Escolar Documentos
Profissional Documentos
Cultura Documentos
Contents
Contents
10 Routine Maintenance ............................................................................................................10-1
10.1 Maintenance Policies.................................................................................................................................10-2 10.2 Routine Maintenance List .........................................................................................................................10-2 10.3 Daily Maintenance ....................................................................................................................................10-3 10.3.1 Monitoring the Process Status..........................................................................................................10-3 10.3.2 Monitoring the Database Status .......................................................................................................10-5 10.3.3 Viewing DMS Alarms ......................................................................................................................10-5 10.3.4 Viewing the Resource Status on the Server......................................................................................10-8 10.3.5 Viewing User Operation Logs..........................................................................................................10-9 10.3.6 Monitoring User Operations ..........................................................................................................10-10 10.4 Weekly Maintenance ............................................................................................................................... 10-11 10.4.1 Viewing Usage of the Server Hard Disk ........................................................................................ 10-11 10.4.2 Backing Up the System File...........................................................................................................10-12 10.4.3 Backing Up the Database Periodically...........................................................................................10-13 10.4.4 Backing Up the Database Manually...............................................................................................10-14 10.4.5 Viewing the Server Time................................................................................................................10-14 10.4.6 Clearing User Rights......................................................................................................................10-15 10.5 Monthly Maintenance .............................................................................................................................10-15 10.5.1 Checking the Power Supply of the Server .....................................................................................10-15 10.5.2 Checking the Hardware and Peripherals of the Server...................................................................10-16 10.5.3 Checking the Environment of the Equipment Room .....................................................................10-16
Issue 02 (2007-10-15)
Figures
Figures
Figure 10-1 Process information ......................................................................................................................10-4 Figure 10-2 Creating the current alarm profile.................................................................................................10-6 Figure 10-3 Selecting resource types................................................................................................................10-6 Figure 10-4 Selecting alarms............................................................................................................................10-7 Figure 10-5 System resources ..........................................................................................................................10-9 Figure 10-6 Setting the log query conditions ...................................................................................................10-9 Figure 10-7 Log querying results ...................................................................................................................10-10 Figure 10-8 Setting monitoring conditions.....................................................................................................10-10 Figure 10-9 Monitoring results....................................................................................................................... 10-11
ii
Issue 02 (2007-10-15)
Tables
Tables
Table 10-1 List of maintenance items...............................................................................................................10-2 Table 10-2 Environment standard of the equipment room..............................................................................10-16
Issue 02 (2007-10-15)
iii
10 Routine Maintenance
10
About This Chapter
Section 10.1 Maintenance Policies 10.2 Routine Maintenance List 10.3 Daily Maintenance 10.4 Weekly Maintenance 10.5 Monthly Maintenance
Routine Maintenance
The following table lists the contents of this chapter. Describes This section describes the maintenance policies. This section describes the maintenance item list. This section describes how to perform daily maintenance. This section describes how to perform weekly maintenance. This section describes how to perform monthly maintenance.
Issue 02 (2007-10-15)
10-1
10 Routine Maintenance
Do not directly run the halt command (in Solaris) or switch off the power. In this way, irretrievable damages may occur on the DMS. To ensure the stable and reliable running of the DMS, comply with the following:
z
It is recommended to configure an Uninterrupted Power Supply (UPS) on the DMS WS to protect the system against hardware corruption, system crash and data loss due to the unexpected power failure. If the DMS server cannot be configured with the UPS, after being informed that the power will be shut down, the administrator must close the DMS server in the correct way before the WS is powered off.
z z
Whenever you need to power off the DMS WS, follow the sequence: exit the DMS, exit the database, and run the init 6 command to restart the WS. After the system is started, run two applications, that is, the client and the System Monitor. These two programs do not need to be closed, so that the administrator can monitor the system status at any time.
The accounts of the NMS WS need to be divided according to their level and are granted to the maintenance personnel. The password of the administrative level account is only granted to the maintenance personnel.
z z z
Do not play games on the DMS server, do not install other unnecessary software or do not use it for other purpose. Do not connect any other computer or portable computer to the network where the DMS server is to avoid the problems, such as the IP address conflict or virus infection. Keep the equipment room clean and dry.
