Académique Documents
Professionnel Documents
Culture Documents
UMTS
RNC Log Collection Tool
UMTS 4.1, UMTS 5 0 01.03/EN Preliminary July 2006
UMTS
RNC LOG COLLECTION TOOL
Document number: Document issue: Document status: Product Release: Date: NN-20500-100 01.03/ EN Preliminary UMTS 4.1, UMTS 5.0 July 2006
Copyright 2006 Nortel Networks, All Rights Reserved Originated in France NORTEL CONFIDENTIAL The information contained in this document is the property of Nortel Networks. Except as specifically authorized in writing by Nortel Networks, the holder of this document shall keep the information contained herein confidential and shall protect same in whole or in part from disclosure and dissemination to third parties and use same for evaluation, operation and maintenance purposes only. The content of this document is provided for information purposes only and is subject to modification. It does not constitute any representation or warranty from Nortel Networks as to the content or accuracy of the information contained herein, including but not limited to the suitability and performances of the product or its intended application. This is the Way. This is Nortel, Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their owners.
Nortel Confidential
Publication history
PUBLICATION HISTORY
July 2006
Issue 01.03 / EN, Preliminary Internal review and editorial update
July 2006
Issue 01.02 / EN, Preliminary Internal review and editorial update
June 2006
Issue 01.01 / EN, Draft Document creation
ii
TABLE OF CONTENTS
1. INTRODUCTION .........................................................................................................................1 1.1. 1.2. 1.3. 2. OBJECT .................................................................................................................................1 APPLICABILITY .......................................................................................................................1 AUDIENCE .............................................................................................................................1
3.
GENERAL DESCRIPTION..........................................................................................................2 3.1. 3.2. TOOL DESCRIPTION ................................................................................................................2 LOGS TYPES ..........................................................................................................................2
4. 5. 6.
PRE-REQUISITES ......................................................................................................................3 PACKAGE DELIVERY DESCRIPTION.......................................................................................4 RUNNING THE TOOL .................................................................................................................5 6.1. 6.2. 6.3. 6.4. 6.5. WHEN TO RUN THE TOOL.......................................................................................................5
HOW TO RUN THE TOOL .........................................................................................................5
7.
ABBREVIATIONS AND DEFINITIONS .......................................................................................9 7.1. 7.2. ABREVIATIONS .......................................................................................................................9 DEFINITIONS ..........................................................................................................................9
NN-20500-100
01.03/ EN
Preliminary
July 2006
Nortel Confidential
1.
1.1.
INTRODUCTION
OBJECT
This document aims at describing the log collection tool. This tool must be run from an OAM main server. It collects all the needed traces/logs from an RNC to allow case of investigation.
1.2.
APPLICABILITY
This tool is designed for both Nortel RNC 1000 and RNC 1500. This tool is relevant for RNC Release 4.1 and 5.0.
1.3.
AUDIENCE
This document is intended to operational teams.
2.
2.1.
REFERENCE DOCUMENTS
APPLICABLE DOCUMENTS
None
2.2.
REFERENCE DOCUMENTS
None
Nortel Confidential
3.
3.1.
GENERAL DESCRIPTION
TOOL DESCRIPTION
This documents aims at describing the use of the RNC Log Collection tool. This tool collects and stores all the required log files, and commands results from RNC (1000 or 1500) into an OAM compressed file, in order to allow RNC issue investigation. The logs to collect are listed into a command file. It is highly recommended to attach such log to any RNC case.
3.2.
LOGS TYPES
Three configuration files are delivered with the tool. They contain the commands to apply and the files to retrieve from RNC. The three files are: gps_EmergencyLogCommands.cfg: This file contains a set of commands to retrieve all the information which will be lost in a case of equipment restart. This command file is available for both RNC 1000 and RNC 1500. gps_ClassicRNCLogCommands.cfg: This file contains the full log collection commands for an RNC 1000. gps_CompactRNCLogCommands.cfg: This file contains the full log collection commands for an RNC 1500.
___________________________________________________________________________________________________________________ NN-20500-100 01.03/ EN Preliminary July 2006 Copyright 2006 Nortel Networks
Nortel Confidential
4.
PRE-REQUISITES
To run the tool, the user needs: A UNIX session on the OAM main server opened by a user that belongs to nortel group. The Login and associated password for WICL connection. The Login and associated password for RNC-CN & omu user password (only when running the tool against an RNC1000). The RNC label (declared in OAM database) having an issue. The Start date for log collection. The End date for log collection. (Optional, if not provided, the current date will be used as the end date).
