked because the $client variable can designate either Boston,
Denver, or London as the location. If the resources are not found at all
three locations, an error is returned indicating that the resources were
not found.
Customize The Customize option enables you to customize where and how
objects are stored, as shown in Figure 14.
Field Description
otherThan Store the replica in a different location from the object. In systems where
there are more than two RMGs, otherThan does not enable you to
specify which other location should be used.
ANY For the Web-service object interface, this is a location at or close to the
client. For the Web-service namespace interface or filesystem interface,
this is the location of the subtenant root directory.
$clientCreateLoc Designates the location of the client where the object is/was created. A
policy using the $clientCreateLoc location descriptor stores the replica
on a SS at the same location as the client where the object is/was
created.
Policy Specifications 93
Managing Policies
Field Description
OPTIMAL Rotate requests equally among all available storage disks (round robin).
GREEN Only one or a few disks are active, the rest are spun down for energy
conservation. When the active disks fill up, the spun-down disks are
woken up and used. This option is not supported in the Atmos Virtual
Edition.
The server can apply data transformations to the object. Table 4 lists
the available data transformations.
Field Description
None No services are performed (normal writes and reads). This is the
default.
Checksum The storage server generates a checksum for all data saved on it.
When the data is read, the checksum is verified. When the data is
re-written, the old data is also verified.
Deduplication Multiple copies of the data are removed and only one copy of the
data is maintained. This is intended to conserve storage capacity.
Atmos Virtual Edition does not support Deduplication.
Striping Striping enables you to put blocks of data of the same replica on
different nodes. The Enable Stripe options are shown in Figure 15.
Field Description
Erasure Code Erasure Code provides data redundancy without the overhead of
replication. Erasure Code divides an object into rows, each of which
contains m data fragments and k code fragments. Each fragment is
stored on a different disk. Using this method, each row of the object
can be reconstructed from any m of the total set of fragments,
tolerating up to k unavailable fragments.
Atmos supports the following Erasure Code Fragmentation options
as shown in Figure 16.
◆ 9/12 configuration (Data=9, Code=3) — storage overhead 33%
◆ 10/16 configuration (Data=10, Code=6) — storage overhead 60%
◆ 10/12 configuration (Data=10, Code=2) — storage overhead 20%
Policy Specifications 95
Managing Policies
Field Description
Replica distribution You can select the distribution location for replicas with Erasure
Code. EMC recommends that you select the defined location of the
RMG, as shown in Figure 17.
Policy Specifications 97
Managing Policies
Read access Replica selection for read access determines how the Atmos client
chooses a replica when a read operation is performed. Typically, for
protection, availability, and performance purposes, Atmos objects
have multiple replicas. The client can choose any of the replicas in
their current state.
Options for read access are:
◆ geographic—chooses the closest replica in geographic terms.
◆ random—picks a replica at random.
Policy Selectors
Policy selection is a process where Atmos applies a set of XQuery
expressions to determine which policy is applied to the object. The
policy selection XQuery expressions are defined by a series of policy
selector descriptions. Each selector descriptor specifies the selection
criteria for a different policy, including the object operation, which
triggers the policy. To complete the process, a policy specification
must be selected from a list available to the subtenant.
! IMPORTANT
Some objects may have one policy triggered on object (or metadata)
creation and another triggered on object (or metadata) update. If so,
at least one synchronous replica in the create policy specification
must exactly match a synchronous replica in the update policy
specification, or the update will fail.
Policy Selectors 99
Managing Policies
The Policy Selectors page, shown in Figure 19, is used to define policy
selectors. This page is accessed by logging into Atmos as a
TenantAdmin and clicking Add in the Policy Selectors area.
Field Description
Field Description
Metadata Tag Indicates which metadata field will be used to intercept. The field can
be either system metadata attribute or user metadata attribute
depending on which method of entry is chosen. System metadata
tags include:
• atime—last access time
• mtime—last modified time
• ctime—change time
• itime—create time
• uid— UID from UID List, where you create new applications from
• gid—group ID, N/A to Web Service users; ignore
• size—object size in bytes
The time format for atime, mtime, ctime, itime is as follows:
YYYY-MM-DDTHH:MnMn:SSZ
Where: YYYY = Year, MM = Month, DD = Day, HH = Hour, MnMn =
Minutes, SS = Seconds. Note that there is a T in between DD and
HH, and also a Z at the end.
For example, April 12, 2008 at 3:35 would be displayed as:
2008-04-12T03:45:00Z
Match Operator Indicates which operator will be used in the selector expression. The
following operators are available:
• Equals—matches the defined entry
• Starts With—starts with the defined entry
• Ends With—ends with the defined entry
• Contains—contains the defined entry
• <—less than the defined entry
• =—equals the defined entry
• >—greater than the defined entry
• <=—less than or equal to the defined entry
• >=—greater than or equal to the defined entry
Metadata Value Indicates what value will be intercepted for the Metadata Tag.
XQuery Expression Enter the XQuery expression that will be used to determine which
policy is applied to the object.
For example, a query for all objects of .jpg file type would have the
following expression:
//objname[ends-with(.,'.jpg')]
Field Description
On Event Indicates when the action is triggered. The following object events
cause evaluation of policies on existing objects:
• ON_CREATE—this event is triggered when an object matching
this definition is created.
• ON_SMD_UPDATE—this event is triggered when a change in the
system metadata of an object is made. System metadata
includes: atime, mtime, ctime, uid, gid, mode, ACL, DACL,
expiration time, and retention time (ACL, expiration time, and
retention time are extended attributes available in the Atmos
reserved namespace). Policy evaluation is only triggered when
attributes are changed directly through commands, such as
chmod, chown, and truncate. Attribute changes caused by
indirect operations, such as modifying the data, does not trigger
policy evaluation. Note that for write operations through
CIFS/Samba, the Samba server calls the utime subroutine to
change the modification and access times of the file touched,
which will trigger policy evaluation.
• ON_UMD_UPDATE—this event is triggered when a change in the
user metadata of an object is made.
Reordering Policies
Atmos evaluates policies in the order in which they appear in the
system. The first one that matches is used.
1. Login as SubtenantAdmin. The Subtenant Dashboard appears.
2. In the Policy Selectors area, click Reorder. The Reorder Policy
page appears.
Overview
Atmos provides various types of notifications and reports that help
you to maintain and troubleshoot your Atmos system.
Atmos provides the following types of notificatons:
◆ alerts—created when situations result in errors and warnings, or
to provide information. Sources may come from either hardware
or software.
◆ email— email notifications can be sent based on severity, which
will trigger the email alerts. Each RMG has its own email alert
configuration.
◆ SNMP—both SNMP trap generation and SNMP standard
(MIB-II) MIB access are supported. For MIB access, the SNMP
agent must be configured.
Atmos also provides log collection and system reports, which are
used by EMC Technical Support when troubleshooting:
◆ log collection—collects logs for debugging purposes. After the
logs are collected, you can save the log package and send them to
EMC Technical Support.
◆ system report—collects data about your Atmos configuration and
sends a report to the EMC System Reports database, through the
System Report (SYR) mechanism. System reports are sent to the
EMC System Reports Database to improve customer service, and
allow EMC to provide timely support for Atmos issues.
Name Description
Swap A portion of the hard disk drive that is used for virtual
memory. This enables the MauiNodeSwap SNMP trap, if
SNMP is configured and/or email if email is configured.
Service Memory Determinies if each service is using too much of its memory
(in GB). This enables the MauiAppServiceMemory SNMP
trap, if SNMP is configured and/or email if email is
configured.
Name Description
CPU, Memory, Filesystem, Swap Usage > 70%... Usage > 95%
Action Description
SNMP Trap Send an SNMP trap. Traps (notifications) can be sent to an SNMP
network-management station) to relay hardware failures and other
exceptions. Requires SNMP configuration (see “SNMP support” on
page 114).
Alerts
The Alert Information area, which is displayed on the Node
Information page, contains a list of alerts relative to the node, as
shown in Figure 20. Alerts are created when situations result in errors
and warnings, or to provide information. Sources may come from
either hardware or software.
Alerts 111
System Monitoring, Events, & Reporting
Email alerts
The Email Configuration page is used to set email alert options for
the RMG. Each RMG has its own email alert configuration. Enabling
Email Configuration also enables DAE and Dell hardware traps, by
default.
Note: The SNMP daemon sends shutdown and coldstart alerts each time the
SNMP daemon is shut down or restarted. To receive these email alerts, SMTP
must be configured and an email address must be provided on the Update
My Information page. When SNMP or SMTP is enabled, each node in the
RMG may send multiple alerts.
Field Description
Enable Alert Email Service Enable by selecting the check box and filing out the fields.
This is required to receive email alerts.
Important: Email alerts must be configured for at least one
RMG, for password-reminder emails to work.
Mail Sending Server IP address of the SMTP server that will deliver alert
messages and password-reminder emails.
User Account The user name of the mail-sending server, which is the
email address authenticated by the SMTP server. If the
mail server does not require a user account, you do need
to enter a user account name.
Alert Severity For Mailing Severity which will trigger the email alerts: Critical, Error,
Warning, or Informational.
5. Click Submit.
SNMP support
Atmos supports both SNMP trap generation and SNMP standard
(MIB-II) MIB access. For MIB access, the SNMP agent must be
configured. SNMP traps and the SNMP agent can be configured at
the same time or separately. For security reasons, it is recommended
that a SNMP agent community name other than public or private be
used as these are well-known default community names.
You can configure SNMP system-wide or for a specific RMG.
Dell traps Atmos forwards Dell OpenManage hardware traps (10892.mib and
dcstorag.mib) to either your NMS or email. All Dell system traps for
all severities (informational, warning, and critical) are forwarded. To
receive these traps as email alerts, SMTP must be configured and an
email address must be provided on the Update My Information page.
When SNMP or SMTP is enabled, each node in the RMG may send
multiple alerts. Atmos Virtual Edition does not support forwarding
Dell OpenManage hardware traps, even if the ESX server is a Dell
system.
A sample of the most severe Dell traps are listed in Table 11.
SNMP agent The SNMP agent is the SNMP daemon that runs on Atmos and
listens on the SNMPD port for SNMP requests from an NMS.
Whereas SNMP traps are sent from Atmos to an NMS, SNMP
requests are sent from NMS to Atmos.
The following SNMP standard MIBs are available for query through
SNMP:
◆ system {mib-2 1}
◆ interfaces {mib-2 2}
◆ at {mib-2 3}
◆ ip {mib-2 4}
◆ icmp {mib-2 5}
◆ tcp {mib-2 6}
◆ udp {mib-2 7}
◆ snmp {mib-2 11}
◆ host resources {mib-2 25}
◆ snmpv2 {internet 6}
For more information about the MIB-II MIB, see Appendix B, “MIB-II
(RFC 1213).” For more information about the Host Resources MIB,
see Appendix C, “Host Resources MIB (RFC 2790).”
Configuring SNMP There are two SNMP configuration pages: System SNMP
Configuration and RMG SNMP Configuration. The System SNMP
Configuration page is used to configure SNMP system-wide, whereas
the RMG SNMP Configuration page is used to configure SNMP for
one RMG. Both configuration pages are configured in the same way.
To configure SNMP:
1. Login as SysAdmin. The System Dashboard appears.
2. Do one of the following:
• To configure SNMP system-wide: In the Operations area, click
SNMP Configuration. The System SNMP Configuration page
appears.
• To configure SNMP for one RMG: In the RMG List area, click
Detail for a given RMG. The RMG Summary page for that
RMG appears. In the Operations area, click Configure SNMP.
The RMG SNMP Configuration page appears.
Note: The setting for Enable SNMP applies to the entire system or
RMG (depending on whether you are using the System SNMP
Configuration or RMG SNMP Configuration page).
6. When the NMS Host Address, NMS Host Port, and Community
Name fields are filled in, the Test button is enabled. Click this to
test the connection to the NMS server. A “busy” icon is displayed
while the test is ongoing. The result message (the popup) will be
prompted after the test finishes.
• If the NMS server test is unsuccessful, one of several error
messages appears, depending on the circumstances. Retry the
test or contact EMC Customer Support.
• If the NMS server test is successful, a success message
appears; click OK to proceed. On the SNMP Configuration
page, the Add button is now enabled. Click Add; the NMS
server is added to the Atmos database, and information about
Getting useful data The following commands can be used from a Linux command line
from the MIBs (which has snmpd available) to poll the MIB-II MIBs in the Atmos
system to retrieve useful information. The OIDs and MIB element
names can be used from any NMS to do polling as well. For more
information about the MIB-II MIB, see Appendix B, “MIB-II (RFC
1213).” For more information about the HOST-RESOURCES MIB, see
Appendix C, “Host Resources MIB (RFC 2790).”
HOST-RESOURCES-MIB::hrStorageIndex.7 = INTEGER: 7
HOST-RESOURCES-MIB::hrStorageIndex.8 = INTEGER: 8
HOST-RESOURCES-MIB::hrStorageIndex.10 = INTEGER: 10
HOST-RESOURCES-MIB::hrStorageIndex.31 = INTEGER: 31
HOST-RESOURCES-MIB::hrStorageIndex.32 = INTEGER: 32
HOST-RESOURCES-MIB::hrStorageIndex.33 = INTEGER: 33
HOST-RESOURCES-MIB::hrStorageIndex.34 = INTEGER: 34
HOST-RESOURCES-MIB::hrStorageIndex.35 = INTEGER: 35
...
HOST-RESOURCES-MIB::hrStorageIndex.87 = INTEGER: 87
HOST-RESOURCES-MIB::hrStorageIndex.88 = INTEGER: 88
HOST-RESOURCES-MIB::hrStorageIndex.89 = INTEGER: 89
Finding disks
To find which disk is which, use the following command:
# snmpwalk -v2c -c community_string node-ip-addr
HOST-RESOURCES-MIB::hrStorageDescr
This command lists the name of each disk, indexed by same index
number as shown above. For example:
HOST-RESOURCES-MIB::hrStorageDescr.1 = STRING: Physical
memory
HOST-RESOURCES-MIB::hrStorageDescr.3 = STRING: Virtual
memory
HOST-RESOURCES-MIB::hrStorageDescr.6 = STRING: Memory
buffers
HOST-RESOURCES-MIB::hrStorageDescr.7 = STRING: Cached
memory
HOST-RESOURCES-MIB::hrStorageDescr.8 = STRING: Shared
memory
HOST-RESOURCES-MIB::hrStorageDescr.10 = STRING: Swap
space
HOST-RESOURCES-MIB::hrStorageDescr.31 = STRING: /
HOST-RESOURCES-MIB::hrStorageDescr.32 = STRING: /boot
HOST-RESOURCES-MIB::hrStorageDescr.33 = STRING:
/mauimds-db/mds-b2abb3f4-2584-437e-ac9c-03eecbd09b0e
HOST-RESOURCES-MIB::hrStorageDescr.34 = STRING:
/mauimds-db/mds-a80a27a5-7e8f-4627-8a1f-c6780f0971a3
HOST-RESOURCES-MIB::hrStorageDescr.35 = STRING:
/mauimds-db/mds-125c7b2a-6425-4003-9e12-7b929742fb4e
...
HOST-RESOURCES-MIB::hrStorageDescr.87 = STRING:
/mauiss-disks/ss-cc722b09-441b-4823-bc55-5e0aa4073e61
HOST-RESOURCES-MIB::hrStorageDescr.88 = STRING:
/mauiss-disks/ss-18ae1f82-3186-4504-8b25-f681f8174520
HOST-RESOURCES-MIB::hrStorageDescr.89 = STRING:
/mnt/mauifs
This command returns the total storage for a given disk. For example:
HOST-RESOURCES-MIB::hrStorageSize.88 = INTEGER: 240358018
This command lists the total used storage for all disks. For example:
HOST-RESOURCES-MIB::hrStorageUsed.1 = INTEGER: 3708308
HOST-RESOURCES-MIB::hrStorageUsed.3 = INTEGER: 3708308
HOST-RESOURCES-MIB::hrStorageUsed.10 = INTEGER: 0
HOST-RESOURCES-MIB::hrStorageUsed.31 = INTEGER: 1219717
HOST-RESOURCES-MIB::hrStorageUsed.32 = INTEGER: 16091
HOST-RESOURCES-MIB::hrStorageUsed.33 = INTEGER: 56790
HOST-RESOURCES-MIB::hrStorageUsed.34 = INTEGER: 56592
HOST-RESOURCES-MIB::hrStorageUsed.35 = INTEGER: 56592
...
