This alarm indicates the server's current time
precedes the timestamp of the last known time the servers time was good.
Severity:
Critical
Instance:
May include AlarmLocation, AlarmId, AlarmState,
AlarmSeverity, and bindVarNamesValueStr
HA Score:
Normal
Auto Clear Seconds:
0 (zero)
OID:
tpdNTPDaemonNotSynchronizedFailure
Alarm ID:
TKSPLATCR16
Recovery:
Verify NTP settings and that NTP sources are
providing accurate time.
Ensure ntpd service is running with correct
options: -x -g.
Verify the content of the /etc/ntp.conf file is
correct for the server.
Type
/usr/sbin/ntpdc -c sysinfo to
check the current state of the ntpd daemon.
Verify the ntp peer configuration; execute ntpq
-np; and analyze the output. Verify peer data, such as tally code (first column
before remote), remote, refid, stratum (st), and jitter, are valid for server.
Execute ntpstat to determine the ntp time
synchronization status. If not synchronized or the stratum is not correct for
server, then ping the ntp peer to determine if peer can be reached.
If ntp peer is reachable, then restart the ntpd
service.
If problem persists, then a reset the NTP date may
resolve the issue.
Note:
Before resetting the ntp date, the applications
may need to be stopped; and subsequent to the ntp reset, the application
restarted.
Reset ntpd:
sudo service ntpd stop
sudo ntpdate <ntp server ip>
sudo service ntpd start
Conform to recommended NTP topology and strategy.
No fewer than tree references are recommended.
If selecting a different number, the number
should be odd.
No intermediate reference should be a
virtualized server.
Additional recommendations and topology are
available in NTP Strategy section in the DSR Hardware and Software Installation
1/2 customer document