FOS MAPS AdminGd v720
FOS MAPS AdminGd v720
53-1002933-03 ®
14 November 2013
Document History
Title Publication number Summary of changes Date
Monitoring and Alerting Policy Suite 53-1002933-01 First release July 2013
Administrator’s Guide
Monitoring and Alerting Policy Suite 53-1002933-02 Updated to match Fabric OS 7.0.2.a September 2013
Administrator’s Guide
Monitoring and Alerting Policy Suite 53-1002933-03 Revised Appendix, corrected errors in November 2013
Administrator’s Guide Overview chapter.
Contents
Index
In this chapter
• Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
• Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
• Notice to the reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
• Additional information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
• Getting technical help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
• Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Document conventions
This section describes text formatting conventions and important notice formats used in this
document.
Text formatting
The narrative-text formatting conventions that are used are as follows:
bold text Identifies command names
Identifies the names of user-manipulated GUI elements
Identifies keywords and operands
Identifies text to enter at the GUI or CLI
italic text Provides emphasis
Identifies variables
Identifies paths and Internet addresses
Identifies document titles
code text Identifies CLI output
Identifies command syntax examples
For readability, command names in the narrative portions of this guide are presented in mixed
lettercase: for example, switchShow. In actual examples, command lettercase is often all
lowercase. Otherwise, this manual specifically notes those cases in which a command is
case-sensitive.
NOTE
A note provides a tip, guidance. or advice, emphasizes important information, or provides a
reference to related information.
ATTENTION
An Attention statement indicates potential damage to hardware or data.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or extremely
hazardous to you. Safety labels are also attached directly to products to warn of these conditions
or situations.
Key terms
For definitions specific to Brocade and Fibre Channel, refer to the Brocade Glossary.
For definitions of SAN-specific terms, visit the Storage Networking Industry Association online
dictionary at:
http://www.snia.org/education/dictionary
Additional information
This section lists additional Brocade and industry-specific documentation that you might find
helpful.
Brocade resources
To get up-to-the-minute information, go to http://my.brocade.com and register at no cost for a user
ID and password.
For additional Brocade documentation, visit the Brocade SAN Info Center and click the Resource
Library location:
http://www.brocade.com
Release notes are available on the My Brocade website and are also bundled with the Fabric OS
firmware.
' "!&'
FT00X0054E9
In this chapter
• MAPS overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
• MAPS license requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
• MAPS interoperability with other features . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
• MAPS upgrade and downgrade considerations . . . . . . . . . . . . . . . . . . . . . . . 3
• Migrating from Fabric Watch to MAPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
• MAPS and Flow Vision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
MAPS overview
The Monitoring and Alerting Policy Suite (MAPS) is an optional storage area network (SAN) health
monitor supported on all switches running Fabric OS 7.2.0 or later that allows you to enable each
switch to constantly monitor itself for potential faults and automatically alerts you to problems
before they become costly failures.
MAPS tracks a variety of SAN fabric metrics and events. Monitoring fabric-wide events, ports, and
environmental parameters enables early fault detection and isolation as well as performance
measurements.
MAPS provides a set of pre-defined monitoring policies that allow you to immediately use MAPS on
activation. Refer to “Predefined policies” for more information on using these policies.
In addition, MAPS provides customizable monitoring thresholds. These allow you to configure
specific groups of ports or other elements so that they share a common threshold value. You can
configure MAPS to provide notifications before problems arise, for example, when network traffic
through a port is approaching the bandwidth limit. MAPS lets you define how often to check each
switch and fabric measure and specify notification thresholds. Whenever fabric measures exceed
these thresholds, MAPS automatically provides notification using several methods, including e-mail
messages, SNMP traps, and log entries. Refer to “MAPS Groups, Policies, Rules, and Actions” for
more information on using these features.
The MAPS dashboard provides you with the ability to view in a quick glance what is happening on
the switch, and helps administrators dig deeper to see details of exactly what is happening on the
switch (for example, the kinds of errors, the error count, and so on.) Refer to “MAPS dashboard
overview” for more information.
MAPS provides a seamless migration of all customized Fabric Watch thresholds to MAPS, thus
allowing you to take advantage of the advanced capabilities of MAPS. MAPS provides additional
advanced monitoring, such as monitoring for the same error counters across different time
periods, or having more than two thresholds for any error counters. MAPS also provides support for
you to monitor the statistics provided by the Flow Monitor feature of Flow Vision. Refer to
“Differences between Fabric Watch and MAPS configurations” and “Migrating from Fabric Watch to
MAPS” for details.
ATTENTION
If MAPS is enabled, do not download configuration files that have Admin Domains defined.
CAUTION
MAPS activation is a non-reversible process. Downgrading to Fabric OS 7.1 will enable
Fabric Watch with its last configured settings. When you upgrade back to Fabric OS 7.2,
Fabric Watch will continue to be enabled.
In this chapter
• Enabling MAPS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
• MAPS configuration quick start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
• MAPS configuration tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Enabling MAPS
MAPS is not enabled by default. To enable MAPS, enter the following command:
mapsConfig --enableMaps -policy policyname
You must supply a named policy to enable MAPS.
Once you have converted the Fabric Watch rules for use in MAPS (this must be done first), you can
enable and configure MAPS. Refer to “MAPS configuration quick start” on page 7 and “Migrating
from Fabric Watch to MAPS” on page 3 for more information on making the migration and getting
started with MAPS.
3. Set global actions on the switch to none using use mapsConfig --actions none.
Setting the global actions to “none” allows you to test the configured thresholds before
enabling the actions. Refer to “MAPS actions” on page 27 for more details.
4. Monitor the switch using mapsDb --show or mapsDb --show all.
Refer to “Viewing the MAPS dashboard” on page 41 more details.
5. Fine-tune the rules used by the policy as necessary.
Refer to “Modifying a policy” on page 25 more details.
6. Set global actions on the switch to the allowed actions by using mapsConfig --actions and
specifying all of the actions that you want to allow on the switch.
Refer to “Enabling or disabling actions at a global level” on page 28 more details.
The following example enables MAPS, loads the policy named “dflt_aggressive_policy”, sets the
actions to none, and then sets approved actions.
switch:admin> mapsconfig --enablemaps
switch:admin> mapsconfig --fwconvert -policy dflt_aggressive_policy
WARNING:
This command enables MAPS and replaces all Fabric Watch configurations and
monitoring. Once MAPS is enabled, the Fabric Watch configuration can't be
converted to MAPS.
If you wish to convert your Fabric Watch configuration into MAPS policies, select
NO to this prompt and first issue the "mapsconfig --fwconvert" command. Once the
Fabric Watch configuration is concerted into MAPS policies, you may reissue the
"mapsconfig --enablemaps" command to continue this process. If you do not use
Fabric Watch or need the configuration, then select YES to enable MAPS now.