HOST-RESOURCES-MIB::hrStorageUsed.87 = INTEGER: 53718
HOST-RESOURCES-MIB::hrStorageUsed.88 = INTEGER: 53718
HOST-RESOURCES-MIB::hrStorageUsed.89 = INTEGER: 1251136
This command returns the used storage for a given disk. For
example:
HOST-RESOURCES-MIB::hrStorageUsed.88 = 53718
This command returns the unique value for each device. For
example:
HOST-RESOURCES-MIB::hrDeviceIndex.768 = INTEGER: 768
HOST-RESOURCES-MIB::hrDeviceIndex.769 = INTEGER: 769
This command returns the unique values for each interface. For
example:
IF-MIB::ifIndex.1 = INTEGER: 1
IF-MIB::ifIndex.2 = INTEGER: 2
IF-MIB::ifIndex.3 = INTEGER: 3
IF-MIB::ifIndex.4 = INTEGER: 4
This command returns the size of the largest datagram. For example:
IF-MIB::ifMtu.1 = INTEGER: 16436
IF-MIB::ifMtu.2 = INTEGER: 1500
IF-MIB::ifMtu.3 = INTEGER: 1500
IF-MIB::ifMtu.4 = INTEGER: 1480
System reports
Atmos can collect system configuration data and send a report to the
EMC System Reports database, through the System Report (SYR)
mechanism. System reports are sent to the EMC System Reports
Database to improve customer service, and allow EMC to provide
timely support for Atmos issues.
Configuring system The System Report Configuration page is used to configure Atmos to
reports be able to securely send Atmos configuration information to EMC
support personnel. This enables EMC to receive detailed information
about your Atmos environment, including: system information, RMG
information, and tenant information. An SMTP connection is used to
send the configuration information. Once the configuration
information is received, it is analyzed by a service automation tool
called SYR. SYR serves as a repository for configuration data and is
used to provide faster problem resolution.
The procedure in this section configures Atmos for system reporting.
To actually collect the data, see “Collecting system reports” on
page 138.
Before using system report configuration, a software serial number
must be provided and email service must be configured.
To configure system reports:
1. Login as SysAdmin. The System Dashboard appears.
2. In the Operations area, click System Report Configuration. The
System Report Configuration page appears.
SYR symptom codes Atmos sends symptom codes of detected problems to the EMC
System Reports database through the System Report (SYR)
mechanism. Table 12 lists the symptom codes that are provided to
SYR.
CRITICAL_NETWORK_RMG_LOST 0x00310001 Lost connection with RMG, and connection hasn’t been restored
for ~8 attempts.
CRITICAL_NETWORK_SEGMENT_LOST 0x00310002 Lost connection with Segment and connection hasn’t been
restored for ~8 attempts.
CRITICAL_SERVICE_MAUISS_CRASH 0x00410003 Atmos Storage Service crashed (or was killed) on node.
CRITICAL_SERVICE_MAUIRMS_CRASH 0x00410004 Atmos RMS Service crashed (or was killed) on node.
CRITICAL_SERVICE_MAUIMDLS_CRASH 0x00410005 Atmos MDLS Service crashed (or was killed) on node.
CRITICAL_SERVICE_MAUIMDS_CRASH 0x00410006 Atmos MDS Service crashed (or was killed) on node.
ERROR_TENANT_POLICY_SYNC_FAIL 0x00620002 “mauicm_mauipmsync” failed. This means that a policy push did
not get done on all nodes. Some nodes will not have been
properly updated, which needs to be addressed.
ERROR_SYS_UID_SYNC_FAIL 0x00720003 “mauicm_synclb” failed. This means that the addition of a new
userID through Web Services failed. This causes a problem with
web access because the secret keys are not authorized/user is
not authorized so user cannot access the system through the
web.
CRITICAL_NODE_DISK_ERROR 0x00810001 A critical internal server (node) disk error has occurred. Do not
use the node. It must be replaced.
CRITICAL_NODE_DISK_REMOVED 0x00810002 An internal server (node) disk has been removed from node.
ERROR_NODE_DOWN 0x00820001 Connection to given node is down and has not been restored
after X attempts.
CRITICAL_DAE_EVENT 0x00910004 A critical event occurred on the DAE. (message from SCSI
enclosure Service).
ERROR_DAE_RUN_DISK_REMOVED 0x00920006 A running disk was removed from the DAE enclosure.
Collecting system The Collect System Report page is used to collect and then send
reports Atmos configuration information to EMC support personnel. This
feature is enabled and configured using the System Report
Configuration page. Once the configuration information is collected,
it is sent to a service automation tool called SYR, which serves as a
repository for configuration data and is used to provide faster
problem resolution.
Before you can collect system reports, you must configure system
reporting (see “Configuring system reports” on page 133).
EMC recommends that you collect a system report after installation
or upgrade, and both before and after making configuration changes.
This provides EMC with a record of the current configuration of a
customer's system, which can be helpful in resolving issues.
To collect system reports:
1. Login as SysAdmin. The System Dashboard appears.
2. In the Operations area, click Collect System Report. The Collect
System Report page appears, first indicating that system-report
information collection is in process, then indicating that the
information collection has completed and will be sent to SYR
(EMC’s internal name for its System Reporting group).
If you navigate away from the Collect System Report page before
the information collection completes, the information continues
to be collected and, if it succeeds, the report is sent. Regardless of
whether it succeeds, you do not receive any status information.
4. To view the log, click Download the log package. (A log package is
a collection of logs from multiple nodes.) The log package
downloads, and you are prompted whether to open or save it.
This chapter describes how to export NFS and CIFS directly from
Atmos, using the system-management GUI.
This chapter describes the following topics:
◆ Overview ........................................................................................... 142
◆ Configuring NFS .............................................................................. 142
◆ Configuring CIFS ............................................................................. 145
Overview
This chapter describes how to export NFS and CIFS directly from
Atmos, using the system-management GUI.
To enable NFS or CIFS access to Atmos nodes:
◆ The SysAdmin adds Atmos nodes to a tenant, so that tenant (and
its subtenants) can be accessed via the NFS/CIFS service of those
nodes. For more information, see “Adding Nodes to a Tenant” on
page 70.
◆ Then the TenantAdmin or SubtenantAdmin adds or edits
mount-point shares of NFS/CIFS on the appropriate nodes, for a
specific subtenant. For more information, see “Configuring NFS”
on page 142 or “Configuring CIFS” on page 145.
Note: Before you configure NFS or CIFS access to Atmos, you should
synchronize your external servers’ times with your Atmos NTP server time
(see “Configuring NTP (Network Time Protocol)” on page 47.
Configuring NFS
1. Do one of the following:
• Login as SubtenantAdmin. The Subtenant Dashboard appears.
• Login as a TenantAdmin. On the Tenant Dashboard, in the
Subtenant List area, click Edit next to a subtenant. The
Subtenant Information page appears.
On either page (Subtenant Dashboard or Subtenant Information),
the area called Access Nodes for NFS/CIFS shows a list of nodes
with the NFS or CIFS service which can be accessed.
2. Under Service Type, click the appropriate NFS link. The Node
NFS Information page appears.
3. To get details about a share, move your mouse anywhere over the
table row for that share, and a popup window appears. To add a
new NFS share, click Add. To edit or delete a current share, click
Edit or Delete for that share. If you click Add or Edit, the NFS
Configuration page appears.
Field Description
Share Path If you are editing an existing share, this field is populated and
cannot be changed. This is a directory to which the user of the
service is to be given access. This should be the full path name
of the directory from the root of the tenant namespace.
Field Description
Allow Host The hosts that access the share. Valid values are:
Single machine—A fully qualified domain name (which can be
resolved by the server), hostname (which can be resolved by the
server), or IP address.
Series of machines specified with wildcards—Use the * or ?
character to specify a string match. Wildcards are not to be used
with IP addresses; however, they may work accidentally if
reverse DNS lookups fail. When specifying wildcards in fully
qualified domain names, dots (.) are not included in the wildcard.
For example, *.example.com includes one.example.com but
does not include one.two.example.com.
IP networks—Use a.b.c.d/z, where a.b.c.d is the network and z is
the number of bits in the netmask (for example, 192.168.0.0/24).
Another acceptable format is a.b.c.d/netmask, where a.b.c.d is
the network and netmask is the netmask (for example,
192.168.100.8/255.255.255.0).
Netgroups—Use the format @group-name, where group-name
is the NIS netgroup name.
Sync Write If Yes, the server cannot reply to requests until the changes
made by the request are written to the disk. The default value is
Yes.
For advanced parameters, click the Advanced check box and
specify the advanced parameters. The advanced parameters are
used to define and map user and group IDs to anonymous
accounts. Advanced parameters are optional.
Secure If Yes, requires that all requests originate from a port lower than
1024. If No, requests from any port number are accepted. The
default is Yes.
Anonymous UID Sets the user ID of the anonymous account, to map all requests
to one user.
Anonymous GID Sets the group ID of the anonymous account, to map all requests
to one user.
Squash UIDs A list of user IDs that are subject to anonymous mapping; for
example: 0-15,20,25-50.
Field Description
Squash GIDs A list of group IDs that are subject to anonymous mapping; for
example, 0-15,20,25-50.
Configuring CIFS
All CIFS configuration should be done through the
system-management GUI. Do not modify the Samba/CIFS
configuration file manually.
Atmos does not support two different CIFS shares with the same
share path on different nodes, unless the nodes have been configured
for high availability. For more information on how to configure
highly available CIFS shares in an Atmos environment, see the EMC
Atmos CIFS Failover using Microsoft Distributed File System white
paper.
Active Directory Active Directory is supported for authenticating only CIFS users
(UIDs), not Atmos administrators.
The Atmos CIFS server can be a member of Microsoft Active
Directory. In this mode, clients can be authenticated centrally by an
Active Directory server. We recommend you use Active Directory
when most clients belong to a Windows domain.
2. Under Service Type, click the appropriate CIFS link. The Node
CIFS Information page appears.
Field Description
Server String The string that will appear in the browse lists next to the machine
name. The default is EMC_Atmos.
Netbios Name The NetBIOS name by which a server is known. By default, this
is the same as the first component of the host's DNS name.
Field Description
Allowed Hosts A set of hosts which are permitted to access a service. Settings
apply to all services, regardless of whether the individual service
has a different setting. You can specify the hosts by name or IP
number. You also can specify hosts by network/netmask pairs
and by netgroup names if your system supports netgroups. The
default is no entry, meaning all hosts are allowed. Here are
several examples.
Example 1: Allow all IPs in 150.203.*.*; except one:
150.203. EXCEPT 150.203.6.66
Example 2: Allow hosts that match the given network/netmask:
150.203.15.0/255.255.255.0
Example 3: Allow two specific hosts:
lalans, calomb
Preferred Master Controls the election of a master node in the CIFS domain and
whether nmbd is a preferred master browser for its workgroup.
(nmbd is a daemon service involved in the CIFS server. It
queries the domain or share names in the domain.)
Valid values are Yes, No, and Auto. If Yes, nmbd has a slight
advantage in winning the election. If No, nmdb cannot win the
election. If Auto, the election is random. The default is No.
Winbind Use Default Specifies whether the winbindd daemon operates on users
Domain without a domain component in their usernames. Users without a
domain component are treated as part of the winbindd server's
own domain. The default is No.
Inherit Permissions When the inherit permissions option is set to yes, the create
mask, directory mask, force create mode, and force directory
mode are ignored. The normal behavior of setting the
permissions on newly created files is overridden such that the
new files and directories take on permissions from their parent
directory. New directories will have exactly the same permissions
as the parent, and new files will inherit the read and write bits
from the parent directory, while the execute bits are determined
as usual by the values of the map archive, map hidden, and map
system parameters. If this option is set to yes, permissions on
new files and directories are inherited from parent directory. The
default value is no.
Field Description
Inherit ACLs CLs: This parameter can be used to ensure that if default ACLs
exist on parent directories, they are always honored when
creating a new file or subdirectory in these parent directories.
The default behavior is to use the UNIX mode specified when
creating the directory. Enabling this option sets the UNIX mode
to 0777, thus guaranteeing that default directory acls are
propagated. The default value is yes.
IDmap UID The range of user IDs that are allocated for the purpose of
mapping UNIX users to NT user SIDs. This range of user IDs
should not contain any existing local or NIS users; that is, it
should be beyond the maximum UID value of the local system, to
avoid overlapping.
IDmap GID The range of group IDs that are allocated for the purpose of
mapping UNIX groups to NT group SIDs. This range of group IDs
should not contain any existing local or NIS groups; that is, it
should be beyond the maximum GID value of the local system, to
avoid overlapping.
Field Description
Security Affects how clients respond to the server. There are two options,
Share and ADS. There are two security modes Atmos does not
support: User (because Atmos does not support internal CIFS
user management) and Domain.
* Share—The client authenticates itself separately for each
share. With each connection request, a client sends a password,
but not a user name (although modern CIFS client do send a
user name; for example, Windows XP sends the current login
name). The client expects a password to be associated with
each share, independent of the user. The CIFS server must
determine what user name the client wants to use.
User Name Mapping By default, Atmos currently uses Active Directory Relative ID
(RID) user mapping schema. This schema maps the RID of an
object AD Security ID to a range specified in the CIFS
configuration to provide a unique ID for a user/group. This
schema is only valid for a Single Domain.
Field Description
RID Range Specifies the range of user/group IDs that are allocated for the
purpose of mapping UNIX users to NT user RIDs. This range of
user IDs should not contain any existing local or NIS users or
groups; that is, it should be beyond the maximum UID value of
the local system to avoid overlapping. A sample range is 20001 -
30000.
Active Directory The fully qualified domain name of the database server. The
Domain Active Directory domain is used as the Active Directory service
equivalent of the NT4 domain. This must be specified in
all-capital letters.
Active Directory A directory service used to store information about the network
Server resources. The Active Directory server is either an IP address or
a simple host name.
Active Directory DNS The IP address or simple host name of the Active Directory DNS
server.
3. Click Submit.
As mentioned above, this configuration will fail unless your
external servers’ times are synchronized with the Atmos NTP
server time (see “Configuring NTP (Network Time Protocol)” on
page 47. To ensure this, a dialog box appears with the following
notice:
Is your Active Directory server time synchronized with
your Atmos NTP server time? If not, DO NOT PROCEED. See
the Atmos documentation for details.
Field Description
Share Path A directory to which the user of the service is to be given access.
Browseable Controls whether this share is seen in the list of available shares
in a net view and in the browse list. The default is Yes.
Read Only If Yes, users of the service cannot create or modify files in the
service's directory. The default is No.
Comments This text field is seen next to a share when a client queries the
server, either via the network neighborhood or via net view to list
what shares are available.
Field Description
Guest Only If Yes, only guest connections to the service are permitted. This
parameter has no effect unless Public is set for the service. The
default is Yes.
Valid Users A list of groups/users who are allowed to login to this service. If
this is empty (the default), any user can login. Groups are
specified using the @ symbol. To specify a group named
Group1, you would enter @Group1. To specify a user named
user1, you would enter user1. To specify both Group1 and
User1, you would enter: @Group1, User1
Create Mask When a file is created, the necessary permissions are calculated
according to the mapping from DOS modes to UNIX
permissions, and the resulting UNIX mode is bit-wise AND-ed
with this parameter. This parameter may be thought of as a
bit-wise mask for a file’s UNIX access modes. Any bit not set
here is removed from the modes set on a file when it is created.
The default value of this parameter removes the “group” and
“other” write and execute bits from the UNIX modes.
Directory Mask The octal modes used when converting DOS modes to UNIX
modes when creating UNIX directories. When a directory is
created, the necessary permissions are calculated according to
the mapping from DOS modes to UNIX permissions, and the
resulting UNIX mode is bit-wise AND-ed with this parameter.
