VMware Telco Cloud Service Assurance 2.3.0 | 19 DEC 2023

Check for additions and updates to these release notes.

About VMware Telco Cloud Service Assurance

VMware Telco Cloud Service Assurance is a real-time automated service assurance solution designed to holistically monitor and manage complex virtual and physical infrastructure and services end to end, from mobile core to the RAN to the edge. From a single pane of glass, VMware Telco Cloud Service Assurance provides cross‑domain, multi‑layer, automated assurance in a multi‑vendor and multi‑cloud environment. It provides operational intelligence to reduce complexity, perform rapid root cause analysis and see how problems impact services and customers across all layers lowering costs and improved customer experience.

For information about setting up and using VMware Telco Cloud Service Assurance, see the VMware Telco Cloud Service Assurance Documentation.

What's New

VMware Telco Cloud Service Assurance release 2.3.0 brings together various features and enhancements across platforms, networking, and virtual infrastructure management areas. This release introduces the following major features:

vRAN Correlation and Assurance

  • Samsung Monitoring: Now allows the extension of the ability to visualize topology discovered using Samsung Unified System Manager (USM) with deeper connectivity (Central Unit and Distributed Unit). Identifies the root cause for failures between vDU and vCU connectivity. Additionally, defines the remediation rules for Samsung events, actions for Samsung events, and provides reporting in Dashboards and Reports.

  • Pipeline Monitoring through VMware Telco Cloud Automation Workflow Hub: Integration to the Workflow Hub in VMware Telco Cloud Automation enables the collection of pipeline results and dashboard/reporting views and generation of notifications in VMware Telco Cloud Service Assurance for pipeline failures.

Closed Loop Remediation

  • User Role-Based Access Control for Remediation: With role-based access controls for remediation, administrator now defines role based access for rules and action.

  • ServiceNow Integration: Customized ServiceNow Lifecycle Management helps users to identify or track user-defined notification fields in the ServiceNow Change Request. User can now create a manual remediation rule for a ServiceNow Lifecycle Management (LCM) action and execute it from VMware Telco Cloud Service Assurance Notification console.

  • Server Tool Actions: The VMware Telco Cloud Service Assurance Tools service launches a web terminal for executing the Ping and SSH commands on the selected notifications target system.

  • Escalation Policies: Remediation feature is enhanced and now includes Escalation Policy, which outlines the sequence of Escalation actions on third party tools in a deployed environment.

Unified Data Collection Framework

  • SNMP Capability Discovery: SNMP collector now allows you to discover the supported SNMP queries (masks) for uploaded devices. Wizard driven approach allows you to manage SNMP Collectors, Masks, Devices and Polling Groups in a centralized manner.

  • AVRO Support in Kafka Collector: Kafka collector is now enhanced to support ingestion of data in AVRO format along with JSON, and M&R with support for multiple schema using the AVRO Schema registry.

  • Webhook Connector for Notifications: Real-time communication mechanism for instant event notifications and seamless integration.

  • SASL Authentication: Kafka collectors is now enabled with SSL authentication and basic authentication.

VMware Telco Cloud Service Assurance Sizing

Revised Sizing Calculator: Now you can get recommendation of the resources required for the fresh deployment and scaling the initial deployment based on the following:

  • The number of devices to be discovered and monitored.

  • Number of incoming metrics.

  • The number of incoming events.

  • Retention Interval.

  • Percentage metrics for Alarms.

  • Percentage metrics for Anomaly.

IP, ESM and SAM domain manager services sizing sheets are also integrated with VMware Telco Cloud Service Assurance sizing sheet. For more information, see VMware Telco Cloud Service Assurance Sizing Sheet.

Platform Modernization

  • VM-based Deployment: Simplified VM-based deployment is now available for production and allows you to deploy VMware Telco Cloud Service Assurance seamlessly based on the number of Devices, Events, Metrics, Retention Interval, Alarms and Anomaly definitions. The maximum scale supported is 200 K managed devices..

