Basic Planning
Learn about the best practices to get started with managing infrastructure for Oracle Communications Unified Assurance.
Business Requirements
Define Business Goals
To ensure Unified Assurance provides the value for which it has been purchased it is extremely important to define the business goals extensively and communicate/measure against them throughout the duration of the implementation. Examples of business goals are defined below:
-
Automation for Operations
-
Automation for Administration
-
Increased Visibility via Dashboards and Diagrams
-
Replacement of previous tool sets
-
Cost Reduction/Avoidance/ROI
Operations
Operations, in the context of Unified Assurance, are the usage or interaction of the various user communities with the Unified Assurance Software Solution. This may include executives, engineers, end-users, and NOC operators.
User Authentication
Unified Assurance supports both internal and external authentication mapped one-to-one to the user defined, but no fail-over capability between the types. Below are the three types of external authentication, make sure you determine these configurations prior to implementation:
-
Active Directory - primary/secondary hosts and domain suffix as well as secure connection.
-
LDAP - primary/secondary hosts and distinguished name as well as secure connection.
Multitenancy
Unified Assurance supports the capability to provide multiple securely segmented read-only access groups used for multitenancy. This is usually for client-side portaling or segmented departments within a single organization. All these configurations are defined within the User Groups, Device Groups, Dashboard Groups, Diagram Groups, and Event Filter Groups all need to be defined prior to its creation. Any multitenancy configuration needs to be designed prior to implementation to prevent rework.
Defined Roles
To leverage any secure application, certain roles need to be defined and each role needs to be assigned privileges. By default, five roles come pre-defined by Unified Assurance: Administrator, Anonymous, API, Operator, and Publisher. Additional roles may be required within your environment, so this needs to be determined at the earliest stage of implementation.
Users Group Creation
User groups, like roles, need to be determined prior to implementation. User Groups use roles to control access into Unified Assurance and have a group of defined usernames associated to the group.
Process Management
Oracle Communications recommends that all major processes (defined or yet undefined) be listed and use cased if interaction with the Unified Assurance software solution is required or wanted. This ensures that any process interaction will be successful and accomplished with ease.
Unified Assurance Architecture
Unified Assurance's architecture consists of a typical 3-tier implementation, where the presentation layer leverages an Apache web server, the data layer consists of MySQL, Elastic, Influx and Neo4j database instances, and the application layer runs Unified Assurance compiled binaries.
Components Required
Before determining your architecture, you must first determine all the Unified Assurance components you will need to achieve the features/functionality you require. This list is vital in the planning and design phases and any architecture created without this component list completely identified may run into scaling issues.
Security Requirements
Determine if you require a FIPS 140-2 compliant environment. Unified Assurance installed on Oracle Linux 8 supports FIPS 140-2 compliance.
See FIPS Compliance in Unified Assurance in Unified Assurance Security Guide and FIPS 140-2 Compliance in Oracle Linux 8 in Oracle Linux 8 Enhancing System Security for more information.
System Requirements
Oracle Communications recommends the following:
-
Dedicated partition for Unified Assurance installation. (By default, this is the /opt partition)
-
RAID 10 for any database or bulk loading uses.
-
NTP configured and synchronized across all servers.
-
All Unified Assurance servers monitored for CPU, Disk, Memory, and IO at least every 5 minutes.
Hardware Requirements
Estimates are broken out into four categories and are baseline hardware recommendation for Unified Assurance.
-
Minimum
-
Medium
-
Large
All Historical Storage estimates given are based on default configuration and retention policies. Storage requirements depend on data retention policies, number of raw events received, and number of metrics collected. Contact your Sales Representative for a personalized estimate.
Minimum
Minimum installs are less than 1000 devices.
