Risks, Limitations And Assumptions
- Application can handle Critical/Recovery failure notifications for below two cases when user enables App Failure Notifications in configuration
- Connectivity Exception
- Authentication Exception
- Application will send any duplicate/repeat failure alert notification for every 6 hours.
- The unique ID for the firewall has been changed from the Manager API to the Policy API. Consequently, during the migration of NSX-T devices from manager to policy mode, existing firewalls created using the Manager API will be removed, and new firewalls utilizing the Policy API will be created.
- Application cannot control monitoring pause/resume actions based on above alerts. Metrics can be used to monitor the resources and can generate alerts based on the threshold values.
- vmware-nsx-t Event/Alert polling will be started only if the user enables Event/Alert Polling in configuration.
Notes:- Here Event/Alert polling support is given for vmware-nsx-t Alarms only.
- When a status value which presents in Event/Alert Cleared Status field occurs, OpsRamp will create an Ok alert accordingly. Otherwise, OpsRamp will create an alert based on Event/Alert Severity Filter & Event/Alert Severity Mappings of the Event/Alert Polling configurations.
- Application will publish event polling alerts on root resource if Alert on root resource is checked in the configuration, else alert will be published on respective resource.
- Default values of Event/Alert Cleared Status configuration field are: ACKNOWLEDGED, SUPPRESSED, RESOLVED.
- Possible vmware-nsx-t status values are OPEN, ACKNOWLEDGED, SUPPRESSED, RESOLVED.
- Default/Possible values of Event/Alert Severity Filter configuration are CRITICAL, HIGH, MEDIUM, LOW.
- We have provided default mappings to map vmware-nsx-t Severity with OpsRamp Severities as part of Event/Alert Severity Mapping configuration.
- Users can modify them as per their use-case at any point of time from the application configuration page. Possible OpsRamp Severities are Critical, Warning, Ok, Info.
- No support of showing activity logs.
- The Template Applied Time will only be displayed if the collector profile (Classic and NextGen Gateway) is version 18.1.0 or higher.
- This application supports both Classic Gateway and NextGen Gateway.
- Below are the possible reasons for tunnel status related metrics of Transport Node can go missing:
- Transport nodes which are connected to only VLAN transport zones wont have tunnel status metrics.
- Tunnels are not setup when no NSX backed/ overlay VM is connected to the host.
- BFD module could be errored and wiped all BFD tunnel related information.
Transport node tunnel status related metrics
nsxt_transportNode_TunnelStatus nsxt_transportNode_TunnelUpCount nsxt_transportNode_TunnelDownCount nsxt_transportNode_BfdAdminDownCount nsxt_transportNode_BfdDownCount nsxt_transportNode_BfdInitCount nsxt_transportNode_BfdUpCount nsxt_transportNode_BfdNoDiagnosticCount nsxt_transportNode_BfdControlDetectionTimeExpiredCount nsxt_transportNode_BfdEchoFunctionFailedCount nsxt_transportNode_BfdForwardPlaneResetCount nsxt_transportNode_BfdPathDownCount nsxt_transportNode_BfdConcatenatedPathDownCount nsxt_transportNode_BfdAdministrativeDownCount nsxt_transportNode_BfdReverseConcatenatedPathDownCount nsxt_transportNode_BfdNeighbourSignalledSessionDownCount
- Latest snapshot metric support from Gateway 14.0.0.
Troubleshooting
Before troubleshooting, ensure all prerequisites prerequisites are met.
If VMware NSX-T integrations fails to discover or monitor, troubleshoot using the following steps:
- Check if any alerts have been generated on the NSX-T resource or gateway, or if there are any error logs in vprobe.
- If there is an error or alert related to the end device connectivity or authentication, try checking the reachability of the end device from the gateway with the following commands:
- to ping the IP address provided in the configuration:
{ping <IP Address>}
- to try telnet:
{telnet <IP Adress> <Port>}
- To run an API:
Prepare the request payload by using below sample request: { “apiVersion”: “debug/v1”, “module”: “Debug”, “app”: “poly-trio”, “action”: “Reachability”, “payload”: { “ipAddressOrHostName”: “
”, “protocol”: “https”, “port”: 443, “requestPath”: “ ”, “version”:“v1”,
“requestMethod”:"<get/post>", “userName”: “
”, “password”: “ ” } } Encode the request payload to base64
Log in to the gateway concole and connect to the GCLI terminal using the below command:
{## gcli}
Run the command using the previously generated base64 encoded string
{## sdkappdebug <base64 encoded string>}
- to ping the IP address provided in the configuration:
- If there are no connectivity or authentication issues, reach out to the support team for further assistance.