Do you want to continue? (yes, y, no, n): [no] yes
...
MAPS is enabled.
switch:admin> mapsconfig --actions none
switch:admin> mapsconfig --actions raslog,fence,snmp,email,sw_marginal
Refer to the Fabric OS Command Reference for additional information on the MAPS-related
commands logicalGroup, mapsConfig, mapsPolicy, mapsRule, mapsDb, and mapsSam.
Rule Data:
----------
RuleName: crc_critical
Condition: ALL_PORTS(crc/min>5)
Actions: email,snmp
Policies Associated: none
In this chapter
• MAPS structural elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
• MAPS monitoring categories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Action The activity performed by MAPS if a condition defined in a rule evaluates to true.
For more information, refer to “MAPS actions” on page 27.
Category A grouping of similar elements that can be monitored (for example, “Security Violations”.
For more information, refer to “MAPS monitoring categories” on page 11.
Condition A true or false trigger created by the combination of a time base and a threshold value.
For more information, refer to “MAPS conditions” on page 26.
Element A value (measure or statistic) that can be monitored. This includes switch conditions, data traffic
levels, error messages, and other values. For a complete list of elements, refer to the Fabric OS
Administrator’s Guide.
Group A collection of similar objects that you can monitor as a single entity. For example, a collection of
ports can be assembled as a group. For more information, refer to “MAPS groups overview” on
page 19.
Rule A direction associating a condition with one or more actions that must occur when the specified
condition is evaluated to be true. For more information, refer to “MAPS rules overview” on page 26.
Policy A set of rules defining thresholds for triggering actions MAPS is to take when that threshold is
triggered. When a policy is enabled, all of the rules in the policy are in effect. For more information,
refer to “MAPS policies overview” on page 22.
• Security Violations
• Fabric State Changes
• Switch Resource
• Traffic Performance
• FCIP Health
The MAPS dashboard also displays the status of these categories. Refer to “MAPS dashboard
overview” on page 39 for information on using the MAPS dashboard.
Power Supplies (BAD_PWR) Power supply thresholds detect absent or failed power supplies, and power
supplies that are not in the correct slot for redundancy.
Temperatures (BAD_TEMP) Temperature thresholds, faulty temperature sensors.
Fans (BAD_FAN) Fan thresholds, faulty fans.
Flash (FLASH_USAGE) Flash thresholds.
Marginal Ports1 (MARG_PORTS) Port, E_Port, FOP_Port (optical), and FCU_Port (copper) port thresholds.
Whenever these thresholds are persistently high, the port is marginal.
Faulty Ports1 (FAULTY_PORTS) Hardware-related port faults.
Missing SFPs1 (MISSING_SFP) Ports that are missing SFP media.
Error Ports1 (ERR_PORTS) Ports with errors.
WWN (WWN_DOWN) Faulty WWN card (applies to modular switches).
Core Blade (DOWN_CORE) Faulty core blades (applies to modular switches).
Faulty blades (FAULTY_BLADE) Faulty blades (applies to modular switches).
High Availability (HA_SYNC) Switch does not have a redundant CP (Applies to modular switches only.)
1. Marginal ports, faulty ports, error ports, and missing SFP transceivers are calculated as a percentage of the
physical ports (excluding FCoE and VE_Ports).
Port Health
The Port Health category monitors port statistics and takes action based on the configured
thresholds and actions. You can configure thresholds per port type and apply the configuration to
all ports of the specified type. Configurable ports include physical ports, E_Ports, optical F_Ports
(FOP_Ports), copper F_Ports (FCU_Ports), and Virtual E_Ports (VE_Ports).
The Port Health category also monitors the physical aspects of a small form-factor pluggable (SFP)
transceiver, such as voltage, current, receive power (RXP), transmit power (TXP), and state changes
in physical ports, E_Ports, FOP_Ports, and FCU_Ports. Table 5 lists the monitored parameters in
this category and provides a brief description for each one. In the Monitored parameter column, the
value in parentheses is the value you can specify for the mapsRule -monitor parameter.
Cyclic redundancy check The number of times an invalid cyclic redundancy check error occurs on a port or a
(CRC) frame that computes to an invalid CRC. Invalid CRCs can represent noise on the
network. Such frames are recoverable by retransmission. Invalid CRCs can indicate
a potential hardware problem.
Invalid transmission words The number of times an invalid transmission word error occurs on a port. A word did
(ITW) not transmit successfully, resulting in encoding errors. Invalid word messages
usually indicate a hardware problem.
Sync loss (LOSS_SYNC) The number of times a synchronization error occurs on the port. Two devices failed
to communicate at the same speed. Synchronization errors are always
accompanied by a link failure. Loss of synchronization errors frequently occur due
to a faulty SFP transceiver or cable.
Link failure (LF) The number of times a link failure occurs on a port or sends or receives the Not
Operational Primitive Sequence (NOS). Both physical and hardware problems can
cause link failures. Link failures also frequently occur due to a loss of
synchronization or a loss of signal.
Signal loss (LOSS_SIGNAL) The number of times that a signal loss occurs in a port. Signal loss indicates that no
data is moving through the port. A loss of signal usually indicates a hardware
problem.
Protocol errors (PE) The number of times a protocol error occurs on a port. Occasionally, protocol errors
occur due to software glitches. Persistent errors occur due to hardware problems.
Link reset (LR) The ports on which the number of link resets exceed the specified threshold value.
Class 3 time outs (C3TXTO) The number of Class 3 discards frames because of time outs.
State changes (STATE_CHG) The state of the port has changed for one of the following reasons:
• The port has gone offline
• The port has come online
• The port is faulty
SFP current (CURRENT) The amperage supplied to the SFP transceiver. Current area events indicate
hardware failures.
SFP receive power (RXP) The power of the incoming laser in microwatts (µw). This is used to help determine if
the SFP transceiver is in good working condition. If the counter often exceeds the
threshold, the SFP transceiver is deteriorating.
SFP transmit power (TXP) The power of the outgoing laser in microwatts (µw). This is used to help determine if
the SFP transceiver is in good working condition. If the counter often exceeds the
threshold, the SFP transceiver is deteriorating.
SFP voltage (VOLTAGE) The voltage supplied to the SFP transceiver. If this value exceeds the threshold, the
SFP transceiver is deteriorating.
SFP temperature The temperature of the SFP transceiver in degrees Celsius. A high temperature
(SFP_TEMP) indicates that the SFP transceiver may be in danger of damage.
SFP power on hours The number of hours the SFP transceiver is powered on.
(PWR_HRS)
FRU Health
The FRU Health category enables you to define rules for field-replaceable units (FRUs), including
small form-factor pluggable (SFP) transceivers, power supplies, and flash memory. Table 6 lists the
monitored parameters in this category and provides a brief description for each one. Possible
states for all FRU measures are faulty, inserted, on, off, ready, and up.