Supported implementations:
-
1 Server: All-in-One Install
-
2 Servers: Presentation and Database Server with separate Collection (including Microservice Cluster) Server
-
4+ Servers: Separate Presentation, Database, Elasticsearch Database and Collection (including Microservice Cluster) Servers
Requires:
-
Linux Server Support
-
Intel/AMD x86_64
-
RHEL/CentOS 7.x (64-bit x86) or RHEL/Oracle Linux 8.x (64-bit x86) ("Base" OS Install)
-
4 Core (including hyper-threaded or vCPU) Xeon E5 2GHz or better Processors
-
32 GB RAM
-
300 GB Drive Space for application and logs
-
1 TB Historical Storage (Database Server Only)
Medium
Medium installs are between 1,000 - 25,000 devices.
Supported implementations:
-
6+ Servers: Separate Presentation, Event/Metric/Graph Database, Historical/Elasticsearch Database and 3x Collection (including Microservice Cluster) Servers
-
Redundancy will double the number of servers
Requires:
-
Linux Presentation/Collection Server Support
-
Intel/AMD x86_64
-
RHEL/CentOS 7.x (64-bit x86) or RHEL/Oracle Linux 8.x (64-bit x86) ("Base" OS Install)
-
8 Core (including hyper-threaded or vCPU) Xeon E5 2GHz or better Processors
-
32 GB RAM per server
-
500 GB Drive Space for application and logs
-
1 TB Historical Storage (Database Server Only)
Large
Large installs are greater than 25,000 devices.
Supported implementations:
-
8+ Servers: Separate Presentation, Event Database, Metric Database, Graph Database, Historical/Elasticsearch Database and 3x Collection (including Microservice Cluster) Servers
-
Redundancy will double the number of servers
Requires:
-
Linux Presentation/Collection Server Support
-
Intel/AMD x86_64
-
RHEL/CentOS 7.x (64-bit x86) or RHEL/Oracle Linux 8.x (64-bit x86) ("Base" OS Install)
-
16 Core (including hyper-threaded or vCPU) Xeon E5 2GHz or better Processors
-
64 GB RAM per server and 128 GB RAM for database servers
-
500 GB Drive Space for application and logs
-
2 TB Historical Storage (Database Server Only)
...and Beyond
For extremely large installations or more specific requirements, please contact your Sales Representative.
Software Map
Determining the software map is a matter of applying the components list to the hardware list. Components can be installed on any server, but there are some best practices rules detailed below:
-
Pollers of any type should not be on the same server where the web server resides - this may cause user interface interference.
-
Components that poll an internal historical storage database (threshold engine, historical event rotation, etc.), should reside on the same server as the historical storage database runs on.
-
Metric Pollers and Threshold Engines are highly memory dependent.
-
Metric Pollers are scaled by average response time to device polled, % of devices down, timeout settings, threads defined, historical database insert speed, CPU speed/availability, and memory availability.
-
Database instances (Metrics, Real-Time Events, Elasticsearch and Graph) can be put on separate servers due to high disk requirements.
-
Metric Pollers and Discovery agents to be used are installed on the same server. This prevents discovery/polling mismatch failures.
Redundancy, Fail-over and Fail-back
Unified Assurance supports pairs of geographical or cross data center (XDCR) fail-over and fail-back capabilities. We recommend you read the redundancy brief provided by Oracle Communications and document your fail-over requirements for production implementation prior to start of implementation.
Backup and Restore Strategy
As with all software, standard backup/restore requirements should apply. By default, the Unified Assurance configuration database is backed up every Saturday at 1 AM. The other databases need to be included into a backup plan. All backup requirements need to be defined prior to implementation.
Unified Assurance Component Network Requirements
Unified Assurance uses few network ports for inter-component communications. These need to be opened bi-bidirectionally via the local operating system firewall and/or network ACLs or firewalls. Oracle recommends that this is done prior to installation.
-
Unified Assurance Message Bus TCP/5671 (Presentation)
-
Unified Assurance MySQL Database TCP/3306 (Presentation/Events Database)
-
Unified Assurance Web Server TCP/80,443 (Presentation)
-
Unified Assurance File Synchronization TCP/8873 (Presentation)
-
Unified Assurance Redundancy Wizard TCP/8055,8056 (Database)
-
See "Linux Prerequisites" for a detailed list of ports that are used.
