|Introduction|Scope|Revision Information|Terms|$|1|1.1|1.2|2|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|OpenLDAP|Apache License Version 1.1|Apache License Version 2.0|tcmalloc|Cyrus SASL Library|Eclipse|BSD License|gSOAP|Perl Modules|Swatch|Boost|SLF4J|pexpect|GPL v2 License|CDDL License|JQuery (MIT License)|Python|$|1|1.1|1.2|1.3|2|3|4|5|6|7|8|9|10|11|12|13|14|15|16|17|18|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Counter Descriptions|LDAP Server Counters|LDAP Node Counters|Per Database Cluster Counters|Notifications Counters|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|
|Introduction|Revision Information|General Impact|Capacity and Performance|Subscriber Capacity|Network Performance|Changes in Hardware Support|Changes in Software Handling|Changes in Upgrade Procedure|Changes in Tools|Schema Update Tool|Obsolete Functions|Other Network Elements (Dependencies)|New Functions|Virtualized Network Function Support|Changes in Operation|Electronic Software License|Changes in Operation|LDAP Data Views|Changes in Operation|Enhanced Functions|Flexible PL Deployment|Changes in Interfaces|Changes in Operation|OAM Automation with NETCONF Support|Changes in Operation|Increment Alert Key Command|Changes in Operation|CUDB Key Performance Indicators|Changes in Operation|LDAP Data Views|Changes in Operation|System Improvements|Improvements in CUDB 1|Interface Improvements|OAM Improvements|Notification Support Improvements|OAM Improvements in CUDB 1.1|OAM Improvements in CUDB 1.2|Functions Planned for Coming Releases|Local Reads|Changes in Interfaces|SOAP Notifications Improvements|Changes in Operation|$|1|1.1|2|2.1|2.1.1|2.1.2|2.2|2.3|2.4|2.5|2.5.1|2.6|2.7|3|3.1|3.1.1|3.2|3.2.1|3.3|3.3.1|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.3|4.3.1|4.4|4.4.1|4.5|4.5.1|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.3|6|6.1|6.1.1|6.2|6.2.1|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|Overview|Continuous Maintenance Procedures|Supervising Alarms|Performance Management|Monitoring Backbone Connectivity|Daily Maintenance Procedures|Create System Data Backup|Check Log Files|Check Log Faults|Perform Lightweight Consistency Check|Check Infrastructure Related Components (for CUDB Systems Deployed on Native BSP 8100)|Check Operating System|Weekly Maintenance Procedures and Tasks with Longer Periodicity|Creating Software and Configuration Backups|User Administration|Performing Consistency Check|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|5|5.1|5.2|5.3|
|Introduction|Prerequisites|Related Information|Revision Information|Alarm Description|Procedure|$|1|1.1|1.2|1.3|2|3|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions for Sentinel RMS Configuration Issues|Actions for License Key File Issues|Actions for Arwa Connection Issues|Actions for Intermittent Connection Issues|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|About This Document|Purpose|Target Group|Prerequisites|Typographic Conventions|Configuration Work Process|Introduction|Mandatory Configuration|Recommended Configuration|Optional Configuration|Feature Configurations|Operation|Introduction|Services|Operations|Startup/Shutdown Sequence|Configuration|SNMP Operation|Configuration|Introduction|Configuration Files|Alarm Controllers|Cluster Mode|Community Strings|Directories|FM MIB Preferences|Information Agent|Interfaces|Interface AgentX|Interface Java RMI|Interface SNMP|Java Virtual Machine|PM Agent Preferences|SNMP Proxy|SNMPv3|Subagent AAL Synchronization|Trap Destination|USM|VACM|Administration|Version|Logging|Backup and Restore|Command Line Interface|Appendix A: ESA MIBs|Appendix B: SNMP Configuration|Introduction|Overview|Use Case: SNMP Get for SNMPv2|Use Case: SNMP Trap for SNMPv2|Use Case: SNMP Get for SNMPv3|Use Case: SNMP Trap for SNMPv3|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|4.11|4.12|4.13|4.14|4.15|4.16|4.17|4.18|4.19|4.20|5|5.1|5.2|5.3|5.4|6|7|7.1|7.2|7.3|7.4|7.5|7.6|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|Overview|Log File Description|Common Terms in Output Logs|Data Repair Output Log Files|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|Overview|CUDB Data Model Description|CUDB Main Directory Information Tree|CUDB Application Counters Directory Information Tree|CUDB Root Entry|CUDB LDAP Users and Groups|Identity Data|Multi Service Consumer and Association Data|MSC Common Data|Service Common Data|LDAP Views|Attributes and Object Classes|Attributes|Object Classes|Operational Attributes|Limitations|CUDB DIT Entries|CUDB Admin Entry|Identities Container Entry|Multi Service Consumer Container Entry|Associations Container Entry|Multi Service Consumer Common Data Container Entry|Service Common Data Container Entry|Operations|CUDB Shortcut in Search for Authentication Data|Performing LDAP Search Below the Distributed Entry|Error Codes|LDAP Controls|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|6.3|6.4|
|$|
|Introduction|Prerequisites|Basic Concepts|eVIP Concepts|Configuration Concepts|Configuration|General eVIP Configuration|ALB Configuration|Traffic Configuration|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|