10-2
Issue 02 (2007-10-15)
10 Routine Maintenance
Period
Maintenance task View the resource status on the server. Check the user operation log. Monitor user operations.
Weekly
View the hard disk usage of the server. Back up the system file. Back up the database at the scheduled time. Manually back up the database. View the server time. Clear the user rights.
Monthly
Check the power supply of the server. Check the hardware and the peripheral devices of the server. Check the environment of the equipment room.
Monitoring the Process Status xe "Monitoring the Process Status" Monitoring the Database Status xe "Monitoring the Database Status" Viewing DMS Alarms xe "Viewing DMS Alarms" Viewing the Resource Status on the Server xe "Viewing the Resource Status on the Server" Viewing User Operation Logs xe "Viewing User Operation Logs" Monitoring User Operations xe "Monitoring User Operations"
Precaution
In daily maintenance, you only need to view the process information and do not need to perform other operations to avoid some errors.
Issue 02 (2007-10-15)
10-3
10 Routine Maintenance
Procedure
Step 1 Log in to the N2000 System Monitor. Step 2 Select the Process tab. On this tab, the process information of the NMS server is displayed. as shown in Figure 10-1. Figure 10-1 Process information
Step 3 This step is optional. Select and right-click one or more processes in the list. Choose the relevant item to do the following:
z z z
Start Process: Starts the selected processes. Stop Process: Stops the selected processes. Start mode: Set the start mode of the selected processes to the relevant modes.
The startup mode of the process includes four types as follows:
z z z z
Automatic: The process is automatically restarted after the process exits from the NMS abnormally. Manual: The process needs to be manually started after the process exits from the NMS abnormally. Disabled: You cannot start the process through System Monitor N2000. External: It is the fixed mode of the Database server process and cannot be modified.
z z
Refresh: Refreshes all data information of the selected processes. Detail Information: Details the process information.
----End
10-4
Issue 02 (2007-10-15)
10 Routine Maintenance
Precaution
When the database usage exceeds the alarm threshold, the following alarm prompts appear:
z z
The records of the database of the N2000 System Monitor turn red. The N2000 SysMointor sends an alarm to the NMS and the alarm is displayed in the alarm list.
Procedure
For details, refer to section "6.3 Viewing the Database Status ." Step 1 Log in to the N2000 System Monitor. Step 2 Select the Database tab. The database information of the NMS server is displayed on the tab. Step 3 This step is optional. Right-click the database information list. Choose Refresh to refresh the data of all items. ----End
Precaution
z z z
On one DMS client, you can open up to nine alarm windows of four types. The default alarm query template is Critical & Major Alarms. The Save button of the default template is unavailable and the user cannot modify the default template. When resetting the alarm query template, you can choose only one of the resource selection type and the resource type. You also can choose only one of alarm selection and alarm features. That is, when you choose one, the other is not available.
Procedure
Step 1 Log in to the DMS client. Step 2 Choose Fault > Fault Browse > Current Alarm. Step 3 By default, the Critical & Major Alarms window is displayed. On the Fault Browser navigation tree, choose and right-click the Current Alarm node. Choose Create Profile. You can customize the alarm template.
Issue 02 (2007-10-15)
10-5
10 Routine Maintenance
Step 4 Enter the profile name in the dialog box that appears, as shown in Figure 10-2. Figure 10-2 Creating the current alarm profile
Step 5 Select Select Resource Type in the Basic Settings box and click Select Resource Type. Step 6 Select the device type in the Select Resource Type dialog box, as shown in Figure 10-3. Click OK. Figure 10-3 Selecting resource types
Step 7 Select Select Alarm in the Basic Settings box and click Select Alarm.