Unified Assurance Typical Collection Network Requirements
As Unified Assurance is typically used for polling devices across the network, the following ports need to be opened from at least the collection servers to the remote network devices (Oracle Communications recommends a management subnet be created to make maintenance of this easier).
-
ICMP Ping or Generic Up/Down Polling requires ICMP connectivity from Server to Devices
-
SNMP Polling requires network connectivity (UDP/161) from Server to Devices
-
WMI/NT Event log Polling requires network connectivity (TCP/135) from Server to Devices
-
Management Servers and monitored devices need to contact the NTP server (UDP/123)
-
Syslog collection requires network connectivity (UDP/514) from Devices to Server
-
SNMP Trap requires network connectivity (UDP/162) from Devices to Server
-
MTU Packet Size should allow for 1475 or higher
Scale and Capacity Planning
Unified Assurance scales based upon two major areas: database inserts/second and database retention requirements. These can be calculated using the Unified Assurance scalability brief and storage calculation spreadsheet. A detailed discovery & planning session is required to determine your polling requirements and storage retention levels for the initial implementation as well as considering future capacity required or expected.
DNS Caching
DNS caching on Linux is disabled by default, which can cause performance issues (increased load on DNS servers, increased response latency, etc.) in large scale implementations. For optimal performance, it is recommended that a DNS caching agent be configured on all Unified Assurance servers.
Recommended DNS Caching agents:
Device Management Process
The device management process is one of the most common key administration processes that will need to be defined. This process includes what needs to be done in Unified Assurance to facilitate adding new devices to be monitored as well as how devices are decommissioned and handling the various changes a device may experience. Below is a basic list of areas that need to be addressed by the process:
-
Auto Discovery - Devices being entered into Unified Assurance's Core Device Catalog
-
Auto discovery Scheduled Job (Ping Scans, Seed Lists, CDP, LDAP)
-
Collection Discovery via collector rules
-
Manual Entry via Web UI
-
-
Device Typing - Setup of Device communication and device type/category (SNMP or WMI)
-
SNMP Discovery agent - v1, v2, v3 community strings (v1 polling not generally recommended)
-
WMI Discovery agent - Windows only
-
-
Instance Discovery - Discovery of sub-devices (Interfaces, IP SLA probe tags, Disk Partitions)
-
Automated via Metric Manager Discovery agents
-
Manually via Web UI
-
-
Metric Discovery - Setup of polling metric instances
-
Automated via Polling Policy Discovery agent
-
Manually via Web UI
-
-
Network Inventory Collection - Interface, ARP, IPRoutes, CDP, etc
-
Topology Stitching - Standard Agents for IPRoutes, ARP, and CDP, otherwise customization is needed
As part of this process there may be additional enrichment or security required rules that may need to be written. The following are commonly required:
-
Device Group placements (auto.rules, snmp.rules)
-
MetaTags created (auto.rules, snmp.rules)
Most of the discovery engines are designed for discovery of new devices. The following device changes may need to be handled in some way by this process:
-
Device DNS Name changes (Auto discovery agent automatically updates)
-
Device IP Address changes (Manual or customization)
-
Device Security changes (Community Strings) - SNMPDiscovery or manual
-
Device Type/Category changes - Manual or customization
-
Device Group changes - customization
-
Device Polling requirements - Automated with pollers, customization for collectors
-
Sub-device changes (New, changes, decommissions, etc)
-
IP SLA Probe Tags - Manual or customization
-
Interfaces - Manual or customization
-
Partitions - Manual or customization
-
Topology - Manual or customization
-
Inventory - Automated with -Flush option
-
When devices are decommissioned the following areas will need to be addressed:
-
Device Catalog Deletion - Bulk Load or via SQL
-
Retention of Metric Data - Static Devices
-
Retention of Topology
It is also important to understand how discovery and/or re-discovery processes will be initiated. Typically, most customers run discovery on-demand, but you may wish it to be fully automated and scheduled jobs can be enabled to run at set time of day, week, and month.