    This deployment exercises the Oracle Linux OS and uses Kubernetes artifacts from Tanzu Kubernetes Grid. This entire deployment procedure is fully automated and easy to run with a minimal set of prerequisites. The number of resources required for the deployment can be achieved using VMware Telco Cloud Service Assurance Sizing Sheet.

  • Flexible Deployment provides you the ability to deploy VMware Telco Cloud Service Assurance services of any size based on the number of Devices, Events, Metrics, Retention Interval, Alarms and Anomaly definitions. The number of resources required for the deployment can be achieved using VMware Telco Cloud Service Assurance Sizing Sheet.

Additional Features

  • User Federation (LDAP/AD) Configuration: Enhanced user interface for LDAP/AD integration in VMware Telco Cloud Service Assurance.

  • Enrichment UI Enhancements:

    • Now user is able to select the tag from a list of possible tags available in VMware Telco Cloud Service Assurance.

    • Filter and Key properties are now unified.

  • Key Performance Indicator redesign: Generating KPI using the live raw metric data, supporting Average, Delta, along with general mathematical expressions.

  • Alarms and Anomaly support for KPI metrics.

  • Simplification of External Kafka and data collector configuration for 5G collectors.

  • Automatic import of dynamic model classes from VMware Smart Assurance to VMware Telco Cloud Service Assurance.

  • VMware Telco Cloud Service Assurance Domain Manager deployment through Ansible scripts.

  • Dynamic Model Auto Upload: Now the Dynamic Models from the underlying domain manager (Presentation SAM) will automatically synchronize with the VMware Telco Cloud Service Assurance.

    Note:

    If there is a requirement for VMware Telco Cloud Service Assurance 2.3 to be interoperable with earlier versions of Domain Managers (specifically 10.1.7, 10.1.9, and 10.1.12), the mentioned feature must be externally installed using the tar ball solution. For detailed instructions on the procedure, refer the KB Article.

Third-party software component upgrades for Domain Managers

Following third-party software components are upgraded in VMware Telco Cloud Service Assurance 2.3.0.0 Domain Managers:

  • OpenJDK is upgraded to 17.0.9.

  • OpenJDK for SAM console (Windows / Linux) is upgraded to 1.8.0_392.

  • RabbitMQ is upgraded to 3.12.4.

  • Erlang/OTP-2 is upgraded to 26.0.2.

  • Xerces is upgraded to 3.2.3 (SAM-Windows Console).

  • Tomcrypt is upgraded to 0.078.

  • Lz4 is upgraded to 1.8.0.

  • Spring Security Core upgrade to 6.1.3.

  • Bin-utils is upgraded to 8.2.

  • Xalan is upgraded to 2.7.3.

Fixed Issues

  • While performing PUT operation on notification, error message MsaError - msa.update.instance.operation.error, appears.

  • Rabbitmq messages still incrementing and not updating in M&R.

  • Generating error messages on missing security crypto.so and asn1rt_nif.so libraries.

  • Incorrect notification count between M&R and Domain Manager.

  • APM service is crashing in one library.

  • Elasticsearch does not start-up as a service post patch upgrade in SAM.

  • BGP is not alerting on SNMP agent errors.

  • Custom/User specific threshold group settings for memory does not work.

  • License Manager is not getting instrumented for Cisco Catalyst 36xx stack-able ethernet switch.

  • Sub-Interfaces lose instrumentation during post-processing phase of pending discovery and does not come back on pending discovery.

  • Typo error in smarts/rules/discovery/ipv6Network-impact-prop-setting.asl.

  • Unable to import seed file, issues with import function.

  • VMware Smart Assurance needs remediation for AMQP Cleartext Authentication vulnerability.

  • Service offering not getting cleared along with problem alarm.

  • Scheduled maintenance notification are not getting cleared after maintenance period is over.

  • NARGs lose ComposedOf enrichment data post topo-sync as Interfaces get deleted and re-created.

  • Notif Traps stop processing in the newly activated OI domain after Failover.

  • Addition of AggregateInterfaces to NARG fails on SAM domains.

  • ErrorTrafficThreshold is not modified from P&T window.

  • Wrong LLDP connection being created, whenever a pending device discovery is initiated and completed.