MAPS monitors FRUs (except for SFP FRUs) only in the default switch so you will not get FRU-related
alerts for other switches, nor will the FRU category in the MAPS dashboard be updated for FRU
alerts on non-default switches.
Security Violations
The Security Violations category monitors different security violations on the switch and takes
action based on the configured thresholds and their actions. Table 7 lists the monitored
parameters in this category and provides a brief description for each one.
Login violations (SEC_LV) Login violations which occur when a secure fabric detects a login failure.
Invalid Certifications Certificates are not valid.
(SEC_CERT)
No-FCS (SEC_FCS) The switch has lost contact with the primary FCS.
SCC violations (SEC_SCC) SCC violations which occur when an unauthorized switch tries to join a secure
fabric. The WWN of the unauthorized switch appears in the ERRLOG.
SLAP failures (SEC_AUTH_FAIL) SLAP failures which occur when packets try to pass from a non-secure switch to
a secure fabric.
Telnet violations (SEC_TELNET) Telnet violations which occur when a Telnet connection request reaches a
secure switch from an unauthorized IP address.
TS out of sync (SEC_TS) Time Server (TS) violations, which occur when an out-of-synchronization error
has been detected.
Domain ID changes (DID_CHG) Monitors forced domain ID changes. Forced domain ID changes occur when
there is a conflict of domain IDs in a single fabric and the principal switch must
assign another domain ID to a switch.
Fabric logins (FLOGI) Activates when ports and devices initialize with the fabric.
Fabric reconfigurations Tracks the number of reconfigurations of the fabric. Fabric reconfiguration
(FAB_CFG) occurs when:
• Two fabrics with the same domain ID are connected
• Two fabrics are joined
• An E_Port or VE_Port goes offline
• A principal link segments from the fabric
E_Port downs (EPORT_DOWN) Tracks the number of times that an E_Port or VE_Port goes down. E_Ports and
VE_Ports go down each time you remove a cable or an SFP transceiver (where
there are SFP transceiver failures or transient errors).
Segmentation changes Tracks the cumulative number of segmentation changes. Segmentation
(FAB_SEG) changes occur because of one of the following:
• Zone conflicts
• Incompatible link parameters. During E_Port and VE_Port initialization,
ports exchange link parameters, and incompatible parameters result in
segmentation. This is a rare event.
• Domain conflicts
• Segmentation of the principal link between two switches
Zone changes (ZONE_CHG) Tracks the number of zone changes. Because zoning is a security provision,
frequent zone changes may indicate a security breach or weakness. Zone
change messages occur whenever there is a change in zone configurations.
Switch Resource
System resource monitoring enables you to monitor your system’s temperature, flash usage,
memory usage, and CPU usage.
You can use Switch Resource monitors to perform the following tasks:
• Configure thresholds for MAPS event monitoring and reporting for the environment and
resource classes. Environment thresholds enable temperature monitoring, and resource
thresholds enable monitoring of flash memory.
• Configure memory or CPU usage parameters on the switch or display memory or CPU usage.
Configuration options include setting usage thresholds which, if exceeded, trigger a set of
specified MAPS alerts. You can set up the system monitor to poll at certain intervals and
specify the number of retries required before MAPS takes action.
Table 9 lists the monitored parameters in this category and provides a brief description for each
one.
Temperature (TEMP) Refers to the ambient temperature inside the switch, in degrees Celsius.
Temperature sensors monitor the switch in case the temperature rises to levels
at which damage to the switch might occur.
Flash (FLASH_USAGE) Monitors the compact flash space available by calculating the percentage of
flash space consumed and comparing it with the configured high threshold
value.
CPU usage (CPU) Monitors the percentage of CPU available by calculating the percentage of CPU
consumed and comparing it with the configured threshold value.
Memory (MEMORY_USAGE) Monitors the available memory by calculating the percentage of memory
consumed and comparing it with the configured threshold value.
Traffic Performance
The Traffic Performance category groups areas that track the source and destination of traffic. You
can use traffic thresholds and alarms to determine traffic load and flow and to reallocate resources
appropriately. Table 10 lists the monitored parameters in this category and provides a brief
description for each one. Notifications related to this monitoring (for example, RASLogs and SNMP
messages) are based on the trunk master port traffic levels.
Receive bandwidth usage The percentage of port bandwidth being used by RX traffic. For example, if the
percentage (RX) port speed is 10 Gbps and the port receives 5 Gb of data in one second, then
the %RX utilization is 50 percent (5 Gb*100/(10 Gb*1 second)). For a master
trunk port this indicates the RX percentage for the entire trunk.
Transmit bandwidth usage The percentage of port bandwidth being used by TX traffic. For example, if the
percentage (TX) port speed is 10 Gbps and the port sends 5 Gb of data in one second, then
the %TX utilization is 50 percent (5 Gb*100/(10 Gb*1 second)). For a master
trunk port, this indicates the TX percentage for the entire trunk.
Utilization (UTIL) The percentage of individual port (or trunk) bandwidth being used at the time of
the most recent poll.
Transmitted frame count The number of frames transmitted from the flow source.
(TX_FCNT)
Received frame count The number of frames received by the flow destination.
(RX_FCNT)
Transmitted throughput The number of megabytes (MB) transmitted per second by the flow source.
(TX_THPUT)
Received throughput The number of megabytes (MB) received per second by the flow destination.
(RX_THPUT)
SCSI frames read (IO_RD) The number of SCSI I/O read command frames recorded for the flow.
SCSI frames written (IO_WR) The number of SCSI I/O write command frames recorded for the flow.
SCSI frames read The number of SCSI I/O bytes read as recorded for the flow.
(IO_RD_BYTES)
SCSI frames written The number of SCSI I/O bytes written as recorded for the flow.
(IO_WR_BYTES)
FCIP Health
The FCIP Health category enables you to define rules for FCIP health, including circuit state
changes, circuit state utilization, and packet loss. Table 11 lists the monitored parameters in this
category and provides a brief description for each one.
FCIP circuit state changes The state of the circuit has changed for one of the following reasons:
(CIR_STATE) • The circuit has gone offline
• The circuit has come online
• The circuit is faulty
FCIP circuit utilization The percentage of circuit utilization in the configured time period (this can be
(CIR_UTIL) minute, hour, or day).
FCIP circuit packet loss The percentage of the total number of packets that have had to be
(CIR_PKTLOSS) retransmitted.
In this chapter
• MAPS groups overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
• MAPS policies overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
• Working with MAPS policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
• MAPS rules overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
• MAPS conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
• MAPS actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
• Working with MAPS rules and actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Predefined groups
MAPS provides several predefined groups that you cannot edit or delete.Table 12 lists these
predefined groups, organized by object type.
NON_E_F_PORTS FC Port All ports in the logical switch which are neither E_Ports nor F_Ports.
