This table describes the possible alarm/event types that can be displayed.
Note:
Not all applications use all of the alarm types listed.Table 3-2 Alarm and Event Types
| Type Name | Type |
|---|---|
| AUD | Audit |
| AUTH | Authorization |
| CAF | Communication Agent (ComAgent) |
| CAPM | Computer-Aided Policy Making (Diameter Mediation) |
| CFG | Configuration |
| COLL | Collection |
| DB | Database |
| DIAG | Diagnostic |
| DIAM | Diameter |
| DISK | Disk |
| HA | High Availability |
| IDIH | Integrated Diameter Intelligence Hub |
| IF | Interface |
| IP | Internet Protocol |
| IPFE | IP Front End |
| LOG | Logging |
| MEAS | Measurements |
| MEM | Memory |
| OAM | Operations, Administration & Maintenance |
| PDRA | Policy DRA |
| PLAT | Platform |
| PROC | Process |
| PROV | Provisioning |
| NAT | Network Address Translation |
| RBAR | Range-Based Address Resolution |
| REPL | Replication |
| SCTP | Stream Control Transmission Protocol |
| SL | Selective Logging |
| SPR | Subscriber Profile Repository |
| STK | EXG Stack |
| SW | Software (generic event type) |
| UDR | User Data Request |
| UDRF/UDRFE | UDR Front End Application running on MP Server |