This parameter may be thought of as a bit-wise mask for a
directory’s UNIX access modes. Any bit not set here is removed
from the modes set on a directory when it is created. The default
value of this parameter removes the “group” and “other” write bits
from the UNIX mode, allowing only the user who owns the
directory to modify it.
Write Cache Size his option allows Samba to improve performance on systems
where the disk subsystem is a bottleneck. The value of this
option is specified in bytes, and a size of 262,144 represent a
256k cache size per file. The default Write Cache Size is
8,388,608 bytes.
Force Unknown ACL The ACLs that result on a Samba server will most probably not
User match the originating ACLs. Windows supports the possibility of
files that are owned only by a group. Group-alone file ownership
is not possible under UNIX/Linux. Errors in migrating
group-owned files can be avoided by using the Force Unknown
ACL User = yes parameter. This option will automatically convert
group-owned files into correctly user-owned files on the Samba
server.
Field Description
Overview
The /wsstats Web page presents basic Web-services performance
data. Performance data can be obtained by anyone with network
access to the HTTP servers that run on Atmos nodes. There are two
ways to get the performance data. From any workstation that can
access an Atmos server running httpd (the HTTP daemon), do one of
the following:
◆ Point your browser to http://node-name/wsstats on the master
node of an installation segment. The performance data for that
server is displayed.
◆ Run a program to do a GET of http://node-name/wsstats on the
master node of an installation segment. A simple XML document
is returned for reading or machine consumption. An example is
shown below; the items you input are in bold.
Above, node-name is the Atmos node name or IP address of an Atmos
server running httpd. For many installations, this is an IP address. If
the node on which the Apache Web server is installed has a Fully
Qualified Domain Name (FQDN), however, a hostname is returned
(as shown in “Example: Getting the Statistics” on page 157).
Each node has a separate instance of the Web server and, hence, a
separate instance of wsstats to be collected. If there is a load balancer
in front of Atmos at your installation (a common occurrence),
node-name is not the concentrator, but the Atmos nodes to which the
concentrator points.
Response <WSStat>
<Node name="10.5.113.242"/>
<ReadsPerSec>675.80</ReadsPerSec>
<WritesPerSec>1102.43</WritesPerSec>
<DeletesPerSec>171.57</DeletesPerSec>
<TransPerSec>1949.80</TransPerSec>
<MeanReadLatencyMS>4.557</MeanReadLatencyMS>
<MeanWriteLatencyMS>153.282</MeanWriteLatencyMS>
<MeanLatencyMS>89.206</MeanLatencyMS>
<Reads>31087</Reads>
<Writes>50712</Writes>
<Deletes>7892</Deletes>
<Total>89691</Total>
<ReadLatencyMS>141660</ReadLatencyMS>
<WriteLatencyMS>7773233</WriteLatencyMS>
<DeleteLatencyMS>86112</DeleteLatencyMS>
<UptimeMS>46711</UptimeMS>
</WSStat>
* Closing connection #0
[root@deuce /]#
Browser Output
REST SOAP
Reads GET and HEAD transactions List, Get, and Read transactions
Writes PUT and POST transactions Create, Set, Update, and Version Transactions
Response <WSStat>
<Node name="deuce.lss.emc.com"/>
<ReadsPerSec>0.00</ReadsPerSec>
<WritesPerSec>0.00</WritesPerSec>
<DeletesPerSec>0.00</DeletesPerSec>
<TransPerSec>0.00</TransPerSec>
<MeanReadLatencyMS>0.000</MeanReadLatencyMS>
<MeanWriteLatencyMS>0.000</MeanWriteLatencyMS>
<MeanLatencyMS>0.000</MeanLatencyMS>
<Reads>0</Reads>
<Writes>0</Writes>
<Deletes>0</Deletes>
<Total>0</Total>
<ReadLatencyMS>0</ReadLatencyMS>
<WriteLatencyMS>0</WriteLatencyMS>
<DeleteLatencyMS>0</DeleteLatencyMS>
<UptimeMS>0</UptimeMS>
</WSStat>
* Closing connection #0
Atmos MIB
atmosMibMajorVersion
OID: 1.3.6.1.4.1.1139.16.3.1.1
The major version of the MIB this SNMP agent implemented.
atmosMibMinorVersion
OID: 1.3.6.1.4.1.1139.16.3.1.2
The minor version of the MIB this SNMP agent implemented.
atmosVersion
OID: 1.3.6.1.4.1.1139.16.3.10.1
Atmos software version currently installed, e.g., '1.3.0-b48080'.
atmosNodeCapacityStorageCapacity
OID: 1.3.6.1.4.1.1139.16.3.80.1
The scalar value of the storage capacity on the current node which is
capable for the client.
atmosNodeCapacityStorageCapacityUnit
OID: 1.3.6.1.4.1.1139.16.3.80.2
The data unit for the scalar value of the storage capacity on the
current node which is capable for the client.
atmosNodeCapacityStorageUsed
OID: 1.3.6.1.4.1.1139.16.3.80.3
The scalar value of the occupied storage space by the client on the
current node, including both Metadata and Data.
atmosNodeCapacityStorageUsedUnit
OID: 1.3.6.1.4.1.1139.16.3.80.4
The data unit for the scalar value of the occupied storage space by the
client on the current node, including both Metadata and Data.
atmosNodeCapacityStorageAvailable
OID: 1.3.6.1.4.1.1139.16.3.80.5
The scalar value of the available storage space on the current node for
the client.
atmosNodeCapacityStorageAvailableUnit
OID: 1.3.6.1.4.1.1139.16.3.80.6
The data unit for the scalar value of the available storage space on the
current node for the client.
atmosNodeCapacityStoragePercentUsed
OID: 1.3.6.1.4.1.1139.16.3.80.7
The occupied storage space by the client in percentage on the current
node, including both Metadata and Data.
atmosNodeCapacityMetadataCapacity
OID: 1.3.6.1.4.1.1139.16.3.80.8
The scalar value of the storage capacity for Metadata on the current
node.
atmosNodeCapacityMetadataCapacityUnit
OID: 1.3.6.1.4.1.1139.16.3.80.9
The data unit for the scalar value of the storage capacity for Metadata
on the current node.
atmosNodeCapacityMetadataUsed
OID: 1.3.6.1.4.1.1139.16.3.80.10
The scalar value of the occupied storage space by Metadata on the
current node.
atmosNodeCapacityMetadataUsedUnit
OID: 1.3.6.1.4.1.1139.16.3.80.11
The data unit for the scalar value of the occupied storage space by
Metadata on the current node.
atmosNodeCapacityMetadataAvailable
OID: 1.3.6.1.4.1.1139.16.3.80.12
The scalar value of the available storage space for Metadata on the
current node.
atmosNodeCapacityMetadataAvailableUnit
OID: 1.3.6.1.4.1.1139.16.3.80.13
The data unit for the scalar value of the available storage space for
Metadata on the current node.
atmosNodeCapacityMetadataPercentUsed
OID: 1.3.6.1.4.1.1139.16.3.80.14
The occupied storage space by Metadata in percentage on the current
node.
atmosNodeCapacityDataCapacity
OID: 1.3.6.1.4.1.1139.16.3.80.15
The scalar value of the storage capacity for Data on current node.
atmosNodeCapacityDataCapacityUnit
OID: 1.3.6.1.4.1.1139.16.3.80.16
The data unit for the scalar value of the storage capacity for Data on
current node.
atmosNodeCapacityDataUsed
OID: 1.3.6.1.4.1.1139.16.3.80.17
The scalar value of the occupied storage space by Data on the current
node.
atmosNodeCapacityDataUsedUnit
OID: 1.3.6.1.4.1.1139.16.3.80.18
The data unit for the scalar value of the occupied storage space by
Data on the current node.
atmosNodeCapacityDataAvailable
OID: 1.3.6.1.4.1.1139.16.3.80.19
The scalar value of the available storage space for Data on the current
node.
atmosNodeCapacityDataAvailableUnit
OID: 1.3.6.1.4.1.1139.16.3.80.20
The data unit for the scalar value of the available storage space for
Data on current node.
atmosNodeCapacityDataPercentUsed
OID: 1.3.6.1.4.1.1139.16.3.80.21
The occupied storage space by Data in percentage on the current
node.
atmosServiceActiveEntries
OID: 1.3.6.1.4.1.1139.16.3.90.1
The number of available Atmos services in the system.
atmosServiceTable
OID: 1.3.6.1.4.1.1139.16.3.90.2
A table defining each Atmos service's detail status entry.
atmosServiceEntry
OID: 1.3.6.1.4.1.1139.16.3.90.2.1
An entry describing a given Atmos service's detail status information.
atmosServiceIndex
OID: 1.3.6.1.4.1.1139.16.3.90.2.1.1
The index for a given Service status instance.
atmosServiceName
OID: 1.3.6.1.4.1.1139.16.3.90.2.1.2
The name of the Atmos service.
atmosServiceStatus
OID: 1.3.6.1.4.1.1139.16.3.90.2.1.3
The current status of the Atmos service.
atmosServiceLatency
OID: 1.3.6.1.4.1.1139.16.3.90.2.1.4
The latency of the Atmos service in microseconds.
atmosServiceOid
OID: 1.3.6.1.4.1.1139.16.3.90.2.1.5
The corresponding OID of the Atmos service, which can be queried to
get more details about the service. If not applicable, should set as .0.
atmosServiceMemoryUsed
OID: 1.3.6.1.4.1.1139.16.3.90.2.1.6
The memory used by the Atmos service.
atmosServiceMemoryUsedUnit
OID: 1.3.6.1.4.1.1139.16.3.90.2.1.7
The data unit for the memory used by the Atmos service.
atmosMDSUpmasterCount
OID: 1.3.6.1.4.1.1139.16.3.100.1
The number of masters for replication.
atmosMDSContainerCount
OID: 1.3.6.1.4.1.1139.16.3.100.2
The number of containers.
atmosMDSReplicaGroupCount
OID: 1.3.6.1.4.1.1139.16.3.100.3
The number of replication groups.
atmosSSDestageStatus
OID: 1.3.6.1.4.1.1139.16.3.110.1
Currently destage status of the Atmos Storage Service.
atmosJSQueueStatus
OID: 1.3.6.1.4.1.1139.16.3.120.1
Current status of the Job Service queue.
atmosJSQueueLength
OID: 1.3.6.1.4.1.1139.16.3.120.2
The length of the Job Service queue.
atmosJSRecoverQueueLength
OID: 1.3.6.1.4.1.1139.16.3.120.3
The number of jobs on the Job Service recover queue.
atmosJSRecoverDequeueRate
OID: 1.3.6.1.4.1.1139.16.3.120.5
The rate of jobs being dequeued from the Job Service recover queue,
in jobs per second.
atmosJSRecoverByteRate
OID: 1.3.6.1.4.1.1139.16.3.120.6
The rate of Job Service recovery data transferred.
atmosJSReclaimQueueLength
OID: 1.3.6.1.4.1.1139.16.3.120.7
The number of jobs on the Job Service reclaim queue.
atmosJSReclaimDequeueRate
OID: 1.3.6.1.4.1.1139.16.3.120.9
The rate of jobs being dequeued from the Job Service reclaim queue,
in jobs per second.
atmosJSReclaimByteRate
OID: 1.3.6.1.4.1.1139.16.3.120.10
The rate of Job Service reclamation data transferred.
atmosJSReplicateQueueLength
OID: 1.3.6.1.4.1.1139.16.3.120.11
The number of jobs on the Job Service replicate queue.
atmosJSReplicateDequeueRate
OID: 1.3.6.1.4.1.1139.16.3.120.13
The rate of jobs being dequeued from the Job Service replicate queue,
in jobs per second.
atmosJSReplicateByteRate
OID: 1.3.6.1.4.1.1139.16.3.120.14
The rate of Job Service replication data transferred.
atmosJSVerifyQueueLength
OID: 1.3.6.1.4.1.1139.16.3.120.18
The number of jobs on the Job Service verify queue.
atmosJSVerifyDequeueRate
OID: 1.3.6.1.4.1.1139.16.3.120.20
The rate of jobs being dequeued from the Job Service verify queue, in
jobs per second.
atmosJSVerifyByteRate
OID: 1.3.6.1.4.1.1139.16.3.120.21
The rate of Job Service verification data transferred.
atmosWSReadsPerSec
OID: 1.3.6.1.4.1.1139.16.3.140.1
The number of reads per second from the web service interface for
the current node.
atmosWSWritesPerSec
OID: 1.3.6.1.4.1.1139.16.3.140.2
The number of writes per second from the web service interface for
the current node.
atmosWSDeletesPerSec
OID: 1.3.6.1.4.1.1139.16.3.140.3
The number of deletes per second from the web service interface for
the current node.
atmosWSTransPerSec
OID: 1.3.6.1.4.1.1139.16.3.140.4
The number of transactions per second from the web service interface
for the current node.
atmosNotificationVariables
OID: 1.3.6.1.4.1.1139.16.3.1000.1
atmosNotificationNode
OID: 1.3.6.1.4.1.1139.16.3.1000.1.1
The name of the Atmos node that generated the notification.
atmosNotificationNodeUUID
OID: 1.3.6.1.4.1.1139.16.3.1000.1.2
The UUID of the Atmos node that generated the notification.
atmosNotificationOID
OID: 1.3.6.1.4.1.1139.16.3.1000.1.3
The OID that was used to identity the object which caused this
notification. If not applicable, should set as .0.
atmosNotificationCurrentStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.1.4
The current status of the object which caused this notification.
atmosNotificationPreviousStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.1.5
The previous status of the object which caused this notification.
atmosNotificationMessage
OID: 1.3.6.1.4.1.1139.16.3.1000.1.6
Detail message for this notification.
atmosNotificationCpuUsage
OID: 1.3.6.1.4.1.1139.16.3.1000.101
This notification is used to report the CPU usage status change on the
system.
atmosNotificationMemoryUsage
OID: 1.3.6.1.4.1.1139.16.3.1000.102
This notification is used to report the physical memory usage status
change on the system.
atmosNotificationSwapUsage
OID: 1.3.6.1.4.1.1139.16.3.1000.103
This notification is used to report the swap usage status change on
the system.
atmosNotificationFilesystemUsage
OID: 1.3.6.1.4.1.1139.16.3.1000.104
This notification is used to report the file system disk space usage
status change.
atmosNotificationServiceMemoryUsage
OID: 1.3.6.1.4.1.1139.16.3.1000.105
This notification is used to report the Atmos service memory usage
status change on the system.
atmosNotificationServiceStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.106
This notification is used to report the Atmos service status change.
atmosNotificationInternalCarrierStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.107
This notification is used to report the internal carrier status change,
e.g., eth0 is disconnected.
atmosNotificationExternalCarrierStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.108
This notification is used to report the external carrier status change,
e.g., eth1 is disconnected.
atmosNotificationNodeStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.109
This notification is used to report the Atmos node status change.
atmosNotificationSegmentStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.110
This notification is used to report the Atmos segment status change.
atmosNotificationRMGStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.111
This notification is used to report the Atmos RMG status change.
atmosNotificationPolicySyncFailed
OID: 1.3.6.1.4.1.1139.16.3.1000.112
This notification is used to report the policy distribution failure.
atmosNotificationUidSyncFailed
OID: 1.3.6.1.4.1.1139.16.3.1000.113
This notification is used to report the UID distribution failure.
atmosNotificationDAEStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.114
This notification is used to report the DAE status change of the
system.
atmosNotificationDAEBackplaneStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.115
This notification is used to report the DAE backplane status change of
the system.
atmosNotificationDAEFanStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.116
This notification is used to report the DAE fan status change of the
system.
atmosNotificationDAETempStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.117
This notification is used to report the DAE temperature status change
of the system.
atmosNotificationDiskStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.118
This notification is used to report the disk status change of the
system.
atmosNotificationPolicyResourceStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.119
This notification is used to report the policy resource status of the
system.
atmosNotificationMgmtDBStatus
OID: 1.3.6.1.4.1.1139.16.3.1000.120
This notification is used to report the policy resource failure of the
system.
atmosNotificationDiskRecovery
OID: 1.3.6.1.4.1.1139.16.3.1000.121
This notification is used to report a file system's critical state, trigger
recovery.
atmosNotificationVIPFailover
OID: 1.3.6.1.4.1.1139.16.3.1000.122
This notification is used to report a VIP failover event.
atmosMibVersionGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.1
Atmos MIB version group.
atmosSoftwareVersionGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.2
Atmos software version group.
atmosNodeCapacityGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.9
Atmos node capacity group.
atmosServiceGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.10
Atmos service group.
atmosMetadataServiceGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.11
Atmos metadata service group.
atmosStorageServiceGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.12
Atmos storage service group.
atmosJobServiceGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.13
Atmos job service group.
atmosWebServiceGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.15
Atmos web service group.
atmosNotificationVariableGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.19
Atmos notification variables group.
atmosNotificationGroup
OID: 1.3.6.1.4.1.1139.16.3.2000.20
Atmos notification group.
atmosCompliance
OID: 1.3.6.1.4.1.1139.16.3.2010.1
MIB II overview
The descriptions of each of the MIB variables in this chapter come
directly from the MIB-II itself.