ALL_10GSWL_SFP SFP All 10-Gbps SWL SFP transceivers on FC Ports in the logical switch.
ALL_10GLWL_SFP SFP All 10-Gbps LWL SFP transceivers on FC Ports in the logical switch.
ALL_16GSWL_SFP SFP All 16-Gbps Short Wavelength (SWL) SFP transceivers in the logical
switch.
ALL_16GLWL_SFP SFP All 16-Gbps Long Wavelength (LWL) SFP transceivers in the logical switch.
ALL_OTHER_SFP SFP All small form-factor pluggable (SFP) transceivers which do not belong to
one of the following groups:
• ALL_10GSWL_SFP
• ALL_10GLWL_SFP
• ALL_16GSWL_SFP
• ALL_16GLWL_SFP
• ALL_QSFP
ALL_QSFP SFP All quad small form-factor pluggable (QSFP) transceivers in the logical
switch.
ALL_SLOTS Slot All slots present in the chassis.
ALL_SW_BLADES Blade All port and application blades in the chassis.
ALL_CORE_BLADES Blade All core blades in the chassis.
ALL_CIRCUITS Circuit All Fibre Channel over Internet Protocol (FCIP) circuits in the logical switch.
ALL_FAN Fan All fans in the chassis.
ALL_FLASH Flash The flash memory card in the chassis.
ALL_PS Power Supply All power supplies in the chassis.
ALL_TS Temperature All temperature sensors in the chassis.
Sensor
ALL_WWN WWN All WWN cards in the chassis.
SWITCH Switch Default group used for defining rules on parameters that are global for the
whole switch level, for example, security violations or fabric health.
CHASSIS Chassis Default group used for defining rules on parameters that are global for the
whole chassis, for example, CPU or flash.
User-defined groups
In many cases, you need groups of elements that are more suited for your environment than the
predefined groups. For example, small form-factor pluggable (SFP) transceivers from a specific
vendor can have different specifications than SFP transceivers from another vendor. For example,
when monitoring SFP transceivers, you might want to create a separate group of SFP transceivers
for each separate vendor. In another scenario, some ports may be more critical than others, and so
would be monitored using different thresholds than other ports. A maximum of 64 user-defined
groups and imported flows combined is permitted per logical switch.
To view details of a specific logical group on a switch, enter the following command:
logicalGroup --show groupname
This command returns the group name, whether the group is predefined, the group’s type (port,
SFP, and so on), the number of members, and the group members.
The following example shows the output of logicalGroup --show ALL_TS.
switch:admin> logicalgroup --show ALL_TS
--------------------------------------------------------------------------------
Group Name |Predefined |Type |Member Count |Members
--------------------------------------------------------------------------------
ALL_TS Yes Temperature Sensor 4 0-3
You can also use this command to display the state of flows from a MAPS perspective. The state of
a flow is shown in the output in the “Members” column.The following example shows the output of
logicalGroup --show for a flow imported into MAPS that is active in Flow Vision, and being
monitored through MAPS.
switch:admin> logicalgroup -show fpm1
--------------------------------------------------------------------------------
Group Name |Predefined |Type |Member Count |Members
--------------------------------------------------------------------------------
fpm1 No Flow 1 Monitored Flow
The following example shows the output of logicalGroup --show for a flow imported into MAPS that
has either been deleted in Flow Vision or has been changed in Flow Vision to be a learning flow, or
has been changed in Flow Vision in such a way that statistics are not being generated. MAPS is not
monitoring this flow, but it is maintained as a zero member group. If you want to start monitoring
this flow, you must reimport the flow using mapsConfig --import -force. Refer to the Fabric OS
Command Reference for more information on using mapsConfig or logicalGroup.
switch:admin> logicalgroup --show fpm2
---------------------------------------------------------------------------------
Group Name |Predefined |Type |Member Count |Members
---------------------------------------------------------------------------------
fpm2 No Flow 0 Not Monitored
(Stale Flow)
2. Create rules using this logical group and add them to the active policy.
switch:admin> mapsrule --create unix_hi_crc -monitor crc -group unix_ports
-timebase min -op g -value 50 -action raslog -policy my_policy
You must enable the policy even if it is the active policy. Adding a rule to the active policy does
not take effect until you re-enable the policy.
Predefined policies
MAPS provides three predefined policies that you can neither modify or delete:
• dflt_moderate_policy
Contains rules with thresholds values between the aggressive and conservative policies.
This is the default policy.
• dflt_aggressive_policy
Contains rules with very strict thresholds. Use this policy if you need a pristine fabric (for
example, FICON fabrics).
• dflt_conservative_policy
Contains rules with more lenient thresholds that allow a buffer and do not immediately trigger
actions. Use this policy in environments where the elements are resilient and can
accommodate errors.
Although you cannot modify the preconfigured policies, you can create a policy based on these
policies. For more information, refer to “Modifying a default policy” on page 25.
User-defined policies
MAPS allows you to define your own policies. You can create a policy and add rules to it, or you can
clone one of the default policies and modify the cloned policy. Refer to “Working with MAPS
policies” on page 24 for information on working with user-defined policies.
This command displays the policy names and the number of rules in each policy.
To view the features of all the policies on a switch, enter the following command:
switch:admin> mapspolicy --show -all
This command displays for all policies, the policy names, rule names, actions, and condition for
each policy.
To view the features of a specific policy, enter the following command:
switch:admin> mapspolicy --show policyname
This command displays for the named policy, the policy names, rule names, actions, and condition.
Creating a policy
In some cases you need multiple policies, for example, to apply a different set of rules when
maintenance operations are in progress. You can create multiple policies beforehand and then
easily switch between policies when necessary.
To create policies and then add rules to them, complete the following steps.
1. Create a new policy or clone a policy from one of your existing policies.
Use mapsPolicy with --create to create a policy, or --clone to clone an existing policy.
2. Create rules or modify rules to configure the required thresholds in the new policy.
Use mapsRule with --add to create rules, or --config to modify existing rules.
The policy is automatically saved, but not enabled. It is not enabled unless you explicitly enable it.
The following example creates a policy by cloning another policy, and adds a rule to the new policy.
switch:admin> mapspolicy --clone defpol -name backup_pol
switch:admin> mapsrule --create chassiscpu -monitor CPU -group chassis -op ge
-value 70 -action raslog -policy backup_pol
Enabling a policy
A policy must be enabled before it takes effect. If the active policy is changed, or if the rules in the
active policy are changed, the active policy must be re-enabled for the changes to take effect. Only
one policy can be enabled at a time. To enable a policy, enter mapsPolicy --enable policyname.
When you do this, the previously enabled policy is automatically disabled and the specified policy is
then enabled.
Modifying a policy
In some cases you might need to modify a policy, for example, if elements in the fabric change or if
threshold configurations need to be modified to catch certain error conditions.