In addition to that, the user may be asked for the following data when the tool can not retrieve them: RNC-IN IP address RNC-IN Login & password.
Nortel Confidential
5.
/opt/nortel/shell/support_tools/LogCollection/ 1 1 1 1 1 1 1 1 1 1 nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel nortel 2834 2393 14401 1433 2723 1419 7005 37914 39106 2334 Apr Apr Apr Apr Apr Apr Apr Apr Apr Apr 20 20 20 14 20 20 20 20 20 20 12:29 12:29 19:15 13:56 17:49 17:50 17:49 19:07 19:15 17:50 gps_ClassicRNCLogCommands.cfg gps_CompactRNCLogCommands.cfg gps_Connections.tcl gps_EmergencyLogCommands.cfg gps_getCommands.tcl gps_getRNCInfo.wcl gps_logTraces.tcl gps_retrieveInfo.tcl gps_rncLogCollection.tcl gps_wiclCommands.tcl
___________________________________________________________________________________________________________________ NN-20500-100 01.03/ EN Preliminary July 2006 Copyright 2006 Nortel Networks
Nortel Confidential
6.
6.1.
Both collected logs collected on steps 1 and 2 must be attached to RNC cases.
6.2.
Nortel Confidential
Several tool inputs can be provided in command line. Otherwise, the user is asked to provide them when needed. The tool collects logs within the time period between Start Date and End Date. Those dates must be provided in format DD/MM/YYYY. If End Date isnt provided, the current date will be used as the End Date.
6.3.
W h e n r u n n i n g , t h e
Once the target RNC is selected, the tool retrieves all the needed connection data. In the example above, the user chose the option 6 corresponding to RNC_1202. Depending on RNC Architecture, a list of command files is provided to select which one must be used during log collection. As the RNC selected in the example above is an RNC 1000, the tool offers the choice between a complete log collection for an RNC 1000 and a light log collection)
___________________________________________________________________________________________________________________ NN-20500-100 01.03/ EN Preliminary July 2006 Copyright 2006 Nortel Networks
Nortel Confidential
Once the command file is chosen, the tool requests the missing information for the equipment connection, and then starts the log collection showing the tool progress. At the end of the execution, the tool displays results summary.
Nortel Confidential
6.4.
TOOL RESULTS
The tool execution provides the two following files as output: The tool execution trace file. This file is named as follows: ExternalLogCollection_RNC_DateOfExecution.log, where DateOfExecution represent the date of tool execution given on the following format: DDMMYYYY_HHMMSS. This file must be provided to the tool development team if any problem occurs during tool execution. The tool resulting file. This file is a compression of all logs collected. This file is named as follows: ExternalLogCollection_RNCLabel_StartDate_EndDate_DateOfExecution.tar.Z where: o o o o RNCLabel is the label of the RNC on which log collection is performed; StartDate is the start date of log collection period in format DDMMYYYY; EndDate is the end date of log collection period in format DDMMYYYY; DateOfExecution is the date of tool execution given on the following format: DDMMYYYY_HHMMSS
The tool logs are stored in the /opt/nortel/logs/support_tools/ExternalLogCollection directory. Only the 20 last execution traces are kept. The tool result files are stored in the /opt/nortel/data/support_tools/ExternalLogCollection directory. No purge mechanism exists on this directory, so the user must remove files periodically.
6.5.
TOOL PRE-CHECKS
When the tool is run, it generates a result file stored in directory /opt/nortel/data/support_tools/ExternalLogCollection. There is no purge mechanism on OAM for this directory, so the user has to clean it. To force this behavior, the tool checks that the directory occupation is less than 80% of its capacity, and that there are less than 40 resulting files present in the directory. If any of those conditions is not met, the tool asks the user to remove files. Example:
___________________________________________________________________________________________________________________ NN-20500-100 01.03/ EN Preliminary July 2006 Copyright 2006 Nortel Networks
Nortel Confidential
7.
7.1.
7.2.
DEFINITIONS
None
Copyright 2006 Nortel Networks, All Rights Reserved NORTEL CONFIDENTIAL The information contained in this document is the property of Nortel Networks. Except as specifically authorized in writing by Nortel Networks, the holder of this document shall keep the information contained herein confidential and shall protect same in whole or in part from disclosure and dissemination to third parties and use same for evaluation, operation and maintenance purposes only. The content of this document is provided for information purposes only and is subject to modification. It does not constitute any representation or warranty from Nortel Networks as to the content or accuracy of the information contained herein, including but not limited to the suitability and performances of the product or its intended application. This is the Way. This is Nortel, Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their owners.
Originated in France