10-6
Issue 02 (2007-10-15)
10 Routine Maintenance
Step 8 In the Select Alarm dialog box that appears, select the version relevant to the device type on the left and select one or more alarms in the alarm list on the right, as shown in Figure 10-4. Click OK. Figure 10-4 Selecting alarms
Step 9 Enter the Generated Time Range and Alarn Duration in the Create current alarm profile dialog box. Click OK. Step 10 In Fault Browser, double-click the customized alarm query template on the Current Alarm node. You can open the current customized alarm information. Step 11 This step is optional. In the list of alarm query results, right-click some alarms and perform the following operations:
z
Ack Alarm Choose Ack Alarm to acknowledge the alarm operation. If the selected alarm information is unacknowledged and uncleared, the status of the alarm is changed to "Acked & Uncleared." If the selected alarm information is unacknowledged and cleared, the alarm is moved to the history alarm database.
Clear Alarm Choose Clear Alarm to clear the alarm. If the selected alarm information is unacknowledged and uncleared, the status of the alarm is changed to "Unacked & Uncleared." If the selected alarm information is acknowledged and uncleared, the alarm is moved to the history alarm database.
Locating to Choose Locate to to locate the topology node where the alarm occurs. Details
Issue 02 (2007-10-15)
10-7
10 Routine Maintenance
Mask Choose Shielding. The Add dialog box appears. Click OK. Add the alarm information as the shielding condition to the shielding condition list of Specify Location Information and Alarm / Event Name
Step 12 This step is optional. Choose one alarm record in the list of alarm query results. Click the button on the lower part to do the following:
z z z z z
Click Details to view details of the alarm. Click Ack to acknowledge the alarm. Click Clear to clear the alarm. Click Print to set the parameters. Click Save to File to save the alarm file.
----End
Procedure
Step 1 Log in to the N2000 System Monitor. Step 2 Select the System Resource tab. On this tab, the information of the system resource on the NMS server is displayed. as shown in Figure 10-5.
10-8
Issue 02 (2007-10-15)
10 Routine Maintenance
Step 3 This step is optional. Right-click the database information list. Choose Refresh to refresh the data of all items. ----End
Procedure
Step 1 Log in to the DMS client. Step 2 Choose System > User Log Management > Browse Use Log. Step 3 The Browse user log interface is displayed. Open all operation logs by default. Set the query conditions in the window which is displayed, as shown in Figure 10-6. Figure 10-6 Setting the log query conditions
Issue 02 (2007-10-15)
10-9
10 Routine Maintenance
Step 4 Click OK. The log information that satisfies the conditions is displayed, as shown in Figure 10-7 Figure 10-7 Log querying results
----End
Precaution
You can monitor the user operations only when opening the Monitor user operation window.
Procedure
Step 1 In the NMS, choose System > User Log Management > Monitor Use Operations. Step 2 In the Monitor user operations window, set User, Client, Result and Operation Level., as shown in Figure 10-8. Figure 10-8 Setting monitoring conditions
Step 3 Click Apply. The operations, which are performed by the user and satisfy the conditions, are displayed in the following table, as shown in Figure 10-9.
10-10
Issue 02 (2007-10-15)
10 Routine Maintenance
----End
You can find some defects, such as the function is invalid and the performance is reduced when the device runs. Thus you can take proper measures to deal with the defects in time. You can back up the data periodically to avoid the loss of the data.
Viewing Usage of the Server Hard Disk xe "Viewing Usage of the Server Hard Disk" Backing Up the System File xe "Backing Up the System File" Backing Up the Database Periodically xe "Backing Up the Database Periodically" Backing Up the Database Manually xe "Backing Up the Database Manually" Viewing the Server Time xe "Viewing the Server Time" Clearing User Rights xe "Clearing User Rights"
Precaution
When the hard disk usage exceeds the alarm threshold, the following alarm prompts appear:
z z
The records of the hard disk of the N2000 System Monitor turn red. The N2000 SysMointor sends the alarm to the NMS and the alarm is displayed in the alarm list.
Procedure
Step 1 Log in to the N2000 System Monitor.
Issue 02 (2007-10-15)
10-11
10 Routine Maintenance
Step 2 Select the Disk tab. On the tab, the information of the hard disk of the NMS server is displayed. Step 3 This step is optional. Right-click the hard disk information interface. Choose Refresh to refresh the hard disk information. ----End
Procedure
Step 1 Back up the Solaris system file to the tape. Run the following command:
# ufsdump -0ucf /dev/rmt/0n <File to be backed up>
In the command, the /dev/rmt/0n indicates the tape that is used for backup.