Textual conventions
Table 14 lists the textual conventions used for MIB-II.
System group
All systems must implement the System group. If an agent is not
configured to have a value for any of the System group variables, a
string of length 0 is returned.
sysDescr
OID: 1.3.6.1.2.1.1.1
A textual description of the entity. This value should include the full
name and version identification of the system's hardware type,
software operating-system, and networking software. It is mandatory
that this only contain printable ASCII characters.
sysObjectID
OID: 1.3.6.1.2.1.1.2
The vendor's authoritative identification of the network management
subsystem contained in the entity. This value is allocated within the
SMI enterprises subtree (1.3.6.1.4.1) and provides an easy and
unambiguous means for determining `what kind of box' is being
managed. For example, if vendor `Flintstones, Inc.' was assigned the
subtree 1.3.6.1.4.1.4242, it could assign the identifier
1.3.6.1.4.1.4242.1.1 to its `Fred Router'.
sysUpTime
OID: 1.3.6.1.2.1.1.3
The time (in hundredths of a second) since the network management
portion of the system was last reinitialized.
sysContact
OID: 1.3.6.1.2.1.1.4
The textual identification of the contact person for this managed
node, together with information on how to contact this person.
sysName
OID: 1.3.6.1.2.1.1.5
An administratively-assigned name for this managed node. By
convention, this is the node’s fully qualified domain name.
sysLocation
OID: 1.3.6.1.2.1.1.6
The physical location of this node (for example, telephone closet, 3rd
floor).
sysServices
OID: 1.3.6.1.2.1.1.7
A value which indicates the set of services that this entity primarily
offers. The value is a sum. This sum initially takes the value zero.
Then, for each layer, L, in the range 1 through 7, that this node
performs transactions for, 2 raised to (L - 1) is added to the sum. For
example, a node which primarily performs routing functions has a
value of 4 (23-1). In contrast, a node that is a host and offers
application services has a value of 72 (24-1 + 27-1).
Note that in the context of the Internet suite of protocols, values
should be calculated accordingly:
Layer functionality
1 = physical (for example, repeaters)
2 = datalink/subnetwork (for example, bridges)
3 = internet (for example, IP gateways)
4 = end-to-end (for example, IP hosts)
7 = applications (for example, mail relays)
For systems including OSI protocols, layers 5 and 6 also can be
counted.
Interfaces group
Implementation of the Interfaces group is mandatory for all systems.
ifNumber
OID: 1.3.6.1.2.1.2.1
The number of network interfaces (regardless of their current state)
present on this system.
ifTable
OID: 1.3.6.1.2.1.2.2
A list of interface entries. The number of entries is given by the value
of ifNumber.
ifEntry
OID: 1.3.6.1.2.1.2.2.1
An interface entry containing objects at the subnetwork layer and
below for a particular interface.
ifIndex
OID: 1.3.6.1.2.1.2.2.1.1
A unique value for each interface. Its value ranges between 1 and the
value of ifNumber. The value for each interface must remain constant
at least from one re-initialization of the entity's network management
system to the next re- initialization.
ifDescr
OID: 1.3.6.1.2.1.2.2.1.2
A textual string containing information about the interface. This
string should include the name of the manufacturer, the product
name and the version of the hardware interface.
ifType
OID: 1.3.6.1.2.1.2.2.1.3
The type of interface, distinguished according to the physical/link
protocol(s) immediately `below' the network layer in the protocol
stack.
ifMtu
OID: 1.3.6.1.2.1.2.2.1.4
The size of the largest datagram which can be sent/received on the
interface, specified in octets. For interfaces that are used for
transmitting network datagrams, this is the size of the largest
network datagram that can be sent on the interface.
ifSpeed
OID: 1.3.6.1.2.1.2.2.1.5
An estimate of the interface's current bandwidth in bits per second.
For interfaces which do not vary in bandwidth or for those where no
accurate estimation can be made, this object should contain the
nominal bandwidth.
ifPhysAddress
OID: 1.3.6.1.2.1.2.2.1.6
The interface's address at the protocol layer immediately `below' the
network layer in the protocol stack. For interfaces which do not have
such an address (e.g., a serial line), this object should contain an octet
string of zero length.
ifAdminStatus
OID: 1.3.6.1.2.1.2.2.1.7
The desired state of the interface. The testing (3) state indicates that
no operational packets can be passed.
ifOperStatus
OID: 1.3.6.1.2.1.2.2.1.8
The current operational state of the interface. The testing (3) state
indicates that no operational packets can be passed.
ifLastChange
OID: 1.3.6.1.2.1.2.2.1.9
The value of sysUpTime at the time the interface entered its current
operational state. If the current state was entered prior to the last
re-initialization of the local network management subsystem, then
this object contains a zero value.
ifInOctets
OID: 1.3.6.1.2.1.2.2.1.10
The total number of octets received on the interface, including
framing characters.
ifInUcastPkts
OID: 1.3.6.1.2.1.2.2.1.11
The number of subnetwork-unicast packets delivered to a
higher-layer protocol.
ifInNUcastPkts
OID: 1.3.6.1.2.1.2.2.1.12
The number of nonunicast packets (for example,
subnetwork-broadcast or subnetwork-multicast) delivered to a
higher-layer protocol.
ifInDiscards
OID: 1.3.6.1.2.1.2.2.1.13
The number of inbound packets which were chosen to be discarded
even though no errors had been detected to prevent their being
deliverable to a higher-layer protocol. One possible reason for
discarding such a packet could be to free up buffer space.
ifInErrors
OID: 1.3.6.1.2.1.2.2.1.14
The number of inbound packets that contained errors preventing
them from being deliverable to a higher-layer protocol.
ifInUnknownProtos
OID: 1.3.6.1.2.1.2.2.1.15
The number of packets received via the interface which were
discarded because of an unknown or unsupported protocol.
ifOutOctets
OID: 1.3.6.1.2.1.2.2.1.16
The total number of octets transmitted out of the interface, including
framing characters.
ifOutUcastPkts
OID: 1.3.6.1.2.1.2.2.1.17
The total number of packets that were requested, by higher-level
protocols, to be transmitted to a subnetwork-unicast address,
including those that were discarded or not sent.
ifOutNUcastPkts
OID: 1.3.6.1.2.1.2.2.1.18
he total number of packets that higher-level protocols requested be
transmitted to a non- unicast (i.e., a subnetwork-broadcast or
subnetwork-multicast) address, including those that were discarded
or not sent.
ifOutDiscards
OID: 1.3.6.1.2.1.2.2.1.19
The number of outbound packets which were chosen to be discarded
even though no errors had been detected to prevent their being
transmitted. One possible reason for discarding such a packet could
be to free up buffer space.
ifOutErrors
OID: 1.3.6.1.2.1.2.2.1.20
The number of outbound packets that could not be transmitted
because of errors.
ifOutQLen
OID: 1.3.6.1.2.1.2.2.1.21
The length of the output packet queue (in packets).
ifSpecific
OID: 1.3.6.1.2.1.2.2.1.22
A reference to MIB definitions specific to the particular media being
used to realize the interface. For example, if the interface is realized
by an ethernet, then the value of this object refers to a document
defining objects specific to ethernet. If this information is not present,
its value should be set to the OBJECT IDENTIFIER { 0 0 }, which is a
syntatically valid object identifier, and any conformant
implementation of ASN.1 and BER must be able to generate and
recognize this value.
AT Group
Implementation of the Address Translation group is mandatory for
all systems. Note, however, that this group is deprecated by MIB-II.
From MIB-II onward, each network protocol group contains its own
address translation tables.
atTable
OID: 1.3.6.1.2.1.3.1
The Address Translation tables contain the NetworkAddress to
`physical' address equivalences. Some interfaces do not use
translation tables for determining address equivalences (e.g.,
DDN-X.25 has an algorithmic method); if all interfaces are of this
type, then the Address Translation table is empty, i.e., has zero
entries.
atEntry
OID: 1.3.6.1.2.1.3.1.1
Each entry contains one network address to physical address
equivalence.
atIfIndex
OID: 1.3.6.1.2.1.3.1.1.1
The interface on which this entry's equivalence is effective. The
interface identified by a particular value of this index is the same
interface as identified by the same value of ifIndex.
atPhysAddress
OID: 1.3.6.1.2.1.3.1.1.2
The media-dependent `physical' address. Setting this object to a null
string (one of zero length) has the effect of invaliding the
corresponding entry in the atTable object. That is, it effectively
dissasociates the interface identified with said entry from the
mapping identified with said entry. It is an implementation-specific
matter as to whether the agent removes an invalidated entry from the
table. Accordingly, management stations must be prepared to receive
tabular information from agents that corresponds to entries not
currently in use. Proper interpretation of such entries requires
examination of the relevant atPhysAddress object.
atNetAddress
OID: 1.3.6.1.2.1.3.1.1.3
The NetworkAddress (e.g., the IP address) corresponding to the
media-dependent `physical' address.
IP group
Implementation of the IP group is mandatory for all systems.
ipForwarding
OID: 1.3.6.1.2.1.4.1
The indication of whether this entity is acting as an IP gateway in
respect to the forwarding of datagrams received by, but not
addressed to, this entity. IP gateways forward datagrams. IP hosts do
not (except those source-routed via the host). Note that for some
managed nodes, this object may take on only a subset of the values
IP group 187
MIB-II (RFC 1213)
ipDefaultTTL
OID: 1.3.6.1.2.1.4.2
The default value inserted into the Time-To-Live field of the IP header
of datagrams originated at this entity, whenever a TTL value is not
supplied by the transport layer protocol.
ipInReceives
OID: 1.3.6.1.2.1.4.3
The total number of input datagrams received from interfaces,
including those received in error.
ipInHdrErrors
OID: 1.3.6.1.2.1.4.4
The number of input datagrams discarded due to errors in their IP
headers, including bad checksums, version number mismatch, other
format errors, time-to-live exceeded, errors discovered in processing
their IP options, etc.
ipInAddrErrors
OID: 1.3.6.1.2.1.4.5
The number of input datagrams discarded because the IP address in
their IP header's destination field was not a valid address to be
received at this entity. This count includes invalid addresses (e.g.,
0.0.0.0) and addresses of unsupported Classes (e.g., Class E). For
entities which are not IP Gateways and therefore do not forward
datagrams, this counter includes datagrams discarded because the
destination address was not a local address.
ipForwDatagrams
OID: 1.3.6.1.2.1.4.6
The number of input datagrams for which this entity was not their
final IP destination, as a result of which an attempt was made to find
a route to forward them to that final destination. In entities which do
not act as IP Gateways, this counter will include only those packets
which were Source-Routed via this entity, and the Source- Route
option processing was successful.
ipInUnknownProtos
OID: 1.3.6.1.2.1.4.7
The number of locally-addressed datagrams received successfully but
discarded because of an unknown or unsupported protocol.
ipInDiscards
OID: 1.3.6.1.2.1.4.8
The number of input IP datagrams for which no problems were
encountered to prevent their continued processing, but which were
discarded (e.g., for lack of buffer space). Note that this counter does
not include any datagrams discarded while awaiting re-assembly.
ipInDelivers
OID: 1.3.6.1.2.1.4.9
The total number of input datagrams successfully delivered to IP
user-protocols (including ICMP).
ipOutRequests
OID: 1.3.6.1.2.1.4.10
The total number of IP datagrams which local IP user-protocols
(including ICMP) supplied to IP in requests for transmission. Note
that this counter does not include any datagrams counted in
ipForwDatagrams.
IP group 189
MIB-II (RFC 1213)
ipOutDiscards
OID: 1.3.6.1.2.1.4.11
The number of output IP datagrams for which no problem was
encountered to prevent their transmission to their destination, but
which were discarded (e.g., for lack of buffer space). Note that this
counter would include datagrams counted in ipForwDatagrams if
any such packets met this (discretionary) discard criterion.
ipOutNoRoutes
OID: 1.3.6.1.2.1.4.12
The number of IP datagrams discarded because no route could be
found to transmit them to their destination. Note that this counter
includes any packets counted in ipForwDatagrams which meet this
`no-route' criterion. Note that this includes any datagarms which a
host cannot route because all of its default gateways are down..
ipReasmTimeout
OID: 1.3.6.1.2.1.4.13
The maximum number of seconds which received fragments are held
while they are awaiting reassembly at this entity.
ipReasmReqds
OID: 1.3.6.1.2.1.4.14
The number of IP fragments received which needed to be
reassembled at this entity.
ipReasmOKs
OID: 1.3.6.1.2.1.4.15
The number of IP datagrams successfully re- assembled.
ipReasmFails
OID: 1.3.6.1.2.1.4.16
The number of failures detected by the IP re- assembly algorithm (for
whatever reason: timed out, errors, etc). Note that this is not
necessarily a count of discarded IP fragments since some algorithms
(notably the algorithm in RFC 815) can lose track of the number of
fragments by combining them as they are received.
ipFragOKs
OID: 1.3.6.1.2.1.4.17
The number of IP datagrams that have been successfully fragmented
at this entity.
ipFragFails
OID: 1.3.6.1.2.1.4.18
The number of IP datagrams that have been discarded because they
needed to be fragmented at this entity but could not be, e.g., because
their Don't Fragment flag was set.
ipFragCreates
OID: 1.3.6.1.2.1.4.19
The number of IP datagram fragments that have been generated as a
result of fragmentation at this entity.
ipAddrTable
OID: 1.3.6.1.2.1.4.20
The table of addressing information relevant to this entity's IP
addresses.
IP group 191
MIB-II (RFC 1213)
ipAddrEntry
OID: 1.3.6.1.2.1.4.20.1
The addressing information for one of this entity's IP addresses.
ipAdEntAddr
OID: 1.3.6.1.2.1.4.20.1.1
The IP address to which this entry's addressing information pertains.
ipAdEntIfIndex
OID: 1.3.6.1.2.1.4.20.1.2
The index value which uniquely identifies the interface to which this
entry is applicable. The interface identified by a particular value of
this index is the same interface as identified by the same value of
ifIndex.
ipAdEntNetMask
OID: 1.3.6.1.2.1.4.20.1.3
The subnet mask associated with the IP address of this entry. The
value of the mask is an IP address with all the network bits set to 1
and all the hosts bits set to 0.
ipAdEntBcastAddr
OID: 1.3.6.1.2.1.4.20.1.4
The value of the least-significant bit in the IP broadcast address used
for sending datagrams on the (logical) interface associated with the IP
address of this entry. For example, when the Internet standard
all-ones broadcast address is used, the value will be 1. This value
applies to both the subnet and network broadcasts addresses used by
the entity on this (logical) interface.
ipAdEntReasmMaxSize
OID: 1.3.6.1.2.1.4.20.1.5
The size of the largest IP datagram which this entity can re-assemble
from incoming IP fragmented datagrams received on this interface.
ipRouteTable
OID: 1.3.6.1.2.1.4.21
This entity's IP Routing table.
ipRouteEntry
OID: 1.3.6.1.2.1.4.21.1
A route to a particular destination.
ipRouteDest
OID: 1.3.6.1.2.1.4.21.1.1
The destination IP address of this route. An entry with a value of
0.0.0.0 is considered a default route. Multiple routes to a single
destination can appear in the table, but access to such multiple entries
is dependent on the table- access mechanisms defined by the network
management protocol in use.
ipRouteIfIndex
OID: 1.3.6.1.2.1.4.21.1.2
The index value which uniquely identifies the local interface through
which the next hop of this route should be reached. The interface
identified by a particular value of this index is the same interface as
identified by the same value of ifIndex.
