Академический Документы
Профессиональный Документы
Культура Документы
LEGAL INFORMATION
By accepting this certain document of ZTE CORPORATION you agree to the following terms. If you do
not agree to the following terms, please notice that you are not allowed to use this document.
Copyright © 2018 ZTE CORPORATION. Any rights not expressly granted herein are reserved. This
document contains proprietary information of ZTE CORPORATION. Any reproduction, transfer,
distribution, use or disclosure of this document or any portion of this document, in any form by any
means, without the prior written consent of ZTE CORPORATION is prohibited.
and are registered trademarks of ZTE CORPORATION. ZTE’s company name, logo
and product names referenced herein are either trademarks or registered trademarks of ZTE
CORPORATION. Other product and company names mentioned herein may be trademarks or trade
names of their respective owners. Without the prior written consent of ZTE CORPORATION or the
third party owner thereof, anyone’s access to this document should not be construed as granting, by
implication, estopped or otherwise, any license or right to use any marks appearing in the document.
The design of this product complies with requirements of environmental protection and personal
security. This product shall be stored, used or discarded in accordance with product manual, relevant
contract or laws and regulations in relevant country (countries).
This document is provided “as is” and “as available”. Information contained in this document is subject
to continuous update without further notice due to improvement and update of ZTE CORPORATION’s
products and technologies.
ZTE CORPORATION
Address: NO. 55
Hi-tech Road South
ShenZhen
P.R.China
518057
Website: http://support.zte.com.cn
Email: 800@zte.com.cn
Revision History
Author
Prepared
Date Document Version Reviewed by Approved by
by
Intended audience:
Proposal: Before reading this document, you had better have the following knowledge and skills.
SEQ Knowledge and skills Reference material
1
2
3
Follow-up document: After reading this document, you may need the following information.
SEQ Reference material Information
1
2
3
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. III
ITMP User Manual Internal Use Only▲
Summary
Chapter Description
1 Overview
2 Operation Instructions
TABLE OF CONTENTS
1 Overview ......................................................................................................... 1
FIGURES
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. VII
ITMP User Manual Internal Use Only▲
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. VIII
ITMP User Manual Internal Use Only▲
1 Overview
The ITMP system can monitor and manage multiple kinds of IT devices, including routers,
switches, firewalls, database applications, operating systems, clusters, and standard
middleware. The system monitors these device nodes via polling and Trap message
receiving, to obtain these nodes’ running status and consequently provide the
performance data after processing. When node status has exceptions or KPIs exceed the
thresholds, it generates alarms, to remind the users.
It supports multiple computer systems, including Intel series PCs/servers and Sun
workstations/servers.
2 Operation Instructions
Before they can be monitored, device nodes need to be added to device groups.
Currently, we have the following device groups: server, database, router, switch, firewall,
cluster, storage, and application.
1. Click [IT Monitoring] on the toolbar of the navigation page to enter the IT monitoring
view, as shown below:
3. If you want to add a Solaris host, select [Solaris Server] in the [Add Node] dialog box,
and enter the related information, as shown below:
Click [Access Test]. Then the system will test the connectivity of the device according to
the information you have entered, and report the test result, as shown below:
4. Click [OK] to finish the operation. Then you can see the Solaris host node on the
node tree. Select this node, and its information will be displayed on the right side of
the page, as shown below:
You can delete a device node to cancel the monitoring on this device.
1. Click [IT Monitoring] on the toolbar of the navigation page to enter the IT monitoring
view, as shown below:
2. Right-click the node to be deleted from the node tree on the left, and select [Delete
Node], as shown below:
3. The [Confirm] dialog box will be displayed. Click [OK] to delete the node; click
[Cancel] to cancel the deletion, as shown below:
4. After you click [OK], the node will be deleted, and the client will inform you of the
deletion, as shown below:
The Proxy node needs to be added under the [IT Network] node. Follow the steps below
to add a proxy node:
1. Click [IT Monitoring] on the toolbar of the navigation page to enter the IT monitoring
view, as shown below:
2. Right-click the [IT Network] node, and select [Add Proxy], as shown below:
3. The [Add Proxy] dialog box will be displayed. Enter the related information, as
shown below:
Click [Access Test]. Then the system will test the connectivity of the proxy according to
the information you have entered and report the test result, as shown below:
4. Click [OK] to finish the operation. Then you can see the added proxy node on the
node tree. Select this node, and its information will be displayed on the right side of
the page, as shown below:
After you add a proxy node, you can refer to Section 2.1.1 to add various device nodes
under this proxy.
You can delete a proxy node to cancel the monitoring on this proxy and on the devices
added under this proxy node.
1. Click [IT Monitoring] on the toolbar of the navigation page to enter the IT monitoring
view, as shown below:
2. Right-click the proxy node to be deleted from the node tree on the left, and select
[Delete Node], as shown below:
3. The [Confirm] dialog box will be displayed. Click [OK] to delete the node; click
[Cancel] to cancel the deletion, as shown below:
4. After you click [OK], the node will be deleted, and the client will inform you of the
deletion, as shown below:
You can refresh a node to obtain the latest information of this node.
5. Click [IT Monitoring] on the toolbar of the navigation page to enter the IT monitoring
view, as shown below:
6. Select a device node from the node tree on the left, and then click the [Refresh]
button on the right, as shown below:
You can set a node to modify the related information. Note that if you have modified the
login user, the password, or the port (TELNET, SSH port, SNMP port, database port, etc.),
it is suggested that perform the access test before saving the modifications.
1. Click [IT Monitoring] on the toolbar of the navigation page to enter the IT monitoring
view, as shown below:
2. Select a device node from the node tree on the left. Then click the [Set] button on the
right, as shown below:
3. The [Set] dialog box will be displayed. Modify the related information and click [OK]
to complete the modification, as shown below:
Note: If you have modified the login user, password, or port, it is suggested that you
perform the access test first.
You can set the components of a node, to add or delete some components. Some nodes
may have components such as file system, network card, port, and process.
1. Click [IT Monitoring] on the toolbar of the navigation page to enter the IT Monitoring
view, as shown below:
2. Select a device node from the node tree on the left, and click the [Component
Information] tab on the right, as shown below:
3. To set a component, click the corresponding [Set] button on the right, as shown
below:
4. Modify the information in the [Component Set] dialog box, and click [OK] to complete
the modification, as shown below:
You can start and stop status monitoring, and configure the polling interval and some
status monitoring parameters, such as the log filtering keywords for log monitoring and
the port for port monitoring, in the [Status Monitoring] tab page.
1. Click [IT Monitoring] on the toolbar of the navigation page to enter the IT Monitoring
view, as shown below:
2. Select a device node from the node tree on the left, and click the [Status Monitoring]
tab on the right, as shown below:
3. To start or stop a status monitoring item, click the corresponding [Start] or [Stop]
button on the [Status Monitoring] tab page, as shown below:
4. To set a status monitoring item, click the corresponding [Set] button, as shown
below:
5. Modify the information in the popup dialog box, and click [OK] to complete the
modification, as shown below:
the monitoring status, and set the monitoring object, the threshold-crossing alarms, and
the time parameters.
2. Select a device node from the node tree, and then click [Create Measurement Task]
to open the [Create Measurement Task] dialog box.
3. In the popup [Create Measurement Task] dialog box, set the task information, and
click [OK] to complete the creation.
When a measurement task is in the activated status, you can suspend it.
When a measurement task is in the suspended status, you can activate it.
You can set a measurement task as required, such as its task objects, task location, and
general information.
3. Click [Modify Measurement Task] to open the [Modify Measurement Task] dialog
box.
4. In the popup [Modify Measurement Task] dialog box, select the [Measurement Task]
tab, and set the performance objects. Then click [OK].
You can set the location of a measurement task based on the requirement.
3. Click the [Modify Measurement Task] button to open the [Modify Measurement Task]
dialog box.
4. Select the [Location] tab. Then you can set the wildcard level, the NE location and
the MO location in this tab page. After that, click [OK].
You can set the general information of a measurement task based on the requirement.
Follow the steps below to set the general information of a measurement task:
3. Click the [Modify Measurement Task] button to open the [Modify Measurement Task]
dialog box.
5. Set the task end time, the granularity, the effective date and the effective time.
Figure 2-61 Set the task end time and the granularity
1. Select [Performance] -> [Threshold Task Management] from the main menu to enter
the threshold task management view.
2. Select a device node from the node tree, and click [Create threshold task] to open
the [Create Threshold Task] dialog box.
