Hello everyone,
I'm trying to parse some traps from PC and I'm stuck. The traps are coming in
as follows:
{S 109} is reporting a major threshold violation.
Detail of Threshold Violation:
1) Incident Start Time: {D 111}
2) Event ID: {S 107}
3) Event Source: {S 113}
4) Alert Message: {S 76620}
A corresponding major Threshold Violation Alarm will be generated.
I would like to parse the Alert Message to look for a particular string and
then create a new event/alarm based on that string. This is what the Alert
Message looks like:
4) Alert Message: A Threshold Violation event has been raised on
'GigabitEthernet0/0/2'. (Profile Name: BW_BRC, Rule Name: BITS IN THRESHOLD
BREACHED).
To that end, I've set up the following in the ECE event rules for that event:
If event 0x5c40011 occurs,
if (regexp({a 76620} {S *BRC*})) evaluates to TRUE, then generate 0xfff00047
I'm not sure if my parsing is working correctly, because I never see event
0xfff00047.
Any help would be greatly appreciated.
Thanks,
Calvin
---
To unsubscribe from spectrum, send email to [email protected] with the body:
unsubscribe spectrum [email protected]