IP group 193
MIB-II (RFC 1213)
ipRouteMetric1
OID: 1.3.6.1.2.1.4.21.1.3
The primary routing metric for this route. The semantics of this
metric are determined by the routing-protocol specified in the route's
ipRouteProto value. If this metric is not used, its value should be set
to -1.
ipRouteMetric2
OID: 1.3.6.1.2.1.4.21.1.4
An alternate routing metric for this route. The semantics of this
metric are determined by the routing-protocol specified in the route's
ipRouteProto value. If this metric is not used, its value should be set
to -1.
ipRouteMetric3
OID: 1.3.6.1.2.1.4.21.1.5
An alternate routing metric for this route. The semantics of this
metric are determined by the routing-protocol specified in the route's
ipRouteProto value. If this metric is not used, its value should be set
to -1.
ipRouteMetric4
OID: 1.3.6.1.2.1.4.21.1.6
An alternate routing metric for this route. The semantics of this
metric are determined by the routing-protocol specified in the route's
ipRouteProto value. If this metric is not used, its value should be set
to -1.
ipRouteNextHop
OID: 1.3.6.1.2.1.4.21.1.7
The IP address of the next hop of this route. (In the case of a route
bound to an interface which is realized via a broadcast media, the
value of this field is the agent's IP address on that interface.)
ipRouteType
OID: 1.3.6.1.2.1.4.21.1.8
The type of route. Note that the values direct(3) and indirect(4) refer
to the notion of direct and indirect routing in the IP architecture.
Setting this object to the value invalid(2) has the effect of invalidating
the corresponding entry in the ipRouteTable object. That is, it
effectively dissasociates the destination identified with said entry
from the route identified with said entry. It is an
implementation-specific matter as to whether the agent removes an
invalidated entry from the table. Accordingly, management stations
must be prepared to receive tabular information from agents that
corresponds to entries not currently in use. Proper interpretation of
such entries requires examination of the relevant ipRouteType object.
ipRouteProto
OID: 1.3.6.1.2.1.4.21.1.9
The routing mechanism via which this route was learned. Inclusion
of values for gateway routing protocols is not intended to imply that
hosts should support those protocols.
ipRouteAge
OID: 1.3.6.1.2.1.4.21.1.10
The number of seconds since this route was last updated or otherwise
determined to be correct. Note that no semantics of `too old' can be
implied except through knowledge of the routing protocol by which
the route was learned.
ipRouteMask
OID: 1.3.6.1.2.1.4.21.1.11
The mask to be logical-ANDed with the destination address before
being compared to the value in the ipRouteDest field. For those
systems that do not support arbitrary subnet masks, an agent
constructs the value of the ipRouteMask by determining whether the
IP group 195
MIB-II (RFC 1213)
ipRouteMetric5
OID: 1.3.6.1.2.1.4.21.1.12
An alternate routing metric for this route. The semantics of this
metric are determined by the routing-protocol specified in the route's
ipRouteProto value. If this metric is not used, its value should be set
to -1.
ipRouteInfo
OID: 1.3.6.1.2.1.4.21.1.13
A reference to MIB definitions specific to the particular routing
protocol which is responsible for this route, as determined by the
value specified in the route's ipRouteProto value. If this information
is not present, its value should be set to the OBJECT IDENTIFIER { 0 0
}, which is a syntatically valid object identifier, and any conformant
implementation of ASN.1 and BER must be able to generate and
recognize this value.
ipNetToMediaTable
OID: 1.3.6.1.2.1.4.22
The IP Address Translation table used for mapping from IP addresses
to physical addresses.
ipNetToMediaEntry
OID: 1.3.6.1.2.1.4.22.1
Each entry contains one IP address to physical address equivalence.
ipNetToMediaIfIndex
OID: 1.3.6.1.2.1.4.22.1.1
The interface on which this entry's equivalence is effective. The
interface identified by a particular value of this index is the same
interface as identified by the same value of ifIndex.
ipNetToMediaPhysAddress
OID: 1.3.6.1.2.1.4.22.1.2
The media-dependent physical address.
ipNetToMediaNetAddress
OID: 1.3.6.1.2.1.4.22.1.3
The IpAddress corresponding to the media-dependent physical
address.
ipNetToMediaType
OID: 1.3.6.1.2.1.4.22.1.4
The type of mapping.
Setting this object to the value invalid(2) has the effect of invalidating
the corresponding entry in the ipNetToMediaTable. That is, it
effectively dissasociates the interface identified with said entry from
the mapping identified with said entry. It is an
implementation-specific matter as to whether the agent removes an
invalidated entry from the table. Accordingly, management stations
must be prepared to receive tabular information from agents that
corresponds to entries not currently in use. Proper interpretation of
such entries requires examination of the relevant ipNetToMediaType
object.
IP group 197
MIB-II (RFC 1213)
ipRoutingDiscards
OID: 1.3.6.1.2.1.4.23
The number of routing entries which were chosen to be discarded
even though they are valid. One possible reason for discarding such
an entry could be to free-up buffer space for other routing entries.
ICMP group
Implementation of the ICMP group is mandatory for all systems.
icmpInMsgs
OID: 1.3.6.1.2.1.5.1
The total number of ICMP messages which the entity received. Note
that this counter includes all those counted by icmpInErrors.
icmpInErrors
OID: 1.3.6.1.2.1.5.2
The number of ICMP messages which the entity received but
determined as having ICMP-specific errors (bad ICMP checksums,
bad length, etc.).
icmpInDestUnreachs
OID: 1.3.6.1.2.1.5.3
The number of ICMP Destination Unreachable messages received.
icmpInTimeExcds
OID: 1.3.6.1.2.1.5.4
The number of ICMP Time Exceeded messages received.
icmpInParmProbs
OID: 1.3.6.1.2.1.5.5
The number of ICMP Parameter Problem messages received.
icmpInSrcQuenchs
OID: 1.3.6.1.2.1.5.6
The number of ICMP Source Quench messages received.
icmpInRedirects
OID: 1.3.6.1.2.1.5.7
The number of ICMP Redirect messages received.
icmpInEchos
OID: 1.3.6.1.2.1.5.8
The number of ICMP Echo (request) messages received.
icmpInEchoReps
OID: 1.3.6.1.2.1.5.9
The number of ICMP Echo Reply messages received.
icmpInTimestamps
OID: 1.3.6.1.2.1.5.10
The number of ICMP Timestamp (request) messages received.
icmpInTimestampReps
OID: 1.3.6.1.2.1.5.11
The number of ICMP Timestamp Reply messages received.
icmpInAddrMasks
OID: 1.3.6.1.2.1.5.12
The number of ICMP Address Mask Request messages received.
icmpInAddrMaskReps
OID: 1.3.6.1.2.1.5.13
The number of ICMP Address Mask Reply messages received.
icmpOutMsgs
OID: 1.3.6.1.2.1.5.14
The total number of ICMP messages which this entity attempted to
send. Note that this counter includes all those counted by
icmpOutErrors.
icmpOutErrors
OID: 1.3.6.1.2.1.5.15
The number of ICMP messages that this entity did not send due to
problems discovered within ICMP such as a lack of buffers. This
value should not include errors discovered outside the ICMP layer
such as the inability of IP to route the resultant datagram. In some
implementations there might be no types of error that contribute to
this counter's value.
icmpOutDestUnreachs
OID: 1.3.6.1.2.1.5.16
The number of ICMP Destination Unreachable messages sent.
icmpOutTimeExcds
OID: 1.3.6.1.2.1.5.17
The number of ICMP Time Exceeded messages sent.
icmpOutParmProbs
OID: 1.3.6.1.2.1.5.18
The number of ICMP Parameter Problem messages sent.
icmpOutSrcQuenchs
OID: 1.3.6.1.2.1.5.19
The number of ICMP Source Quench messages sent.
icmpOutRedirects
OID: 1.3.6.1.2.1.5.20
The number of ICMP Redirect messages sent. For a host, this object is
always zero, since hosts do not send redirects.
icmpOutEchos
OID: 1.3.6.1.2.1.5.21
The number of ICMP Echo (request) messages sent.
icmpOutEchoReps
OID: 1.3.6.1.2.1.5.22
The number of ICMP Echo Reply messages sent.
icmpOutTimestamps
OID: 1.3.6.1.2.1.5.23
The number of ICMP Timestamp (request) messages sent.
icmpOutTimestampReps
OID: 1.3.6.1.2.1.5.24
The number of ICMP Timestamp Reply messages sent.
icmpOutAddrMasks
OID: 1.3.6.1.2.1.5.25
The number of ICMP Address Mask Request messages sent.
icmpOutAddrMaskReps
OID: 1.3.6.1.2.1.5.26
The number of ICMP Address Mask Reply messages sent.
TCP group
Implementation of the TCP group is mandatory for all systems that
implement the TCP.
Instances of object types that represent information about a particular
TCP connection are transient; they persist only as long as the
connection in question.
tcpRtoAlgorithm
OID: 1.3.6.1.2.1.6.1
The algorithm used to determine the time-out value used for
retransmitting unacknowledged octets.
tcpRtoMin
OID: 1.3.6.1.2.1.6.2
The minimum value permitted by a TCP implementation for the
retransmission time-out, measured in milliseconds. More refined
semantics for objects of this type depend upon the algorithm used to
determine the retransmission time-out. In particular, when the
time-out algorithm is 3 (rsre), an object of this type has the semantics
of the LBOUND quantity described in RFC 793.
tcpRtoMax
OID: 1.3.6.1.2.1.6.3
The maximum value permitted by a TCP implementation for the
retransmission time-out, measured in milliseconds. More refined
semantics for objects of this type depend upon the algorithm used to
determine the retransmission time-out. In particular, when the
time-out algorithm is 3 (rsre), an object of this type has the semantics
of the UBOUND quantity described in RFC 793.
tcpMaxConn
OID: 1.3.6.1.2.1.6.4
The limit on the total number of TCP connections the entity can
support. In entities where the maximum number of connections is
dynamic, this object should contain the value -1.
tcpActiveOpens
OID: 1.3.6.1.2.1.6.5
The number of times TCP connections have made a direct transition
to the SYN-SENT state from the CLOSED state.
tcpPassiveOpens
OID: 1.3.6.1.2.1.6.6
The number of times TCP connections have made a direct transition
to the SYN-RCVD state from the LISTEN state.
tcpAttemptFails
OID: 1.3.6.1.2.1.6.7
The number of times TCP connections have made a direct transition
to the CLOSED state from either the SYN-SENT state or the
SYN-RCVD state, plus the number of times TCP connections have
made a direct transition to the LISTEN state from the SYN-RCVD
state.
tcpEstabResets
OID: 1.3.6.1.2.1.6.8
The number of times TCP connections have made a direct transition
to the CLOSED state from either the ESTABLISHED state or the
CLOSE-WAIT state.
tcpCurrEstab
OID: 1.3.6.1.2.1.6.9
The number of TCP connections for which the current state is either
ESTABLISHED or CLOSE-WAIT.
tcpInSegs
OID: 1.3.6.1.2.1.6.10
The total number of segments received, including those received in
error. This count includes segments received on currently established
connections.
tcpOutSegs
OID: 1.3.6.1.2.1.6.11
The total number of segments sent, including those on current
connections but excluding those containing only retransmitted octets.
tcpRetransSegs
1.3.6.1.2.1.6.12
The total number of segments retransmitted; that is, the number of
TCP segments transmitted containing one or more previously
transmitted octets.
tcpConnTable
OID: 1.3.6.1.2.1.6.13
A table containing TCP connection-specific information.
tcpConnEntry
OID: 1.3.6.1.2.1.6.13.1
Information about a particular current TCP connection. An object of
this type is transient, in that it ceases to exist when (or soon after) the
connection makes the transition to the CLOSED state.
tcpConnState
OID: 1.3.6.1.2.1.6.13.1.1
The state of this TCP connection.
The only value that might be set by a management station is
deleteTCB (12). Accordingly, it is appropriate for an agent to return a
badValue response if a management station attempts to set this object
to any other value.
If a management station sets this object to the value delete12 (TCB),
then this has the effect of deleting the TCB (as defined in RFC 793) of
the corresponding connection on the managed node, resulting in
immediate termination of the connection.
As an implementation-specific option, a RST segment might be sent
from the managed node to the other TCP endpoint (note, however,
that RST segments are not sent reliably).
tcpConnLocalAddress
OID: 1.3.6.1.2.1.6.13.1.2
The local IP address for this TCP connection. In the case of a
connection in the listen state that is willing to accept connections for
any IP interface associated with the node, the value 0.0.0.0 is used.
tcpConnLocalPort
OID: 1.3.6.1.2.1.6.13.1.3
The local port number for this TCP connection.
tcpConnRemAddress
OID: 1.3.6.1.2.1.6.13.1.4
The remote IP address for this TCP connection.
tcpConnRemPort
OID: 1.3.6.1.2.1.6.13.1.5
The remote port number for this TCP connection.
tcpInErrs
OID: 1.3.6.1.2.1.6.14
The total number of segments received in error (for example, bad
TCP checksums).
tcpOutRsts
OID: 1.3.6.1.2.1.6.15
The number of TCP segments sent containing the RST flag.
UDP group
Implementation of the UDP group is mandatory for all systems that
implement the UDP.
udpInDatagrams
OID: 1.3.6.1.2.1.7.1
The total number of UDP datagrams delivered to UDP users.
udpNoPorts
OID: 1.3.6.1.2.1.7.2
The total number of received UDP datagrams for which there was no
application at the destination port.
udpInErrors
OID: 1.3.6.1.2.1.7.3
The number of received UDP datagrams that could not be delivered
for reasons other than the lack of an application at the destination
port.
udpOutDatagrams
OID: 1.3.6.1.2.1.7.4
The total number of UDP datagrams sent from this entity.
udpTable
OID: 1.3.6.1.2.1.7.5
A table containing UDP listener information.
udpEntry
OID: 1.3.6.1.2.1.7.5.1
Information about a particular current UDP listener.
udpLocalAddress
OID: 1.3.6.1.2.1.7.5.1.1
The local IP address for this UDP listener. In the case of a UDP
listener that is willing to accept datagrams for any IP interface
associated with the node, the value 0.0.0.0 is used.
udpLocalPort
OID: 1.3.6.1.2.1.7.5.1.2
The local port number for this UDP listener.