Dashboards
Custom Dashboards
-
List of Dashboards that need to be created with the following information
-
Audience (who is it designed for)
- Customers, Executives, NOC Operators
-
Security restriction (who can access it, etc.)
- Customers, Executives, NOC Operators
-
Contents
- Background, Metrics, Filters, Images, etc
-
Layout requirements (where does what go?)
-
Maintenance requirements (who is going to keep it up to date)
- Admin, NOC Operators
-
Plug-ins
- Who should have access to the Topology/SLM Plug ins?
Metrics (Polling, Collection, Display)
Metric Manager is used for collection, processing, reporting, and displaying of availability, performance, or capacity-based data. The individual component types need to be properly scoped so that the correct configuration can be deployed. Below are commonly discussed requirements that need to be discussed/determined before moving into implementation.
Base Configuration
-
TopN Overviews - Type/Scope/Direction
-
Custom Collection Definitions (Name, How, Maximums, Factor, Scales/Abbr)
-
Retention (Raw, Hourly, Daily) - reference scale brief/calculator
-
Raw - default 14 days
-
Hourly (1hr consolidation) - default 3 months
-
Daily (24hr consolidation) - default 2 years
-
Pollers
-
What polling intervals are required?
-
Every minute?
-
Every 5 minutes?
-
-
Clustering/Location
-
How many devices need to be polled?
-
What is the average latency/packet loss for the devices to be polled by location?
-
Is load balancing required? How many poller instances are required?
-
-
Database Scalability
-
What are the expected inserts/sec for each poller and each database instance?
-
What polling delay is expected/required?
-
Which storage engines will be used by pollers? Direct or Bulk Insert?
-
-
Custom SNMP Polling
- What MIBs and Objects are required for polling (Gauges, Indexed tables, and Counter)?
Collectors
-
What custom collection feeds are required?
-
Format for rules parsing (Are formulas required?)
-
Feed Type/Protocol
-
-
How many interfaces, of what capacity, need to be collection targets?
Synthetic Transactions
-
How many types of transactions need to be run? How many concurrently? How many POVs?
-
Are the transactions run via command-line or WinTask policy?
-
How many instances of the same transaction type need to be run?
-
Do the transactions need to be setup to run automatically?
-
Do you have code examples and test-beds available and documented?
Thresholding
-
Do you need threshold notifications or just event integration?
-
Approximately how many thresholds will need to be defined?
-
Do you have defined service levels that threshold differently?
-
Do you need to threshold metric trends across daily, weekly, monthly, or yearly change?
-
Do you need dynamic thresholding for metrics via cyclical deviation?
-
What are your static threshold levels that need to be defined, i.e.
-
CPU - > 75% Warning, > 90% Critical
-
Bandwidth - > 75% Warning, > 90% Critical
-
Dynamic Device Overviews
Besides the following, are there any custom metric overviews required?
-
Device Health (Ping Availability, CPU, Disk, Memory)
-
Network Traffic (Latency, Packet Loss, Interface Stats)
-
IPSLA by Probe Tag/Type (Availability, Latency, Jitter, Packet Loss)
-
Response Times (Synthetic Transaction Latency)
Custom Reporting
-
What scheduled static reporting templates are required?
-
Are they Graphical Reports?
-
Trend Report
-
Time-Series
-
-
Are they List Reports?
-
What schedules or distribution lists are assigned to each graph template?
Service Level Management
-
What services need to be monitored? Quantity?
-
VOIP
-
DNS
-
WEB
-
-
Are they documented?
-
Who will have access to the SLM data?
-
How often are they changed?
-
Is automated creation/maintenance required?
Events
Event Collection
-
What are the event feeds that need to be collected?