|Introduction|Fault Management|Basic Concepts|Act on Received Notification|Configure SNMP Master Agent|Configure SNMP Master Agent for DTLS|Create SNMPv1 Target|Create SNMPv2C Target|Create SNMPv3 Target|Create SNMPv3 Target for DTLS|Create SNMPv1 View|Create SNMPv2C View|Create SNMPv3 View|Ericsson Alarm MIB|Alarm Information Mapping|Configuration Management|Basic Concepts|Managed Object Models|Configuration Management Using NETCONF|Configuration Management Using CLI|Management of CM Interfaces|Model File Access|Security Management|Overview|Security Management Functions|Roles and Rules|Procedures|Cipher Configuration|Synchronization|File Management|Performance Management|Basic Concepts|Measurement Job Administration|Storage of Performance Measurement Results|ECIM PM Model Compliance|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|4.5|4.6|5|6|6.1|6.2|6.3|6.4|
|Introduction|Prerequisites|Related Information|Revision Information|System Configuration|Overview|The lde-config and cluster.conf|The Etc-Overlay-Framework|Kickstart Management (for LDEfR)|Overview|Creating Kickstart structure for a blade|Software Configuration (for LDEfS and LDEfR)|Overview|Repository Management|Software Management|Upgrading To New System Version|Software Configuration (for LDEwS)|Adding an Application Package|Removing an Application Package|Upgrading an Application Package|Upgrading an LDEwS Package|Listing Packages|Synchronizing Packages|Activating Packages|User and Group Management|Overview|Adding/Removing/Modifying Users and Groups|Make a User or Group Global|Changing Password|Account and Password Aging|Forced Password Change|Allowing Login Users (for LDEwS)|Login Information|Inactivity Logout|Logging In Remotely|SSH|Backup|Overview|Creating a Backup|Restoring a Backup|Local Snapshot|Overview|Creating a Local Snapshot on LDEfS|Creating a Local Snapshot on LDEwS|Restoring a Local Snapshot on LDEfS|Restoring a Local Snapshot on LDEwS|Delete a Local Snapshot on LDEfS|BRF (for LDEwS)|Reboot|Overview|Reboot a Single blade|Reboot the Whole Cluster|Bypass the BIOS When Rebooting|Power|Overview|Configuration|Power On|Power Off|Power Reset|Power Status|Alarms|Overview|Alarm Status|Configuration Management (for LDEwS)|Example|Cluster tool|Network Services|Listening Services|List Services|SSH server|Preventive Maintenance|System Check|Logs|Copying large files to shared replicated storage|Maintenance Mode|Trouble Reporting|$|1|2|3|4|5|5.1|5.2|5.3|6|6.1|6.2|7|7.1|7.2|7.3|7.4|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|9|9.1|9.2|9.3|9.4|9.5|9.6|9.7|9.8|9.9|10|10.1|11|11.1|11.2|11.3|12|12.1|12.2|12.3|12.4|12.5|12.6|12.7|13|13.1|13.2|13.3|13.4|14|14.1|14.2|14.3|14.4|14.5|14.6|15|15.1|15.2|16|16.1|17|18|18.1|18.2|18.3|19|19.1|19.2|19.3|19.4|19.5|
|Introduction|Document Purpose and Scope|Revision Information|Prerequisites|Typographic Conventions|Overview|Data Backup and Restore|Software and Configuration Backup and Restore|Data Backup and Restore|Data Backup|Unit Data Backup|System Data Backup|Data Restore|Unit Data Restore|Group Data Restore|System Data Restore|Combined Data Backup and Restore|Combined Unit Data Backup and Restore|Software and Configuration Backup and Restore|Software and Configuration Backup|Software and Configuration Restore|Prerequisites of Software and Configuration Restore|Performing Software and Configuration Restore|Periodic Software and Configuration Backup in a CUDB System|Configuring Periodic Software and Configuration Backup|Printing Configured Software and Configuration Backups|BSP 8100 Configuration Backup and Restore|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|4|4.1|4.2|4.2.1|4.2.2|4.3|4.3.1|4.3.2|4.4|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Running the Application|Window Management|Main Window|Project View|Editor View|Schema Editor|Overview Tab|Source Code Tab|Attribute Editor|Overview Tab|Source Code Tab|Object Class Editor|Overview Tab|Source Code Tab|Log View|Managing Projects|Creating a Project|Deleting a Project|Managing Schemas|Creating an Empty Schema|Importing an Existing Schema|Commenting Schemas|Renaming a Schema|Deleting a Schema|Managing Attributes|Creating an Attribute|Modifying an Attribute|Moving an Attribute|Deleting an Attribute|Managing Object Classes|Creating an Object Class|Modifying an Object Class|Moving an Object Class|Deleting an Object Class|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.3.1|3.3.1.1|3.3.1.2|3.3.2|3.3.2.1|3.3.2.2|3.3.3|3.3.3.1|3.3.3.2|3.4|4|4.1|4.2|5|5.1|5.2|5.3|5.4|5.5|6|6.1|6.2|6.3|6.4|7|7.1|7.2|7.3|7.4|
|Introduction|CPI Library Types|Document Formats|Active Library Explorer Variants|Active Library Explorer Functions|Active Library Explorer Window|Frames|Library Collections|Active Library Explorer Toolbar|Context Menu|Basic Functions|Back and Forward|Search|Document View Search Syntax|Instant Document Search|Advanced Search Options|Search Library Collections|Change Sort Order|Show All Titles and Show Context|Next Search Hit|Search in Document Frame|Navigation|Library Front Page Images|Filter Displayed Contents|Set Filters|Reset Filters|Add Bookmarks|Create and Display Annotations|Provide Feedback|Add Note|Edit Note|Delete Note|Print|Save Document to Local Disk|View PDF Version of Current Document|Open a Document in Separate Window|Get Help|Find Active Library Explorer Version|Active Library Explorer Server|Active Library Explorer for Windows|Download Latest Active Library Explorer Version|Internet Address and Parameters|Open Libraries|Search for Documents|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.3|3.4|3.5|3.5.1|3.5.3|3.6|3.8|3.9|3.9.1|3.9.2|3.9.3|3.10|3.11|3.12|3.13|4|5|5.1|5.2|5.3|6.1|6.2|6.3|
|Introduction|Document Purpose and Scope|Target Groups|Revision Information|Typographic Conventions|CUDB Commands|CUDB Command|Management Commands|Internal Commands|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|