EGP group
Implementation of the EGP group is mandatory for all systems which
implement the EGP.
egpInMsgs
OID: 1.3.6.1.2.1.8.1
The number of EGP messages received without error.
egpInErrors
OID: 1.3.6.1.2.1.8.2
The number of EGP messages received that proved to be in error.
egpOutMsgs
OID: 1.3.6.1.2.1.8.3
The total number of locally generated EGP messages.
egpOutErrors
OID: 1.3.6.1.2.1.8.4
The number of locally generated EGP messages not sent due to
resource limitations within an EGP entity.
egpNeighTable
OID: 1.3.6.1.2.1.8.5
The EGP neighbor table.
egpNeighEntry
OID: 1.3.6.1.2.1.8.5.1
Information about this entity's relationship with a particular EGP
neighbor.
egpNeighState
OID: 1.3.6.1.2.1.8.5.1.1
The EGP state of the local system with respect to this entry's EGP
neighbor. Each EGP state is represented by a value that is one greater
than the numerical value associated with said state in RFC 904.
egpNeighAddr
OID: 1.3.6.1.2.1.8.5.1.2
The IP address of this entry's EGP neighbor.
egpNeighAs
OID: 1.3.6.1.2.1.8.5.1.3
The autonomous system of this EGP peer. Zero should be specified if
the autonomous system number of the neighbor is not yet known.
egpNeighInMsgs
OID: 1.3.6.1.2.1.8.5.1.4
The number of EGP messages received without error from this EGP
peer.
egpNeighInErrs
OID: 1.3.6.1.2.1.8.5.1.5
The number of EGP messages received from this EGP peer that
proved to be in error (e.g., bad EGP checksum).
egpNeighOutMsgs
OID: 1.3.6.1.2.1.8.5.1.6
The number of locally generated EGP messages to this EGP peer.
egpNeighOutErrs
OID: 1.3.6.1.2.1.8.5.1.7
The number of locally generated EGP messages not sent to this EGP
peer due to resource limitations within an EGP entity.
egpNeighInErrMsgs
OID: 1.3.6.1.2.1.8.5.1.8
The number of EGP-defined error messages received from this EGP
peer.
egpNeighOutErrMsgs
OID: 1.3.6.1.2.1.8.5.1.9
The number of EGP-defined error messages sent to this EGP peer.
egpNeighStateUps
OID: 1.3.6.1.2.1.8.5.1.10
The number of EGP state transitions to the UP state with this EGP
peer.
egpNeighStateDowns
OID: 1.3.6.1.2.1.8.5.1.11
The number of EGP state transitions from the UP state to any other
state with this EGP peer.
egpNeighIntervalHello
OID: 1.3.6.1.2.1.8.5.1.12
The interval between EGP Hello command retransmissions (in
hundredths of a second). This represents the t1 timer as defined in
RFC 904.
egpNeighIntervalPoll
OID: 1.3.6.1.2.1.8.5.1.13
The interval between EGP poll command retransmissions (in
hundredths of a second). This represents the t3 timer as defined in
RFC 904.
egpNeighMode
OID: 1.3.6.1.2.1.8.5.1.14
The polling mode of this EGP entity, either passive or active.
egpNeighEventTrigger
OID: 1.3.6.1.2.1.8.5.1.15
A control variable used to trigger operator- initiated Start and Stop
events. When read, this variable always returns the most recent value
that egpNeighEventTrigger was set to. If it has not been set since the
last initialization of the network management subsystem on the node,
it returns a value of `stop'. When set, this variable causes a Start or
egpAs
OID: 1.3.6.1.2.1.8.6
The autonomous system number of this EGP entity.
Transmission group
Based on the transmission media underlying each interface on a
system, the corresponding portion of the Transmission group is
mandatory for that system.
When Internet-standard definitions for managing transmission
media are defined, the transmission group is used to provide a prefix
for the names of those objects.
Typically, such definitions reside in the experimental portion of the
MIB until they are "proven", then as a part of the Internet
standardization process, the definitions are accordingly elevated and
a new object identifier, under the transmission group is defined. By
convention, the name assigned is:
type OBJECT IDENTIFIER ::= { transmission number }
where "type" is the symbolic value used for the media in the ifType
column of the ifTable object, and "number" is the actual integer value
corresponding to the symbol.
SNMP group
Implementation of the SNMP group is mandatory for all systems that
support an SNMP protocol entity. Some of the objects defined next
are zero-valued in those SNMP implementations that are optimized
to support only those functions specific to either a management agent
or a management station. All of the objects that follow refer to an
SNMP entity, and there might be several SNMP entities residing on a
managed node (for example, if the node is acting as a management
station).
snmpInPkts
OID: 1.3.6.1.2.1.11.1
The total number of messages delivered to the SNMP entity from the
transport service.
snmpOutPkts
OID: 1.3.6.1.2.1.11.2
The total number of SNMP messages that were passed from the
SNMP protocol entity to the transport service.
snmpInBadVersions
OID: 1.3.6.1.2.1.11.3
The total number of SNMP messages that were delivered to the
SNMP protocol entity and were for an unsupported SNMP version.
snmpInBadCommunityNames
OID: 1.3.6.1.2.1.11.4
The total number of SNMP messages delivered to the SNMP protocol
entity that used a SNMP community name not known to said entity.
snmpInBadCommunityUses
OID: 1.3.6.1.2.1.11.5
The total number of SNMP messages delivered to the SNMP protocol
entity that represented an SNMP operation that was not allowed by
the SNMP community named in the message.
snmpInASNParseErrs
OID: 1.3.6.1.2.1.11.6
The total number of ASN.1 or BER errors encountered by the SNMP
protocol entity when decoding received SNMP messages.
snmpInTooBigs
OID: 1.3.6.1.2.1.11.8
The total number of SNMP PDUs that were delivered to the SNMP
protocol entity and for which the value of the error-status field is
“tooBig.”
snmpInNoSuchNames
OID: 1.3.6.1.2.1.11.9
The total number of SNMP PDUs that were delivered to the SNMP
protocol entity and for which the value of the error-status field is
“noSuchName.”
snmpInBadValues
OID: 1.3.6.1.2.1.11.10
The total number of SNMP PDUs that were delivered to the SNMP
protocol entity and for which the value of the error-status field is
“badValue.”
snmpInReadOnlys
OID: 1.3.6.1.2.1.11.11
The total number valid SNMP PDUs that were delivered to the
SNMP protocol entity and for which the value of the error-status field
is “readOnly.”
It is a protocol error to generate an SNMP PDU that contains the
value “readOnly” in the error-status field; as such, this object is
provided as a means of detecting incorrect implementations of the
SNMP.
snmpInGenErrs
OID: 1.3.6.1.2.1.11.12
The total number of SNMP PDUs that were delivered to the SNMP
protocol entity and for which the value of the error-status field is
“genErr.”
snmpInTotalReqVars
OID: 1.3.6.1.2.1.11.13
The total number of MIB objects that have been retrieved successfully
by the SNMP protocol entity as the result of receiving valid SNMP
Get-Request and Get-Next PDUs.
snmpInTotalSetVars
OID: 1.3.6.1.2.1.11.14
The total number of MIB objects that have been altered successfully
by the SNMP protocol entity as the result of receiving valid SNMP
Set-Request PDUs.
snmpInGetRequests
OID: 1.3.6.1.2.1.11.15
The total number of SNMP Get-Request PDUs that have been
accepted and processed by the SNMP protocol entity.
snmpInGetNexts
OID: 1.3.6.1.2.1.11.16
The total number of SNMP Get-Next PDUs that have been accepted
and processed by the SNMP protocol entity.
snmpInSetRequests
OID: 1.3.6.1.2.1.11.17
The total number of SNMP Set-Request PDUs that have been
accepted and processed by the SNMP protocol entity.
snmpInGetResponses
OID: 1.3.6.1.2.1.11.18
The total number of SNMP Get-Response PDUs that have been
accepted and processed by the SNMP protocol entity.
snmpInTraps
OID: 1.3.6.1.2.1.11.19
The total number of SNMP Trap PDUs that have been accepted and
processed by the SNMP protocol entity.
snmpOutTooBigs
OID: 1.3.6.1.2.1.11.20
The total number of SNMP PDUs that were generated by the SNMP
protocol entity and for which the value of the error-status field is
“tooBig.”
snmpOutNoSuchNames
OID: 1.3.6.1.2.1.11.21
The total number of SNMP PDUs that were generated by the SNMP
protocol entity and for which the value of the error-status field is
“noSuchName.”
snmpOutBadValues
OID: 1.3.6.1.2.1.11.22
The total number of SNMP PDUs that were generated by the SNMP
protocol entity and for which the value of the error-status field is
“badValue.”
snmpOutGenErrs
OID: 1.3.6.1.2.1.11.24
The total number of SNMP PDUs that were generated by the SNMP
protocol entity and for which the value of the error-status field is
“genErr.”
snmpOutGetRequests
OID: 1.3.6.1.2.1.11.25
The total number of SNMP Get-Request PDUs that have been
generated by the SNMP protocol entity.
snmpOutGetNexts
OID: 1.3.6.1.2.1.11.26
The total number of SNMP Get-Next PDUs that have been generated
by the SNMP protocol entity.
snmpOutSetRequests
OID: 1.3.6.1.2.1.11.27
The total number of SNMP Set-Request PDUs that have been
generated by the SNMP protocol entity.
snmpOutGetResponses
OID: 1.3.6.1.2.1.11.28
The total number of SNMP Get-Response PDUs that have been
generated by the SNMP protocol entity.
snmpOutTraps
OID: 1.3.6.1.2.1.11.29
The total number of SNMP Trap PDUs that have been generated by
the SNMP protocol entity.
snmpEnableAuthenTraps
OID: 1.3.6.1.2.1.11.30
Indicates whether the SNMP agent process is permitted to generate
authentication-failure traps. The value of this object overrides any
configuration information; as such, it provides a means whereby all
authentication-failure traps may be disabled.
Note that it is strongly recommended that this object be stored in
non-volatile memory so that it remains constant between
re-initializations of the network management system.
hrSystemUptime
OID: 1.3.6.1.2.1.25.1.1
The amount of time since this host was last initialized. Note that this
is different from sysUpTime in the SNMPv2-MIB [RFC1907] because
sysUpTime is the uptime of the network management portion of the
system.
hrSystemDate
OID: 1.3.6.1.2.1.25.1.2
The host's notion of the local date and time of day.
hrSystemInitialLoadDevice
OID: 1.3.6.1.2.1.25.1.3
The index of the hrDeviceEntry for the device from which this host is
configured to load its initial operating system configuration (i.e.,
which operating system code and/or boot parameters).
Note that writing to this object just changes the configuration that
will be used the next time the operating system is loaded and does
not actually cause the reload to occur.
hrSystemInitialLoadParameters
OID: 1.3.6.1.2.1.25.1.4
This object contains the parameters (e.g. a pathname and parameter)
supplied to the load device when requesting the initial operating
system configuration from that device.
Note that writing to this object just changes the configuration that
will be used the next time the operating system is loaded and does
not actually cause the reload to occur.
hrSystemNumUsers
OID: 1.3.6.1.2.1.25.1.5
The number of user sessions for which this host is storing state
information. A session is a collection of processes requiring a single
act of user authentication and possibly subject to collective job
control.
hrSystemProcesses
OID: 1.3.6.1.2.1.25.1.6
The number of process contexts currently loaded or running on this
system.
hrSystemMaxProcesses
OID: 1.3.6.1.2.1.25.1.7
The maximum number of process contexts this system can support.
If there is no fixed maximum, the value should be zero. On systems
that have a fixed maximum, this object can help diagnose failures that
occur when this maximum is reached.
hrStorageTypes
OID: 1.3.6.1.2.1.25.2.1
Registrations for some storage types, for use with hrStorageType.
hrStorageOther
OID: 1.3.6.1.2.1.25.2.1.1
The storage type identifier used when no other defined type is
appropriate.
hrStorageRam
OID: 1.3.6.1.2.1.25.2.1.2
The storage type identifier used for RAM.
hrStorageVirtualMemory
OID: 1.3.6.1.2.1.25.2.1.3
The storage type identifier used for virtual memory, temporary
storage of swapped or paged memory.
hrStorageFixedDisk
OID: 1.3.6.1.2.1.25.2.1.4
The storage type identifier used for non-removable rigid rotating
magnetic storage devices.
hrStorageRemovableDisk
OID: 1.3.6.1.2.1.25.2.1.5
The storage type identifier used for removable rigid rotating
magnetic storage devices.
hrStorageFloppyDisk
OID: 1.3.6.1.2.1.25.2.1.6
The storage type identifier used for non-rigid rotating magnetic
storage devices.
hrStorageCompactDisc
OID: 1.3.6.1.2.1.25.2.1.7
The storage type identifier used for read-only rotating optical storage
devices.
hrStorageRamDisk
OID: 1.3.6.1.2.1.25.2.1.8
The storage type identifier used for a file system that is stored in
RAM.
hrStorageFlashMemory
OID: 1.3.6.1.2.1.25.2.1.9
The storage type identifier used for flash memory.
hrStorageNetworkDisk
OID: 1.3.6.1.2.1.25.2.1.10
The storage type identifier used for a networked file system.
hrMemorySize
OID: 1.3.6.1.2.1.25.2.2
The amount of physical read-write main memory, typically RAM,
contained by the host.
hrStorageTable
OID: 1.3.6.1.2.1.25.2.3
The (conceptual) table of logical storage areas on the host.
An entry shall be placed in the storage table for each logical area of
storage that is allocated and has fixed resource limits. The amount of
storage represented in an entity is the amount actually usable by the
requesting entity, and excludes loss due to formatting or file system
reference information.
These entries are associated with logical storage areas, as might be
seen by an application, rather than physical storage entities which are
typically seen by an operating system. Storage such as tapes and
floppies without file systems on them are typically not allocated in
chunks by the operating system to requesting applications, and
therefore shouldn't appear in this table. Examples of valid storage for
this table include disk partitions, file systems, ram (for some
architectures this is further segmented into regular memory,
extended memory, and so on), backing store for virtual memory
(`swap space').
This table is intended to be a useful diagnostic for `out of memory'
and `out of buffers' types of failures. In addition, it can be a useful
performance monitoring tool for tracking memory, disk, or buffer
usage.
hrStorageEntry
OID: 1.3.6.1.2.1.25.2.3.1
A (conceptual) entry for one logical storage area on the host. As an
example, an instance of the hrStorageType object might be named
hrStorageType.3.
hrStorageIndex
OID: 1.3.6.1.2.1.25.2.3.1.1
A unique value for each logical storage area contained by the host.
hrStorageType
OID: 1.3.6.1.2.1.25.2.3.1.2
The type of storage represented by this entry.
hrStorageDescr
OID: 1.3.6.1.2.1.25.2.3.1.3
A description of the type and instance of the storage described by this
entry.
hrStorageAllocationUnits
OID: 1.3.6.1.2.1.25.2.3.1.4
The size, in bytes, of the data objects allocated from this pool. If this
entry is monitoring sectors, blocks, buffers, or packets, for example,
this number will commonly be greater than one. Otherwise this
number will typically be one.
hrStorageSize
OID: 1.3.6.1.2.1.25.2.3.1.5
The size of the storage represented by this entry, in units of
hrStorageAllocationUnits. This object is writable to allow remote
configuration of the size of the storage area in those cases where such
an operation makes sense and is possible on the underlying system.
For example, the amount of main memory allocated to a buffer pool
might be modified or the amount of disk space allocated to virtual
memory might be modified.
hrStorageUsed
OID: 1.3.6.1.2.1.25.2.3.1.6
The amount of the storage represented by this entry that is allocated,
in units of hrStorageAllocationUnits.
hrStorageAllocationFailures
OID: 1.3.6.1.2.1.25.2.3.1.7
The number of requests for storage represented by this entry that
could not be honored due to not enough storage. It should be noted
that as this object has a SYNTAX of Counter32, that it does not have a
defined initial value. However, it is recommended that this object be
initialized to zero, even though management stations must not
depend on such an initialization.
hrDeviceTypes
OID: 1.3.6.1.2.1.25.3.1
hrDeviceOther
OID: 1.3.6.1.2.1.25.3.1.1
The device type identifier used when no other defined type is
appropriate.
hrDeviceUnknown
OID: 1.3.6.1.2.1.25.3.1.2
The device type identifier used when the device type is unknown.
hrDeviceProcessor
OID: 1.3.6.1.2.1.25.3.1.3
The device type identifier used for a CPU.
hrDeviceNetwork
OID: 1.3.6.1.2.1.25.3.1.4
The device type identifier used for a network interface.
hrDevicePrinter
OID: 1.3.6.1.2.1.25.3.1.5
The device type identifier used for a printer.
hrDeviceDiskStorage
OID: 1.3.6.1.2.1.25.3.1.6
The device type identifier used for a disk drive.
hrDeviceVideo
OID: 1.3.6.1.2.1.25.3.1.10
The device type identifier used for a video device.
hrDeviceAudio
OID: 1.3.6.1.2.1.25.3.1.11
The device type identifier used for an audio device.
hrDeviceCoprocessor
OID: 1.3.6.1.2.1.25.3.1.12
The device type identifier used for a co-processor.
hrDeviceKeyboard
OID: 1.3.6.1.2.1.25.3.1.13
The device type identifier used for a keyboard device.
hrDeviceModem
OID: 1.3.6.1.2.1.25.3.1.14
The device type identifier used for a modem.
hrDeviceParallelPort
OID: 1.3.6.1.2.1.25.3.1.15
The device type identifier used for a parallel port.
hrDevicePointing
OID: 1.3.6.1.2.1.25.3.1.16
The device type identifier used for a pointing device (e.g., a mouse).
hrDeviceSerialPort
OID: 1.3.6.1.2.1.25.3.1.17
The device type identifier used for a serial port.
hrDeviceTape
OID: 1.3.6.1.2.1.25.3.1.18
The device type identifier used for a tape storage device.
hrDeviceClock
OID: 1.3.6.1.2.1.25.3.1.19
The device type identifier used for a clock device.
hrDeviceVolatileMemory
OID: 1.3.6.1.2.1.25.3.1.20
The device type identifier used for a volatile memory storage device.
hrDeviceNonVolatileMemory
OID: 1.3.6.1.2.1.25.3.1.21
The device type identifier used for a non-volatile memory storage
device.
hrDeviceTable
OID: 1.3.6.1.2.1.25.3.2
The (conceptual) table of devices contained by the host.
hrDeviceEntry
OID: 1.3.6.1.2.1.25.3.2.1
A (conceptual) entry for one device contained by the host. As an
example, an instance of the hrDeviceType object might be named
hrDeviceType.3.
hrDeviceIndex
OID: 1.3.6.1.2.1.25.3.2.1.1
A unique value for each device contained by the host. The value for
each device must remain constant at least from one re-initialization of
the agent to the next re-initialization.
hrDeviceType
OID: 1.3.6.1.2.1.25.3.2.1.2
An indication of the type of device.
