1 Introduction
This instruction concerns alarm handling.
1.1 Alarm Description
The alarm is raised when the memory use exceeds a threshold.
The possible alarm causes and fault locations are explained in Table 1.
|
Alarm Cause |
Description |
Fault Reason |
Fault Location |
Impact |
|---|---|---|---|---|
|
System overload |
The system is overloaded |
The system is overloaded |
System dimensioning |
Service downtime or reduced service capacity when the problem is too often detected or when it persists |
|
One or more processes leak memory |
One or more processes leak memory |
A software component has an implementation defect |
Software component |
Software crash leading to service downtime or reduced service capacity depending on redundancy |
- Note:
- This alarm can appear as a result of a maintenance activity.
The alarm attributes are listed and explained in Table 2.
|
Attribute Name |
Attribute Value |
|---|---|
|
Major Type |
193 |
|
Minor Type |
3341942789 |
|
Source |
One of the following:
|
|
Specific Problem |
LOTC Memory Usage |
|
Event Type |
environmentalAlarm (6) |
|
Probable Cause |
x736UnspecifiedReason (418) |
|
Additional Text |
Memory usage above <value>% |
|
Perceived Severity |
major (4) |
1.2 Prerequisites
This section provides information on the documents, tools, and conditions that apply to the procedure.
1.2.1 Documents
This instruction references the following document:
1.2.2 Tools
No tools are required.
1.2.3 Conditions
Before starting this procedure, ensure that the following condition is met:
- A LOTC Memory Usage alarm is raised.
2 Procedure
Do the following:
- Log on to the host to access a Linux® shell:
ssh <user>@<hostname> -p 22
The hostname is part of alarm attribute Source.
- Synchronize the data on the disk with the memory:
>sync
- Wait one minute.
- Is the alarm cleared?
Yes: Continue with the next step.
No: Proceed with Step 7.
- Is this alarm occurring at least once a day?
Yes: Continue with the next step.
No: Proceed with Step 9.
- This can be a scaling issue. Contact the planning organization. Proceed with Step 9.
- Perform data collection, refer to Data Collection Guideline.
- Consult the next level of maintenance support. Further actions are outside the scope of this instruction.
- Job is completed.

Contents