To modify a policy and its associated rules, complete the following steps.
1. Modify the rules in the policy based on your requirements.
You cannot modify the default rules, but you can add rules to and delete rules from the policy,
and you can create rules and add them to the policy.
Use mapsPolicy to add rules to and delete rules from the policy. Use mapsRule to modify rules
or to create rules and add them to the policy.
2. If the policy is the active policy, you must enable the policy for the changes to take effect.
switch:admin> mapspolicy --enable my_policy
Changing the rules of the active policy does not take effect until you re-enable the policy.
The following example adds a rule to the policy named daily_policy, displays the policy, and then
re-enables the policy so the change can become active.
switch:admin> mapspolicy --addrule daily_policy -rulename check_crc
switch:admin> mapspolicy --show daily_policy
Policy Name: daily_policy
Rule List :
check_crc
defALL_E_PORTSITW_21
defALL_E_PORTSITW_40
myCHASSISFLASH_USAGE_90
The following example clones the default policy, deletes two rules, and modifies a rule to send an
e-mail message in addition to a RASLog entry.
switch:admin> mapspolicy --clone dflt_moderate_policy -name rule_policy
switch:admin> mapspolicy --delrule rule_policy -rulename defCHASSISFLASH_USAGE_90
switch:admin> mapspolicy --delrule rule_policy
-rulename defCHASSISMEMORY_USAGE_75
switch:admin> mapsrule --clone myCHASSISFLASH_USAGE_90 -monitor flash_usage
-group chassis -timebase none -op ge -value 90 -action raslog,email
-policy rule_policy
switch:admin> mapspolicy --enable rule_policy
MAPS conditions
A MAPS condition includes a time base and a threshold. If the condition is evaluated as true, the
rule is triggered. The condition depends on the element that is to be monitored.
Consider the following rule:
For all F_Ports, if the change in the CRC counter in the last minute is greater than 10, then
fence the port and issue a RASLog message.
In this rule, the condition is whether the change in the CRC counter in the last minute is greater
than 10. For more details on RASLog messages in MAPS, refer to the Fabric OS Command
Reference.
Thresholds
Thresholds are the values at which potential problems may occur. For example, in configuring a
port threshold, you can select a specific value at which an action is triggered because of too many
threshold violations.
Consider the following condition:
The change in the CRC counter in the last minute is greater than 10.
For this condition, the threshold is “greater than 10”.
NOTE
MAPS conditions are applied on a per-port basis, not switch- or fabric-wide. For example, 20 ports
that each get 1 CRC counter would not trigger a “greater than 10” rule.
Time base
Time bases specify the time interval between two samples to be compared. You can set the time
base to day (samples are compared once a day), hour (samples are compared once an hour), or
minute (samples are compared every minute).
The time base affects the comparison of sensor-based data with user-defined threshold values.For
measures where the time base is not applicable, set the time base to “none”.
MAPS actions
When you create a rule, you associate an action for MAPS to take if the condition defined in the rule
evaluates to true.
Each rule can have one or more actions associated with it. For example, you can configure a rule to
issue a RASLog message and fence the port if the number of CRC errors on any E_Port is greater
than 20 per minute.
The global action settings on the switch take precedence over the actions defined in the rules. For
example, if the global action settings allow RASLog alerts, but do not allow port fencing, then in the
previous example, if the CRC threshold is reached, a RASLog message would be issued but the port
would not be fenced. To enable global actions, use mapsConfig --actions. For more details, refer to
“Enabling or disabling actions at a global level” on page 28. Refer to the Fabric OS Command
Reference for further details on using this command.
MAPS provides the following actions:
• RASLog messages
• SNMP traps
• E-mail alert
• Port fencing
• Switch critical
• Switch marginal
• SFP marginal
NOTE
To disable all actions, enter mapsConfig --actions none. The none keyword cannot be combined
with any other action.
The following example shows that port fencing (fence) is not an allowed action on the switch, and
then adds it to the list of allowed actions.
switch:admin> mapsconfig --show
Configured Notifications: RASLOG,EMAIL
Mail Recipient: [email protected]
Relay Host: Relay Host IP is: 1.1.1.1
Paused members :
PORT :
CIRCUIT :
SFP :
switch:admin> mapsconfig --actions raslog,email,fence
switch:admin> mapsconfig --show
Configured Notifications: RASLOG,EMAIL,FENCE
Mail Recipient: [email protected]
Relay Host: Relay Host IP is: 1.1.1.1
Paused members :
PORT :
CIRCUIT :
SFP :
RASLog messages
Following an event, MAPS adds an entry to the internal event log for an individual switch. The
RASLog stores event information but does not actively send alerts. You can use errShow to view
the RASLog. Refer to the Fabric OS Command Reference for a complete listing and explanation of
MAPS-related RASLog messages.
SNMP traps
In environments where you have a high number of messages coming from a variety of switches, you
may want to receive them in a single location and view them using a graphical user interface (GUI).
In this type of scenario, Simple Network Management Protocol (SNMP) notifications may be the
most efficient notification method. You can avoid having to log in to each switch individually as you
would have to do for error log notifications.
When specific events occur on a switch, SNMP generates a message (called a “trap”) that notifies
a management station using SNMP. Log entries can also trigger SNMP traps if the SNMP agent is
configured. When the SNMP agent is configured to a specific error message level, error messages
at that level trigger SNMP traps.
An SNMP trap forwards the following information to an SNMP management station:
• Name of the element whose counter registered an event
• Class, area, and index number of the threshold that the counter crossed
• Event type
• Value of the counter that exceeded the threshold
• State of the element that triggered the alarm
• Source of the trap
The SNMP trap only stores event information. In order to get the event notifications, you must
configure the SNMP software to receive the trap information from the network device, and
configure the SNMP agent on the switch to send the trap to the management station. You can
configure SNMP notifications using snmpConfig or Brocade Network Advisor (refer to Event
notification in the Brocade Network Advisor User’s Manual or online help). For additional
information on configuring the SNMP agent using snmpConfig, refer to the Fabric OS Command
Reference.
E-mail alert
An e-mail alert sends information about the event to one or more specified e-mail addresses. The
e-mail alert specifies the threshold and describes the event, much like an error message.
You configure the e-mail recipients using mapsConfig --emailcfg. You must separate multiple
e-mail addresses with a comma and include the complete e-mail address. For example,
[email protected] is a valid e-mail address; abc@12 is not. Refer to “Sending alerts using e-mail” on
page 33 for more information.
Port fencing
The port fencing action fences the port if port fencing is enabled. Port fencing takes the ports
offline if the user-defined thresholds are exceeded. Supported port types include physical ports,
E_Ports, optical F_Ports (FOP_Ports), copper F_Ports (FCU_Ports), and Virtual E_Ports (VE_Ports).