|Introduction|Scope|Revision Information|Prerequisites|Related Information|Troubleshooting Tools|CLI Commands|UDC Cockpit Tool|Troubleshooting Procedure|Trouble Reporting|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|3|4|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|CUDB Configuration Model Description|Data Types|Class Hierarchy|System Object Classes|Class CudbSystem|Class CudbDsGroup|Class CudbAppService|Class CudbPlGroup|Class CudbSystemSecurity|Class CudbAutomaticMasterChange|Class CudbDsGroupRepairAndResync|Class CudbExternalAuthMgmt|Class CudbExternalAuthServer|Class CudbExternalLogMgmt|Class CudbExternalLogServer|Node Object Classes|Class CudbLocalNode|Class CudbLocalPl|Class CudbLocalDs|Class CudbProvisioningGatewayConfig|Class CudbSecurityMgmt|Class CudbLdapCertificates|Class CudbSoapCertificates|Class CudbRemoteNode|Class CudbRemotePl|Class CudbRemoteDs|Class CudbLogCertificates|Class CudbTrafficControlManager|Class CudbTrafficBlockingRule|Node Object Structures|Structure CudbAsyncActionProgress|LDAP Access Object Classes|Class CudbLdapAccess|Class CudbLdapUsersMgmt|Class CudbLdapUserGroup|Class CudbLdapUser|Class CudbLdapViewsMgmt|Class CudbLdapView|Notifications Object Classes|Class CudbNotifications|Class CudbNotificationEvent|Class CudbNotificationEndPoint|Class CudbNotificationObjectClass|Class CudbNotificationAttr|PG Object Classes|Class CudbProvisioningGatewayMgmt|Class CudbProvGatewayEndPoint|CUDB Administrative Operations|applyConfig|updateUserInfo|cancelApplyConfig|Initial Configuration|Considerations|Configuration Modification Procedure|Preconditions|Object Model Modification Procedure|Modification Procedure Using CUDB Configuration CLI|Modification Procedure Using NETCONF|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.3.5|2.3.6|2.3.7|2.3.8|2.3.9|2.3.10|2.3.11|2.4|2.4.1|2.4.2|2.4.3|2.4.4|2.4.5|2.4.6|2.4.7|2.4.8|2.4.9|2.4.10|2.4.11|2.4.12|2.4.13|2.5|2.5.1|2.6|2.6.1|2.6.2|2.6.3|2.6.4|2.6.5|2.6.6|2.7|2.7.1|2.7.2|2.7.3|2.7.4|2.7.5|2.8|2.8.1|2.8.2|2.9|2.9.1|2.9.2|2.9.3|3|3.1|4|4.1|4.2|4.2.1|4.2.2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for BSP Alarm or Alert Related to Hardware Identified by IP Address|$|1|1.1|1.2|2|2.1|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Related Terms|Overview|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|Appendix: Examples|Creating Application Counters Configuration File|Creating Tables|Stored Procedures|ESA Configuration|Configuring Cron File: appCounters.cron|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.4|3.5|4|4.1|4.2|4.3|4.4|4.5|
|Introduction|Description of Changes|New and Changed Documents|Library Overview|Product Overview|Planning|Integration|Operation and Maintenance|Interface|Removed Documents|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for the Local Cluster Is Under Maintenance Operation|Actions for All Management Components of the Local Cluster Are Unreachable|Actions for All Data Nodes Are Unreachable|Actions for All Local Master Replication Servers of This Cluster Are Unreachable If the CUDB System Contains at Least Two CUDB Nodes|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuring the CUDB Schema Conversion Tool|Configuring the CUDB Schema Update Tool|Fault Management|Performance Management|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.4|
|Introduction|Target Groups|Revision Information|Typographic Conventions|Overview|LDAP Data Views Configuration|Data View Configuration Entities|Configuration|Checking Tool|Output|Appendix: Mapping Structure|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|4|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for the Local Cluster Is Under Maintenance Operation|Actions for All Management Components of the Local Cluster Are Unreachable|Actions for All Data Nodes Are Unreachable|$|1|1.1|1.2|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|
|Introduction|Document Purpose and Scope|Revision Information|Overview|Usage Information|General Information|Automatic Log Collection and Log Analysis|Manual Log Collection and Analysis|$|1|1.1|1.2|2|3|3.1|3.2|3.3|
|Introduction|Target Group|Educational Requirements|Hazard Symbols and Admonitions|Personal Health and Safety Admonitions|Special Hazard Symbols|General Safety Precautions|Electric Shock Hazards|Safety Precautions for Working with Electrical Equipment|Energy Hazards|Batteries|Capacitors and Uninterruptible Power Systems|Safety Precautions for Avoiding Energy Hazards|Fire Hazard|Fire Precautions|Heat Hazards|Mechanical Hazards|Radio Frequency Exposure Hazards|General RF Safety Information|RF Safety for Installation and Maintenance Personnel|Laser Hazards|Class 1 Laser|Class 3 Laser|Chemical Hazards|Beryllium Oxide Hazard|Battery Acid Hazard|Gas Explosion Hazard|Refrigerant Hazard|Other Hazards|Handling Heavy Goods|Working at Height|$|1|1.1|1.2|2|2.1|2.2|3|4|4.1|5|5.1|5.2|5.3|6|6.1|7|8|9|9.1|9.2|10|10.1|10.2|11|11.1|11.2|11.3|11.4|12|12.1|12.2|
|Introduction|Target Group|Educational Requirements|Admonitions and Safety Symbols|Special Hazard Symbols|Batteries|Overheated Batteries|Treating Hazardous Waste from Leaks|Electrical Installation|Safety Precautions for Working with Electrical Installations|Electrostatic Discharge|Handling Printed Board Assemblies and IC Components|Storing and Transporting Printed Board Assemblies and IC Components|Equipment Handling|Ground Connection|Lightning Protection|System, Data, and Traffic Protection|$|1|1.1|1.2|2|2.1|3|3.1|3.2|4|4.1|5|5.1|5.2|6|7|8|9|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Document Purpose and Scope|Revision Information|Concepts|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|How to Use This Function|Example of a Virtual Tree|Principles of LDAP Data Views|Scaffolding Virtual Entries|One-to-one Mapped Entries|Description of Runtime Behavior|General Rules|Search Requests|Write Requests|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|4|5|5.1|5.2|5.3|5.4|5.5|