  • ISIS components not seen in discovery for Nokia - Alcatel devices.

  • While discovering F5 Networks BIG-IP-5250 LoadBalancer Host probe error observed.

  • The sm_gui.exe is using an old/unsupported version of 'mfc42.dll'. (VC++4.2).

  • The time stamp in the SAM audit log file have changed.

  • Harbor Registry and Harbor core pods are getting into evicted state and restarting in a VM based demo deployment.

  • Multiple PODs are getting into CrashedLoopbackState in a VM based VMware Telco Cloud Service Assurance deployment.

  • Alarms are not getting generated for multiple devices when broader filter is given.

  • Post upgrade, Alarm page is throwing an error Alarm list cannot be loaded.

  • Unsigned plugins were found warning appears, while adding new datasource.

  • Events Logs is not displaying the status as Completed/End time, even though the Notifications process completed.

  • When user execute the command kubectl get pods, the stale entries with the status of 'Init:Error or Error' appears in init jobs.

  • Sometimes in Longevity environment, ElasticSearch, Nginx, and Prometheus pods are down in the VMware Telco Cloud Service Assurance.

  • Post upgrade, Kibana-init reconcile failed.

  • Unable to delete the cloned console of Default Summary View.

Known Issues

  • MnR-gateway-stream enrichment jobs are retained post upgrade from VMware Telco Cloud Service Assurance 2.1.0 to 2.3.0.

    Where as the fresh installation MNR-gateway-stream enrichment job is not available in the VMware Telco Cloud Service Assurance 2.3.0.

    Workaround: Enrichment jobs needs to be removed during the upgrade process.

    1. Login to VMware Telco Cloud Service Assurance UI

    2. Navigate to Administration > Enrichment.

    3. Disable or stop the MNR-Gateway stream enrichment job.

  • The vRAN discovery and monitoring pod's name still have vRealize Operations (vROps) reference.

  • Service logs UI (Kibana) does not enforce dark theme.

  • The Kafka subscription and the monitoring are suspended post restart.

    When only one Domain Manager is up and active in Failover environment and if user restarts that Domain Manager server, the Kafka subscription and the monitoring are suspended.

    This is applicable for ESM and OI Servers where user collects the data through Kafka subscription for features like VMware Aria Operations discovery, VMware Telco Cloud Automation, and so on.

    Workaround:

    Set the flag suspendTopologyManager = FALSE in the bootend.conf file in the ESM and OI Server and then restart the server. Once the server is up, the monitoring and the Kafka subscription will be turned on.

    Location of bootend.conf file in ESM Install : <ESM-Basedir>/smarts/local/conf/esm/bootend.conf

    Location of bootend.conf file in OI Server: <SAM-Basedir>/smarts/local/conf/icoi/bootend.conf

  • Capability Discovery stopped, when user moves to another tabs while Capability Discover is running.

    Workaround:

    User must wait in Capability Discover tab until Capability Discovery completes.

    In case if user moves to other tabs, the Capability Discovery will be aborted. But, you can revisit the Capability Discovery tab and click Discover Capabilities.

  • Anomaly definitions created in old version of VMware Telco Cloud Service Assurance 2.2 are not available when upgraded to 2.3.0.

  • New alert definitions created by the user in VMware Telco Cloud Service Assurance 2.2.0 are getting deleted post upgrade to 2.3.0.

  • BGP alarms failure is seen in co-relation of alarms.

  • Binutils component check on RHEL 9.x is failing.

    Gdb is a debugging tool. The upgrade to the latest version was done to resolve the vulnerabilities in the older versions. The drawback here is that the latest version is incompatible with the other OS versions. This is applicable to all domain manager products.

    Workaround:

    From the other OS versions, Gdb can be copied from /usr/bin/gdb to /bin location when it is required.

  • RabbitMQ has an error in setup_rabbitmq.log file.

    Below error is noticed in setup_rabbitmq.log.

    Waiting for RabbitMQ to be available: ............................ OKMerging default configuration: Failed!204 No ContentDied at/opt/InCharge/SAM/smarts/perl/lib/setup_rabbitmq.pl line 207

    Workaround:

    This error will be seen only after installation. To avoid the error, restart the smarts-rabbitmq service.

