7 Cloud Native Policy and Charging Rule Function Alerts
This section includes information about alerts for CNPCRF.
Alarm Name | Alarm Description | Severity | App/Metrics |
---|---|---|---|
PRE_UNREACHABLE | PRE is unreachable | CRITICAL | Metrics |
PDS_DOWN | PDS is down | CRITICAL | Metrics |
PDS_UP | PDS is up | INFO | Metrics |
DB_UNREACHABLE | Connectivity to DB lost | CRITICAL | Metrics |
DB_REACHABLE | Connectivity to DB available | INFO | Metrics |
SH_UNREACHABLE | Remote Sh connection is unreachable | CRITICAL | App |
SY_UNREACHABLE | Remote Sy connection is unreachable | CRITICAL | App |
SOAP_CONNECTOR_DOWN | SOAP Connector is down | CRITICAL | Metrics |
SOAP_CONNECTOR_UP | SOAP Connector is up | INFO | Metrics |
CONFIG_SERVER_DOWN | Config server is down | CRITICAL | Metrics |
CONFIG_SERVER_UP | Config server is up | INFO | Metrics |
DIAM_GATEWAY_DOWN | Diameter Gateway is down | CRITICAL | Metrics |
DIAM_GATEWAY_UP | Diameter Gateway is up | INFO | Metrics |
LDAP_GATEWAY_DOWN | LDAP Gateway is down | CRITICAL | Metrics |
LDAP_GATEWAY_UP | LDAP Gateway is up | INFO | Metrics |
LDAP_DATASOURCE_UNREACHABLE | LDAP Datasource is unreachable | CRITICAL | App |
CM_SERVICE_DOWN | CM Service is down | CRITICAL | Metrics |
CM_SERVICE_UP | CM Service is up | INFO | Metrics |
CCA_SEND_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of CCA Send Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCAI_SEND_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of CCA-I Send Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCAT_SEND_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of CCA-T Send Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCAU_SEND_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of CCA-U Send Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
ASA_SEND_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of ASA Send Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
RAA_SEND_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of RAA Send Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
STA_SEND_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of STA Send Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCA_RECV_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of CCA Receive Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCAI_RECV_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of CCA-I Receive Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCAT_RECV_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of CCA-T Receive Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCAU_RECV_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of CCA-U Receive Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
ASA_RECV_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of ASA Receive Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
RAA_RECV_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of RAA Receive Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
STA_RECV_FAIL_COUNT_EXCEEDS_THRESHOLD | Rate of STA Receive Failure has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCR_TIMEOUT_COUNT_EXCEEDS_THRESHOLD | Rate of CCR Timeout count has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCRI_TIMEOUT_COUNT_EXCEEDS_THRESHOLD | Rate of CCR-I Timeout count has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCRT_TIMEOUT_COUNT_EXCEEDS_THRESHOLD | Rate of CCR-T Timeout count has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
CCRU_TIMEOUT_COUNT_EXCEEDS_THRESHOLD | Rate of CCR-U Timeout count has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
ASR_TIMEOUT_COUNT_EXCEEDS_THRESHOLD | Rate of ASR Timeout count has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
RAR_TIMEOUT_COUNT_EXCEEDS_THRESHOLD | Rate of RAR Timeout count has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
STR_TIMEOUT_COUNT_EXCEEDS_THRESHOLD | Rate of STR Timeout count has exceeded threshold limit(1000 times) in 1 min | CRITICAL | Metrics |
PCRF Alert Configuration
This section describes the Measurement based Alert rules configuration for CNPCRF. The Alert Manager uses the Prometheus measurements values as reported by microservices in conditions under alert rules to trigger alerts.
PCRF Alert Configuration
To configure cnPCRF alerts in Prometheus:
Note:
- The alert manager and prometheus tools should run in the default namespace.
- The PCRF Templates.zip file can be downloaded from OHC. Unzip the package after downloading to get cnpcrfalertrule.yaml and mib files.
- Find the config map to
configure alerts in prometheus server by executing the following command:
where, Namespace is the namespace used in helm install command.kubectl get configmap -n Namespace
- Take Backup of current
config map of prometheus server by executing the following command:
where, Name is the release name used in helm install command.kubectl get configmaps NAME -o yaml -n Namespace /tmp/t_mapConfig.yaml
- Delete the entry
alertscnpcrf
under rule_files, if present, in the Alert Manager config map by executing the
following command:
sed -i '/etc\/config\/alertscnpcrf/d' /tmp/t_mapConfig.yaml
Note:
This command should be executed only once. - Add entry
alertscnpcrf
under rule_files in the prometheus server config map by executing the following
command:
sed -i '/rule_files:/a\ \- /etc/config/alertscnpcrf' /tmp/t_mapConfig.yaml
Note:
This command should be executed only once. - Reload the modified
config map by executing the following command:
kubectl replace configmap <_NAME_> -f /tmp/t_mapConfig.yaml
Note:
This step is not required for AlertRules. - Add cnpcrfAlertrules in
config map by executing the following command :
kubectl patch configmap _NAME_-server -n _Namespace_--type merge --patch "$(cat ~/cnpcrfAlertrules.yaml)"