-
Format
-
Feed/Protocol/Method
-
-
Which aggregators will be needed?
-
Standard Trap/Syslog (forwarding?)
-
API-based - NNM, etc
-
TL1 - Gateway/NE list - Chat In/Out Login, Poll, Logout scripts
-
Generic (Database, Socket, Flat File, Command, Email, etc.)
-
-
What are the different collection locations and how are they split up?
Scalability
-
What is the estimated events/sec per aggregator?
-
How many total events/sec are required for the historical event repository?
-
How many days of historical event data do you want to keep?
Escalation/Notification
-
What simple notification profiles are required? (Uni-directional without time delay)
-
Do you have operational performance monitoring requirements that you want to use iE&N (Intelligent Escalation and Notification Engine) for? (one-to-one mapping of event to responsible group)
-
What are your escalation tree requirements by type?
-
Do you want to use the rotating on-call engine?
-
Who is going to maintain the on-call list?
-
What are the Users/Groups/Shifts/Schedules?
-
-
-
What custom notification requirements are needed? (SMS, Voice, IM, other, etc.)
-
What text email formats are required?
-
What SMTP servers do you intend to use?
-
Do you intend to use the email acknowledgment engine? What POP3 server, port, user, password?
Event Display
-
What default Filters are required?
-
Device filter
-
Specific Alarm Types
-
Time frames
-
Public/Private to Groups?
-
-
What Filter Group configurations need to be created?
-
Which Filters belong in which groups?
-
Which Filters can specific groups use?
-
-
What default Displays need to be required?
-
Public/Private to Groups?
-
What Fields, Names, and Order
-
-
What custom right-click tools need to be created? Who uses them?
-
SQL queries
-
CGI scripts
-
-
Each non-read-only user group uses its own menu defined. Are there additional menus you want created? List them out fully.
Enrichment
-
What Internal Event Enrichment is required?
-
Device Catalog (Priority, Meta Tags, etc.)
-
Topology (Next Hop, etc.)
-
Inventory (Interface Name, etc.)
-
-
What External Event Enrichment is required?
-
Format/Mappings
-
Feed/Method (Flat File, Database, Socket, Command-line)
-
-
What Method for each enrichment policy makes the most sense?
-
Rules-based (quick/easy/real-time but keeping up to date may be a problem)
-
Agent/Connector (not real-time, but fewer look-ups, less maintenance required)
-
Correlation
-
What correlation requirements beyond the basic generic Clear and Expire do you require?
-
Heart beating
-
Stacking or Disparate Events - This + This = That (Same Source/Different Source)
-
XinY - Event Thresholding to new summation event?
-
Parent/Child or RCA - Topology-based? Data Source?
-
Downstream Suppression - If this is downstream from that, and that is in alarm, suppress this (What is suppressed?)
-
Custom Policy/Automatic Remediation?
-
Service Impact Analysis
-
-
Correlation Methods
-
Rules (Correlation by De-duplication, Direct Query, etc.)
-
Mechanizations (Database Stored Procedures)
-
Connector/Agents (Custom Single Policy, Time-of-Day Correlations)
-
CAPE (Multiple Policy Engine, Auto-Remediation)
-
PRCA Connector (Network-based Topology Correlation, Down-stream Suppression)
-
SLM Connector (Real-time Service Impact Analysis)
-
Northbound Integrations
(Custom, Ticketing, Historical)
-
What Ticketing Integration is required?
-
When/How do you want to ticket? (Methods)
-
How to integrate with the ticketing system? (API, Socket, Database, Flat File, Command-line, SOAP, etc.)
-
What scheduled synchronization requirements do you have?
-
Work Log + Alarm Journal
-
Ticket Status + Event Severity/Acknowledgment
-
Other?
-
-
-
What other northbound integrations are required? (Historical/Other)
Historical Reporting
-
What table-based historical event reports are required?
-
Query (Where Clause)
-
Format (Columns)
-
Schedule to run?
-
-
What other custom reporting is required?