  • User is unable to use Java 1.8 351 and above to launch Web Console.

    The latest Java updates 8.0.351 and above, deprecate the use of SHA1 signed jars and treat them as unsigned jars.

    Workaround:

    Since, the web console utilizes the system's Java, and we have limited control over it, we recommend to use the lower version of Java at client side or apply the workaround mentioned in the KB article. This workaround does not impact the product.

  • Airflow application is not getting reconciled.

    During deployment, the Airflow application is not getting reconciled.

    Workaround:

    If application reconciliation fails with the error Failed with reason BackoffLimitExceeded, then follow the below steps to recover from the failure.

    Delete the airflow jobs, by running the following commands, post which the app reconciliation must succeed.

    kubectl delete job airflow-run-airflow-migrations
    kubectl delete job airflow-create-user
  • All the classes and instances are not visible in Topology Explorer/Topology Maps.

    When more numbers of SAMs are added to the VMware Telco Cloud Service Assurance, the classes and instances are not visible in Topology Explorer/Topology Maps.

    Workaround:

    Execute the following script from the ArangoDB coordinator pod:

    Kubectl get pods | grep arangodb-crdn
    kubectl exec -it <<arangodb crdn pod>>  – bash
    cd /opt/vmware/vsa/infra/install/Scripts
    ./viewUpdate.sh
  • Unable to recognize the base install during MPLS upgrade to 2.3.0.0.

    This is applicable only when upgrade is performed from versions 10.1.7 and 11.1.0.

    Workaround:

    Open /var/.com.zerog.registry.xml file from a machine where smarts is installed and perform the following steps:

    1. MPLS independent upgrade: Under <product> tag search for old MPLS installation and modify id from 28322b95-1f3b-11b2-bb9a-eb6ec3979369 to 28322b95-1f3b-11b2-bb9a-eb6ec3979370.

    2. When NPM and MPLS installations are present in same directory, and incase user wants to upgrade NPM and then MPLS: Add below <product> tag content under <product> tag, just before MPLS upgrade:

      <product name="MPLS" id="28322b95-1f3b-11b2-bb9a-eb6ec3979370" upgrade_id="db14898f-1f3a-11b2-a90c-eb6ec3979369" version="11.1.0.0" copyright="2019" info_url="VMware Inc" support_url="www.http://vmware.com" location="/opt/InCharge" last_modified="2022-07-29 05:02:08"><![CDATA[]]><vendor name="InstallAnywhere" id="2832bde7-1f3b-11b2-bb9a-eb6ec3979369" home_page="http://www.installanywhere.com" email="support@installanywhere.com"/><feature short_name="Application" name="Application" last_modified="2022-07-29 05:02:08"><![CDATA[This installs the application feature.]]><component ref_id="db1488e4-1f3a-11b2-a8c7-eb6ec3979369" version="1.0.0.0" location="/tmp/install.dir.4793/./devstat_err-javadoc.jar"/><component ref_id="db1488e3-1f3a-11b2-a8c8-eb6ec3979369" version="1.0.0.0" location="/opt/InCharge/MPLS/jre"/></feature></product>
    3. When MPLS and NPM installations are present in same directory, incase user wants to upgrade MPLS and then NPM:Add below <product> tag content under <products> tag, just before MPLS upgrade:

      <product name="MPLS" id="28322b95-1f3b-11b2-bb9a-eb6ec3979370" upgrade_id="db14898f-1f3a-11b2-a90c-eb6ec3979369" version="11.1.0.0" copyright="2019" info_url="VMware Inc" support_url="www.http://vmware.com" location="/opt/InCharge" last_modified="2022-07-29 05:02:08"><![CDATA[]]><vendor name="InstallAnywhere" id="2832bde7-1f3b-11b2-bb9a-eb6ec3979369" home_page="http://www.installanywhere.com" email="support@installanywhere.com"/><feature short_name="Application" name="Application" last_modified="2022-07-29 05:02:08"><![CDATA[This installs the application feature.]]><component ref_id="db1488e4-1f3a-11b2-a8c7-eb6ec3979369" version="1.0.0.0" location="/tmp/install.dir.4793/./devstat_err-javadoc.jar"/><component ref_id="db1488e3-1f3a-11b2-a8c8-eb6ec3979369" version="1.0.0.0" location="/opt/InCharge/MPLS/jre"/></feature></product>