If you configure port fencing as an action, make sure that port fencing is configured for the rule
with the highest monitored threshold. For example, if you configure a rule for CRC values greater
than 10 per minute and you configure a second rule for CRC values greater than 20 per minute, do
not configure port fencing as the action for the rule with the threshold value of 10.
MAPS does not fence E_Ports or trunked F_Ports based on C3TX_TO; MAPS does consider port
fencing for F_Ports based on C3TX_TO. MAPS does not fence D_Ports under any conditions.
Port fencing is valid only for conditions evaluated on ports. Refer to “Notes on Port Health” on
page 14 for additional information on CRC error counting.
Switch critical
The switch critical action sets the state of the affected switch in the MAPS dashboard display to
SW_CRITICAL. This action does not bring the switch down, but only affects what is displayed in the
dashboard.
This action is valid only in the context of Switch Status Policy-related rules.
Switch marginal
The switch marginal action sets the state of the affected switch in the MAPS dashboard to
SW_MARGINAL. This action does not affect the actual state of the switch, but only affects what is
displayed in the dashboard.
This action is valid only in the context of Switch Status Policy-related rules.
SFP marginal
The SFP marginal action sets the state of the affected small form-factor pluggable (SFP) transceiver
in the MAPS dashboard to “down”. This action does not bring the SFP transceiver down, but only
affects what is displayed in the dashboard.
This action is valid only in the context of Advanced SFP groups.
Creating a rule
Each rule monitors a single condition. When you create a rule, you can choose to add it to a policy.
To create a policy rule, complete the following steps.
1. Enter mapsRule --create to create the rule.
mapsrule --create rule_name -monitor monitor -group group_name
-timebase timebase -op comparison_operator -value threshold_value
-action action -policy policy
3. If you added the rule to the active policy, you must re-enable the policy for the rule to take
effect.
mapspolicy --enable policy
The following example creates a rule to generate a RASLog message if the CRC counter for a group
of critical ports is greater than 10 in an hour. This rule is added to the daily_policy, and the
daily_policy is re-enabled for the rule to take effect.
switch:admin> mapsrule --create check_crc -monitor crc -group critical_ports
-timebase hour -op g -value 10 -action raslog -policy daily_policy
switch:admin> mapsrule --show check_crc
Rule Data:
----------
RuleName: check_crc
Condition: critical_ports(crc/hour>10)
Actions: raslog
Policies Associated: daily_policy
switch:admin> mapspolicy --enable daily_policy
To accommodate creating a rule for a flow, mapsrule accepts a flow name as a value for the -group
parameter. The following example illustrates the structure.
switch:admin> mapsrule --create check_crc2 -monitor crc -group MyFlow
-timebase min -op g -value 15 -action raslog -policy daily_policy2
Modifying a rule
You can modify only user-defined rules. You cannot modify the default rules.
To modify a user-defined policy rule, complete the following steps.
1. Enter mapsRule --show to display the rule you want to modify.
mapsrule --show rule_name
2. Enter mapsRule --config followed by the parameters you are changing to modify the rule.
mapsrule --config check_crc2 -timebase hour
You only need to specify the parameters you are changing. Any parameters you do not specify
are not changed. The configuration settings you specify replace the existing configuration
settings for the rule.
3. Enter mapsRule --show to display the new rule.
mapsrule --show rule_name
4. If the rule is included in the active policy, you must re-enable the policy for the modified rule to
take effect.
mapspolicy --enable policy
The following example modifies the check_crc rule to generate a RASLog message if the CRC
counter for a group of critical ports is greater than 15 in an hour. This rule is part of the active
policy, so the policy is re-enabled for the change to take effect.
switch:admin> mapsrule --show check_crc
Rule Data:
----------
RuleName: check_crc
Condition: critical_ports(crc/hour>10)
Actions: raslog
Policies Associated: daily_policy
switch:admin> mapsrule --config check_crc -monitor crc -group critical_ports
-timebase hour -op g -value 15 -action raslog -policy daily_policy
switch:admin> mapsrule --show check_crc
Rule Data:
----------
RuleName: check_crc
Condition: critical_ports(crc/hour>15)
Actions: raslog
Policies Associated: daily_policy
switch:admin> mapspolicy --enable daily_policy
Cloning a rule
You can clone both default and user-defined rules.
To clone a rule, complete the following steps.
1. Enter mapsRule --show to display the rule you want to clone.
mapsrule --show rule_name
Optionally, you can specify the parameters you want to be different from the old rule in the new
rule. If no parameters other than -rulename are specified, an exact copy of the original rule is
created. You can later modify the rule by using --config.
For example, the following command clones “myOldRule” as “myNewRule”, but changes the
flow that is being monitored to “flow2” and assigns it the monitor “monitor2”.
switch:admin> mapsrule --clone myOldRule -rulename myNewRule -group flow2
-monitor monitor2
The following example creates a cloned rule with a changed time base.
admin> mapsrule --clone Rule1 -rulename NewRule2 -timebase hour
admin> mapsrule --show NewRule2
RuleName: NewRule2
Action: Raslog, Fence, SNMP
Condition: Switch(SEC_IDB/Hour>0)
Policies Associated: none
The following example shows all rules. Notice that the actions are not abbreviated in the output.
admin> mapsrule --show all
----------------------------------------------------------------------------
RuleName Action Condition
----------------------------------------------------------------------------
Rule1 Raslog, Fence, SNMP Switch(SEC_IDB/Min>0)
Rule2 Raslog Switch(SEC_IDB/Hour>1)
NewRule1 Raslog, Fence, SNMP Switch(SEC_IDB/Min>0)
NewRule2 Raslog, Fence, SNMP Switch(SEC_IDB/Hour>1)
The following example shows the policy names associated with the rule. If the rule is not associated
with a policy, nothing is shown. The actions are abbreviated in the output.
admin> mapsrule --show rule1
RuleName: Rule1
Action: Raslog, Fence, SNMP
Condition: Switch(SEC_IDB/Min>0)
Policies Associated: daily_policy, crc_policy
To send an alert to multiple email addresses, separate the addresses using a comma.
2. Enter the mapsConfig --show command to display the e-mail configuration settings. Refer to
“Configuring e-mail server information” on page 34 for information on specifying the email
server to be used.
mapsconfig --show
The following example specifies the e-mail address for e-mail alerts on the switch.
switch:admin> mapsconfig --emailcfg -address [email protected]
switch:admin> mapsconfig --show
Configured Notifications: RASLOG,EMAIL,FENCE
Mail Recipient: [email protected]
Relay Host: Relay Host IP is: 10.168.39.118
Relay Host Domain Name: brocade.com
Paused members :
PORT :
CIRCUIT :
SFP :
The following example specifies multiple e-mail addresses for e-mail alerts on the switch.
