Got it

OLT Fault Location Alarm Analysis&Log Analysis

Latest reply: Jun 18, 2019 03:19:02 6071 20 11 0 1

Hi, everyone!

For details about OLT alarm and log analysis, see the following sections:


Alarm Analysis:

 

An alarm indicates that a fault or event occurs. The alarm information includes a detailed description of a fault or exception, possible causes, and troubleshooting suggestions. The information involves multiple sectors, such as hardware, link, service, and CPU usage, and is important in fault analysis and location.

When a fault occurs, check whether the system reports an alarm. If the system reports an alarm, analyze the alarm related to the fault and clear the alarm based on the alarm information to rectify the fault.

The difference between an alarm and an event is as follows: An alarm is generated when an exception occurs or will occur; an event is a notification sent by the system in the proper running.

 


Querying Alarm Information

 

Run the display alarm active command to query the alarm information saved in the system.
Run the display alarm configuration command to query the alarm settings based on an alarm ID.
Run the display alarm history command to query historical alarms.
Run the display alarm jitter-proof command to check whether the alarm jitter-proof function is enabled and query the alarm jitter-proof period.

 

Querying Event Information

 

Run the display event configuration command to query the event settings based on an event ID.
Run the display event history command to query historical events.
Run the display event list command to query the event's basic information.
Run the display event statistics command to query event statistics records.

 

Log analysis:

 

Log analysis is a daily maintenance method. Recorded logs help users to better know system maintenance information and therefore facilitate troubleshooting. Network managers can query and save logs periodically to better detect unauthorized logins or operations and locate a fault in a timely manner.


Log Types


Logs are classified into security logs and operation logs.
Security logs are recorded after security events occur. The system supports three types of security logs: maintenance user online and offline events, user lock events, and automatic backup success events.
Operations logs record configuration commands that are issued using the CLI or SNMP successfully. The system records successful and failed operations.
Both security logs and operation logs are reported to the NMS.

 

[Remarks]
In versions earlier than V008R012, the system supports a maximum of 512 operation logs and the number is increased to 5000 in V008R012.

 

Common Operations


display log: queries the names and IP addresses of users that have performed operations in the system, and the operation time and detailed operations.
display log failure: queries the configuration failure logs about a user that has the same level or lower level than the current user.
loghost add: enables the log servers to save device logs because the device has limited space for saving logs.
loghost activate: activates the log host. The system reports logs to a log host only after the activation.



Thank you for reading!

The post is synchronized to: Hot Topics

If either of the following two situations occurs, the PON pot is faulty.
Run the display port state command to query the status of the PON port. It is found that abnormal items exist in the query result. For example, the laser status (Laser state) is abnormal and the transmit optical power (TX power) exceeds the normal range (1.5-5.0 dBm).
Migrate the service to another port. It is found that the ONU goes online normally.
View more
  • x
  • convention:

Raheel_Ahmad
Raheel_Ahmad Created Aug 15, 2019 17:26:26 (0) (0)
1234  
Raheel_Ahmad
Raheel_Ahmad Created Aug 15, 2019 17:26:45 (0) (0)
1  
Raheel_Ahmad
Raheel_Ahmad Created Aug 15, 2019 17:26:58 (0) (0)
2  
Raheel_Ahmad
Raheel_Ahmad Created Aug 15, 2019 17:27:09 (0) (0)
2  
Raheel_Ahmad
Raheel_Ahmad Created Aug 15, 2019 17:27:40 (0) (0)
wertgh  
thanks
queries the names and IP addresses of users that have performed operations in the system, and the operation time and detailed operations.
display log failure: queries the configuration failure logs about a user that has the same level or lower level than the current user.
loghost add: enables the log servers to save device logs because the device has limited space for saving logs.
loghost activate: activates the log host. The system reports logs to a log host only after the activation.
View more
  • x
  • convention:

Raheel_Ahmad
Raheel_Ahmad Created Aug 15, 2019 17:30:03 (0) (0)
234  
Log analysis is a daily maintenance method. Recorded logs help users to better know system maintenance information and therefore facilitate troubleshooting. Network managers can query and save logs periodically to better detect unauthorized logins or operations and locate a fault in a timely manner.
thanks for sharing us such a good example,I learned a lot.
View more
  • x
  • convention:

the OLT Fault Location Alarm Analysis&Log Analysis is a normal problem ,using display log: queries the names and IP addresses of users that have performed operations in the system, and the operation time and detailed operations.
display log failure: queries the configuration failure logs about a user that has the same level or lower level than the current user.
thanks for your advice
View more
  • x
  • convention:

In FTTD scenarios, an optical network unit (ONU) can be a bridging+voice ONU or a bridging ONU. The bridging ONU obtains power from a piece of power sourcing equipment (PSE). Therefore, when locating a bridging ONU fault, check whether the PSE is functional.
View more
  • x
  • convention:

hello auth , good post ! thank you.

and if there are some example for alarm analysis , it will be more wonderful .
View more
  • x
  • convention:

hi author , about the log analysis ,Log analysis is a daily maintenance method. Recorded logs help users to better know system maintenance information and therefore facilitate troubleshooting. Network managers can query and save logs periodically to better detect unauthorized logins or operations and locate a fault in a timely manner.
there is any tool can help us analysis it automatically ? because usually log is very large , we only need some special error information .
View more
  • x
  • convention:

Nice work, useful for O&M team.
View more
  • x
  • convention:

ONT (optical network terminal) is the product of xpon network access scheme.
Generally speaking, ONT is ONU, which is an optical network terminal for the user.
Strictly speaking, ONT should be part of ONU.
The difference between ONT and ONU is that ONT is an optical network terminal, directly located at the user end, while ONU is an optical network unit, and there may be other networks between users, such as ethernet.
Under ONU, you can access the gateway devices of xDSL (adsl, vdsl) or Ethernet access port, and then access the network terminal.

View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.