      Add below tag before NPM upgrade, if not present:

      <product name="NPM" id="28322b95-1f3b-11b2-bb9a-eb6ec3979369" upgrade_id="db14898f-1f3a-11b2-a90c-eb6ec3979369" version="11.1.0.0" copyright="2019" info_url="VMware Inc" support_url="www.http://vmware.com" location="/opt/InCharge" last_modified="2022-08-02 02:28:34"><![CDATA[]]><vendor name="InstallAnywhere" id="2832bde7-1f3b-11b2-bb9a-eb6ec3979369" home_page="http://www.installanywhere.com" email="support@installanywhere.com"/><feature short_name="Application" name="Application" last_modified="2022-08-02 02:28:34"><![CDATA[This installs the application feature.]]><component ref_id="db1488e4-1f3a-11b2-a8c7-eb6ec3979369" version="1.0.0.0" location="/tmp/install.dir.7209/./devstat_err-javadoc.jar"/><component ref_id="db1488e4-1f3a-11b2-a8c7-eb6ec3979369" version="1.0.0.0" location="/opt/InCharge/NPM/_uninst/uninstaller"/></feature></product>
    Note:

    Ensure that the 'location' and 'version' (highlighted in bold) attributes are updated correctly as per the existing smarts deployment location and version.

  • Metric file names in filters are not segregating tags and properties.

    While creating an alarm, when properties and tags of the incoming metric are the same, duplicate entries appear in the drop-down. 

    Workaround: Ensure that there are no duplicates in the properties and tags section of incoming metrics.

  • Adding Enrichment other than default causes the duplication of records in VMware Telco Cloud Service Assurance topics.

    When a user adds new enrichers, the VMware Telco Cloud Service Assurance ends up duplicating the records, as all of the records go through default as well as the new enricher.

  • Alarms and Anomaly is not allowing static and user defined metrics to define alarms and anomaly.

  • Alarm is not getting generated with range regex filter "<0-9>".

    While creating an alarms definition we are able to get metrics by passing '<0-9>' for range in regex patterns, but alarm is not getting generated for it.

    Note:

    Other general pattern for ranges in regex is "[0-9]" are working fine.

     

  • Alarm resulting Notification is not having Ticket ID specified in Notification definition.

  • Cloudify discovery not working by passing DCF complex passwords.

  • In out-of-box cisco-aci collector, the devicetype/deviceName value are empty.

    Legacy issue, no reports and functionality impacted.

  • Warning message "java.io.FileNotFoundException" appears in snmp config collector logs.

    No functional impact. Warning messages can be ignored.

  • Grafana reports are not getting populated with daily or weekly VMware Smart Assurance metrics indexes.

    Workaround:

    1. Select Configurations > Data Sources from the left side menu bar.

    2. Click Add Data Source.

    3. Select OpenSearch.

    4. Enter the relevant name based on the metric type for which the weekly index is created. For example, (Week-Network-Interface). Use HTTP URL as http://nginx:8099/esdb-proxy/. You can also refer to any other VMware Telco Cloud Service Assurance data sources.

    5. Under Auth, check Skip TLS Verify and Forward OAuth Identity.

    6. Enter Index Name based on the metric type for which the weekly index is created. Check the OpenSearch DB for the availability of the indexes. For example, ([vsametrics-week-networkinterface-]YYYY.MM). Select Pattern "Monthly" ([vsametrics-week-networkinterface-]YYYY) and select Pattern "Yearly".

    7. Enter the Time Field Name timestamp and Version OpenSearch 1.0.x.

    8. Retain the rest of the fields to default value.

    9. Click Save & Test.

    10. Now in the corresponding report settings, change the default data source to the newly created Datasource. For example, Report.. Home==>Top 10 Bandwidth Utilization.