In the command, the /dev/rmt/0n indicates the tape that is used for backup.
If you cannot find the files /etc/defaultrouter and /etc/Routes, you need not to back up these two files. /etc/hosts /etc/netmasks /etc/nodename /etc/hostname.*
In the file name, the "*" is the name of the network card, such as ce0. You can view it by the ifconfig a command.
10-12
Issue 02 (2007-10-15)
10 Routine Maintenance
/etc/profile /etc/rc3 /etc/rc3.d /n2kuser /etc/defaultrouter /etc/Routes Step 3 Back up the DMS files to the disk.
# ufsdump -0ucf /dev/rmt/0n /opt/n2000
In the command, the /dev/rmt/0n indicates the tape that is backed up.
----End
Precaution
You can configure a scheduled backup task only when the database set, automatic backup policy and backup device are configured.
Procedure
Step 1 Start the N2000 Database Backup Tool. Log in to the server to be configured. Step 2 Choose Configuration > Database Set. Create the set of all databases. Step 3 Optional. Choose Configuration > Backup Device and modify the path of the backup device. Step 4 Choose Configuration > Auto Backup Policy and create the backup policy. Step 5 Choose Operation > Auto Backup Task and configure the scheduled backup task.
For details, refer to section "9.3 Automatic Backup."
----End You can view the scheduled backup of the DMS database every week and ensure that the database can be backed up normally with the backup tool.
Issue 02 (2007-10-15)
10-13
10 Routine Maintenance
Procedure
Step 1 Start the database backup tool and log in to the server to be configured. Step 2 Choose Configuration > Database Set and create the set of all databases. Step 3 Choose Configuration > Backup Device and modify the path of the backup device. Step 4 Choose Operation > Manual Backup and manually back up the DMS database.
For operation details, refer to section 9.2 "Manual Backup."
----End
Procedure
Step 1 Log in to the Solaris OS as the n2kuser user. Step 2 Open one terminal window and switch to the root user. Run the following commands:
$ su Password:<root password>
Step 3 View the current server time and run the commands as follows:
# date
Step 4 This step is optional. If some abnormity occurs, perform the following:
z
Modify the server time. For details, refer to Chapter 1"Setting the NMS." In the case that NTP is abnormal, reset the NTP service. For details, refer to section "8 NTP Configuration."
----End
10-14
Issue 02 (2007-10-15)
10 Routine Maintenance
Procedure
Step 1 Log in to the DMS client as the admin user. Step 2 Choose System > Security Management. Step 3 In the Security Management window, clear the DMS user rights. Abide by the following principles to clear the user rights:
z z z
Delete the useless user name in time. For the new added devices, grant rights to the users who maintain the devices. Strictly group the user rights according to the user group and operation set. Set the users who have the same rights to the same group. Do not grant rights to a single user to reduce the effect on the NMS performance.
----End
Checking the Power Supply of the Server xe "Checking the Power Supply of the Server" Checking the Hardware and Peripherals of the Server xe "Checking the Hardware and Peripherals of the Server" Checking the Environment of the Equipment Room xe "Checking the Environment of the Equipment Room"
Procedure
Step 1 Check whether the power supply indicator of the server on the active and standby node is normal. Step 2 This step is optional. If some faults occur, contact the vendor to repair or replace it.
Issue 02 (2007-10-15)
10-15
10 Routine Maintenance
----End
Procedure
Step 1 Check whether the hardware on the active and standby servers is damaged. Step 2 Check whether the CD-ROM can run normally. Step 3 Check whether the tape drive can run normally. Step 4 This step is optional. If some faults occur, contact the vendor to repair or replace it. ----End
Procedure
Step 1 Check the temperature of the equipment room. Step 2 Check the humidity of the equipment room. Step 3 Check the dustproof status of the equipment room. Step 4 This step is optional. If the abnormity occurs, adjust the temperature and humidity of the equipment room, improve the sealing effect of the door and window, and clean the equipment room periodically. ----End
10-16
Issue 02 (2007-10-15)