If this value is `hrDeviceProcessor { hrDeviceTypes 3 }' then an entry
exists in the hrProcessorTable which corresponds to this device.
If this value is `hrDeviceNetwork { hrDeviceTypes 4 }', then an entry
exists in the hrNetworkTable which corresponds to this device.
If this value is `hrDevicePrinter { hrDeviceTypes 5 }', then an entry
exists in the hrPrinterTable which corresponds to this device.
If this value is `hrDeviceDiskStorage { hrDeviceTypes 6 }', then an
entry exists in the hrDiskStorageTable which corresponds to this
device.
hrDeviceDescr
OID: 1.3.6.1.2.1.25.3.2.1.3
A textual description of this device, including the device's
manufacturer and revision, and optionally, its serial number.
hrDeviceID
OID: 1.3.6.1.2.1.25.3.2.1.4
The product ID for this device.
hrDeviceStatus
OID: 1.3.6.1.2.1.25.3.2.1.5
The current operational state of the device described by this row of
the table. A value unknown(1) indicates that the current state of the
device is unknown. running(2) indicates that the device is up and
running and that no unusual error conditions are known. The
warning(3) state indicates that agent has been informed of an
unusual error condition by the operational software (e.g., a disk
device driver) but that the device is still 'operational'. An example
would be a high number of soft errors on a disk. A value of
testing(4), indicates that the device is not available for use because it
is in the testing state. The state of down(5) is used only when the
agent has been informed that the device is not available for any use.
hrDeviceErrors
OID: 1.3.6.1.2.1.25.3.2.1.6
The number of errors detected on this device. It should be noted that
as this object has a SYNTAX of Counter32, that it does not have a
defined initial value. However, it is recommended that this object be
initialized to zero, even though management stations must not
depend on such an initialization.
hrProcessorTable
OID: 1.3.6.1.2.1.25.3.3
The (conceptual) table of processors contained by the host.
Note that this table is potentially sparse: a (conceptual) entry exists
only if the correspondent value of the hrDeviceType object is
`hrDeviceProcessor'.
hrProcessorEntry
OID: 1.3.6.1.2.1.25.3.3.1
A (conceptual) entry for one processor contained by the host. The
hrDeviceIndex in the index represents the entry in the hrDeviceTable
that corresponds to the hrProcessorEntry.
As an example of how objects in this table are named, an instance of
the hrProcessorFrwID object might be named hrProcessorFrwID.3.
hrProcessorFrwID
OID: 1.3.6.1.2.1.25.3.3.1.1
The product ID of the firmware associated with the processor.
hrProcessorLoad
OID: 1.3.6.1.2.1.25.3.3.1.2
The average, over the last minute, of the percentage of time that this
processor was not idle. Implementations may approximate this one
minute smoothing period if necessary.
hrNetworkTable
OID: 1.3.6.1.2.1.25.3.4
The (conceptual) table of network devices contained by the host.
Note that this table is potentially sparse: a (conceptual) entry exists
only if the correspondent value of the hrDeviceType object is
`hrDeviceNetwork'.
hrNetworkEntry
OID: 1.3.6.1.2.1.25.3.4.1
A (conceptual) entry for one network device contained by the host.
The hrDeviceIndex in the index represents the entry in the
hrDeviceTable that corresponds to the hrNetworkEntry.
As an example of how objects in this table are named, an instance of
the hrNetworkIfIndex object might be named hrNetworkIfIndex.3.
hrNetworkIfIndex
OID: 1.3.6.1.2.1.25.3.4.1.1
The value of ifIndex which corresponds to this network device. If this
device is not represented in the ifTable, then this value shall be zero.
hrPrinterTable
OID: 1.3.6.1.2.1.25.3.5
The (conceptual) table of printers local to the host.
Note that this table is potentially sparse: a (conceptual) entry exists
only if the correspondent value of the hrDeviceType object is
`hrDevicePrinter'.
hrPrinterEntry
OID: 1.3.6.1.2.1.25.3.5.1
A (conceptual) entry for one printer local to the host. The
hrDeviceIndex in the index represents the entry in the hrDeviceTable
that corresponds to the hrPrinterEntry.
As an example of how objects in this table are named, an instance of
the hrPrinterStatus object might be named hrPrinterStatus.3.
hrPrinterStatus
OID: 1.3.6.1.2.1.25.3.5.1.1
The current status of this printer device.
hrPrinterDetectedErrorState
OID: 1.3.6.1.2.1.25.3.5.1.2
This object represents any error conditions detected by the printer.
The error conditions are encoded as bits in an octet string, with the
following definitions:
Condition Bit #
lowPaper 0
noPaper 1
lowToner 2
noToner 3
doorOpen 4
jammed 5
offline 6
serviceRequested 7
inputTrayMissing 8
outputTrayMissing 9
markerSupplyMissing 10
outputNearFull 11
outputFull 12
inputTrayEmpty 13
overduePreventMaint 14
Bits are numbered starting with the most significant bit of the first
byte being bit 0, the least significant bit of the first byte being bit 7, the
most significant bit of the second byte being bit 8, and so on. A one
bit encodes that the condition was detected, while a zero bit encodes
that the condition was not detected.
This object is useful for alerting an operator to specific warning or
error conditions that may occur, especially those requiring human
intervention.
hrDiskStorageTable
OID: 1.3.6.1.2.1.25.3.6
The (conceptual) table of long-term storage devices contained by the
host. In particular, disk devices accessed remotely over a network are
not included here.
hrDiskStorageEntry
OID: 1.3.6.1.2.1.25.3.6.1
A (conceptual) entry for one long-term storage device contained by
the host. The hrDeviceIndex in the index represents the entry in the
hrDeviceTable that corresponds to the hrDiskStorageEntry. As an
example, an instance of the hrDiskStorageCapacity object might be
named hrDiskStorageCapacity.3.
hrDiskStorageAccess
OID: 1.3.6.1.2.1.25.3.6.1.1
An indication if this long-term storage device is readable and
writable or only readable. This should reflect the media type, any
write-protect mechanism, and any device configuration that affects
the entire device.
hrDiskStorageMedia
OID: 1.3.6.1.2.1.25.3.6.1.2
An indication of the type of media used in this long- term storage
device.
hrDiskStorageRemoveble
OID: 1.3.6.1.2.1.25.3.6.1.3
Denotes whether or not the disk media may be removed from the
drive.
hrDiskStorageCapacity
OID: 1.3.6.1.2.1.25.3.6.1.4
The total size for this long-term storage device. If the media is
removable and is currently removed, this value should be zero.
hrPartitionTable
OID: 1.3.6.1.2.1.25.3.7
The (conceptual) table of partitions for long-term storage devices
contained by the host. In particular, partitions accessed remotely
over a network are not included here.
hrPartitionEntry
OID: 1.3.6.1.2.1.25.3.7.1
A (conceptual) entry for one partition. The hrDeviceIndex in the
index represents the entry in the hrDeviceTable that corresponds to
the hrPartitionEntry.
As an example of how objects in this table are named, an instance of
the hrPartitionSize object might be named hrPartitionSize.3.1.
hrPartitionIndex
OID: 1.3.6.1.2.1.25.3.7.1.1
A unique value for each partition on this long-term storage device.
The value for each long-term storage device must remain constant at
least from one re- initialization of the agent to the next re-
initialization.
hrPartitionLabel
OID: 1.3.6.1.2.1.25.3.7.1.2
A textual description of this partition.
hrPartitionID
OID: 1.3.6.1.2.1.25.3.7.1.3
A descriptor which uniquely represents this partition to the
responsible operating system. On some systems, this might take on a
binary representation.
hrPartitionSize
OID: 1.3.6.1.2.1.25.3.7.1.4
The size of this partition.
hrPartitionFSIndex
OID: 1.3.6.1.2.1.25.3.7.1.5
The index of the file system mounted on this partition. If no file
system is mounted on this partition, then this value shall be zero.
Note that multiple partitions may point to one file system, denoting
that that file system resides on those partitions. Multiple file systems
may not reside on one partition.
hrFSTable
OID: 1.3.6.1.2.1.25.3.8
The (conceptual) table of file systems local to this host or remotely
mounted from a file server. File systems that are in only one user's
environment on a multi-user system will not be included in this table.
hrFSEntry
OID: 1.3.6.1.2.1.25.3.8.1
A (conceptual) entry for one file system local to this host or remotely
mounted from a file server. File systems that are in only one user's
environment on a multi-user system will not be included in this table.
As an example of how objects in this table are named, an instance of
the hrFSMountPoint object might be named hrFSMountPoint.3.
hrFSIndex
OID: 1.3.6.1.2.1.25.3.8.1.1
A unique value for each file system local to this host. The value for
each file system must remain constant at least from one
re-initialization of the agent to the next re-initialization.
hrFSMountPoint
OID: 1.3.6.1.2.1.25.3.8.1.2
The path name of the root of this file system.
hrFSRemoteMountPoint
OID: 1.3.6.1.2.1.25.3.8.1.3
A description of the name and/or address of the server that this file
system is mounted from. This may also include parameters such as
the mount point on the remote file system. If this is not a remote file
system, this string should have a length of zero.
hrFSType
OID: 1.3.6.1.2.1.25.3.8.1.4
The value of this object identifies the type of this file system.
hrFSAccess
OID: 1.3.6.1.2.1.25.3.8.1.5
hrFSBootable
OID: 1.3.6.1.2.1.25.3.8.1.6
A flag indicating whether this file system is bootable.
hrFSStorageIndex
OID: 1.3.6.1.2.1.25.3.8.1.7
The index of the hrStorageEntry that represents information about
this file system. If there is no such information available, then this
value shall be zero. The relevant storage entry will be useful in
tracking the percent usage of this file system and diagnosing errors
that may occur when it runs out of space.
hrFSLastFullBackupDate
OID: 1.3.6.1.2.1.25.3.8.1.8
The last date at which this complete file system was copied to another
storage device for backup. This information is useful for ensuring
that backups are being performed regularly.
If this information is not known, then this variable shall have the
value corresponding to January 1, year 0000, 00:00:00.0, which is
encoded as (hex)'00 00 01 01 00 00 00 00'.
hrFSLastPartialBackupDate
OID: 1.3.6.1.2.1.25.3.8.1.9
The last date at which a portion of this file system was copied to
another storage device for backup. This information is useful for
ensuring that backups are being performed regularly.
If this information is not known, then this variable shall have the
value corresponding to January 1, year 0000, 00:00:00.0, which is
encoded as (hex)'00 00 01 01 00 00 00 00'.
hrFSTypes
OID: 1.3.6.1.2.1.25.3.9
Registrations for some popular File System types, for use with
hrFSType.
hrFSOther
OID: 1.3.6.1.2.1.25.3.9.1
The file system type identifier used when no other defined type is
appropriate.
hrFSUnknown
OID: 1.3.6.1.2.1.25.3.9.2
The file system type identifier used when the type of file system is
unknown.
hrFSBerkeleyFFS
OID: 1.3.6.1.2.1.25.3.9.3
The file system type identifier used for the Berkeley Fast File System.
hrFSSys5FS
OID: 1.3.6.1.2.1.25.3.9.4
The file system type identifier used for the System V File System.
hrFSFat
OID: 1.3.6.1.2.1.25.3.9.5
The file system type identifier used for DOS's FAT file system.
hrFSHPFS
OID: 1.3.6.1.2.1.25.3.9.6
The file system type identifier used for OS/2's High Performance File
System.
hrFSHFS
OID: 1.3.6.1.2.1.25.3.9.7
The file system type identifier used for the Macintosh Hierarchical
File System.
hrFSMFS
OID: 1.3.6.1.2.1.25.3.9.8
The file system type identifier used for the Macintosh File System.
hrFSNTFS
OID: 1.3.6.1.2.1.25.3.9.9
The file system type identifier used for the Windows NT File System.
hrFSVNode
OID: 1.3.6.1.2.1.25.3.9.10
The file system type identifier used for the VNode File System.
hrFSJournaled
OID: 1.3.6.1.2.1.25.3.9.11
The file system type identifier used for the Journaled File System.
hrFSiso9660
OID: 1.3.6.1.2.1.25.3.9.12
The file system type identifier used for the ISO 9660 File System for
CD's.
hrFSRockRidge
OID: 1.3.6.1.2.1.25.3.9.13
The file system type identifier used for the RockRidge File System for
CD's.
hrFSNFS
OID: 1.3.6.1.2.1.25.3.9.14
The file system type identifier used for the NFS File System.
hrFSNetware
OID: 1.3.6.1.2.1.25.3.9.15
The file system type identifier used for the Netware File System.
hrFSAFS
OID: 1.3.6.1.2.1.25.3.9.16
The file system type identifier used for the Andrew File System.
hrFSDFS
OID: 1.3.6.1.2.1.25.3.9.17
The file system type identifier used for the OSF DCE Distributed File
System.
hrFSAppleshare
OID: 1.3.6.1.2.1.25.3.9.18
The file system type identifier used for the AppleShare File System.
hrFSRFS
OID: 1.3.6.1.2.1.25.3.9.19
The file system type identifier used for the RFS File System.
hrFSDGCFS
OID: 1.3.6.1.2.1.25.3.9.20
The file system type identifier used for the Data General DGCFS.
hrFSBFS
OID: 1.3.6.1.2.1.25.3.9.21
The file system type identifier used for the SVR4 Boot File System.
hrFSFAT32
OID: 1.3.6.1.2.1.25.3.9.22
The file system type identifier used for the Windows FAT32 File
System.
hrFSLinuxExt2
OID: 1.3.6.1.2.1.25.3.9.23
The file system type identifier used for the Linux EXT2 File System.
hrSWOSIndex
OID: 1.3.6.1.2.1.25.4.1
The value of the hrSWRunIndex for the hrSWRunEntry that
represents the primary operating system running on this host. This
object is useful for quickly and uniquely identifying that primary
operating system.
hrSWRunTable
OID: 1.3.6.1.2.1.25.4.2
The (conceptual) table of software running on the host.
hrSWRunEntry
OID: 1.3.6.1.2.1.25.4.2.1
A (conceptual) entry for one piece of software running on the host.
Note that because the installed software table only contains
information for software stored locally on this host, not every piece of
running software will be found in the installed software table. This is
true of software that was loaded and run from a non-local source,
such as a network-mounted file system.
As an example of how objects in this table are named, an instance of
the hrSWRunName object might be named hrSWRunName.1287.
hrSWRunIndex
OID: 1.3.6.1.2.1.25.4.2.1.1
A unique value for each piece of software running on the host.
