Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Generating Alarms Reports

 

PSM supports alarm report generation for the following:

  • BTI7800 Series network elements

  • BTI7000 Series network elements

  • BTI800 Series network elements

  • BTI700 Series network elements

  • MX Series and PTX Series routers

  • QFX Series switches

Generating an Active Alarms Report

Use this procedure to generate an active alarms report in spreadsheet format, and save it to the local drive.

  1. From the main menu, choose Tools >Reports >Alarms >Active.
  2. Wait while the report generates. The bottom of the GUI shows "Requesting Report:" followed by the selected report type. Note

    If the report fails to generate, see if Changing the Report Generation Timeout applies to your situation.

  3. When the report has been generated, the tool automatically launches your web browser and points it to the location of the report (report URL) on the PSM Server. Log in using your PSM user name and password. Note

    The report is stored indefinitely on the server at the location specified by the report URL, and is accessible from any browser. To prevent unauthorized access to this possibly sensitive data, the report location is password protected. If you have generated reports previously, your web browser might have cached your user name and password, and might log in automatically for you.

    Note

    Your browser might require you to explicitly verify and accept the server certificate before you can have access to the report. This is normal because communication between the browser and the server is through HTTPS.

    After logging in, a file download dialog box opens.

  4. Open or save the report.

    The following is an example of an Active Alarms report:

Generating a Historical Alarms Report

Use this procedure to generate a historical alarms report in spreadsheet format, and save it to the local drive.

  1. From the main menu, choose Tools >Reports >Alarms >Historical.

    The Historical Alarms Report dialog appears:

  2. Specify the alarms you want to include in the report.
    • Description Contains Include alarms with the specified text string in the alarm description.

    • Device Address Starts With Include alarms raised by a node with the specified IP address prefix.

    • Source Contains Include alarms with the specified text string in the source description.

    • Raised Time After Include alarms raised after the specified time.

    • (Raised Time) Before Include alarms raised prior to the specfiied time.

    • Cleared Time After Include alarms cleared after the specified time.

    • (Cleared Time) Before Include alarms cleared prior to the specified time.

    • Severity Include alarms at the indicated alarm severity. If no severity is selected, alarms at all severities are included.

    • Service Affecting Include alarms that are service affecting, non-service affecting, or either.

    • Acknowledged Include alarms that are acknowledged, unacknowledged, or either.

    • Assigned User Contains Include alarms with the specified text string in the user assignment.

    • System Name Contains Include alarms with the specified text string in the system name.

    • Domain Name Contains Include alarms with the specified text string in the domain name.

  3. Click Run to generate the report based on the filters you specify.
  4. Wait while the report generates. The bottom of the GUI shows "Requesting Report:" followed by the selected report type. Note

    If the report fails to generate, see if Changing the Report Generation Timeout applies to your situation.

  5. When the report has been generated, the tool automatically launches your web browser and points it to the location of the report (report URL) on the PSM Server. Log in using your PSM user name and password. Note

    The report is stored indefinitely on the server at the location specified by the report URL, and is accessible from any browser. To prevent unauthorized access to this possibly sensitive data, the report location is password protected. If you have generated reports previously, your web browser might have cached your user name and password, and might log in automatically for you.

    Note

    Your browser might require you to explicitly verify and accept the server certificate before you can have access to the report. This is normal because communication between the browser and the server is through HTTPS.

    After logging in, a file download dialog box opens.

  6. Open or save the report.

    The following is an example of a Historical Alarms report: