|Introduction|Scope|Revision Information|Terms|Glossary|$|1|1.1|1.2|2|3|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Apache License Version 1.1|Apache License Version 2.0|BSD License|Boost|CDDL License|Cyrus SASL Library|Eclipse|gSOAP|GPL v2 License|MIT License Apcera Inc.|MIT License JQuery Foundation|MIT License QOS.ch|MIT License Jesse Beder|OpenLDAP|Perl Modules|pexpect|Python|SLF4J|Swatch|tcmalloc|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|4|5|6|7|8|9|10|11|12|13|14|15|16|17|18|19|20|21|22|23|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Counter Descriptions|LDAP Server Counters|LDAP Node Counters|Per Database Cluster Counters|Notifications Counters|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|3|4|
|Introduction|Revision Information|General Impact|Capacity and Performance|Subscriber Capacity|Network Performance|Changes in Hardware Support|Changes in Cloud Support|Changes in VNF Workflows|Changes in VMware Support|Changes in Software Handling|Changes in Upgrade Procedure|Changes in Tools|Obsolete Functions|Other Network Elements (Dependencies)|New Functions|Virtualized Network Function Support|Changes in Operation|Electronic Software License|Changes in Operation|LDAP Data Views|Changes in Operation|Local Reads|Changes in Interfaces|Changes in Operation|Commercial UDC IoT Offering|Changes in Licensing|Changes in Operation|Support for Static Routing|Changes in Operation|Smooth Migration to Virtualized CUDB|Changes in Operation|Migration to Virtualized CUDB through Backup and Restore|Support for HSS-EPC 5G Profiles|Changes in Licensing|Changes in Operation|Optimized Subtree Searches|Changes in Operation|New Enhanced Functions|Flexible PL Deployment|Changes in Interfaces|Changes in Operation|OAM Automation with NETCONF Support|Changes in Operation|Increment Alert Key Command|Changes in Operation|CUDB Key Performance Indicators|Changes in Operation|SOAP Notifications Improvements|Changes in Operation|Asynchronous LDAP Proxy|CUDB Combined Hardware and Software Upgrade Procedure|Virtualized CUDB Adaptation Framework|Subscription Reallocation Improvement|Changes in Interfaces|Changes in Operation|Automatic Mastership Change Improvements|Changes in Operation|Additional High-Throughput Write Requests|Changes in Operation|IPv6 Support in CUDB|Changes in Operation|GEP7L Support|Changes in Operation|Image Based Instantiation|Changes in Operation|Automatic Installation in Native|Changes in Operation|Automated DSG Expansion|System Improvements|Improvements in CUDB 1|Interface Improvements|OAM Improvements|Notification Support Improvements|Security Improvements|OAM Improvements in CUDB 1.1|Improvements in CUDB 1.2|LDAP Data Views|OAM Improvements|OAM Improvements in CUDB 1.3|Improvements in CUDB 1.4|Application Counters|OAM Improvements|Improvements in CUDB 1.5|OAM Improvements|SOAP Notifications|Encrypted rootdn Password|Improvements in CUDB 1.6|OAM Improvements|Multicast Removal|Improvements in CUDB 1.7|OAM Improvements|Centralized Security Event Logging|Import and Export Procedures|Application Counters|Improvements in CUDB 1.8|OAM Improvements|Centralized Security Event Logging|Improvements in CUDB 1.10|OAM Improvements|Electronic Software License Improvement|OAM Improvements in CUDB 1.11|Improvements in CUDB 1.12|LDAP Node Counters|OAM Improvements in CUDB 1.12|Improvements in CUDB 1.13|OAM Improvements in CUDB 1.13|Security Improvements|Restoration of Multiple Backups into a Single Destination Cluster in Hardware Migration through Backup and Restore Procedures|Functions Planned for Coming Releases|Impacts in VNF Workflows|VNF Scale-Out Workflow|Geographical Redundancy Decrease and Site Decommissioning|Glossary|Reference List|$|1|1.1|2|2.1|2.1.1|2.1.2|2.2|2.3|2.3.1|2.3.2|2.4|2.5|2.6|2.7|2.8|3|3.1|3.1.1|3.2|3.2.1|3.3|3.3.1|3.4|3.4.1|3.4.2|3.5|3.5.1|3.5.2|3.6|3.6.1|3.7|3.7.1|3.8|3.9|3.9.1|3.9.2|3.10|3.10.1|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.3|4.3.1|4.4|4.4.1|4.5|4.5.1|4.6|4.7|4.8|4.9|4.9.1|4.9.2|4.10|4.10.1|4.11|4.11.1|4.12|4.12.1|4.13|4.13.1|4.14|4.14.1|4.15|4.15.1|4.16|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.2|5.3|5.3.1|5.3.2|5.4|5.5|5.5.1|5.5.2|5.6|5.6.1|5.6.2|5.6.3|5.7|5.7.1|5.7.2|5.8|5.8.1|5.8.2|5.8.3|5.8.4|5.9|5.9.1|5.9.2|5.10|5.10.1|5.10.2|5.11|5.12|5.12.1|5.12.2|5.13|5.13.1|5.13.2|5.13.3|6|6.1|6.1.1|6.2|7|8|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|Overview|Continuous Maintenance Procedures|Supervising Alarms|Performance Management|Monitoring Backbone Connectivity|Daily Maintenance Procedures|Create System Data Backup|Check Log Files|Perform Lightweight Consistency Check|Check Infrastructure Related Components (for CUDB Systems Deployed on Native BSP 8100)|Check Operating System|Weekly Maintenance Procedures and Tasks with Longer Periodicity|Creating Software and Configuration Backups|Performing Consistency Check|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|6|7|
|Introduction|Prerequisites|Related Information|Revision Information|Alarm Description|Procedure|Reference List|$|1|1.1|1.2|1.3|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions for Sentinel RMS Configuration Issues|Actions for License Key File Issues|Actions for NeLS Connection Issues|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|3|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for "Couldn't Get Slave SDL List or Master List"|Actions for "Faulty or Missing Configuration"|Actions for "Impossible to Store Collected Application Counters Values"|Actions for "There Are Some Nodes without Master"|Actions for "Error Application Counters Trap for PL"|Actions for "Error Application Counters Trap for DSG"|Generic Recovery Steps|Application Counters Re-Installation Steps|Stored Procedures Restoration Steps|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|2.6|3|3.1|3.2|4|5|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for "applyConfig action is ongoing"|Actions for "There are pending configuration changes"|Actions for "Backup with the same name already exists"|Actions for "Internal fault"|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|3|4|
|Overview|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|2|
|Overview|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|About This Document|Purpose|Target Group|Prerequisites|Typographic Conventions|Configuration Work Process|Introduction|Mandatory Configuration|Recommended Configuration|Optional Configuration|Feature Configurations|Common Configuration|Operation|Introduction|Services|Operations|Startup/Shutdown Sequence|SNMP Operation|Configuration|Introduction|Configuration Files|Alarm Controllers|Cluster Mode|Community Strings|Directories|FM MIB Preferences|Information Agent|Interfaces|Interface AgentX|Interface Java RMI|Interface SNMP|Java Virtual Machine|PM Agent Preferences|Master Agent Preferences|SNMP Proxy|SNMPv3|Subagent AAL Synchronization|Trap Destination|USM|VACM|Originating source as IP / Hostname|Administration|Version|Logging|Backup and Restore|Command Line Interface|Appendix A: ESA MIBs|Appendix B: SNMP Configuration|Introduction|Overview|Use Case: SNMP Get for SNMPv2|Use Case: SNMP Trap for SNMPv2|Use Case: SNMP Get for SNMPv3|Use Case: SNMP Trap for SNMPv3|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|3|3.1|3.2|3.3|3.4|3.5|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|4.11|4.12|4.13|4.14|4.15|4.16|4.17|4.18|4.19|4.20|4.21|4.22|5|5.1|5.2|5.3|5.4|6|7|7.1|7.2|7.3|7.4|7.5|7.6|8|9|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|Overview|Log File Description|Common Terms in Output Logs|Data Repair Output Log Files|Location and Naming of the Data Repair Output Logs|Contents of the Data Repair Output Logs|Record #1: Task Metainfo|Record #2: Execution Info|Record #3: DN|Record #4: Former Master Entry|Record #5: Current Master Entry Before Repair (Repaired log)|Record #6: Current Master Entry Before Repair (Unrepaired log)|Example Data Repair Log Files|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.2.1|3.2.2|3.2.2.1|3.2.2.2|3.2.2.3|3.2.2.4|3.2.2.5|3.2.2.6|3.2.3|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|Overview|CUDB Data Model Description|CUDB Main Directory Information Tree|CUDB Root Entry|CUDB LDAP Users and Groups|Identity Data|Multi Service Consumer and Association Data|MSC Common Data|Service Common Data|CUDB Application Counters Directory Information Tree|dsgLocks|LDAP Views|Concepts|Attributes and Object Classes|Attributes|Object Classes|Operational Attributes|Limitations|CUDB DIT Entries|CUDB Admin Entry|Identities Container Entry|Multi Service Consumer Container Entry|Multi Service Consumer Data Entry|Multi Service Consumer Data Service Entry|Associations Container Entry|Association Data Entry|Association Data Service Entry|Multi Service Consumer Common Data Container Entry|Multi Service Consumer Common Data Service Entry|Service Common Data Container Entry|Service Common Data Service Entry|dsgLocks Container Entry|dsgLocks Data Entry|dsgLocks Data Distribution Entry|Operations|CDC|Option 1|Option 2|Base DN Transformation in LDAP operations over Authentication Data Operations (serv=Auth)|Performing LDAP Search Below the DE|Error Codes|LDAP Controls|ReadMode Control|CUDB LDAP Extended Operations|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.1.6|3.1.7|3.1.8|3.2|3.2.1|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.3.1|5.3.2|5.4|5.4.1|5.4.2|5.5|5.5.1|5.6|5.6.1|5.7|5.7.1|5.7.2|6|6.1|6.1.1|6.1.2|6.2|6.3|6.4|6.5|6.5.1|6.6|
|$|
|Introduction|Prerequisites|Basic Concepts|eVIP Concepts|Abstract Load Balancer|Front-End Element|Security Element|Load Balancer Element|Deployment of eVIP Elements|Resilient FEE IP Addresses|Target Pool|Flow Policy|Selection Policy|XFRM ALB Selection Policies|IPsec Tunnel Configuration|Configuration Concepts|Managed Object Model|Configuration Feedback|Actions|Startup Commands|Parameter Objects|Configuration|General eVIP Configuration|Specify a Startup Command|Delete a Command Definition|Define a Cluster|Configure an eVIP Parameter|Define a Port Range|ALB Configuration|Create an ALB|Delete an ALB Object|Define an ERSIP Parameter|Configure a VIP Address|Configure an SE|Configure an LBE|Configure an FEE|Configure a Supervised Remote Gateway|Configure OSPFv2 Routing|Configure OSPFv2 Routing with BFD Supervision|Configure OSPFv3 Routing|Configure OSPFv3 Routing with BFD Supervision|Configure Static Routing with BFD Supervision for IPv4|Configure Static Routing with BFD Supervision for IPv6|Configure Static Routing for IPv4|Configure Static Routing for IPv6|Traffic Configuration|Configure a Target Pool|Configure a Flow Policy|Configure a Selection Policy|Configure an XFRM ALB Selection Policy|Configure an IPsec Tunnel|$|1|1.1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.1.7|2.1.8|2.1.9|2.1.10|2.1.11|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.2.9|3.2.10|3.2.11|3.2.12|3.2.13|3.2.14|3.2.15|3.2.16|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.3.5|
|Introduction|Fault Management|Basic Concepts|Configuration|Act on Received Notification|Ericsson Alarm MIB|Alarm Information Mapping|Configuration Management|Basic Concepts|Managed Object Models|Configuration|Configuration Management Using NETCONF|Configuration Management Using CLI|Management of CM Interfaces|Model File Access|Security Management|Overview|Security Management Functions|Roles and Rules|Configuration|File Management|Configuration|Performance Management|Basic Concepts|Measurement Job Administration|Storage of Performance Measurement Results|ECIM PM Model Compliance|$|1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|4.1|4.2|4.3|4.4|5|5.1|6|6.1|6.2|6.3|6.4|
|Introduction|Prerequisites|Related Information|Revision Information|System Configuration|Overview|The lde-config and cluster.conf|The etc-overlay-framework|Kickstart Management (for LDEfR)|Overview|Creating Kickstart Structure for a Blade|Software Configuration (for LDEfS and LDEfR)|Overview|Repository Management|Software Management|Upgrading to a New System Version|Software Configuration (for LDEwS)|Adding an Application Package|Removing an Application Package|Upgrading an Application Package|Upgrading an LDEwS Package|Listing Packages|Synchronizing Packages|Activating Packages|User and Group Management|Overview|Adding/Removing/Modifying Users and Groups|Make a User or Group Global|Changing Password|Account and Password Aging|Forced Password Change|Allowing Login Users (for LDEwS)|Login Information|Inactivity Logout|Logging In Remotely|SSH|Backup|Overview|Creating a Backup|Restoring a Backup|Local Snapshot|Overview|Creating a Local Snapshot on LDEfS|Creating a Local Snapshot on LDEwS|Restoring a Local Snapshot on LDEfS|Restoring a Local Snapshot on LDEwS|Delete a Local Snapshot on LDEfS|BRF (for LDEwS)|Reboot|Overview|Reboot a Single Blade|Reboot the Whole Cluster|Bypass the BIOS When Rebooting|Power|Overview|Configuration|Power On|Power Off|Power Reset|Power Status|Alarms|Overview|Alarm Status|Configuration Management (for LDEwS)|Example|Cluster Tool|Network Services|Listening Services|List Services|SSH Server|DSCP Marking|Traffic classification|Preventive Maintenance|System Check|Logs|Copying Large Files to Shared Replicated Storage|Maintenance Mode|Trouble Reporting|Reference List|$|1|2|3|4|5|5.1|5.2|5.3|6|6.1|6.2|7|7.1|7.2|7.3|7.4|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|9|9.1|9.2|9.3|9.4|9.5|9.6|9.7|9.8|9.9|10|10.1|11|11.1|11.2|11.3|12|12.1|12.2|12.3|12.4|12.5|12.6|12.7|13|13.1|13.2|13.3|13.4|14|14.1|14.2|14.3|14.4|14.5|14.6|15|15.1|15.2|16|16.1|17|18|18.1|18.2|18.3|19|19.1|20|20.1|20.2|20.3|20.4|20.5|21|
|Introduction|Document Purpose and Scope|Revision Information|Prerequisites|Typographic Conventions|Overview|Data Backup and Restore|Software and Configuration Backup and Restore|Data Backup and Restore|Data Backup|Unit Data Backup|System Data Backup|Data Restore|Unit Data Restore|Group Data Restore|System Data Restore|Combined Data Backup and Restore|Combined Unit Data Backup and Restore|Software and Configuration Backup and Restore|Software and Configuration Backup|Software and Configuration Restore|Prerequisites of Software and Configuration Restore|Performing Software and Configuration Restore|Periodic Software and Configuration Backup in a CUDB System|Configuring Periodic Software and Configuration Backup|Printing Configured Software and Configuration Backups|Canceling a Periodic Software and Configuration Backup|BSP 8100 Configuration Backup and Restore|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|4|4.1|4.2|4.2.1|4.2.2|4.3|4.3.1|4.3.2|4.3.3|4.4|5|6|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Running the Application|Window Management|Main Window|Project View|Editor View|Schema Editor|Overview Tab|Source Code Tab|Attribute Editor|Overview Tab|Source Code Tab|Object Class Editor|Overview Tab|Source Code Tab|Log View|Managing Projects|Creating a Project|Deleting a Project|Managing Schemas|Creating an Empty Schema|Importing an Existing Schema|Commenting Schemas|Renaming a Schema|Deleting a Schema|Managing Attributes|Creating an Attribute|Modifying an Attribute|Moving an Attribute|Deleting an Attribute|Managing Object Classes|Creating an Object Class|Modifying an Object Class|Moving an Object Class|Deleting an Object Class|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.3.1|3.3.1.1|3.3.1.2|3.3.2|3.3.2.1|3.3.2.2|3.3.3|3.3.3.1|3.3.3.2|3.4|4|4.1|4.2|5|5.1|5.2|5.3|5.4|5.5|6|6.1|6.2|6.3|6.4|7|7.1|7.2|7.3|7.4|8|9|
|Introduction|Purpose and Scope|Revision Information|Target Groups|Typographic Conventions|Prerequisites|Hardware and Software|Configuration Files|Instantiate Configuration Files|Upgrade Configuration Files|Other Requirements|Onboard|Procedures|Instantiate vCUDB System|Instantiate vCUDB System Prerequisites|Instantiate vCUDB VNF|Workflow Log in GUI|vCUDB System Completion Steps|vCUDB System Integration|Terminate vCUDB System|Terminate vCUDB VNF|Workflow Log in GUI|vCUDB Upgrade Preparation|vCUDB Upgrade Preparation Prerequisites|vCUDB Upgrade Preparation Steps|Workflow Log in GUI|vCUDB Upgrade System|vCUDB Upgrade System Prerequisites|vCUDB Upgrade VNF Steps|Workflow Log in GUI|Troubleshooting|Appendix: General Considerations when Upgrading|Hardening|Deviations from Standard Configuration|Prerequisites|Network Impacts|System Downtime and Service Disturbances|Restrictions|$|1|1.1|1.2|1.3|1.4|1.5|1.5.1|1.5.2|1.5.2.1|1.5.2.2|1.5.3|2|3|3.1|3.1.1|3.1.2|3.1.2.1|3.1.2.2|3.1.2.3|3.2|3.2.1|3.2.1.1|3.3|3.3.1|3.3.2|3.3.2.1|3.4|3.4.1|3.4.2|3.4.2.1|4|5|5.1|5.2|5.3|5.4|5.5|5.6|
|Introduction|Document Purpose and Scope|Revision Information|Target Groups|Typographic Conventions|CUDB Commands|CUDB Command|Management Commands|cudbAnalyser|cudbApplicationCounters|cudbApplyConfig|cudbCheckConsistency|cudbCheckReplication|cudbCollectInfo|cudbConsistencyMgr|cudbDataBackup|cudbDbDiskManage|cudbDsgMastershipChange|cudbDsgProvisioningManage|cudbGetLogs|cudbHaState|cudbLdapFeRestart|cudbManageBCServer|cudbManageLibDataDist|cudbManageMsgSrvServer|cudbManageStore|cudbPmJobReload|cudbPrepareStore|cudbReallocate|cudbReconciliationMgr|cudbRemoteTrust|cudbResumeProvisioningNotification|cudbServiceContinuity|cudbSwBackup|cudbSwVersionCheck|cudbSystemDataBackupAndRestore|cudbSystemStatus|cudbTakeAllMasters|cudbUnitDataBackupAndRestore|cudbUpdateUserInfo|Internal Commands|cudbAppCheckerManager|cudbBCServersRestart|cudbCopyAclsConfFile|cudbEvipConfigExtension|cudbEvipEncapsulator|cudbExecuteAllBlades|cudbFollowLdapfeLogs|cudbManageDsGroup|cudbManageNode|cudbManageSite|cudbMpstat|cudbOomConfigurator|cudbParallelCommandRun|cudbRemoveNode|cudbSdpInfo|cudbSetDsgMaster|cudbSetPartitionStatus|cudbTpsStat|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.2.7|2.2.8|2.2.9|2.2.10|2.2.11|2.2.12|2.2.13|2.2.14|2.2.15|2.2.16|2.2.17|2.2.18|2.2.19|2.2.20|2.2.21|2.2.22|2.2.23|2.2.24|2.2.25|2.2.26|2.2.27|2.2.28|2.2.29|2.2.30|2.2.31|2.2.32|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.3.5|2.3.6|2.3.7|2.3.8|2.3.9|2.3.10|2.3.11|2.3.12|2.3.13|2.3.14|2.3.15|2.3.16|2.3.17|2.3.18|3|4|
|Introduction|Purpose and Scope|Revision Information|Target Groups|Prerequisites|Related Information|Tools|CLI Commands|Checking the Active System Controller|CUDB Logchecker|Manual Log Collection|Log Analysis|CUDB Logs Collection|LDE Status|ESA Processes|Check Database Consistency between Database Clusters|cudbConsistencyMgr|Check Replication Channels Behavior|UDC Cockpit Tool|Troubleshooting Procedure|Trouble Reporting|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.1.1|2.1.2|2.1.2.1|2.1.2.2|2.1.3|2.1.4|2.1.5|2.1.6|2.1.7|2.1.8|2.2|3|4|
|About Ericsson Library Explorer|Introducing Ericsson Library Explorer|CPI Library Types|Document Formats|Ericsson Library Explorer Variants|Ericsson Library Explorer Functions|Ericsson Library Explorer, Library View|Ericsson Library Explorer, Content View|Content View Overview|Search|Search Syntax|How to Search|Search Results|Navigate|Provide Feedback|Add Note|View Notes|Edit or Delete Note|Content Rating|Copy Links to Clipboard|Show Document in PDF|Save Document as PDF to Local Disk|$|1|1.1|1.2|1.3|1.4|1.5|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.3|3.4|3.4.1|3.4.2|3.4.3|3.4.4|3.5|3.6|3.7|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|CUDB Configuration Model Description|Data Types|Class Hierarchy|System Object Classes|Class CudbSystem|Class CudbDsGroup|Class CudbAppService|Class CudbPlGroup|Class CudbSystemSecurity|Class CudbAutomaticMasterChange|Class CudbDsGroupRepairAndResync|Class CudbExternalAuthMgmt|Class CudbExternalAuthServer|Class CudbExternalLogMgmt|Class CudbExternalLogServer|Node Object Classes|Class CudbLocalNode|Class CudbLocalPl|Class CudbLocalDs|Class CudbProvisioningGatewayConfig|Class CudbSecurityMgmt|Class CudbLdapCertificates|Class CudbSoapCertificates|Class CudbRemoteNode|Class CudbRemotePl|Class CudbRemoteDs|Class CudbLogCertificates|Class CudbTrafficControlManager|Class CudbTrafficBlockingRule|Node Object Structures|Structure CudbAsyncActionProgress|LDAP Access Object Classes|Class CudbLdapAccess|Class CudbLdapUsersMgmt|Class CudbLdapUserGroup|Class CudbLdapUser|Class CudbLdapViewsMgmt|Class CudbLdapView|Class CudbSubtreeSearchMgmt|Class CudbSubtreeSearchConfig|Notifications Object Classes|Class CudbNotifications|Class CudbNotificationEvent|Class CudbNotificationEndPoint|Class CudbNotificationObjectClass|Class CudbNotificationAttr|PG Object Classes|Class CudbProvisioningGatewayMgmt|Class CudbProvGatewayEndPoint|CUDB Administrative Operations|applyConfig|updateUserInfo|cancelApplyConfig|Initial Configuration|Considerations|Configuration Modification Procedure|Preconditions|Object Model Modification Procedure|Modification Procedure Using CUDB Configuration CLI|Modification Procedure Using NETCONF|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.3.5|2.3.6|2.3.7|2.3.8|2.3.9|2.3.10|2.3.11|2.4|2.4.1|2.4.2|2.4.3|2.4.4|2.4.5|2.4.6|2.4.7|2.4.8|2.4.9|2.4.10|2.4.11|2.4.12|2.4.13|2.5|2.5.1|2.6|2.6.1|2.6.2|2.6.3|2.6.4|2.6.5|2.6.6|2.6.7|2.6.8|2.7|2.7.1|2.7.2|2.7.3|2.7.4|2.7.5|2.8|2.8.1|2.8.2|2.9|2.9.1|2.9.2|2.9.3|3|3.1|4|4.1|4.2|4.2.1|4.2.2|5|6|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for BSP Alarm or Alert Related to Hardware Identified by IP Address|Glossary|Reference List|$|1|1.1|1.2|2|2.1|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Related Terms|Overview|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Application Counters Configuration File|Create Tables in PLDB|Create Stored Procedures|Configure ESA|Create Scripts to Fetch Application Counters to ESA|Configure ESA to Use Scripts|Configure Jobs to Generate Output Files|Configure Cron Task|Fault Management|Performance Management|Security|Logging|Appendix: Examples|Creating Application Counters Configuration File|Creating Tables|Stored Procedures|Best Practices in Writing Stored Procedures|ESA Configuration|Scripts to Fetch Counters|Configuring ESA to Use Scripts|Configuring Cron File: appCounters.cron|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|2.1|2.2|2.3|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.4.1|3.1.4.2|3.1.4.3|3.1.5|3.2|3.3|3.4|3.5|4|4.1|4.2|4.3|4.3.1|4.4|4.4.1|4.4.2|4.5|
|Introduction|Description of Changes|Library Front Page|Safety and Environment|Library Overview|Product Overview|Site Engineering|Planning|Integration|Operation and Maintenance|Interface|Removed Documents|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for the Local Cluster Is Under Maintenance Operation|Actions for All Management Components of the Local Cluster Are Unreachable|Actions for All Data Nodes Are Unreachable|Actions for All Local Master Replication Servers of This Cluster Are Unreachable If the CUDB System Contains at Least Two CUDB Nodes|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Architecture|Description|CUDB Schema Conversion Tool|CUDB Schema Update Tool|CUDB Schema Management GUI|Dependencies and Interactions|Operation and Maintenance|Configuring the CUDB Schema Conversion Tool|Schema Files Required by the CUDB Schema Conversion Tool|Modifications Required in the CUDB Schema Conversion Tool Configuration File|Configuring the CUDB Schema Update Tool|Files Required by the CUDB Schema Update Tool|Modifications Required in the CUDB Schema Update Tool Configuration File|Fault Management|Performance Management|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.3|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.3|3.4|
|Introduction|Target Groups|Revision Information|Typographic Conventions|Overview|LDAP Data Views Configuration|Data View Configuration Entities|Virtual Entries|Child Virtual Entries|Virtual Object Classes|Map Rules|Attributes|Variables|Transformation Rules|Attribute Value Transformation|One-to-one Mapped Entries|Scaffolding Virtual Entries|Defining an Alias|Configuration|Creating LDAP Data View in the Data Model|Assigning LDAP Data View to User|Removing LDAP Data View from User|Deleting LDAP Data View|Modifying LDAP Data View|Checking Tool|Input|Execution|Output|Appendix: Mapping Structure|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.1.6|3.1.7|3.1.8|3.1.9|3.1.10|3.1.11|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.3|3.3.1|3.3.2|3.4|4|5|6|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for the Local Cluster Is Under Maintenance Operation|Actions for All Management Components of the Local Cluster Are Unreachable|Actions for All Data Nodes Are Unreachable|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|4|5|
|Introduction|Document Purpose and Scope|Revision Information|Overview|Usage Information|General Information|Automatic Log Collection and Log Analysis|Defining Custom Monitoring Intervals|Manual Log Collection and Analysis|Troubleshooting cudbAnalyser Results|cudbSystemStatus|NDB|OS|Config|SWM|Database Cluster|LDAP|System Monitor|BC Server|Master Unavailability|Software Platform|Alarm|Log|$|1|1.1|1.2|2|3|3.1|3.2|3.2.1|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|4.11|4.12|4.13|
|Introduction|Hazard Symbols and Admonitions|General Safety Precautions|Electric Shock Hazards|Safety Precautions for Working with Electrical Equipment|Energy Hazards|Fire Hazard|Fire Precautions|Heat Hazards|Mechanical Hazards|Radio Frequency Exposure Hazards|Laser Hazards|Chemical Hazards|Beryllium Oxide Hazard|Battery Acid Hazard|Gas Explosion Hazard|Refrigerant Hazard|Other Hazards|Handling Heavy Goods|Working at Height|$|1|2|3|4|4.1|5|6|6.1|7|8|9|10|11|11.1|11.2|11.3|11.4|12|12.1|12.2|
|Introduction|Target Group|Educational Requirements|Admonitions and Safety Symbols|Special Hazard Symbols|Batteries|Overheated Batteries|Treating Hazardous Waste from Leaks|Electrical Installation|Safety Precautions for Working with Electrical Installations|Electrostatic Discharge|Handling Printed Board Assemblies and IC Components|Storing and Transporting Printed Board Assemblies and IC Components|Equipment Handling|Ground Connection|Lightning Protection|System, Data, and Traffic Protection|$|1|1.1|1.2|2|2.1|3|3.1|3.2|4|4.1|5|5.1|5.2|6|7|8|9|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|4|5|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Document Purpose and Scope|Revision Information|Concepts|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|How to Use This Function|Example of a Virtual Tree|Principles of LDAP Data Views|Scaffolding Virtual Entries|One-to-one Mapped Entries|Description of Runtime Behavior|General Rules|Search Requests|Write Requests|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|4|5|5.1|5.2|5.3|5.4|5.5|6|7|
|Introduction|Revision Information|Compute Requirements|Network Requirements|Storage Requirements|Security Requirements|Other Requirements|Glossary|Reference List|$|1|1.1|2|3|4|5|6|7|8|
|Introduction|Document Purpose and Scope|Revision Information|Target Groups|Typographic Conventions|Installation Information|Installation Preparation|Prerequisites|Download Deliverables|Tools Delivered|Installation|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|4|5|6|
|Introduction|Target Groups|Prerequisites|CPI Library Distribution|CPI Library Access|CPI Product Numbers|Library Structure|Document Types|CUDB Library|Safety and Environment|Library Overview|Product Overview|Site Engineering|Planning|Integration|Operation and Maintenance|Interface|3rd Party Products|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Document Purpose and Scope|Target Group|Prerequisites|Revision Information|Typographic Conventions|Overview|Execution Conditions|Consistency Check|Ordering the Consistency Check|Listing Tasks|Reviewing the Task History|Removing Tasks|Consistency Check Output|LDAP Tree Log|Format of the LDAP Tree Log XML|Structure of the LDAP Tree Log XML|LDAP Tree Log Output Examples|Log Cleanup|Alarms|Use Recommendations|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|3|3.1|3.2|3.3|3.4|3.5|3.5.1|3.5.1.1|3.5.1.2|3.5.1.3|3.5.2|3.6|3.7|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|$|
|$|
|$|
|$|
|$|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions to Adjust the LM Configuration|Actions to Order and Install a New License Key File|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for All Causes|$|1|1.1|1.2|2|2.1|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Alarm Description|Prerequisites|Procedure|Failing Node Introduction|Manual Replica Synchronization Procedure|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Description|Prerequisites|Procedure|Actions for the Reallocation Process is Ongoing|Actions for the Replication Delay Exceeds the Time Limit|Actions for Mastership Change During cudbCheckReplication Execution|Actions for Replication Malfunction|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|3|4|
|About This Document|Purpose|Target Group|Prerequisites|Typographic Conventions|Fault Management Overview|Alarm Definition|Introduction|Function Description|Configuration Overview|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Alarm Translation|Introduction|Function Description|Configuration Overview|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Command Line Interface|Introduction|Command: View Active Alarms|Command: Send Message|Application Programming Interface|Introduction|Interface: Alarm Definition|Interface: Alarm|Interface: Active Alarm List|Interface: Subagent AAL Synchronization|Administration|Log Files|Backup and Restore|Appendix A: Standardized Parameter Values|Perceived Severity|Event Type|Probable Cause|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|6|6.1|6.2|6.3|6.4|6.5|7|7.1|7.2|8|8.1|8.2|8.3|9|10|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Overview|Interfaces and Tools|Interfaces|SNMP|SSH|SFTP|NETCONF|SCP|Tools|CUDB CLI|Finding the Active System Controller|CUDB Configuration CLI|CUDB Platform Interfaces|LDAP Schema Management Tools|UDC Cockpit|Configuration Data Management|Fault Management|Performance Management|Logging Management|CUDB Log Collection|Security Management|Backup and Restore Procedures|Replication|Reconciliation|Networking|Data and Schema Management|LDAP Data Import and Export|Adding and Searching LDAP Data|Adding LDAP Data|Searching LDAP Data|LDAP Schema Edition|Schema Update and Index Creation on New Attributes|Index Creation|Startup and Shutdown|Initial System Startup|Node Startup after Graceful Shutdown|Node Startup after a Graceful Shutdown for CUDB Systems Deployed on Native BSP 8100|Node Startup after Graceful Shutdown for CUDB Systems Deployed on a Cloud Infrastructure|Node Startup after Graceful Shutdown Using the Atlas GUI|Node Startup after Graceful Shutdown Using OpenStack Command-Line Tools|Node Startup after a Non-Graceful Shutdown|Node Startup after a Non-Graceful Shutdown for CUDB Systems Deployed on Native BSP 8100|Node Startup after a Non-Graceful Shutdown for CUDB Systems Deployed on a Cloud Infrastructure|Full CUDB System Startup|Node Graceful Shutdown|Node Graceful Shutdown for CUDB Systems Deployed on Native BSP 8100|Node Graceful Shutdown for CUDB Systems Deployed on a Cloud Infrastructure|Node Graceful Shutdown Using the Atlas GUI|Node Graceful Shutdown Using OpenStack Command-Line Tools|Regular Maintenance Procedures|System Level CUDB Procedures|Configuring Network Routes Towards Notification Endpoints|Disabling a CUDB Node in a CUDB System|Disabling a CUDB Node Using Manual Procedure|Enabling a Previously Disabled CUDB Node in a CUDB System|Enabling a CUDB Node Using Manual Procedure|Creating a New DSG|Activating a DSG|Activating a Previously Deactivated DSG in the CUDB System|Activating a New DSG in the CUDB System|Activation Procedure for a New DSG|Managing DSG for Provisioning|Listing the Master Replicas|Setting the Default Geographical Zone Globally|Setting Custom Distribution Policy for Distribution Entries Globally|Checking the Custom Distribution Policy of DEs Globally|Restoring the Default Distribution Policy of DEs Globally|Activating and Deactivating Notifications Globally|Deactivating Specific Notifications Globally|Adding Space to a BLOB in the Disk Storage System Globally|Configuring Subscription Reallocation|Shortening the Reallocation Process|Requesting Reconciliation Manually|Running Defragmentation|Configuring Provisioning Gateway Nodes|CUDB LDAP User Management|Changing DSG or PLDB Mastership Manually|Updating LDAP Schema Globally|Activating DS Units|Deactivating DS Units|Configuring Automatic Mastership Change|LDAP Data Views Management|OAM Centralized Authentication System Support|Optimized Subtree Searches|Node Level CUDB Procedures|Activating a Local CUDB Node|Activating a Remote CUDB Node|Modifying a CUDB Node Name|Modifying the DSG or PLDB Cluster State|Checking Software Inventory on a CUDB Node|Checking Imported Software on a CUDB Node|Checking Installed Software on Each Blade or VM of a CUDB Node|Defragmenting a Database Cluster|Subscribing a DSG Master Replica to Reconciliation Manually|Deactivating a Local CUDB Node|Storage Performance Monitoring Function|Auxiliary CUDB Procedures|Activating a DS Unit in a Local CUDB Node|Deactivating a DS Unit in a Local CUDB Node|Activating a DS Unit in a Remote CUDB Node|Deactivating a DS Unit in a Remote CUDB Node|Deactivating a Remote CUDB Node|Adding a DSG to a Local CUDB Node|Adding a DS Unit to a Local CUDB Node|Adding a Generic Blade or VM to a Local CUDB Node|Configuring a DS Unit Added to a Local CUDB Node|Configuring a DS Unit Added to a Remote CUDB Node|Deactivating a Local PLDB Unit|Activating a Local PLDB Unit|Deactivating a Remote PLDB Unit|Activating a Remote PLDB Unit|Setting the Default Geographical Zone|Setting Custom Distribution Policy for DEs|Checking The Custom Distribution Policy of DEs|Restoring the Distribution Policy of DEs|Increasing the Space of a BLOB in the Disk Storage System|Enabling or Disabling Notifications for All Applications|Disabling Notifications towards a Specification Application End Point|Creating a CUDB LDAP User Group in a Local CUDB Node|Adding a New CUDB LDAP User to a Local CUDB Node|Configuring Attributes of a CUDB LDAP User|Configuring a PG Node in a Local CUDB Node for Backup Notification|Updating CUDB LDAP User Information in a CUDB Node|Deleting a CUDB LDAP User in a Local CUDB Node|Deleting a CUDB LDAP User Group in a Local CUDB Node|Removing Huge Files|Disabling PROVISIONING_VIP, FE_VIP, and SITE_VIP Addresses|Enabling PROVISIONING_VIP, FE_VIP, and SITE_VIP Addresses|Configuring PG Endpoints in a Local CUDB Node for the Provisioning Assurance Function|Creating a New Notification Event|Configuring an Existing CudbNotificationEvent|Deleting a CudbNotificationEvent|Configuring QoS in CUDB|$|1|1.1|1.2|1.3|2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.2|3.2.1|3.2.1.1|3.2.2|3.2.3|3.2.4|3.2.5|4|5|6|7|8|9|10|11|12|13|14|14.1|14.2|14.2.1|14.2.2|14.3|14.4|14.4.1|15|15.1|15.2|15.2.1|15.2.2|15.2.2.1|15.2.2.2|15.3|15.3.1|15.3.2|15.4|15.5|15.5.1|15.5.2|15.5.2.1|15.5.2.2|16|17|17.1|17.2|17.2.1|17.3|17.3.1|17.4|17.5|17.5.1|17.5.2|17.5.2.1|17.6|17.7|17.8|17.9|17.10|17.11|17.12|17.13|17.14|17.15|17.15.1|17.16|17.17|17.18|17.19|17.20|17.21|17.22|17.23|17.24|17.25|17.26|17.27|18|18.1|18.2|18.3|18.4|18.5|18.5.1|18.5.2|18.6|18.7|18.8|18.9|19|19.1|19.2|19.3|19.4|19.5|19.6|19.7|19.8|19.9|19.10|19.11|19.12|19.13|19.14|19.15|19.16|19.17|19.18|19.19|19.20|19.21|19.22|19.23|19.24|19.25|19.26|19.27|19.28|19.29|19.30|19.31|19.32|19.33|19.34|19.35|19.36|
|Introduction|Related Information|Key Features of Ericsson NETCONF Interface|Prerequisites|NETCONF Session|Start a NETCONF Session over SSH|Start a NETCONF Session over TLS|Session Inactivity Timer|Session End|NETCONF RPC Messages|Message <hello>|Message <ok>|Error Messages|NETCONF Data Model|Model Definition|Namespaces|Configuration and State Data|Distinguished Names|MO Attributes|MO Instances|MO Actions|NETCONF Operations|Operation <get>|Operation <get-config>|Operation <editconfig>|Operation <action>|Operation <create-subscription>|Operation <close-session>|Operation <kill-session>|Operation <copy-config>|Operation <delete-config>|NETCONF Notifications|Notification <replayComplete>|Notification <notificationComplete>|Non-Standard Notifications|NETCONF Validation|Create MO Instance|Delete MO Instance|Change Single-Valued Attributes|Delete MO Attribute Values|Change Sequence Attributes|Change Struct Attributes|System-Created Property|NETCONF Visibility Control|NETCONF Transaction|Transaction Start|Locking|Transaction Commit|Abort|Transaction Time-Out|NETCONF Capability <action>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|NETCONF Capability <notification>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|New Notifications|XML Schema|RFC Compliance Latest|NETCONF Statement of Compliance|NETCONF Capabilities|NETCONF Compliance to RFC 4741 and RFC 6241|NETCONF Compliance to RFC 4742 and RFC 6242|NETCONF Compliance to RFC 5277|NETCONF Compliance to RFC 5539|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|6.1|6.2|6.3|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|11.3|11.4|11.5|11.6|11.7|12|13|13.1|13.2|13.3|13.4|13.5|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|4|5|
|Introduction|Prerequisites|Core MW Command Overview|Deprecated Commands|Administrative Operations|Reboot Cluster|Reboot Node|Lock Node|Unlock Node|Verify System Status|Save IMM Data|Get AMF Node of Given Hostname|Get Hostname of Given AMF Node|Configure IMM Access Control|Enable or Disable Core MW Features|Set Time-Out for Core MW Scaling Feature|Clear Alarm Issued by AMF|Core MW Partial Backup and Partial Restore  Deprecated|Create Core MW Partial Backup  Deprecated|List Core MW Partial Backups  Deprecated|Delete Core MW Partial Backup  Deprecated|Restore Using Core MW Partial Backup  Deprecated|Software Management|Import Software Bundles and Campaigns|Delete Software Bundles and Campaigns|Read from Software Inventory|Use SMF Campaigns|Configure ECIM SWM|Use CLI for Upgrade Package/CSP|Configure ISP Events for Cluster Restarts|Configure Reboot Behavior of Single-Step Procedures|Configure Remote Fencing Parameters|Performance Management|Create ECIM PM Job|Start ECIM PM Job|Stop ECIM PM Job|Delete ECIM PM Job|Report Status of ECIM PM Job|List ECIM PM Jobs|Modify ECIM PM Job|Display Active PM Values for an Instance|OpenSAF Tools|OpenSAF Tools Wrapper|Backup and Restore Framework|$|1|1.1|2|2.1|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|8|
|Introduction|Document Purpose and Scope|Target Group|Revision Information|Typographic Conventions|Prerequisites|Limitations and Recommendations|Updating Existing Schemas|Adding New Schemas|Definition of Search Indexes|$|1|1.1|1.2|1.3|1.4|2|3|4|5|6|
|Introduction|Purpose and Scope|Target Groups|Revision Information|Typographic Conventions|Overview|Deployment Considerations|IP Transport Network Considerations|Geographical Redundancy Considerations|CUDB Site and Node Number Considerations|CUDB Node Distance Considerations|Network Latency Impacts on LDAP Proxy Traffic|Virtual Deployment Considerations|CUDB Deployment Examples|Example Networks Dimensioned with 5 DSGs|Example Network with Double Geographical Redundancy|Example Network with Triple Geographical Redundancy|Example Networks Dimensioned with 15 DSGs|Example Networks with Double Geographical Redundancy|Example Network with Triple Geographical Redundancy|Example Networks Dimensioned with 30 DSGs|Example Network with Double Geographical Redundancy|Example Network with Triple Geographical Redundancy|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.4.1|3.5|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.3|4.3.1|4.3.2|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Description|Prerequisites|Typographic Conventions|Procedure in Case of Site Failure|Situations|Emergency Procedure|Recovery Procedure|Procedure in Case of IP Backbone Failure|Situation|Emergency Procedure|Recovery Procedure|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|3|3.1|3.2|3.3|4|5|
|Introduction|Target Groups|Revision Information|Typographic Conventions|Overview|Optimized Subtree Searches Configuration|Configure an Optimized Subtree Search|Delete an Optimized Subtree Search|Update an Optimized Subtree Search|Creating Optimized Subtree Search in the Data Model|Assigning Optimized Subtree Search to User|Removing Optimized Subtree Search from User|Deleting Optimized Subtree Search|Modifying Optimized Subtree Search configuration|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Purpose and Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Supported Hardware|Functions|General|CUDB Functionality|Structured, Flexible and Extensible Common Data Model|Data Distribution|Data Backup and Restore|Import and Export|Access Control|Notifications|EPC Mobility Support|Geographical Zone Administration|BLOB Support|External Data Access Support|Subscription Reallocation|Geographically Redundant Deployments|Enhanced Overload Protection and Cooperative Load Regulation FE-BE|Traffic Prioritization per Application under Overload|Data Schema Management Tool|Consistency Check|Automatic Mastership Change|Automatic Handling of Network Isolation|Provisioning Assurance after CUDB Mastership Change|Multi-Application Support|LDAP Data Views|VNF Support|Flexible PL Deployment|Local Reads|Security|Interfaces|Reference Model|Protocols|Architecture|Logical Components|PL|DS Layer|Monitoring and OAM Components|OAM|Fault Management|Performance Management|Log Management|Configuration and Software Management|Configuration|CUDB Node Configuration|CUDB System Configuration|Characteristics|Availability and Reliability|Scalability|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.2.9|3.2.10|3.2.11|3.2.12|3.2.13|3.2.14|3.2.15|3.2.16|3.2.17|3.2.18|3.2.19|3.2.20|3.2.21|3.2.22|3.2.23|3.2.24|3.3|4|4.1|4.2|5|5.1|5.1.1|5.1.2|5.1.3|6|6.1|6.2|6.3|6.4|7|7.1|7.2|8|8.1|8.2|
|Introduction|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|Actions for Intensive Database Operations|Actions for High Rate of Incoming LDAP Operations|Actions for Hardware Error in the Blade|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Introduction|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|Actions for Intensive Database Operations|Actions for High Rate of Incoming LDAP Operations|Actions for Hardware Error in the Blade|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Procedure|Procedure for CUDB Systems Deployed on Native BSP 8100|Procedure for CUDB Systems Deployed on a Cloud Infrastructure|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|Procedure for CUDB Systems Deployed on Native BSP 8100|Procedure for CUDB Systems Deployed on a Cloud Infrastructure|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|2|2.1|2.2|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyze Alarm|Actions for Failure|Actions for Accidental Locking|Actions for Uninstalling Application Alarm|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for the Reallocation Process is Ongoing|Actions for the Replication Delay Exceeds the Time Limit|Actions for Mastership Change During cudbCheckReplication Execution|Actions for Replication Malfunction|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|3|4|
|About This Document|Purpose|Target Group|Prerequisites|Typographic Conventions|Introduction|Overview|Configuration Work Process|Groups and Counters|Data Sources|Output|Thresholds|Define a Counter|Introduction|Function Description|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Define a Job|Introduction|Function Description|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Define a Threshold|Overview|Function Description|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Output SNMP|Introduction|SNMP MIB Format and Content|Output 3GPP XML File|Introduction|File Format and Content|Administration|Log Files|Backup and Restore|Command Line Interface|Introduction|Command: Counter Status|Command: Reset Counter|Command: Verify Data Source|Command: Read Counter|Command: Write Counter|Command: View Job|Command: View Threshold Alarms|Application Programming Interface|Introduction|Interface: Counter|Interface: Job|Interface: Threshold|Interface: Output Reporter|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|4.5|4.6|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|7|7.1|7.2|8|8.1|8.2|9|9.1|9.2|9.3|9.4|9.5|9.6|9.7|9.8|10|10.1|10.2|10.3|10.4|10.5|11|12|
|Introduction|Revision Information|Related Information|Prerequisites|Documents|Conditions|Naming Conventions|Connecting to the Blade or VM of the CUDB Node|Connecting from an External Server with Serial Connection|Connecting through the CUDB CLI|Obtaining Local and Global DS and DSG ID Allocation|Obtaining Global DSG ID for Channel Replication|Workflow|Mandatory Data|Data Collection|Collecting Application and Platform Logs|Copying Log Archive Files|Collecting SAF Logs|Collecting Additional Core Dump Files|Collecting Additional Logs|Describing Recent Activities|Data Collection for Specific Problem Types|BSP 8100|$|1|1.1|1.2|1.3|1.3.1|1.3.2|1.3.2.1|1.3.2.2|1.3.2.2.1|1.3.2.2.2|1.3.2.3|1.3.2.4|2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.1.6|4|4.1|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Overview|SOAP Protocol Introduction|SOAP Message Structure|Data Encoding|Notifications Interface|XML Data Structure|Bindings|SOAP Socket Initialization|WSDL Schema|Messages Examples|Successful Notification Messages|Failed Notification Messages|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|4|4.1|4.2|4.3|5|6|6.1|6.2|7|8|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|CUDB Node Hardware Components|Active Patch Panel usage in CUDB|$|1|1.1|1.2|1.3|2|2.1|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Alarms in the CUDB System|Application Alarms|Alarm Format and Description|Alarm Management|Clearing Alarms|Alarm List|Storage Engine|Lightweight Directory Access Protocol Front End|Server Platform|Operating System|Control|Application Counters|Service Availability Forum|Security|Preventive Maintenance|Licensing|SOAP Notifications|Alarm Relationships|Infrastructure Alarms|Configuration|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.1.2.1|2.1.3|2.1.3.1|2.1.3.2|2.1.3.3|2.1.3.4|2.1.3.5|2.1.3.6|2.1.3.7|2.1.3.8|2.1.3.9|2.1.3.10|2.1.3.11|2.1.4|2.2|3|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Description|Target Groups|Revision Information|Typographic Conventions|Reboot and Rebuild the VM|Reboot the VM|Rebuild the VM|Actions in the Case of Infrastructure Activities|One Compute Host Affected|Multiple Compute Hosts Affected|Identify All Affected VMs|Identify Affected Infrastructure Segment|Cloud Administration Actions to Identify Infrastructure Position|Identifying the VM Infrastructure Position in the Case of Using Atlas Dashboard GUI|Identifying the VM Infrastructure Position in the Case of Using OpenStack Command Line Tools|Cloud Administration Actions to Identify Affected VMs|Recovery of Multiple VMs in Parallel|VM Groups|Execute Parallel Recovery|Prepare the VMs for Operation|Prepare SC VM|Prepare PLDB or DSG VM|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.2.1|3.3.2.2|3.3.3|3.4|3.4.1|3.4.2|3.5|3.5.1|3.5.2|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|2|
|Introduction|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Selective Replica Check Task Was Not Completed|Actions for Data Repair Task Was Not Completed|Actions for Triggering Reconciliation Task Was Not Completed|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Selective Replica Check Task Was Not Completed|Actions for Data Repair Task Was Not Completed|Actions for Triggering Reconciliation Task Was Not Completed|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Prerequisites|Related Information|Revision Information|Alarm Description|Procedure|Reference List|$|1|1.1|1.2|1.3|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions for Sentinel RMS Configuration Issues|Actions for License Key File Issues|Actions for NeLS Connection Issues|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|3|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Description|Revision Information|Typographic Conventions|Node Hardware Description|Replacing a Blade|Identifying the Faulty Blade|Identifying the Blade Name|Identifying Blade Rack and Subrack Position|Preparing the Blade Replacement|Replacing GEP Boards|CUDB Node Configuration Changes|Obtaining MAC Addresses for the New Blade|Obtaining All MAC Addresses|Obtaining Board Revision for the New Blade|Editing the LDE installation.conf File|Editing the LDE cluster.conf File|System Controller Replacement Steps|DSG and PLDB Replacement Steps|Finalizing Replacement|Changing the Boot Device Order|Replacing Multiple Blades in Parallel|Parallel Blade Replacement Procedure|$|1|1.1|1.2|1.3|2|3|3.1|3.1.1|3.1.2|3.2|3.3|3.4|3.4.1|3.4.1.1|3.4.2|3.4.3|3.4.4|3.5|3.6|3.7|3.8|3.9|3.9.1|
|Introduction|Related Information|Key Features of ECLI|Prerequisites|ECLI Version|CLI Concepts|CLI Modes|CLI Session|CLI Transaction|CLI Position|CLI Prompt|Context-Sensitive Help|Auto-Completion|Case Correction|Escaping of Special Characters|CLI Comments|Visibility Levels|Automatic Correction of ManagedElement ID|Limitations|CLI Commands|Summary of CLI Commands|Success and Error Indications|Display Information|Change and Display the Position in MO Tree|Change MO Attributes|Create MO|Reinitialize MO|Delete MO|MO Actions|Copy and Paste Configuration Data|Change Password Command|Display CLI Version|Pipe Utility Commands|Help Command|Deprecated Actions|Deprecated Options|CLI Commands Limitations|Terminal Properties|Terminal Types|Default Key Bindings|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|4|4.1|4.2|
|Introduction|Document Purpose and Scope|Revision Information|Target Groups|Typographic Conventions|Solution Overview|CUDB System Overview|Network Overview|Hardware Components|CMX|SCX|Software Components|BSP 8100 Software for CUDB Systems Deployed on Native BSP 8100|eVIP|Network|General Overview|Network Description|Internal Networks|Infrastructure Networks|VIP Addresses|SysMGMT Network|External Connectivity for CUDB Systems Deployed on Native BSP 8100|Uplink Networks for CUDB Systems Deployed on Native BSP 8100|BFD and VRRP for CUDB Systems Deployed on Native BSP 8100|Internal L2 Connectivity for CUDB Systems Deployed on Native BSP 8100|Other Considerations for CUDB Systems Deployed on Native BSP 8100|Hardware Alarms|Hardware Naming|VIP Address Allocation|SITE_VIP|Multiple SITE_VIPs|OAM_VIP|FE_VIP|PROVISIONING_VIP|VIP Address Mapping with Configuration Model Attributes|Address Plan Summary|Time Synchronization|Traffic Flows|Incoming Traffic|Incoming OAM Traffic|Incoming LDAP Traffic|Incoming BC Traffic|Incoming PLDB Traffic|Incoming DSG Traffic|Outgoing Traffic|Outgoing OAM Traffic|Outgoing PG Traffic|Outgoing FE Traffic|Outgoing LDAP Traffic|Outgoing BC Traffic|Outgoing SSH Traffic|Outgoing PLDB Traffic|Outgoing DSG Traffic|CUDB OAM Centralized Security Event Logging Traffic|Routing|Firewall Configuration|Appendix: Quality of Service|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.2.1|2.2.1.1|2.2.1.2|2.2.2|2.2.2.1|2.2.2.2|2.2.3|2.2.3.1|2.2.3.2|2.2.3.2.1|2.2.3.2.2|2.2.3.2.3|2.2.3.2.4|2.2.3.3|2.2.3.3.1|2.2.3.4|2.2.3.5|2.2.4|2.2.4.1|2.2.4.2|2.3|2.3.1|2.3.1.1|2.3.2|2.3.3|2.3.4|2.3.5|2.4|2.5|2.6|2.6.1|2.6.1.1|2.6.1.2|2.6.1.3|2.6.1.4|2.6.1.5|2.6.2|2.6.2.1|2.6.2.2|2.6.2.3|2.6.2.4|2.6.2.5|2.6.2.6|2.6.2.7|2.6.2.8|2.6.2.9|2.7|2.8|3|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Log Events|Infrastructure Log Events|Middleware and Platform Log Events|eVIP Log Events|Fault and Performance Management (ESA) Log Events|Application Log Events|Log Files|Log Types|Log Format|Log Messages|DataAccess|LDAP FE|LDAP FE Monitor|Schema Management GUI|LDAP Counters|DbmsTools|CountersFw|DataBackupRestore|Reconciliation|Replica Consistency Audit|Reallocation|Replica Repair|Selective Replica Check|Application Data Consistency Checker|Monitoring|System Monitor|CS|KeepAlive|High Availability|Security Logs Monitor|Replica Consistency|Licensing|Notifications|SOAP|OAM|Software Management|Configuration Management|Fault Management|Performance Management|Security|Platform|LogHandler|SmartHWFaultReaction|Storage|Engine|3PP|MySQL|BC Server|Security Log Events|Sending Logs to a Remote Server|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.5|2.5.1|2.5.2|2.5.3|2.5.4|2.5.4.1|2.5.4.1.1|2.5.4.1.2|2.5.4.1.3|2.5.4.1.4|2.5.4.2|2.5.4.2.1|2.5.4.2.2|2.5.4.2.3|2.5.4.2.4|2.5.4.2.5|2.5.4.2.6|2.5.4.2.7|2.5.4.2.8|2.5.4.3|2.5.4.3.1|2.5.4.3.2|2.5.4.3.3|2.5.4.3.4|2.5.4.3.5|2.5.4.3.6|2.5.4.3.7|2.5.4.4|2.5.4.4.1|2.5.4.5|2.5.4.5.1|2.5.4.5.2|2.5.4.5.3|2.5.4.5.4|2.5.4.5.5|2.5.4.6|2.5.4.6.1|2.5.4.6.2|2.5.4.7|2.5.4.7.1|2.5.4.8|2.5.4.8.1|2.5.4.8.2|2.6|3|
|Introduction|Purpose and Scope|Target Groups|Revision Information|Prerequisites|Typographic Conventions|Counters in CUDB|Overview|Counter Generation and Publishing|Configuring Counter Output Files Names|CUDB KPIs|Effects of Structure and Configuration on CUDB Counters|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|2.5|3|4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Description|Configuring the Dynamic Library|Compiling the Dynamic Library|Installing the Dynamic Library|Examples|Basic Example Library|Testing the Dynamic Library|Header File Template|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.1.1|2.1.2|2.1.3|3|3.1|3.2|3.3|4|5|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Incorrectly Defined PG Endpoints|Actions for Network Connection Problems|Actions for HTTP Authentication Error|Common Actions after Alarm Causes are Fixed|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions to Order and Install a New License Key File|Reference List|$|1|1.1|1.2|2|2.1|2.2|3|
|Introduction|Alarm Description|Prerequisites|Compatibility|Procedure|Actions for All Causes|$|1|1.1|1.2|2|3|3.1|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Single Point of Access|Data Allocation Schemes|Description|Information Model|LDAP Schema|CUDB Default Distributed Information Tree|Default Directory Information Tree|CUDB Root Entry|Administration LDAP User Data|Identity Data|Common Data|DEs|Distributed Data|Service Model|LDAP Modify Behavior|Distributed LDAP Search|Optimized Subtree Searches|LDAP Extended Operations|Processing LDAP Requests|Normal Scenarios|Special Scenarios|Handling Responses to Outgoing Proxy Requests|Master Election|Replica Selection|Normal Scenarios|Special Scenarios|CUDB Node Overload Protection|LDAP FE Self-Protection|PLDB Cluster Self-Protection|DSG Cluster Self-Protection|LDAP FE-to-Database Cluster Collaborative Protection|Traffic Prioritization per Application Under Overload|Unresponsive Remote Node|Time Limits|Outstanding Proxy Requests|Fairness Control and Database Cluster Watchdog Function|CUDB Import and Export|Import and Export Commands|LDAP Error Code Precedence|Dependencies and Interactions|Operation and Maintenance|Configuration|Configuration Files|LDAP Data Access Configuration|LDAP Data Access Parameters|Provisioning|Fault Management|Performance Management|Security|Logging|Appendix A: Traffic Prioritization Configuration Guidelines|Traffic Prioritization Configuration|Traffic Prioritization Examples|Two Users Configuration|Unbalanced Traffic Examples|Three Users Configuration|Online Priority Change|Performance Management|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.2.1|2.2.2|2.3|2.3.1|2.3.1.1|2.3.1.2|2.3.2|2.3.2.1|2.3.2.2|2.3.2.3|2.3.2.4|2.3.2.5|2.3.2.6|2.3.3|2.3.3.1|2.3.3.2|2.3.3.3|2.3.3.4|2.3.4|2.3.4.1|2.3.4.2|2.3.4.3|2.3.5|2.3.6|2.3.6.1|2.3.6.2|2.3.7|2.3.7.1|2.3.7.2|2.3.7.3|2.3.7.4|2.3.8|2.3.9|2.3.9.1|2.3.10|2.3.11|2.3.12|2.3.12.1|2.3.13|2.4|3|3.1|3.1.1|3.1.2|3.1.3|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.2.1|4.2.1.1|4.2.2|4.2.3|4.3|
|Trademarks Used in Library|$|1|
|Introduction|Prerequisites|Related Information|Revision Information|Alarm Description|Procedure|Reference List|$|1|1.1|1.2|1.3|2|3|4|
|Introduction|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|CUDB Data Types and Data Architecture|CUDB LDAP DIT DEs|Description|Default Data Distribution|Custom Data Distribution|Data Distribution Policy Overwrite|Data Distribution Mechanism Interactions|CUDB Subscription Reallocation|CUDB Data Store Group Provisioning|Dependencies and Interactions|Operation and Maintenance|Configuration|DE Configuration|Custom Distribution|DSG Provisioning Management|Configured DSG Checking|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.2.1|2.2.2|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.3.5|2.3.6|2.4|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.2|3.3|3.4|3.5|
|Introduction|Purpose and Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Import Procedure|Conditions|Input|PLDB Entries Excluding DEs|PLDB DEs|DS Entries|Execution|Importing PLDB Entries|Importing DS Entries|Configuration File Directives|Limitations and Recommendations|Import Verification|Creating the LDIF File Used for Search|Retrieving Data|File Comparison|Export Procedure|Conditions|Execution|Configuration File Directives|LDAP Filters|Export Examples|Limitations and Recommendations|Complex Export Queries Using Filters and Scripts|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.4|3.4.1|3.4.2|3.4.3|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|5|6|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for All Causes|$|1|1.1|1.2|2|2.1|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Overview|Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Introduction|Revision Information|Prerequisites|Documents|Tools|Conditions|Related Information|Health Check Tasks|Health Check Procedure|Status of the CUDB System|Output of cudbSystemStatus|Fault Examples|UDC Cockpit Tool for Health Check|Detailed Health Check Procedures|Checking Active Alarms|Checking ESA Processes|Checking Database Cluster Load|Checking Notifications Traffic|Checking CPU Load|Checking Database Consistency|Problem Reporting|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|1.3|2|3|3.1|3.1.1|3.1.1.1|3.2|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.3.5|3.3.6|4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview of High Availability|Architecture|Detailed Description of High Availability|Node Level Availability|Infrastructure Availability for CUDB Systems Deployed on Native BSP 8100|Infrastructure Availability for CUDB Systems Deployed on a Cloud Infrastructure|Server Resiliency|Platform Availability|LDE|Core Middleware|COM|CUDB Node Function Availability|LDAP Access and Processing Function|Data Store Function|Monitoring Function|Node OAM Function|Application Notification Function|Data Availability Coordination Function|Blackboard Coordination Cluster Service|Cluster Supervising Service|System Monitoring Service|System Level Availability|Processing Layer System Functions|Data Storage System Functions|Automatic Mastership Change|Automatic Mastership Change when Master Replica Is Degraded|Geographical Redundancy|Double Geographical Redundancy Configuration|Triple Geographical Redundancy Configuration|Inter Database Cluster Replication|System Resiliency to Multiple Failures|CUDB System Split|Split Situations|Recovery Procedures after System Split|Service Continuity for Asymmetrical Split Scenarios|Replication Lag|Master Election Algorithm|Manual DS Master Change|Operation and Maintenance|Configuration|Geographical Redundancy Configuration|Geographical Redundancy Upgrade|Setting Site Identifier for a CUDB Node|Provisioning Condition for an LDAP User|Fault Management|Management of Geographical Redundancy|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.4.1|3.1.4.2|3.1.4.3|3.1.5|3.1.5.1|3.1.5.2|3.1.5.3|3.1.5.4|3.1.5.5|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.2|3.3.2.1|3.3.2.2|3.3.3|3.3.3.1|3.3.3.2|3.3.3.3|3.3.4|3.3.5|3.3.5.1|3.3.5.2|3.3.5.3|3.3.5.4|3.3.6|3.3.7|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.2|4.2.1|4.3|4.4|4.5|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Preconditions|Overview|Data Management|LDAP Views|LDAP DIT|LDAP Schemas|Identities|Data Distribution|Storage Space Considerations|BLOB Configuration and Storage Options|LDAP Search Indexes|Candidate Queries for Search Index Optimization|Configuration|Storage Space Considerations|LDAP Users and Access Control|Notifications|Application Counters|Licensing|CUDB Subtree Search Optimization|CUDB Subtree Optimization Configuration|$|1|1.1|1.2|1.3|2|3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|6|7|8|9|10|10.1|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Data Store Layer|Processing Layer|Geographical Redundancy and Replication|Description|Data Storage|Processing Layer Database Distribution|Data Storage Distribution|Data Storage Management|Data Storage Scalability|Reconciliation|Reconciliation Tasks|Reconciliation Scenarios|Reconciliation Output Files|Reconciliation Management|Data Backup and Restore|Unit Data Backup|System Data Backup|Periodic System Data Backup|Unit Data Restore|PLDB Group Data Restore|DSG Group Data Restore|System Data Restore|Combined Unit Data Backup and Restore|Automated Procedure for Complete CUDB System Backup and Restore|Detecting Inconsistencies between Replicas|Consistency Check Output Files|Automatic Handling of Network Isolation|Selective Replica Check|Data Repair|Logs|Self-Ordered Backup and Restore|Dependencies and Interactions|Consistency Check Interactions|Backup Interactions|Restore Interactions|Provisioning Assurance Interactions|Automatic Handling of Network Isolation Interactions|Selective Replica Check Interactions|Data Repair Interactions|Self-Ordered Backup and Restore Interactions|Operation and Maintenance|Configuration|Data Store Configuration|Data Storage Parameters|System Restore Configuration|Miscellaneous Tasks|Data Storage Tasks|Backup and Restore Tasks|Consistency Check Configuration|Fault Management|Data Storage Management Alarms|Backup Alarms|Restore Alarms|Reconciliation Alarms|Replica Inconsistency Alarms|Replication Alarms|Troubleshooting|Performance Management|Security|Logging|Backup and Restore Log Management|Reconciliation Log Management|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.3.5|2.3.6|2.3.6.1|2.3.6.2|2.3.6.3|2.3.6.4|2.3.7|2.3.7.1|2.3.7.2|2.3.7.3|2.3.7.4|2.3.7.5|2.3.7.6|2.3.7.7|2.3.7.8|2.3.7.9|2.3.8|2.3.8.1|2.3.9|2.3.9.1|2.3.9.2|2.3.9.3|2.3.10|2.4|2.4.1|2.4.2|2.4.3|2.4.4|2.4.5|2.4.5.1|2.4.5.2|2.4.6|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.4.1|3.1.4.2|3.1.5|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.3|3.4|3.5|3.5.1|3.5.2|
|Introduction|Purpose and Scope|Revision Information|Typographic Conventions|Overview|Network Security Configuration|Backbone Security|ICMP Reply|Allowed Protocols, Services, and Ports|Access Filtering|Switch Configuration|Router Configuration|User Management|LDE User Management|cudbadmin Password Expiration Policy|User Policies|Configuring the Maximum Number of Failed Login Attempts|Configuring Lockout Period|Configuring Inactivity Timer|Accounts not Expiring|Expired Accounts|cudbadmin Group Permissions|cudbOperators Group Permissions|Password Strength Policy|Configuring the Minimum Password Length|Configuring the Minimum Number of Unique Passwords|Configuring Password Strength|General Password Recommendations|Remote User Authentication Management|Constraints of Remote User Authentication|List of Local CUDB Users and Groups, Not Valid on Remote Servers|Examples of Using Remote User Authentication|LDAP User Management|Changing the Password of the rootdn User|Access Control Configuration Rules|Access Control Configuration Guidelines|Access Control Configuration Examples|Storage of LDAP users passwords|Default Storage of LDAP Users Passwords|Storage of a Specific LDAP User Password|Switch User Management|Remote Switch User Authentication Management|Router User Management|System Audit Logging|LDE Audit Logging|Switch Audit Logging|Router Audit Logging|Certification Authority|Certificate Generation|Configuring Secure Database Replication|Configuring Secure Notifications|TLS Configuration|Configuring LDAP Front End Security|LDAP Authentication Types|Configuring TLS for LDAP Front End|Configuring Secure LDAP Proxy|Configuring Secure CUDB OAM Centralized Authentication System Support|Configuring Secure Centralized Security Event Logging|Examples of Using Secure Centralized Security Event Logging|Using TLS|Not Using TLS|Other Security Recommendations|Privacy|Notice|Consent|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.1.1|4.1.2|4.1.2.1|4.1.2.2|4.1.2.3|4.1.2.3.1|4.1.2.3.2|4.1.2.4|4.1.2.5|4.1.3|4.1.3.1|4.1.3.2|4.1.3.3|4.1.4|4.2|4.2.1|4.2.2|4.2.3|4.3|4.3.1|4.3.2|4.3.2.1|4.3.2.2|4.3.3|4.3.3.1|4.3.3.2|4.4|4.4.1|4.5|5|5.1|5.2|5.3|6|7|8|9|9.1|10|10.1|10.2|10.3|11|12|12.1|12.1.1|12.1.2|13|14|14.1|14.2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Data Node Goes Down or Is Unreachable|Actions for Node Type MGM Cannot Retrieve Cluster Status|Actions for Data Node is Unable to Start up|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Introduction|Document Purpose and Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Activation|Prerequisites|Activating Notifications|Configuration|Configuring Notifications|Notifications Parameters|Configuration Examples|Preconfigured Notifications|External Networks Connectivity|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.3|3.4|3.5|3.6|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
