Hello everyone,

I'm trying to parse some traps from PC and I'm stuck.  The traps are coming in 
as follows:


{S 109} is reporting a major threshold violation.

Detail of Threshold Violation:
        1) Incident Start Time: {D 111}
        2) Event ID: {S 107}
        3) Event Source: {S 113}
        4) Alert Message: {S 76620}

A corresponding major Threshold Violation Alarm will be generated.



I would like to parse the Alert Message to look for a particular string and 
then create a new event/alarm based on that string.  This is what the Alert 
Message looks like:

     4) Alert Message: A Threshold Violation event has been raised on 
'GigabitEthernet0/0/2'. (Profile Name: BW_BRC, Rule Name: BITS IN THRESHOLD 
BREACHED).




To that end, I've set up the following in the ECE event rules for that event:

If event 0x5c40011 occurs,
if (regexp({a 76620} {S *BRC*})) evaluates to TRUE, then generate 0xfff00047




I'm not sure if my parsing is working correctly, because I never see event 
0xfff00047.  

Any help would be greatly appreciated.

Thanks,
Calvin








---
To unsubscribe from spectrum, send email to [email protected] with the body: 
unsubscribe spectrum [email protected]

Reply via email to