|Introduction to Virtual Infrastructure Requirements|Revision Information|Compute Requirements|Network Requirements|Storage Requirements|Security Requirements|Other Requirements|$|1|1.1|2|3|4|5|6|
|Introduction|Document Purpose and Scope|Revision Information|Target Groups|Typographic Conventions|Installation Information|Installation Preparation|Prerequisites|Download Deliverables|Tools Delivered|Installation|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|4|
|Introduction|Target Groups|Prerequisites|CPI Library Distribution|CPI Library Access|CPI Product Numbers|Library Structure|Document Types|CUDB Library|Safety and Environment|Library Overview|Product Overview|Site Engineering|Planning|Integration|Operation and Maintenance|Interface|3rd Party Products|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Document Purpose and Scope|Target Group|Prerequisites|Revision Information|Typographic Conventions|Overview|Execution Conditions|Consistency Check|Ordering the Consistency Check|Listing Tasks|Reviewing the Task History|Removing Tasks|Consistency Check Output|Alarms|Use Recommendations|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|$|
|$|
|$|
|$|
|$|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions to Adjust the LM Configuration|Actions to Order and Install a New License Key File|Actions to Obtain New License Keys for Arwa|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for All Causes|$|1|1.1|1.2|2|2.1|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Alarm Description|Prerequisites|Procedure|Failing Node Introduction|Manual Replica Synchronization Procedure|$|1|1.1|1.2|2|2.1|2.2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Description|Prerequisites|Procedure|Actions for the Reallocation Process is Ongoing|Actions for the Replication Delay Exceeds the Time Limit|Actions for Mastership Change During cudbCheckReplication Execution|Actions for Replication Malfunction|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|About This Document|Purpose|Target Group|Prerequisites|Typographic Conventions|Fault Management Overview|Alarm Definition|Introduction|Function Description|Configuration Overview|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Alarm Translation|Introduction|Function Description|Configuration Overview|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Command Line Interface|Introduction|Command: View Active Alarms|Command: Send Message|Application Programming Interface|Introduction|Interface: Alarm Definition|Interface: Alarm|Interface: Active Alarm List|Interface: Subagent AAL Synchronization|Administration|Log Files|Backup and Restore|Appendix A: Standardized Parameter Values|Perceived Severity|Event Type|Probable Cause|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|6|6.1|6.2|6.3|6.4|6.5|7|7.1|7.2|8|8.1|8.2|8.3|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Overview|Interfaces and Tools|Interfaces|SNMP|SSH|SFTP|NETCONF|SCP|Tools|CUDB CLI|Finding the Active System Controller|CUDB Configuration CLI|CUDB Platform Interfaces|LDAP Schema Management Tools|UDC Cockpit|Configuration Data Management|Fault Management|Performance Management|Logging Management|CUDB Log Collection|Security Management|Backup and Restore Procedures|Replication|Reconciliation|Networking|Data and Schema Management|LDAP Data Import and Export|Adding and Searching LDAP Data|Adding LDAP Data|Searching LDAP Data|LDAP Schema Edition|Schema Update and Index Creation on New Attributes|Index Creation|Startup and Shutdown|Initial System Startup|Node Startup after Graceful Shutdown|Node Startup after a Graceful Shutdown for CUDB Systems Deployed on Native BSP 8100|Node Startup after Graceful Shutdown for CUDB Systems Deployed on a Cloud Infrastructure|Node Startup after Graceful Shutdown Using the Atlas GUI|Node Startup after Graceful Shutdown Using OpenStack Command-Line Tools|Node Startup after a Non-Graceful Shutdown|Node Startup after a Non-Graceful Shutdown for CUDB Systems Deployed on Native BSP 8100|Node Startup after a Non-Graceful Shutdown for CUDB Systems Deployed on a Cloud Infrastructure|Full CUDB System Startup|Node Graceful Shutdown|Node Graceful Shutdown for CUDB Systems Deployed on Native BSP 8100|Node Graceful Shutdown for CUDB Systems Deployed on a Cloud Infrastructure|Node Graceful Shutdown Using the Atlas GUI|Node Graceful Shutdown Using OpenStack Command-Line Tools|Regular Maintenance Procedures|System Level CUDB Procedures|Configuring Network Routes Towards Notification Endpoints|Disabling a CUDB Node in a CUDB System|Enabling a Previously Disabled CUDB Node in a CUDB System|Creating a New DSG|Activating a DSG|Activating a Previously Deactivated DSG in the CUDB System|Activating a New DSG in the CUDB System|Listing the Master Replicas|Setting the Default Geographical Zone Globally|Setting Custom Distribution Policy for Distribution Entries Globally|Checking the Custom Distribution Policy of DEs Globally|Restoring the Default Distribution Policy of DEs Globally|Activating and Deactivating Notifications Globally|Deactivating Specific Notifications Globally|Adding Space to a BLOB in the Disk Storage System Globally|Configuring Subscription Reallocation|Requesting Reconciliation Manually|Running Defragmentation|Configuring Provisioning Gateway Nodes|CUDB LDAP User Management|Changing DSG or PLDB Mastership Manually|Updating LDAP Schema Globally|Activating DS Units|Deactivating DS Units|Configuring Automatic Mastership Change|LDAP Data Views Management|OAM Centralized Authentication System Support|Node Level CUDB Procedures|Activating a Local CUDB Node|Activating a Remote CUDB Node|Modifying a CUDB Node Name|Modifying the DSG or PLDB Cluster State|Checking Software Inventory on a CUDB Node|Checking Imported Software on a CUDB Node|Checking Installed Software on Each Blade or VM of a CUDB Node|Defragmenting a Database Cluster|Subscribing a DSG Master Replica to Reconciliation Manually|Deactivating a Local CUDB Node|Storage Performance Monitoring Function|Auxiliary CUDB Procedures|Activating a DS Unit in a Local CUDB Node|Deactivating a DS Unit in a Local CUDB Node|Activating a DS Unit in a Remote CUDB Node|Deactivating a DS Unit in a Remote CUDB Node|Deactivating a Remote CUDB Node|Adding a DSG to a Local CUDB Node|Adding a DS Unit to a Local CUDB Node|Adding a Generic Blade or VM to a Local CUDB Node|Configuring a DS Unit Added to a Local CUDB Node|Configuring a DS Unit Added to a Remote CUDB Node|Deactivating a Local PLDB Unit|Activating a Local PLDB Unit|Deactivating a Remote PLDB Unit|Activating a Remote PLDB Unit|Setting the Default Geographical Zone|Setting Custom Distribution Policy for DEs|Checking The Custom Distribution Policy of DEs|Restoring the Distribution Policy of DEs|Increasing the Space of a BLOB in the Disk Storage System|Enabling or Disabling Notifications for All Applications|Disabling Notifications towards a Specification Application End Point|Creating a CUDB LDAP User Group in a Local CUDB Node|Adding a New CUDB LDAP User to a Local CUDB Node|Configuring Attributes of a CUDB LDAP User|Configuring a PG Node in a Local CUDB Node for Backup Notification|Updating CUDB LDAP User Information in a CUDB Node|Deleting a CUDB LDAP User in a Local CUDB Node|Deleting a CUDB LDAP User Group in a Local CUDB Node|Removing Huge Files|Disabling PROVISIONING_VIP, FE_VIP, and SITE_VIP Addresses|Enabling PROVISIONING_VIP, FE_VIP, and SITE_VIP Addresses|Configuring PG Endpoints in a Local CUDB Node for the Provisioning Assurance Function|Creating a New Notification Event|Configuring QoS in CUDB|$|1|1.1|1.2|1.3|2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.2|3.2.1|3.2.1.1|3.2.2|3.2.3|3.2.4|3.2.5|4|5|6|7|8|9|10|11|12|13|14|14.1|14.2|14.2.1|14.2.2|14.3|14.4|14.4.1|15|15.1|15.2|15.2.1|15.2.2|15.2.2.1|15.2.2.2|15.3|15.3.1|15.3.2|15.4|15.5|15.5.1|15.5.2|15.5.2.1|15.5.2.2|16|17|17.1|17.2|17.3|17.4|17.5|17.5.1|17.5.2|17.6|17.7|17.8|17.9|17.10|17.11|17.12|17.13|17.14|17.15|17.16|17.17|17.18|17.19|17.20|17.21|17.22|17.23|17.24|17.25|18|18.1|18.2|18.3|18.4|18.5|18.5.1|18.5.2|18.6|18.7|18.8|18.9|19|19.1|19.2|19.3|19.4|19.5|19.6|19.7|19.8|19.9|19.10|19.11|19.12|19.13|19.14|19.15|19.16|19.17|19.18|19.19|19.20|19.21|19.22|19.23|19.24|19.25|19.26|19.27|19.28|19.29|19.30|19.31|19.32|19.33|19.34|
|Introduction|Prerequisites|Overview|Standard Compliance|NETCONF Session|Start Session over SSH|Start Session over TLS|Session Inactivity Timer|Session End|NETCONF RPC Messages|ebase Numbering|OK Message|Error Message|NETCONF Data Model|Model Definition|Namespaces|Configuration and State Data|Distinguished Names|MO Attributes|MO Instances|MO Actions|NETCONF Operations|&lt;get&gt; Operation|&lt;get-config&gt; Operation|&lt;edit&ndash;config&gt; Operation|&lt;action&gt; Operation|&lt;create-subscription&gt; Operation|&lt;close-session&gt; Operation|&lt;kill-session&gt; Operation|&lt;copy-config&gt; Operation|&lt;delete-config&gt; Operation|NETCONF Notifications|&lt;replayComplete&gt; Notification|&lt;notificationComplete&gt; Notification|Non-Standard Notifications|Validation|MO Instance Creation|MO Instance Deletion|Change Single-Valued Attributes|Delete MO Attribute Values|Change Sequence Attributes|Change Struct Attributes|System-Created Property|Passphrase Property|ManagedElement ID Translation|NETCONF Visibility Control|Transaction|Transaction Start|Locking|Transaction Commit|End|Transaction Time-Out|&lt;action&gt; Capability|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|&lt;notification&gt; Capability|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|New Notifications|XML Schema|RFC Compliance Latest|NETCONF Statement of Compliancies|Compliance to RFC 4741 and RFC 6241|Compliance to RFC 4742 and RFC 6242|Compliance to RFC 5277|Compliance to RFC 5539|$|1|1.1|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|7.9|8|8.1|8.2|8.3|9|9.1|9.2|9.3|9.4|9.5|9.6|9.7|9.8|9.9|10|11|11.1|11.2|11.3|11.4|11.5|12|12.1|12.2|12.3|12.4|12.5|13|13.1|13.2|13.3|13.4|13.5|13.6|13.7|14|15|15.1|15.2|15.3|15.4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|
|Introduction|Prerequisites|Core MW Command Overview|Deprecated Command|Administrative Operations|Reboot Cluster|Reboot Node|Lock Node|Unlock Node|Verify System Status|Save IMM Data|Get AMF Node of Given Hostname|Get Hostname of Given AMF Node|Configure IMM Access Control|Enable or Disable Core MW Features|Set Timeout for Core MW Scaling Feature|Clear Alarm Issued by AMF|Core MW Partial Backup and Partial Restore &ndash; Deprecated|Create Core MW Partial Backup &ndash; Deprecated|List Core MW Partial Backups &ndash; Deprecated|Delete Core MW Partial Backup &ndash; Deprecated|Restore Using Core MW Partial Backup &ndash; Deprecated|Software Management|Import Software Bundles and Campaigns|Delete Software Bundles and Campaigns|Read from Software Inventory|Use SMF Campaigns|Configure ECIM SWM|Use CLI for Upgrade Package/CSP|Configure ISP Events for Cluster Restarts|Configure Reboot Behavior of Single-Step Procedures|Performance Management|Create ECIM PM Jobs|Start ECIM PM Jobs|Stop ECIM PM Jobs|Delete ECIM PM Jobs|Report Status of ECIM PM Jobs|List ECIM PM Jobs|Modify ECIM PM Jobs|Display Active PM Values for an Instance|OpenSAF Tools|OpenSAF Tools Wrapper|$|1|1.1|2|2.1|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|
|Introduction|Document Purpose and Scope|Target Group|Revision Information|Typographic Conventions|Prerequisites|Limitations and Recommendations|Updating Existing Schemas|Adding New Schemas|Definition of Search Indexes|$|1|1.1|1.2|1.3|1.4|2|3|4|5|6|
|Introduction|Scope|Revision Information|Target Groups|Typographic Conventions|Overview|Deployment Considerations|IP Transport Network Considerations|Geographical Redundancy Considerations|CUDB Site and Node Number Considerations|CUDB Node Distance Considerations|Virtual Deployment Considerations|CUDB Deployment Examples|Example Networks Dimensioned with 5 DSGs|Example Networks Dimensioned with 15 DSGs|Example Networks Dimensioned with 30 DSGs|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.5|4|4.1|4.2|4.3|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Typographic Conventions|Procedure in Case of Site Failure|Situations|Emergency Procedure|Recovery Procedure|Procedure in Case of IP Backbone Failure|Situation|Emergency Procedure|Recovery Procedure|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|3|3.1|3.2|3.3|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Overview|Supported Hardware|Functions|General|CUDB Functionality|Security|Interfaces|Reference Model|Protocols|Architecture|Logical Components|Operation and Maintenance|Fault Management|Performance Management|Log Management|Configuration and Software Management|Configuration|CUDB Node Configuration|CUDB System Configuration|Characteristics|Availability and Reliability|Scalability|$|1|1.1|1.2|1.3|1.4|2|2.1|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|6|6.1|6.2|6.3|6.4|7|7.1|7.2|8|8.1|8.2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Intensive Database Operations|Actions for High Rate of Incoming LDAP Operations|$|1|1.1|1.2|2|2.1|2.2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Intensive Database Operations|Actions for High Rate of Incoming LDAP Operations|$|1|1.1|1.2|2|2.1|2.2|
|Introduction|Alarm Description|Prerequisites|Procedure for CUDB Systems Deployed on Native BSP 8100|Procedure for CUDB Systems Deployed on a Cloud Infrastructure|$|1|1.1|1.2|2|3|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Procedure for CUDB Systems Deployed on Native BSP 8100|Procedure for CUDB Systems Deployed on a Cloud Infrastructure|$|1|1.1|1.2|2|2.1|2.2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions to Order and Install an Emergency Unlock Reset Key|Actions to Obtain an Emergency Unlock Reset Key for Arwa|$|1|1.1|1.2|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyze Alarm|Actions for Failure|Actions for Accidental Locking|Actions for Uninstalling Application Alarm|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for the Reallocation Process is Ongoing|Actions for the Replication Delay Exceeds the Time Limit|Actions for Mastership Change During cudbCheckReplication Execution|Actions for Replication Malfunction|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|About This Document|Purpose|Target Group|Prerequisites|Typographic Conventions|Introduction|Overview|Configuration Work Process|Groups and Counters|Data Sources|Output|Thresholds|Define a Counter|Introduction|Function Description|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Define a Job|Introduction|Function Description|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Define a Threshold|Overview|Function Description|Configuration Format|Configuration Deployment|Configuration Activation|Examples|Output SNMP|Introduction|SNMP MIB Format and Content|Output 3GPP XML File|Introduction|File Format and Content|Administration|Log Files|Backup and Restore|Command Line Interface|Introduction|Command: Counter Status|Command: Reset Counter|Command: Verify Data Source|Command: Read Counter|Command: Write Counter|Command: View Job|Command: View Threshold Alarms|Application Programming Interface|Introduction|Interface: Counter|Interface: Job|Interface: Threshold|Interface: Output Reporter|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|4.5|4.6|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|7|7.1|7.2|8|8.1|8.2|9|9.1|9.2|9.3|9.4|9.5|9.6|9.7|9.8|10|10.1|10.2|10.3|10.4|10.5|
|Introduction|Revision Information|Related Information|Prerequisites|Documents|Conditions|Workflow|Mandatory Data|Data Collection|Collecting Application and Platform Logs|Copying Log Archive Files|Collecting SAF Logs|Collecting Additional Core Dump Files|Collecting Additional Logs|Describing Recent Activities|Data Collection for Specific Problem Types|BSP 8100|$|1|1.1|1.2|1.3|1.3.1|1.3.2|2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.1.6|4|4.1|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Overview|SOAP Protocol Introduction|SOAP Message Structure|Data Encoding|Notifications Interface|XML Data Structure|Bindings|SOAP Socket Initialization|WSDL Schema|Messages Examples|Successful Notification Messages|Failed Notification Messages|$|1|1.1|1.2|1.3|2|3|3.1|3.2|4|4.1|4.2|4.3|5|6|6.1|6.2|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|CUDB Node Hardware Components|Active Patch Panel usage in CUDB|$|1|1.1|1.2|1.3|2|2.1|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Alarms in the CUDB System|Application Alarms|Alarm Format and Description|Alarm Management|Alarm List|Alarm Relationships|Infrastructure Alarms|Configuration|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.2|3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction to Virtual Machine Recovery|Description|Target Groups|Revision Information|Typographic Conventions|Reboot and Rebuild the VM|Reboot the VM|Rebuild the VM|Actions for Planned Infrastructure Maintenance Activities|Identify All Affected VMs|Preparations for PLDB or DSG VM Recovery|Recovery of Multiple VMs in Parallel|Cloud Administration Actions After Infrastructure Maintenance|Prepare the VMs for Operation|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Selective Replica Check Task Was Not Completed|Actions for Data Repair Task Was Not Completed|Actions for Triggering Reconciliation Task Was Not Completed|$|1|1.1|1.2|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Selective Replica Check Task Was Not Completed|Actions for Data Repair Task Was Not Completed|Actions for Triggering Reconciliation Task Was Not Completed|$|1|1.1|1.2|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Related Information|Revision Information|Alarm Description|Procedure|$|1|1.1|1.2|1.3|2|3|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions for Sentinel RMS Configuration Issues|Actions for License Key File Issues|Actions for Arwa Connection Issues|Actions for Intermittent Connection Issues|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Description|Revision Information|Typographic Conventions|Node Hardware Description|Replacing a Blade|Identifying the Faulty Blade|Identifying Blade Rack and Subrack Position|Preparing the Blade Replacement|Replacing GEP Boards|CUDB Node Configuration Changes|System Controller Replacement Steps|DSG and PLDB Replacement Steps|Finalizing Replacement|Changing the Boot Device Order|Replacing Multiple Blades in Parallel|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|
|Introduction|Key Features of CLI|Prerequisites|CLI Concepts|CLI Session|CLI Version|CLI Mode|Transaction|CLI Position|CLI Prompt|CLI Help|AutoCompletion|Case Correction|Escaping of Special Characters|Visibility Levels|CLI Limitations|Automatic Correction of ManagedElement ID|CLI Commands|Success and Error Indications|Display Information|Change and Display the Position in MO Tree|Display MO Instances|Change MO Attribute|Create MO|Reinitialize MO|Delete MO|MO Actions|Deprecated Actions|Deprecated Options|Pipe Utility Commands|Static Help in CLI|CLI Commands Limitations|Copy and Paste Configuration Data|Display CLI Version|Change Password Command|Terminal Properties|Terminal Types|Default Key Bindings|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|4|4.1|4.2|
|Introduction|Document Purpose and Scope|Revision Information|Target Groups|Typographic Conventions|Solution Overview|CUDB System Overview|Network Overview|VIP Address Allocation|Address Plan Summary|Time Synchronization|Traffic Flows|Routing|Firewall Configuration|Appendix: Quality of Service|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|3|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Log Events|Infrastructure Log Events|Middleware and Platform Log Events|eVIP Log Events|Fault and Performance Management (ESA) Log Events|Application Log Events|Log Files|Log Types|Log Format|Log Messages|DataAccess|DbmsTools|Monitoring|Notifications|OAM|Platform|Storage|3PP|Security Log Events|Sending Logs to a Remote Server|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.5|2.5.1|2.5.2|2.5.3|2.5.4|2.5.4.1|2.5.4.2|2.5.4.3|2.5.4.4|2.5.4.5|2.5.4.6|2.5.4.7|2.5.4.8|2.6|3|
|Introduction|Document Purpose and Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Counters in CUDB|Overview|Counter Generation and Publishing|Configuring Counter Output Files Names|CUDB KPIs|Effects of Structure and Configuration on CUDB Counters|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|2.5|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Description|Configuring the Dynamic Library|Compiling the Dynamic Library|Installing the Dynamic Library|Examples|Basic Example Library|Testing the Dynamic Library|Header File Template|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.1.1|2.1.2|2.1.3|3|3.1|3.2|3.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Incorrectly Defined PG Endpoints|Actions for Network Connection Problems|Actions for HTTP Authentication Error|Common Actions after Alarm Causes are Fixed|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing the Alarm|Actions to Order and Install a New License Key File|Actions to Obtain New License Keys for Arwa|$|1|1.1|1.2|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Compatibility|Procedure|Actions for All Causes|$|1|1.1|1.2|2|3|3.1|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Provisioning|Fault Management|Performance Management|Security|Logging|Appendix A: Traffic Prioritization Configuration Guidelines|Traffic Prioritization Configuration|Traffic Prioritization Examples|Performance Management|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|
|Trademarks Used in Library|$|1|
|Introduction|Prerequisites|Related Information|Revision Information|Alarm Description|Procedure|$|1|1.1|1.2|1.3|2|3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|
|Introduction|Scope|Revision Information|Typographic Conventions|Overview|Import Procedure|Preconditions|Input|PLDB Entries Excluding DEs|PLDB DEs|DS Entries|Execution|Importing PLDB Entries|Importing DS Entries|Configuration File Directives|Limitations and Recommendations|Import Verification|Creating the LDIF File Used for Search|Retrieving Data|File Comparison|Export Procedure|Preconditions|Execution|Configuration File Directives|LDAP Filters|Export Examples|Limitations and Recommendations|Complex Export Queries Using Filters and Scripts|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.4|3.4.1|3.4.2|3.4.3|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for All Causes|$|1|1.1|1.2|2|2.1|
|Overview|Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Revision Information|Prerequisites|Related Information|Health Check Tasks|Health Check Procedure|Status of the CUDB System|UDC Cockpit Tool for Health Check|Detailed Health Check Procedures|Problem Reporting|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|4|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview of High Availability|Architecture|Detailed Description of High Availability|Node Level Availability|Infrastructure Availability for CUDB Systems Deployed on Native BSP 8100|Infrastructure Availability for CUDB Systems Deployed on a Cloud Infrastructure|Network Links Resiliency|Server Resiliency|Node Networking Resilience|Platform Availability|LDE|Core Middleware|COM|VIP Redundancy|CUDB Node Function Availability|LDAP Access and Processing Function|Data Store Function|Monitoring Function|Node OAM Function|Application Notification Function|Data Availability Coordination Function|Blackboard Coordination Cluster Service|Cluster Supervising Service|System Monitoring Service|System Level Availability|Processing Layer System Functions|Data Storage System Functions|Automatic Mastership Change|Geographical Redundancy|Double Geographical Redundancy Configuration|Triple Geographical Redundancy Configuration|Inter Database Cluster Replication|System Resiliency to Multiple Failures|CUDB System Split|Split Situations|Recovery Procedures after System Split|Service Continuity for Asymmetrical Split Scenarios|Replication Lag|Master Election Algorithm|Manual DS Master Change|Operation and Maintenance|Configuration|Geographical Redundancy Configuration|Geographical Redundancy Upgrade|Setting Site Identifier for a CUDB Node|Provisioning Condition for an LDAP User|Fault Management|Management of Geographical Redundancy|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.1.6|3.1.6.1|3.1.6.2|3.1.6.3|3.1.6.4|3.1.7|3.1.7.1|3.1.7.2|3.1.7.3|3.1.7.4|3.1.7.5|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.2|3.3.2.1|3.3.3|3.3.3.1|3.3.3.2|3.3.3.3|3.3.4|3.3.5|3.3.5.1|3.3.5.2|3.3.5.3|3.3.5.4|3.3.6|3.3.7|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.2|4.2.1|4.3|4.4|4.5|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Preconditions|Overview|Data Management|LDAP Views|LDAP DIT|LDAP Schemas|Identities|Data Distribution|Storage Space Considerations|BLOB Configuration and Storage Options|LDAP Search Indexes|Candidate Queries for Search Index Optimization|Configuration|Storage Space Considerations|LDAP Users and Access Control|Notifications|Application Counters|Licensing|$|1|1.1|1.2|1.3|2|3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|6|7|8|9|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Configuration|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|
|Introduction|Scope|Revision Information|Typographic Conventions|Overview|Network Security Configuration|Backbone Security|ICMP Reply|Allowed Protocols, Services, and Ports|Access Filtering|Switch Configuration|Router Configuration|User Management|LDE User Management|cudbadmin Password Expiration Policy|User Policies|Password Strength Policy|General Password Recommendations|Remote User Authentication Management|Constraints of Remote User Authentication|List of Local CUDB Users and Groups, Not Valid on Remote Servers|Examples of Using Remote User Authentication|LDAP User Management|Changing the Password of the rootdn User|Access Control Configuration Rules|Storage of LDAP users passwords|Switch User Management|Remote Switch User Authentication Management|Router User Management|UDC Cockpit User Management|System Audit Logging|LDE Audit Logging|Switch Audit Logging|Router Audit Logging|Certification Authority|Certificate Generation|Configuring Secure Database Replication|Configuring Secure Notifications|TLS Configuration|Configuring LDAP Front End Security|LDAP Authentication types|Configuring TLS for LDAP Front End|Configuring Secure LDAP Proxy|Configuring Secure CUDB OAM Centralized Authentication System Support|Configuring Secure Centralized Security Event Logging|Examples of Using Secure Centralized Security Event Logging|Other Security Recommendations|Privacy|Notice|Consent|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.2|4.2.1|4.2.2|4.2.3|4.3|4.3.1|4.3.2|4.3.3|4.4|4.4.1|4.5|4.6|5|5.1|5.2|5.3|6|7|8|9|9.1|10|10.1|10.2|10.3|11|12|12.1|13|14|14.1|14.2|
|Introduction|Alarm Description|Prerequisites|Procedure|Actions for Data Node Goes Down or Is Unreachable|Actions for Node Type MGM Cannot Retrieve Cluster Status|Actions for Data Node is Unable to Start up|$|1|1.1|1.2|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Document Purpose and Scope|Revision Information|Target Groups|Prerequisites|Typographic Conventions|Overview|Prerequisites|Architecture|Description|Dependencies and Interactions|Operation and Maintenance|Activation|Configuration|Fault Management|Performance Management|Security|Logging|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|3.6|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
