DO NOT SHARE THESE DOCS WITH CUSTOMERS!
This is an LA release that will only be provided to a select number of PLM-sanctioned customers (PDFs only). Contact PLM for details.
In this section:
Use the request oam
command to perform the following OAM actions.
> request oam accounting cdrServer admin <primary | secondary> forceCurrentServer - Set this server to be the current generateSshPublicKeys - Generate SSH public key resetCdrServerStats - Reset the CDR server statistics
> request oam alarms resetIpPolicingAlarmStatus
> request oam eventLog filterStatus infoLevelLoggingEnable typeAdmin > request oam eventLog filterStatus <node name> <event_type: audit | debug | security | system | trace> <event_class: audit | callproc | directory | netmgmt | policy | resmgmt | routing | security | signaling | sysmgmt | trace> resetStats > request oam eventLog infoLevelLoggingEnable clearInfoLevelLoggingDisabled > request oam eventLog typeAdmin <event_type: acct | audit | debug | packet | security | system | trace> rolloverLogNow
Parameter Description Event log class filter status table. SBC system name. The type of event log: Event class for each event type: Use this control to reset the value of Events Filtered column of the Filter Status Event Log Parameters
filterStatus
<system name>
<event type>
audit
– System audit data. These files contain a record of all management interactions that modify the state of the system, and includes all the changes made via the CLI and the Netconf interface. These files use .AUD extensions.debug
– System debugging data. These files have .DBG extensions.memusage
– Process heap memory usage data. These files have .MEM extensions.security
– Security level events. These files have .SEC extensions.system
– System level events. These files have .SYS extensions.trace
– System trace data. These files have .TRC extensions.<event class>
audit
– Audit subsystem.callproc
– Call Processing subsystem.directory
– Directory Services subsystem.netmgmt
– Network Management subsystem.policy
– Policy subsystem.resmgmt
– Resource Management subsystem.routing
– Network Routing subsystem.security
– Security subsystem.signaling
– Signaling subsystem.sysmgmt
– System Management subsystem.trace
– Call Trace subsystem.resetStats
filterStatus
display.
Parameter Description Use this command to re-enable info level logging after it becomes disabled due to system congestion. If this command is executed while the system is still congested, this may cause the system to become further congested. Note: Only issue this command once system congestion dissipates. The system may become further congested if this command is executed while the system is still congestedInfo Level Logging Enable Event Log Parameter
clearInfoLevelLoggingDisabled
Parameter Description Event Log configuration table for configuration items related to each Event Log type. Specifies the type of event log to roll over: This control is used with request command to perform a roll-over of the specified log immediately.Type Admin Event Log Parameters (request command)
typeAdmin
<event_type>
acct
– System account data. These files have .ACT extensions.audit
– System audit data. These files contain a record of all management interactions that modify the state of the system. These files have .AUD extensions. It includes all the changes made via the CLI and the Netconf interface. (This attribute is only available to an Administrator)debug
– System debugging data. These files have .DBG extensions.memusage
– Process heap memory usage data. These files have .MEM extensions.packet
– Packet information details. These files have .PKT extensions. If enabled, stores the packet details to .PKT files.security
– Security level events. These files have .SEC extensions. (This attribute is only available to an Administrator)system
– System level events. These files have .SYS extensions.trace
– System trace data. These files have .TRC extensions.rolloverLogNow
> request oam localAuth userStatus <account name> deleteRsaKey keyName <key name> disable enable setRsaKey keyName <key name> rsaKey <key> showRsaKey
To set an RSA key:
> request oam localAuth userStatus admin setRsaKey keyName Orkney rsaKey "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEQFsIKJx8YqUsrenlSdeBDaaC7okxXKsEjiPQR8V8UnpTMMYqnkyd7ZMvvYgJkEbjxVbunv0S3y+6GN0FVndbV9y9KFNeeTOyTCrokhE4Z2YKmIrGHHqZJ8Gk9/CNS39HLC43I3tn4EPlyQLLZ9S7EVpk7/opzk7z2GkmdG+eYqLWwrK8CFS+oXyWGpXr7KSU22/N8uVa6qLhVMxGzvFf4RKJd6HJuktOihjFsm5aN2LQbjbkVJoPEPjd6dlXKf9/MHc8stHXekdJtxY0kLjJ9GI5zYhJjm5XdU0i31AYE/7j/DM6UgpUSDB1SuEbzapDQmEaEI4+Nj9/hMVK1WIT" result success reason Request to add RSA Key for the user admin is successful
To delete an RSA key:
> request oam localAuth userStatus admin deleteRsaKey keyName Orkney result success reason Request to delete SSH key for user admin is successful.
To view an RSA key:
> request oam localAuth userStatus admin showRsaKey result success reason success rsaKey1 SBX ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEQFsIKJx8YqUsrenlSdeBDaaC7okxXKsEjiPQR8V8UnpTMMYqnkyd7ZMvvYgJkEbjxVbunv0S3y+6GN0FVndbV9y9KFNeeTOyTCrokhE4Z2YKmIrGHHqZJ8Gk9/CNS39HLC43I3tn4EPlyQLLZ9S7EVpk7/opzk7z2GkmdG+eYqLWwrK8CFS+oXyWGpXr7KSU22/N8uVa6qLhVMxGzvFf4RKJd6HJuktOihjFsm5aN2LQbjbkVJoPEPjd6dlXKf9/MHc8stHXekdJtxY0kLjJ9GI5zYhJjm5XdU0i31AYE/7j/DM6UgpUSDB1SuEbzapDQmEaEI4+Nj9/hMVK1WIT rsaKey2 rsaKey3 rsaKey4 rsaKey5