The following example configures the switch to use an e-mail server located at 10.70.212.168
named “mail.brocade.com”.
switch:admin> relayconfig --config -rla_ip 10.70.212.168 -rla_dname
"mail.brocade.com"
In this chapter
• Flows and MAPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
• Monitoring flows using MAPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
NOTE
Only the statistics monitoring functionality is supported in MAPS. The Flow Generator and Flow
Mirror features are not integrated with MAPS.
Importing flows
A flow can be imported any time after it has been defined in Flow Vision. Only static flows can be
imported into MAPS. Learned flows (those created using an asterisk (*)) cannot be imported or
monitored. When importing a flow, the flow name must be specified.
Only active flows can be monitored in MAPS. MAPS monitoring starts after a flow has both been
activated in Flow Vision and imported into MAPS. Deactivating a flow causes monitoring to stop
until it is reactivated. When the flow is reactivated, monitoring automatically restarts.
Once a flow is imported to MAPS, you can define MAPS rules to monitor the flow. Each rule has a
threshold criterion and alerting mechanism defined. If the threshold criterion is met, then a
configured alert is generated.
The following example imports an existing flow named “myflow22” into MAPS.
switch:admin> mapsconfig --import myflow22
ATTENTION
Subflow monitoring is not supported at this time.
ATTENTION
Small form-factor pluggable (SFP) transceiver monitoring on simulated mode (SIM) ports is not
supported for MAPS.
MAPS Dashboard 6
In this chapter
• MAPS dashboard overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
• Flow Vision integration with the MAPS dashboard . . . . . . . . . . . . . . . . . . . . 48
• Bottleneck detection integration with the MAPS dashboard . . . . . . . . . . . . 47
Historical data
The historical data section provides information on how the switch has been behaving regardless of
whether rules were triggered. It contains only port-related statistics. The historical information is
the raw counter information since the previous midnight. Using this information, you can get an
idea of the errors seen on the switch even though none of the rules might have been violated. And
if you see potential issues, you can reconfigure the appropriate rule thresholds to specifically fit the
switch based on the information shown instead of using the default thresholds. The historical data
log stores the last seven days on which errors were recorded (not the last seven calendar days but
the last seven days, irrespective of any interval between these days). If a day does not have any
errors, the dashboard does not include that day in the results.
• By default only the last five violations are displayed for each category. However, running
mapsDb --show all causes the dashboard to display all the rule violations currently stored
along with additional historical data.
• If there are no errors for the switch ports, security, fabric, or FCIP health, the dashboard
displays “No-error”. If there are no errors for any of the other categories, the dashboard
displays “In-range”. The following dashboard state conditions may be displayed:
• No-error: Displayed if there is no error, for example, if no port has had an error since
midnight.
• In-range: Displayed if there are errors but no rule was triggered.
• Out of range: Displayed if at least one error triggered a rule belonging to the category in
which this state message appears.
• CIR_UTIL errors (CIR_UTIL, RX, TX, UTIL) are not displayed in the Historical data section unless
other errors are recorded for that day.
Contributing Factors:
---------------------
*BAD_PWR (MARGINAL).
*BAD_FAN (CRITICAL).
|Triggered Value(Units)|
------------------------
|876 CRCs |
|876 CRCs |
|FAULTY |
|FAULTY |
Contributing Factors:
---------------------
*BAD_PWR (MARGINAL).
*BAD_FAN (CRITICAL).
|Triggered Value(Units)|
------------------------
|876 CRCs |
|876 CRCs |
|FAULTY |
|FAULTY |
3 History Data:
===============
The following example displays all stored historical port performance data for a chassis-based platform.
switch:admin> mapsdb --show history
History Data:
===============
or
mapsdb --show details -hour hh
The following example displays historical port performance data for July 9, 2013 for a
chassis-based platform. Because the health status of the current switch policy is “CRITICAL”, the
sections “Contributing Factors” and “Rules affecting health” are displayed. If the current switch
policy status was “HEALTHY”, neither of these sections would be displayed.
switch:admin> mapsdb --show details -day 7/09/2013
DB start time: Tue Jul 9 17:17:33 2013
Active policy: dflt_conservative_policy
Fenced Ports : none
| | | |Fan 1 \
|Triggered Value(Units)|
------------------------
|876 CRCs |
|876 CRCs |
|FAULTY |
|FAULTY |
3 History Data:
===============
Clearing data
The mapsDb --clear command deletes the stored data from the dashboard. This is useful if, for
example, you want to see only the data logged after making a change on the switch (or to a rule).
To clear the stored dashboard data from a switch, complete the following steps.
1. Connect to the switch and log in using an account with admin permissions.
2. Enter mapsDb --clear and specify the level of data (all, history, or summary) you want to
remove from the display.
mapsdb --clear -[all | history | summary]
NOTE
When the dashboard is cleared, a RASLog message is generated. For more details on RASLog
messages in MAPS, refer to the Fabric OS Message Reference.
NOTE
For the bottleneck daemon to produce notifications, the sub-second bottleneck monitoring
parameters must be correctly configured and the bottlenecks must be seen persistently on the ports.
Bottleneck events detected by the bottleneck daemon are shown in the Rules section of the
Summary view. However, even if the bottleneck daemon does not log a bottleneck event (due to
lack of persistence) the data shown in the Historical section can be used in the following ways:
• MAPS identifies the ports on which bottlenecks are seen and sorts them based on the number
of seconds that they exceeded the bottleneck threshold. This identifies the most strongly
affected ports, whether they are affected by persistent or transient bottlenecks.
• The cred_zero counter can also be used to detect bottlenecks. If the cred_zero counter
increases for a port but no bottleneck time is recorded, this indicates a potential transient
bottleneck on the port.
|Triggered Value(Units)|
------------------------
|11 |
|7 |
|57 |
|57 |
|STUCKVC |
|60 |
|TIMEOUT |
In this chapter
• Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
• Pausing and resuming MAPS monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
• MAPS Service Availability Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Overview
The following sections describe additional features in the Monitoring and Alerting Policy Suite
(MAPS).
Notes on MAPSSAM
• The MAPSSAM report does not distinguish why a port is recorded as down, it only reports that
how long the port has been down.
• The MAPSSAM report does not include the health status of GbE ports. MAPS only monitors and
reports the status for physical and virtual FC ports.
• When run as mapsSam --show, the command displays the following information:
- Port Number
• Port type:
• D (disable port)
• DIA (D_Port)
• DP (persistently disabled port)
• E (E_Port)
• F (F_Port)
• G (G_Port)
• T (Trunk port)
• TF (F_Port trunks)
• U (U_Port)
• VE (VE_Port)
• VEX (VEX_Port)
- Total up time (percent)
- Total down time (percent)
- Down Occurrence (times)
- Offline time (percent)
- Number of ports
The following example shows a typical output for mapsSam --show.
switch:admin> mapssam --show
Total Total Down Total
Port Type Up Time Down Time Occurrence Offline Time
(Percent) (Percent) (Times) (Percent)
==========================================================================
0 E 0.00 98.00 7 2.00
1 F 99.97 0.00 0 0.03
2 U 0.00 0.00 0 100.00
3 U 0.00 0.00 0 100.00
4 U 0.00 0.00 0 100.00
5 U 0.00 0.00 0 100.00
6 U 0.00 0.00 0 100.00
7 F 99.97 0.00 0 0.03
8 M 99.97 0.00 0 0.03
Number of Ports: 8
Appendix
In this appendix
• Default MAPS threshold values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
• FRU state thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
• Switch Status Policy thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
• Port monitoring thresholds for E_Ports and non-F_Ports. . . . . . . . . . . . . . . 53
• Port monitoring thresholds for F_Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
• FCIP monitoring thresholds. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
• Fabric monitoring thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
• Security monitoring thresholds. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
• Resource monitoring thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
• SFP monitoring thresholds for 10G and 16G SFPs . . . . . . . . . . . . . . . . . . . . 56
• SFP monitoring thresholds for QSFPs and all other SFPs. . . . . . . . . . . . . . . 57
PS
Fan
Same as Aggressive Same as Aggressive
SFP In, Out, Off, Faulty RASLOG, SNMP, EMAIL
policy policy
Blade
WWN
E_Ports NON-E_F_Ports
AG MO CO Actions AG MO CO Actions
TXP percentage
60 75 90
Utilization
percentage
C3TX_TO 2/4 3/10 11/20 0/2 3/5 6/10 2/4 3/10 11/20
CRC Low threshold: 0/2 5/10 11/20
RASLOG,
ITW SNMP, EMAIL 5/10 11/20 21/40
Link Reset High threshold: 0/2 3/5 6/10
FENCE, SNMP,
State Change EMAIL 0/2 3/7 8/15
Protocol Err 0/2 3/4 5/6
Loss of signal 0 3 5
Same As E_Ports Same as Same as E_Ports Same as
Link Failure (Refer to Table 15.) 0 3 5 F_Ports (Host) (Refer to Table 15.) F_Ports (Host)
Sync Loss 0 3 5
RXP RASLOG, 60 75 90
percentage SNMP, EMAIL
TXP
percentage
Utilization
State Change 0 3 5
Utilization percentage 60 75 90 RASLOG, SNMP, EMAIL
Packet Loss percentage 0.01 0.05 0.1
Domain ID Change 1
Fabric Logins 4 6 8
Fabric Reconfigurations 1 2 4
RASLOG, SNMP, EMAIL
E_ports down 1 2 4
Segmentation changes 1 2 4
Zone changes 2 5 10
DCC Violations 0 2 4
HTTP Violation 0 2 4
Illegal Command 0 2 4
Incompatible security DB 0 2 4
Login Violations 0 2 4
Invalid Certifications 0 2 4
RASLOG, SNMP, EMAIL
No-FCS 0 2 4
SCC Violations 0 2 4
SLAP failures 0 2 4
Telnet Violations 0 2 4
TS out of sync 1/hr 2/hr 4/hr
2/day 4/day 10/day
AG MO CO AG MO CO AG MO CO AG MO CO Actions
CURRENT (amps) 10 95 12 70
RXP (µw) 1999 2230 1259 1995
SFP_MARGINAL,
TXP (µw) 1999 2230 1259 1995
RASLOG, SNMP, EMAIL
VOLTAGE (volts) 3000 to 3600 2970 to 3600 3000 to 3600 3000 to 3600
TEMP (°C) -5 to 90 -5 to 90 -5 to 85= -5 to 90
TABLE 22 SFP monitoring thresholds for QSFPs and all other SFPs
Monitoring Statistic MAPS Thresholds (RASLOG threshold/Port Fencing threshold)
ALL_QSFP ALL_OTHER_SFP
AG MO CO Actions AG MO CO Actions
CURRENT (amps) 10 50
RXP (µw) 2180 5000
SFP_MARGINAL, RASLOG,
TXP (µw) - 5000 RASLOG, SNMP, EMAIL
SNMP, EMAIL
VOLTAGE (volts) 2940 to 3600 2960 to 3630
TEMP (°C) -5 to 85 -13 to 85
A mapsConfig
--actions, 8
actions, 27 --config continue, 49
e-mail alert, 29 --config pause, 49
enabling or disabling globally, 28 --enablemaps, 3, 7
port fencing, 29 --fwconvert, 3, 7, 23
RASLog, 28 --import, 35
SFP marginal, 30 --import -force, 36
SNMP trap, 29 mapsDb
switch down, 30 --clear, 46
switch marginal, 30 --show, 8, 41
Admin Domains considerations, 2 --show all, 39, 42
alerts, configuring e-mail address for, 33 --show details, 45
--show history, 44
mapsPolicy
B --clone, 24
--create, 24
bottleneck detection and MAPS dashboard, 47–48 --enable, 10, 24
bottleneck detection data on MAPS dashboard, 47 --show, 24
bottleneckmon command, 47 mapsRule, 13, 25
mapsSam
--clear, 49
C --show, 50
supportSave, xi
categories switchShow, 49
Fabric State Changes, 15 wwn, xi
FCIP Health, 17 conditions, 26
FRU Health, 14 configuration
monitoring, 11 configuration download, resetting MAPS to default, 10
Port Health, 12 configuration upload, resetting MAPS to default, 10
Security Violations, 14 quick start, 7–8
Switch Policy Status, 12 tasks, 8
Switch Resource, 16 configuring
Traffic Performance, 16 e-mail address for alerts, 33
cloning rules, 32 e-mail server information, 34
command MAPS, 7–8
bottleneckmon, 47 creating
flow policies, 24
--deimport, 36 rules, 30
licenseIdShow, xi cred_zero counter, 47
logicalGroup
--addmember, 9
--show, 21 D
dashboard, deleting stored data, 46
S V
viewing
Security Monitoring thresholds, 55 detailed switch status, 42
Security Violations category, 14 e-mail server information, 34
serial number location on switch, xi group information, 21
SFP marginal action, 30 historical data, 44, 45
SFP monitoring on SIM ports, 37 MAPS dashboard, 41–46
SFP Monitoring thresholds, 56, 57 summary switch status, 41
SIM ports, monitoring, 37 Virtual Fabrics considerations, 2
SNMP trap action, 29
stored data, deleting, 46
subflow monitoring, 36 W
summary switch status, viewing, 41 wwn command, xi
supportSave command, xi
switch
health, monitoring, 12
resource monitoring, 16
security violations, 14
serial number location, xi
switch down action, 30
switch marginal action, 30
Switch Policy Status category, 12
Switch Resource category, 16
Switch Status Policy thresholds, 52
switchShow command, 49