    11. Navigate to setting, and change Datesource "Network-Interface" to "Week-Network-Interface".

    12. Change metric "CurrentUtlization" to "CurrentUtlization.avg".

    13. Save.

  • Exception appears in the user interface while adding more than 30 SAMs or Domain Managers at a time.

    Sometimes the user interface timeouts with an exception, while adding more number of SAMs or Domain Managers in a single Smarts Integration Create Wizard flow.

    Though the timeout happens , the collectors would be created successfully. Youcan validate by going to the details of the Smarts Integration.

    Workaround: To avoid the timout exception, it is advisable to add limited SAM or Domain Mnaagers (around 30) in initial Smarts Integration create wizard flow. And, subsequently add additional SAM or Domain Managers in the existing Smarts Integration.

  • The SDK REST Custom collector pod is spinned up and in still state when the REST simulator is down.

    The SDK REST Custom collector is up and running, after the simulator is up.

    But the spinned up REST pods which are in error state remains in still sate. These pods are not consuming any memory or CPU resources, and there is no functional impact.

  • After upgrade and migration, the ESM Server hangs.

    The ESM Server hangs for the first time, after performing an upgrade or migrate from earlier versions. Server does not responds to any dmctl commands and the SAM Console gets freezed. You are unable to naviagte in the SAM Console.

    You can stop the ESM Server using dmquit, or kill the ESM Server after the ESM Server is started for the first time post upgrade or migrate.

    Once the server is completely stopped, restart the ESM Server. After the Server is restarted, the hang issue is no more observed, and the dmctl commands start responding.

  • VMware Telco Cloud Service Assurance job Instantiation and Terminate status is not showing correct status in VMware Telco Cloud Automation user interface.

    VMware Telco Cloud Service Assurance job Instantiation and Terminate status is shown as success, eventhough the VMware Telco Cloud Service Assurance deployment is in progress.

    To check the VMware Telco Cloud Service Assurance job Instantiation & Terminate status, use the following kubectl command:

    root [ ~/tcx-deployer/scripts ]# kubectl get tcxproduct
  • Getting an error message during migration of IP, SAM, and ESM domain managers.

    Following error message appears, during migration of IP, SAM, and ESM. And, .conflict files are created for sm_merge and version.pm:

    ----
    Merge Process aborted/opt/InCharge11/IP/smarts/local/bin/system/sm_merge: 
    line 1: $'\177ELF\002\001\001': command not found/opt/InCharge11/IP/smarts/local/bin/system/sm_merge: 
    line 2: $'w\267P\343\316\301\024W\026': command not found
    ------

    There is no functional impact, and errors can be ignored. It is safe to delete the sm_merge.conflict and version.pm.conflict files, before starting the server.

    The sm_merge.conflict and version.pm.conflict file must be deleted before starting the server.

  • The log_level messages are displaying 'unknown' in Service logs (Kibana logs).

    When user navigates to Administration > Service Logs, and clicks on the application service logs, the filter log level displays 'unknown' fields for log_level messages for any service. For example: Apiservice, elasticsearch, and so on.. .

  • VMware Telco Cloud Service Assurance currently does not support connections to SAM server when Broker is configured in secure mode.

    Currently there is no workaround. Broker must configured in non-authenticate mode.

    Note: EDAA related operations including the Acknowledge, Ownership, Server Tools, Browse Details > Containment and Browse Details > Domain Manager are not supported when Broker is configured in secure mode.

  • When the number of hops of connectivity is increased, you may experience performance issues in the topology maps.

    There might be performance issues in the rendering of Redundancy Group and SDN connectivity map types in the Map Explorer view. This issue is observed on deployments with a complex topology where the topology maps may stop working when the number of hops of connectivity is increased.

  • Broker failover is not supported in VMware Telco Cloud Service Assurance.

    Primary Broker fails in the Domain manager failover environment.

    Currently when a Broker (multi-broker) failover happens, then it requires a manual intervention where you need to log in to VMware Telco Cloud Service Assurance  and change the Broker IP address to point to the new Broker IP.

