Configuring Event Script (NSM Procedure)

Event scripts allow you to automate network troubleshooting and network management.

To configure event scripting in NSM:

  1. In the NSM navigation tree, select Device Manager > Devices.
  2. Click the Device Tree tab, and then double-click the device to select it.
  3. Click the Configuration tab. In the configuration tree, expand Event Options > Event Script.
  4. Select Event Script.
  5. Add or modify settings as specified in Table 210.
  6. Click one:
    • OK—Saves the changes.
    • Cancel—Cancels the modifications.

Table 210: Event Script Configuration Details

Task

Your Action

Specify the name of an Extensible Stylesheet Language Transformations (XSLT) or Stylesheet Language Alternative Syntax (SLAX) file containing an event script.

  1. Click File next to Event Script.
  2. Click Add new entry next to File.
  3. In the Name box, enter the filename.
  4. In the Comment box, enter the comment.

Calculate the checksum.

  1. Click Checksum next to file.
  2. In the Comment box, enter the comment.
  3. In the Md5 box, enter the MD5 checksum.
  4. In the Sha1 box, enter the SHA-1 checksum.
  5. In the Sha 256 box, enter the SHA-256 checksum.

Configure the username and passphrase for a remote machine.

  1. Click Remote Execution next to file.
  2. Click Add new entry next to Remote Execution.
  3. In the Name box, enter the filename.
  4. In the Comment box, enter the comment.
  5. In the Username box, enter the username for the remote machine.
  6. In the Passphrase box, enter the passphrase for the remote machine.

Define tracing operations for event scripts.

  1. Click Traceoptions next to Event Script.
  2. In the Comment box, enter the comment.
  3. Expand traceoptions.
  4. Click File next to Traceoptions.
  5. In the Comment box, enter the comment.
  6. In the Filename box, enter the name of the file to receive the output of the tracing operation.
  7. In the Size box, enter the maximum trace file size.
  8. From the Files list, select the maximum number of trace files.
  9. Select one of the following:
    • no-world-readable—To restrict the file access to owner.
    • world-readable—To enable unrestricted access.
  10. Click Flag next to traceoptions.
  11. Click Add new entry next to Flag.
  12. From the Name list, select the flag to perform the trace operation.
  13. In the Comment box, enter the comment for the flag.

Related Documentation