3. Set the threshold task information, and then click [OK] to complete the creation.
When a threshold task is in the activated status, you can suspend it.
1. Select [Performance] -> [Threshold Task Management] from the main menu to enter
the threshold task management view.
When a threshold task is in the suspended status, you can activate it.
1. Select [Performance] -> [Threshold Task Management] from the main menu to enter
the threshold task management view.
2. Select the threshold task, and then click [Activate Threshold Task].
You can set a threshold task as required, such as the threshold index, the location, and
the general information.
After you set threshold-crossing alarms for the performance indexes of a threshold task,
threshold-crossing alarms will be generated if the collected performance data exceeds or
is lower than the defined thresholds.
Follow the steps below to set the threshold-crossing alarms for a threshold task:
1. Select [Performance] -> [Threshold Task Management] from the main menu to enter
the threshold task management view.
2. Suspend the threshold task to be modified, and then click [Modify threshold task].
3. In the popup dialog box, select the threshold index to be modified, and then click
[Set index].
4. The [Modify Threshold] dialog box will be displayed. Set the thresholds, and click
[OK].
When you are setting the threshold index, you need to refer to the alarm direction, i.e.
whether alarms are generated when the index value exceeds the threshold or when the
index value is lower than the threshold. For example, if alarms are generated when the
index value exceeds the threshold, the following order should be followed when you set
the thresholds: [Warning]<[Minor]<[Major]<[Critical]. Otherwise, the system will prompt
you that the threshold setting is wrong.
1. Select [Performance] -> [Threshold Task Management] from the main menu to enter
the threshold task management view.
2. Suspend the threshold task to be modified and click [Modify threshold task]. For
details, please refer to Section 2.2.5.
3. The [Modify Threshold Task] dialog box will be displayed. Select the [Location] tab.
Then you can set the monitoring level, the wildcard level, the NE location, and the
MO location. After that, click [OK].
Follow the steps below to set the general information of a threshold task:
1. Select [Performance] -> [Threshold Task Management] from the main menu to enter
the threshold task management view.
3. Click [Modify threshold task] to open the [Modify Threshold Task] dialog box.
5. Set the task end time, the granularity, the effective date and the effective time.
Figure 2-90 Set the task end time and the granularity
Parameters that can be set in performance data query include the query granularity, the
time, indexes, and MOs.
Parameters that can be set in real-time performance data query include the collection
interval, the collection duration, and the index.
1. Click [Performance Data Query] on the toolbar of the navigation page to open the
[Performance Data Query] dialog box, as shown below:
2. Select the [Indices Selection] tab, and then set the NE type, the MO type, counters,
and indexes.
3. Select the [Object Selection] tab on the [Performance Data Query] page. Then set
the location group, the wildcard level, the NE location, and the MO location.
4. Select the [Time Selection] tab on the [Performance Data Query] page. Then set the
query granularity, the query time range, the effective date, and the effective time.
5. After you set the query conditions, click [OK]. Then the query result will be displayed.
For the query result, you can export data of a specific page, print data of a specific page,
convert the data into a chart, and refresh the data. If the query result exceeds one page,
you can choose to go to the previous page, the next page, the first page, and the last
page; you can also search for data of a specific page.
1. Click [Realtime Data Query] on the toolbar of the navigation page to open the
[Create Realtime Data Query] dialog box, as shown below:
2. In the [Create Realtime Data Query] dialog box, set the NE type, the MO type, the
task lifecycle, the collection granularity, counters/indexes, location, and whether to
save data.
3. After you set the query condition, click [OK] to start the realtime query.
4. In the query result page, click [Chart] to show the real-time data in a chart.
5. To stop the realtime data query, click the [Suspend Realtime Query] button on the
toolbar.
The fault management module provides various monitoring methods to monitor alarms in
the managed network. Via the monitoring diagram, you can monitor the quantity of
different types of alarms from a macro view. Via the monitoring table, you can view the
specific alarms. When alarms are generated, you can click an alarm in the table to view
the details of this alarm, such as the position, the time, the type, and the reason of the
alarm. Besides, you can acknowledge and clear alarms.
The fault management module provides flexible queries of the alarms. You can query
both active alarms and history alarms in the system. The query result will be rendered in
a table. Active alarms’ query result will be refreshed in real time. You can also create
custom queries, and run the custom queries.