Topology
Network Inventory Collection
-
Do you want to use CDP-based data? Is it enabled on all routers/switches/servers?
-
How often do you want to collect inventory (Discovery vs. Re-Discovery)?
-
Do you need to split up your inventory collection to collect from a certain location, time of day, etc.? Do you want to limit the collection and exclude certain data?
Topology Stitching
(ARP, CDP, IPRoutes, Config Agent, Custom CRM/Provisioning, Billing)
-
Do you wish to still keep the following default inventory data?
-
ARP
-
CDP
-
IPRoutes
-
-
What custom Config Agent stitching do you need to collect?
-
What custom 3rd party stitching data do you need to collect?
-
Format/Mapping
-
Feed/Method (Database, Flat File, Socket, Subversion, SOAP)
-
Configuration Agent
-
What Devices are targets? How are they grouped?
-
How often do you want them to be collected?
-
What differential notifications do you want? Where do you want the notifications sent?
-
What Chat In/Chat Out scripts need to be developed and tested?
-
Commands/Responses
-
User/Passwords
-
DNS IP SLA Naming Standards and Examples
A standard IP addressing scheme for distributing IP networks between access, distribution, core, WAN networks, and data centers should be devised. Networks should be allocated in CIDR blocks to help routing protocols summarize the networks as well as provide ease of identification.
All host and network devices should be configured to use Domain Name Service (DNS) servers for name resolution. For Unified Assurance components, configuring both forward and reverse resolution is recommended.
At least 2 DNS servers should be setup to provide authoritative DNS lookups to devices and hosts. Zones should be setup to provide forward lookups for all domains and subdomains (example.com), as well as provide reverse lookups for all IP networks (X.X.X.in-addr.arpa). If one device is accessible from multiple interfaces/IP addresses (from an ICMP and/or SNMP perspective), you should add reverse DNS to the management addressed host name.
A standard naming scheme should be used to provide consistency. The standard can include description by location, device type, purpose, etc. Names cannot include spaces, nor should they contain underscores (_) due to standards-based DNS restrictions.
Example 1
(Device Use)(Device Type)(Floor)(Device Number)(BuildingName)(Riser)
ASW-1-2-RDP-A1 = Access Switch 1st Floor Device Number 2 Galter Riser A1
DSW-1-2-RDP-PACS = Distribution Switch 1st Floor Device Number 2 Feinberg Building Riser PACS
CSW-5-1-259 = Core Switch 5th Floor Device Number 1 259 Building Riser N/A
Example 2
(Building)(Floor/Closet)(Device Type)(Device Number)
1st 3 characters designate building
4th thru the 7th characters designate the area, floor and closet
8th thru the 10th characters designate the device use & function
11th and 12th characters designate the device number
The example would result in a device name like "str-x201-wap-01", and could translate to meaning "the 1st wireless access point at stratford, area x, 2nd floor, 1st closet".
Cisco
Example IOS Configuration
ip domain-name <DNSDomain>
ip name-server <DNSSrv1>
ip name-server <DNSSrv2>
Example CatOS Configuration
set ip dns domain <DNSDomain>
set ip dns server <DNSSrv1> primary
set ip dns server <DNSSrv2>
set ip dns enable
Basic Device Configurations
Common Server Configurations
The following are some of the common server configurations for Unified Assurance.
SNMP Polling Options
Oracle recommends leveraging the Net-SNMP agent for Unix, Linux, and Windows-based platforms. For more information about the Net-SNMP agent, see the Net-SNMP website. If you wish to use Windows SNMP Agent, we highly recommend downloading SNMP Informant Patch for Windows. The stability, popularity, conformity of the agent, various platforms supported, and large default MIB support are the reasons for this recommendation. Oracle Communications provides a net-snmp SNMP rules file that provides many of the common metric data requirements customers are seeking. For all other agents, custom SNMP rules may need to be created, so you may want to consult with your Oracle Communications sales representative before implementation. Be aware that only SNMP v2 and v3 are supported by default by the pollers.