Wherever possible, this should be the system's native, unique
identification number.
hrSWRunName
OID: 1.3.6.1.2.1.25.4.2.1.2
A textual description of this running piece of software, including the
manufacturer, revision, and the name by which it is commonly
known. If this software was installed locally, this should be the same
string as used in the corresponding hrSWInstalledName.
hrSWRunID
OID: 1.3.6.1.2.1.25.4.2.1.3
The product ID of this running piece of software.
hrSWRunPath
OID: 1.3.6.1.2.1.25.4.2.1.4
A description of the location on long-term storage (e.g. a disk drive)
from which this software was loaded.
hrSWRunParameters
OID: 1.3.6.1.2.1.25.4.2.1.5
A description of the parameters supplied to this software when it was
initially loaded.
hrSWRunType
OID: 1.3.6.1.2.1.25.4.2.1.6
The type of this software.
hrSWRunStatus
OID: 1.3.6.1.2.1.25.4.2.1.7
The status of this running piece of software. Setting this value to
invalid(4) shall cause this software to stop running and to be
unloaded. Sets to other values are not valid.
hrSWRunPerfTable
OID: 1.3.6.1.2.1.25.5.1
The (conceptual) table of running software performance metrics.
hrSWRunPerfEntry
OID: 1.3.6.1.2.1.25.5.1.1
A (conceptual) entry containing software performance metrics. As an
example, an instance of the hrSWRunPerfCPU object might be named
hrSWRunPerfCPU.1287.
hrSWRunPerfCPU
OID: 1.3.6.1.2.1.25.5.1.1.1
The number of centi-seconds of the total system's CPU resources
consumed by this process. Note that on a multi-processor system,
this value may increment by more than one centi-second in one
centi-second of real (wall clock) time.
hrSWRunPerfMem
OID: 1.3.6.1.2.1.25.5.1.1.2
The total amount of real system memory allocated to this process.
hrSWInstalledLastChange
OID: 1.3.6.1.2.1.25.6.1
The value of sysUpTime when an entry in the hrSWInstalledTable
was last added, renamed, or deleted. Because this table is likely to
contain many entries, polling of this object allows a management
station to determine when re-downloading of the table might be
useful.
hrSWInstalledLastUpdateTime
OID: 1.3.6.1.2.1.25.6.2
The value of sysUpTime when the hrSWInstalledTable was last
completely updated. Because caching of this data will be a popular
implementation strategy, retrieval of this object allows a management
station to obtain a guarantee that no data in this table is older than the
indicated time.
hrSWInstalledTable
OID: 1.3.6.1.2.1.25.6.3
The (conceptual) table of software installed on this host.
hrSWInstalledEntry
OID: 1.3.6.1.2.1.25.6.3.1
A (conceptual) entry for a piece of software installed on this host.
As an example of how objects in this table are named, an instance of
the hrSWInstalledName object might be named
hrSWInstalledName.96
hrSWInstalledIndex
OID: 1.3.6.1.2.1.25.6.3.1.1
A unique value for each piece of software installed on the host. This
value shall be in the range from 1 to the number of pieces of software
installed on the host.
hrSWInstalledName
OID: 1.3.6.1.2.1.25.6.3.1.2
A textual description of this installed piece of software, including the
manufacturer, revision, the name by which it is commonly known,
and optionally, its serial number.
hrSWInstalledID
OID: 1.3.6.1.2.1.25.6.3.1.3
The product ID of this installed piece of software.
hrSWInstalledType
OID: 1.3.6.1.2.1.25.6.3.1.4
The type of this software.
hrSWInstalledDate
OID: 1.3.6.1.2.1.25.6.3.1.5
The last-modification date of this application as it would appear in a
directory listing.
If this information is not known, then this variable shall have the
value corresponding to January 1, year 0000, 00:00:00.0, which is
encoded as (hex)'00 00 01 01 00 00 00 00'.
Conformance information
hostResourcesMibModule
OID: 1.3.6.1.2.1.25.7.1
hrMIBCompliances
OID: 1.3.6.1.2.1.25.7.2
hrMIBCompliance
OID: 1.3.6.1.2.1.25.7.2.1
hrMIBGroups
OID: 1.3.6.1.2.1.25.7.3
hrSystemGroup
OID: 1.3.6.1.2.1.25.7.3.1
The Host Resources System Group.
hrStorageGroup
OID: 1.3.6.1.2.1.25.7.3.2
The Host Resources Storage Group.
hrDeviceGroup
OID: 1.3.6.1.2.1.25.7.3.3
The Host Resources Device Group.
hrSWRunGroup
OID: 1.3.6.1.2.1.25.7.3.4
The Host Resources Running Software Group.
hrSWRunPerfGroup
OID: 1.3.6.1.2.1.25.7.3.5
The Host Resources Running Software Performance Group.
hrSWInstalledGroup
OID: 1.3.6.1.2.1.25.7.3.6
The Host Resources Installed Software Group.
A
access node An internal Atmos node that acts as an entry point for requests
generated by clients who do not reside within the Atmos system. An
access node can be assigned to one tenant.
Atmos API Atmos provides an API for object access and management (REST and
SOAP), and for system management tasks.
Atmos Installable File Atmos software packaged as an rpm and installed on a RHEL5
System system running FUSE. IFS enables access to the Atmos storage cloud
from traditional file system applications.
Atmos services Atmos services include client service (CS), job service (JS), metadata
location service (MDLS), metadata service (MDS), resource
management service (RMS), storage service (SS), web service (WS).
All Atmos services (except the MDLS) run on every node in the
system. The MDLS runs on first two nodes of first RMG, and the first
node of subsequent RMGs.
Atmos Virtual Edition The Atmos software that can be installed in a virtual environment.
C
client service CS. An Atmos service that manages requests that come in via Web
Service, IFS, and CIFS/NFS. The client service is installed on every
Atmos node.
consistency checker CC. An Atmos service that runs for each tenant. It checks all objects of
the tenant and initiates recovery if it fails to access a replica or
determines that a replica is not consistent. It runs at a low priority in
the background.
D
default policy The policy that the Atmos policy manager applies when no other
policy is assigned by the user, or no other policy matches. The default
policy is named default and defines two synchronous replicas
without location or server attribute constraints.
deletion period A policy specification that defines a time period after which Atmos
automatically deletes an object.
E
erasure code An Atmos feature that provides data redundancy without the
overhead of replication.
F
federation An Atmos replica definition. When defining policies, replicas can be
federated. Federated replicas are distributed across a combination of
internal Atmos systems and external Atmos-based systems. Atmos
supports access to federated data via file-system and Web-services
access mechanisms.
file-system client File-system access is provided via NFS (Network File System), CIFS
(Common Internet File System), or installable file systems for specific
operating systems.
FUSE File System in User Space. Software required by the Atmos installable
file system.
G
GeoProtect An Atmos feature that provides better protection optimized for the
cloud. GeoProtect increases the availability of your content, reduces
storage overhead, and improves access to content.
I
initial master node The first node of the first installation segment in the first RMG that is
installed in the system becomes the initial master node. Each Atmos
system has only one initial master node. You use the IP address of this
node to initiate the system.
installation segment A set of nodes that share the same “private,” management subnet.
J
job service JS. The Atmos service responsible for all asynchronous
data-maintenance tasks, like asynchronous replication and
consistency checking. It runs on most Atmos nodes and is an
application that sits on top of the client.
L
location Identifies the physical location of the RMG. The RMG’s location is
specified during system installation.
M
management network The private network (eth0) that handles internal management and
installation. It is assigned a private IP address.
master node The first node installed in each installation segment. It always has
-001 appended to its node name. When a new RMG is added to the
system, it has one installation segment, hence one master node. If
more installation segments are added to that RMG later, there are
mauifs The Atmos service that runs on the Atmos installable file system.
metadata disk ratio A setting applied by the user when installing Atmos. It defines the
amount of disks to use for metadata storage and the amount to use
for data storage. The ratio selected depends on what kind of data the
system is expected to handle.
metadata service MDS. The Atmos service that maintains the physical location and
layout of objects. Responsible for a range of object identifiers (OIDs)
and their metadata. It tells the client service where to store a piece of
metadata. Installed on every node.
metadata location MDLS. The Atmos service that maintains the location of MDS objects.
service An index responsible for tracking the metadata database locations,
and the MDS that owns it. It is installed on the first two nodes of a
system, and on the master node of every subsequent RMG.
metadata One of two components of an object, along with user data. Metadata
is divided into system metadata and user metadata.
N
namespace Data access provided by a file-system client occurs in the context of a
namespace.
namespace interface Atmos web services support an object interface and a namespace
interface for interacting with objects. The namespace interface allows
an application to interact with objects using file and directory paths.
node A device where Atmos software is installed and that runs the set of
Atmos services that store, retrieve, categorize, and manage the data
in the system. Nodes are either master or slave.
network time protocol The protocol used to synchronize the computer clock with a network
time source. Atmos requires that time be synchronized across all
nodes and clients within 5 minutes. It is recommended that an
external NTP server be used for this purpose.
O
object interface Atmos web services support an object interface and a namespace
interface for interacting with objects. The object interface allows an
application to interact with objects using the object identifier.
P
policy manager PM. An Atmos service that stores policies and selects the appropriate
service policies for objects.
policy A set of rules used to guide Atmos about how, when, and where to
replicate, and store objects. It is a combination of a policy selector and
a policy specification.
policy selector The conditions under which a policy is triggered. If you view a policy
as an if-then statement: the selector is the “if” clause.
policy specification A description of what happens when a policy is selected for use, such
as information about replicas, striping, and server attributes. If you
view a policy as an if-then statement: the specification is the “then”
clause.
private network The Atmos network interface (eth0) used for internal management
traffic, such as Installing Atmos (PXE, DHCP, and IPMI), intra-node
communications (within an IS), upgrading to a new Atmos version,
and replacing nodes.
public network The Atmos network interface (eth1 and above) used for data,
replication and system management traffic. This interface is assigned
an externally facing IP addresses.
R
resource RMG. A collection of installation segments that share a single
management group domain. In almost all cases, this is equivalent to a subnet on the
“public,” customer network. You can create multiple RMGs on the
same subnet, as long as each RMG has a unique address. RMGs are
responsible for monitoring and discovering nodes within the subnet.
resource manager RMS. The Atmos service that tracks the availability, status, and
service location of storage services, and the specific features available with
those storage services (for example, compression).
rolling upgrade The upgrade process where Atmos remains accessible and responsive
while the software is upgraded.
S
SS Storage Server. A physical server on which user data is stored.
system management The application used to configure, manage, and monitor the Atmos
GUI system.
system metadata Atmos objects include the following system metadata: atime—last
access time, mtime—last modified time, ctime—change time,
itime—create time, uid— UID from UID List, where you create new
applications from, gid—group ID, N/A to Web Service users; ignore,
size—object size in bytes.
T
tenant A conceptual subset of the storage resources within an Atmos system.
Associated with a tenant are specific storage resources, security
control, storage policies, and access to the data stored on that tenant's
resources. Each tenant has a name that is unique system-wide.
Tenant Admin A role within a specific tenant, assigned to one or more users.
TenantAdmins control the storage resources, security and storage
policies, and data usage of the tenant to which they are assigned. A
given user can be a TenantAdmin for multiple tenants.
TenantAdmins are unaware of system resources other than those
defined for their tenant, nor any ability to access those resources.
U
user data Atmos objects are comprised of user data and metadata.
user meta data Metadata assigned to an object by the user. It is arbitrary key/value
pairs. Examples of user metadata are artist name (for example, for
MP3 data) and customer type.
W
web services client A flexible Web-services client interface allows direct access to the
object API over SOAP or REST. This enables customers to implement
a solution without needing to understand the underlying
implementation. Using the Atmos Web-services interface allows
customers to quickly integrate Atmos with existing applications that,
like Atmos, have a service-oriented architecture.
PKCS7 73 S
placement strategies 94 Samba 145
policy Secure Sockets Layer 49
default policy specification 88 security dashboard 26
defining policies 87 SecurityAdmin
defining policy selector 100 login credentials 25
definition 86 login page 25
deletion period 98 password 30
Erasure Code 95 segment 34
federate 98 Segments’ Hardware TLA 47
management 86 server attributes 94
Manager 86 service status 35
match operators 101 Shared Secret 63, 80
metadata 89 shutdown command 44
overview 86 slave node 42, 44
reordering 103 SMTP 112
replicas 92 SNMP
retention period 98 agent 114
selector 87 community name 114
specification 87 configure for RMG 114
striping 95 configure system-wide 114
triggers 102 daemon 112, 120
XQuery expressions 101 email contact 124
private network 35 enabling traps 122
public-key certificate 73 standard MIBs 120
traps 114, 116, 122
R SNMP group 212
remote replication (MDS) 51 SOAP interface 49, 72
Replacement Failed error 35 software serial number 46, 134
replicas 92 Spread Toolkit 109
Reporting Framework 108 SSL certificates 50, 73
reports 138 statistics 157
Resource Management Service 109 Storage Service 109
REST interface 49, 72 striping 95
restarting nodes 44 SubtenantAdmin 23
retention period 98 email address 82
RMG login credentials 25
adding nodes 41 login page 25
definition 35 password 82
new 34 subtenants
roles authentication source 76
SecurityAdmin 22 creating 76
SubtenantAdmin 22 dashboard 29
SysAdmin 22 definition 23
TenantAdmin 22 list 76
namespace 76
renaming 78 traps
root directory 76 atmosNotificationCpuUsage 114
SubtenantAdmin role 80 atmosNotificationDAEBackplaneStatus 115
SYR, see system reporting 106, 133, 135 atmosNotificationDAEFanStatus 115
SysAdmin 22 atmosNotificationDAEStatus 115
deleting a TenantAdmin 69 atmosNotificationDAETempStatus 115
login credentials 25 atmosNotificationDiskRecovery 116
login page 25 atmosNotificationDiskStatus 115
password 25 atmosNotificationExternalCarrierStatus 115
system dashboard 27 atmosNotificationFilesystemUsage 114
system group 179 atmosNotificationInternalCarrierStatus 115
system log 44 atmosNotificationMemoryUsage 114
system reporting atmosNotificationMgmtDBStatus 116
Atmos configuration 46 atmosNotificationNodeStatus 115
configuring 133 atmosNotificationPolicyResourceStatus 116
database 106, 133, 135 atmosNotificationPolicySyncFailed 115
reports 138 atmosNotificationRMGStatus 115
atmosNotificationSegmentStatus 115
atmosNotificationServiceMemoryUsage 115
T atmosNotificationServiceStatus 115
TCP connection table 204
atmosNotificationSwapUsage 114
TCP group 202
atmosNotificationUidSyncFailed 115
tenant dashboard 28
atmosNotificationVIPFailover 116
TenantAdmin
Dell OpenManage 118
creating a SubtenantAdmin 80
MAUI_MGMTDB_OID 118
deleting a SubtenantAdmin 83
MauiAppServiceCrash 117
email address 67
MauiAppServiceMemory 117
login credentials 25
MauiAppServiceRestart 117
login page 25
MauiDAEBackplane 116
password 67
MauiDAECriticalEvent 118
role 22
MauiDAEDiskFailure 116
Update My Information 68
MauiDAEEnclosureFail 117
tenants
MauiDAEFanOperation 116
authentication source 56
MauiDAETempThreshold 117
creating 55
MauiNodeCPU 117
default policy 55
MauiNodeDiskError 118
default policy specification 88
MauiNodeDown 116
default subtenant 78
MauiNodeFileSystem 117
LDAP configuration 58
MauiNodeIntfCarrier 116
list 54
MauiNodeMemory 117
namespace 55
MauiNodeSwap 117
nodes 70
MauiNodeTempThreshold 116
renaming 64
MauiRmgDown 117
root directory 55
MauiSegmentDown 118
TenantAdmin role 65
MauiTrapGeneric 116
textual conventions 178
MauiTrapPolicySyncFail 117
transmission group 211
MauiTrapUidSyncFail 117
NUM_EXCEPTION_RECS_OID 118 V
overview 114 VMware 35
RECOVER_DISK_OID 118
X
U XQuery expressions 101
UDP group 206
UID 80