    Procedure:

    1. Go to https://IPaddress of the Control Plane Node.

    2. Navigate to Administration > Configuration > Smarts Integration

    3. Delete the existing Smarts Integration Details.

    4. Re-add the Smarts Integration Details by pointing it to secondary Broker.

  • Weekly indexes are not displayed while creating custom reports, only daily and hourly index are shown part of reports.

    Procedure for workaround:

    1. Select  Configurations > Data Sources from the left side menu bar

    2. Click Add Data Source.

    3. Select Elasticsearch.

    4. Enter relevant name based on the metric-type for which the weekly index needs to be created (for example: Week-Network-Interface) and the Elastic http url as  http://elasticsearch:9200, refer any other VMware Telco Cloud Service Assurance data sources

    5. Enter Index Name based on the metric type for which the weekly index needs to be create ([vsametrics-week-networkinterface-]YYYY.MM) and select Pattern "Monthly"

    6. Enter the Time Field Name timestamp and Version 7+.

    7. Keep the rest of the fields to default  value.

    8. Click Save & Test.

  • Notification count mismatch between SAM and VMware Telco Cloud Service Assurance UI due to non-filtering of notification with Owner field set to SYSTEM​. By default in VMware Telco Cloud Service Assurance there are no filters set.

    Manually apply the filter to remove notifications with Owner field not containing SYSTEM in VMware Telco Cloud Service Assurance Notification Console window by following below steps:

    1. Go to Default Notification Console.

    2.  Click Customize View.

    3. Go to Filters and provide Filter Set Name, for example Filterout SYSTEM Notifications.

    4. Filter Section Add Attribute with below condition:

      Property = Owner

      Expression = regex

      Value = ~(SYSTEM+)

    5. Click Update.

    Verify the Default Notification Console has only those notifications whose owner not set to SYSTEM. The default notification count must match between SAM and VMware Telco Cloud Service Assurance UI.

  • The Containment, Browse detail, Notification Acknowledge/Unacknowledge does not work when the primary Tomcat server fails in a HA environment.

    In a Failover deployment, when the primary Tomcat fails, the UI operations including the Notification Acknowledgement, Containment, Browse Detail, and Domain Managers fail.

    When the primary Tomcat instance fails in a failover environment, then you can manually point the VMware Telco Cloud Service Assurance to a secondary Tomcat instance.

    Procedure:

    1. Go to https://IPaddress of the Control Plane Node.

    2. Navigate to Administration > Configuration > Smarts Integration

    3. Delete the existing Smarts Integration Details.

    4. Re-add the Smarts Integration Details by editing the EDAA URL and pointing it to the secondary Tomcat Instance.

  • The SAM server is getting listed in the Domain Manager section instead of Presentation SAM section.

    During Smart integration and configuration, INCHARGE SA (SAM server) is getting listed in the Domain Manager sectionThis problem occurs only when, the SAM server is started in Non-EDAA Mode.

    To get listed under Presentation SAM section, start the SAM server in EDAA Mode.

  • User needs to mandatorily  discover ESX Servers for getting Virtual Machine Down event. Currently the Virtual Machine Down event is not generated if the corresponding ESX Servers are not discovered in IP Server. So, its recommended to discover Virtual Machines to get proper Root cause events.

  • Topology synchronization is taking more than 10 minutes for 25K devices, when latency between SAM and VMware Telco Cloud Service Assurance is more than 5 milliseconds.

    When the latency increases topology synchronization time increases. 

    Ensure that the latency between VMware Telco Cloud Service Assurance (Topology Collector) and SAM Presentation server is less than 5 milliseconds.

  • Notification processing rate is slower, when the latency between SAM and VMware Telco Cloud Service Assurance is greater than 5 milliseconds.

    When the latency between VMware Telco Cloud Service Assurance and SAM Presentation server increases, notification processing rate goes down.

    Ensure that the latency between VMware Telco Cloud Service Assurance (Notification Collector) and SAM Presentation server is less than 5 milliseconds.

check-circle-line exclamation-circle-line close-line
Scroll to top icon