Unix/Linux Syslog Forwarding
Syslog forwarding is documented by the syslog daemon being used on your server. Some external research about your particular operating system will be needed, and you can also run "man syslogd.conf".
NTP
Oracle Communications recommends all devices being monitored are synchronized to a single common clock source. Consult with your operating system documentation to determine the best NTP strategy for your organization.
Common Network Device Configurations
The following are some of the common network device configurations for Unified Assurance.
SNMP Polling Setup
Most network devices monitored by Unified Assurance leverage SNMP for communication. Consult your vendor documentation on how to set up SNMP connectivity and test the process before implementation. Below is a running list of different vendors and the recommended configuration required:
Cisco
Example IOS Configuration
no snmp-server community public RO
no snmp-server community private RW
snmp-server community <enter_read_only_password_here> RO
snmp-server community <enter_read_write_password_here> RW
Example CatOS Configuration
set snmp community read-only <enter_read_only_password_here>
set snmp community read-write <enter_read_write_password_here>
set snmp community read-write-all
Cisco devices can provide serial numbers through SNMP, although they are only configured by default on fixed chassis devices. All other modular devices should have the serial number configured manually to provide ease of contract and warranty management.
Example IOS Configuration
snmp-server chassis-id <enter_device_serial_number_here>
Example CatOS Configuration
set logging level snmp 7 default
Interface Descriptions
To assist with troubleshooting issues and to provide additional information to an enterprise management system, all interfaces should have a description defined for them. This description can either be a generic description about the interface type, or can include specific information like customer name, circuit ID, etc.
Example IOS Configuration
interface Serial0/1
description T1 connection to Internet provider (circuit id: XXXX/0000001)
Example CatOS Configuration
set port name 4/1 Trunk to distribution switch
SNMP Interface Index Renumbering
One of the big challenges associated with many SNMP performance management tools is the tool's ability to handle interface index re-numbering. It is true that some tools handle this better than others; however, there are steps that your organization can take to minimize the problems you'll likely encounter when this occurs. One of the relatively easy and straight forward approaches to take is to configure all IOS routers with the command 'snmp-server ifindex persist'.
The tools also need to be smart enough to know when ifIndexes change for other devices. Usually vendors say they key off of the ifDescr, but they should allow this to be configurable by device type. For example, ifDescr is always the same on CatOS Ethernet ports, but portName will be unique.
Syslog/Trap Forwarding
Most network devices monitored by Unified Assurance forward event information either by Syslog or by Trap. Some devices can send equal quality of data in either format, and where this is the case Oracle Communications recommends using syslog because it is easier to parse. Consult your vendor documentation on how to set up syslog or trap forwarding and test the process before implementation. Below is a running list of different vendors and the recommended configuration required:
Cisco Syslog
Example IOS Configuration
logging trap notifications
logging source-interface <DevMgmtIntf>
logging <MgmtSrvIPAddr>
Example CatOS Configuration
set logging server severity 5
set logging server enable
set logging server <MgmtSrvIPAddr>
set logging timestamp enable
NTP
Oracle Communications recommends all devices on monitoring be synchronized with a single common clock source. Consult with your vendor documentation to determine the best NTP strategy for your organization. Below is a running list of different vendors and the recommended configuration required:
Cisco
Example IOS Configuration
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
clock timezone CST -6
clock summer-time CDT recurring
ntp authenticate
ntp authentication-key 1 md5 <enter_auth_key_here>
ntp trusted-key 1
ntp source <DevMgmtIntf>
ntp server <NTPSrv1> key 1
ntp server <NTPSrv2> key 1
Example CatOS Configuration
set timezone CST -6
set summertime enable CDT
set summertime recurring
set ntp broadcastclient disable
set ntp client enable
set ntp authentication enable
set ntp key <enter_auth_key_here>
set ntp server <NTPSrv1>
set ntp server <NTPSrv2>