How to Configure Alarms


Use the Alarm Configuration tab to configure network alarms that provide status information for a particular problem or condition on a particular network device. Alarms are triggered when certain trap or event conditions (called a trigger event) occur on your network, and they are tracked until the problem or condition is removed.

The alarm source, which is the device, interface, or AP that is the source of the trigger event, is considered to have an alarm until the alarm is cleared. You can view alarms and alarm status and clear alarms in the Alarms & Events > Alarms tab in Extreme Management Center. Using the Alarm Configuration tab, you can add a new alarm definition, which includes configuring the conditions (criteria) that triggers the alarm, and defining the actions performed to notify a person or network component about the problem, when the alarm is triggered.

You can create an alarm definition that detects a problem or condition and raises an alarm, and create an alarm definition that detects when the problem or condition is removed and clears the alarm. For example, a Device Down alarm is triggered when contact with a device is lost. Then, when contact is established with the device, the Device Up alarm automatically clears the Device Down alarm.

Extreme Management Center ships with a set of default alarm definitions, which you can see listed in the Alarms tab. You can use these default alarms as is, or enable, disable, delete or modify them, as desired.

This Help topic includes instructions for:

Defining an Alarm

Use the Alarm Configuration tab to create new alarm definitions and define their criteria and actions, and to edit the criteria and actions for existing alarms.

There are six types of alarms, each using different criteria to establish the alarm definition.

  • Custom Criteria Alarm — Triggers an alarm when very specific criteria you define is met.
  • Flow Alarm — Flow alarms are used for reporting network traffic flow anomalies detected by the NetFlow flow collector. An alarm triggers when a flow matches criteria you configure.
  • Selected Trap Alarm — Triggers an alarm when a specific trap occurs. You are able to select from all the Trap IDs available for the devices modeled in the Extreme Management Center database.
  • Severity Alarm — Triggers an alarm when an event or trap occurs to which you assign a specific level of severity. Select an event severity level (Emergency, Alert, Critical, Error, Warning, Notice, or Info) and whether the alarm is triggered by traps, or events, or both.
  • Status Change Alarm — Triggers an alarm when the operational status for a device changes: Contact Lost triggers the alarm when contact with a device is lost, Contact Established triggers the alarm when contact is restored, and Both triggers the alarm when contact is lost and when contact is restored.
  • Threshold Alarm — Triggers the alarm when a specified value enters a defined range. For example, when CPU utilization exceeds 80% or when free disk space falls below 100 MB. There are two threshold alarm types: OneView and ExtremeAnalytics. This option is disabled if your Extreme Management Center license does not include Extreme Management Center features that support threshold alarms (such as device statistics collection) and you do not have an ExtremeAnalytics license.

To create a new alarm definition:

  1. Select the Add button and select the type of Alarm you are creating from the drop-down list. The Alarm Configuration window opens.

  2. Enter a name for your new alarm definition in the Name field.
  3. Select the appropriate severity level of the alarm definition in the Severity drop-down list. The alarm can have its own specified severity regardless of the severity of the event or trap from which it is triggered.
    • Set From Source Alarm Severity (question mark) Set from Source — the alarm uses the severity level of the trigger event, for example a warning event.
    • Critical Alarm Severity (Red) Critical — A problem with significant implications.
    • Error Alarm Severity (Orange) Error — A problem with limited implications.
    • Warning Alarm Severity (Yellow) Warning — A condition that might lead to a problem.
    • Info Alarm Severity (Blue) Info — Information only; not a problem.
    • Clear Alarm Severity (Green) Clear — An alarm that clears another alarm (for example, Device Up).
  4. Select the Enabled checkbox to activate the alarm definition. You can disable an alarm definition to deactivate it without deleting the definition.
  5. Enter the criteria that triggers the alarm. Options in the Criteria tab vary depending on the type of alarm you are creating.
    • Selected Trap Alarm

      1. Select the Select Traps button. The Select Traps window opens.
      2. Select the traps that trigger the alarm.
      3. Select Save.
      4. Select Select Groups if the alarm only applies to a specific group of devices. Select the groups of devices in the Alarm Group Selection window and select OK. Not selecting any device groups means the alarm applies to all devices.
      5. Select the Actions tab to configure the actions performed when the alarm is triggered.
    • Severity Alarm

      1. Select the severity of the event or trap required to generate the alarm from the drop-down list (Emergency, Alert, Critical, Error, Warning, Notice, or Info). Traps or Events that occur and match the severity in this drop-down list trigger the alarm. For example, you can create a severity alarm with a Severity of Error that is triggered when a trap or event occurs with an Event/Alarm Severity of Alert.
      2. Select whether the alarm is triggered by traps, or events, or both.
      3. Select Select Groups if the alarm only applies to a specific group of devices. Select the groups of devices in the Alarm Group Selection window and select OK. Not selecting any device groups means the alarm applies to all devices.
      4. Select the Actions tab to configure the actions performed when the alarm is triggered.
    • Status Change Alarm

      1. Select whether the alarm triggers when contact with a device is lost (Contact Lost), restored (Contact Established), or when contact is lost and when contact is regained (Both).
      2. Select Select Groups if the alarm only applies to a specific group of devices. Select the groups of devices in the Alarm Group Selection window and select OK. Not selecting any device groups means the alarm applies to all devices.
      3. Select the Actions tab to configure the actions performed when the alarm is triggered.
    • Flow Alarm

      1. Select how the flow is matched to trigger a flow alarm in the Match drop-down list. Flow alarms are used for reporting network traffic flow anomalies detected by the NetFlow flow collector. NetFlow is a flow-based data collection protocol that provides information about the packet flows being sent over a network. K-Series, S-Series, and N-Series devices support NetFlow flow collection.
        • Flows from Network — Match a flow's source IP address to the specified network.
        • Flows to Network — Match a flow's destination IP address to the specified network.
        • Flows from Network from Port — Match a flow's source IP address and port number to the specified network and port.
        • Flows from Port to Network — Match a flow's source port number and destination IP address to the specified port and network.
        • Flows from Network with low TTL — Match a flow's source IP address and TTL value to the specified network and the TTL at or below value.
      2. Enter the Network or Port monitored by the flow alarm
        • From/To Network — A network is identified as a set of IP masks. The mask is used as a filter to define a range of IP addresses. Masks can be entered in CIDR or dotted-decimal format.
          • CIDR — CIDR format uses a slash followed by a number between 8 and 32, to define the number of contiguous, left-most "one" bits that define the network mask. For example, /16 indicates a 16-bit mask. Here is an example of a From/To Network value using the CIDR format:
            10.20.0.0/16,10.20.0.0/24
          • Dotted-Decimal — Dotted decimal format represents network masks as four octets separated by periods. For example, a 16-bit mask in dotted decimal notation is 255.255.0.0. Here is an example of a From/To Network value using the dotted-decimal format:
            10.20.0.0/255.255.0.0,10.20.88.0/255.255.255.0
          • For example, if you entered either 10.20.0.0/16 (CIDR) or 10.20.0.0/255.255.0.0 (Dotted-Decimal) in the From/To Network field, then all incoming packets in the range 10.20.00.00 through 10.20.255.255 would result in an address match.
        • From Port — Enter the port number to be matched.
        • TTL at or below — Enter a value that triggers an alarm when the TTL value in the packet's TTL field is equal to or less than the value entered.
        • Select the Invert checkbox if you want the flow criteria to trigger the alarm when it does not match the specified values.
      3. Enter a phrase in the Alarm Source field used as the source of the alarm.
      4. Enter the amount of time, in minutes, hours, or days that must pass until the alarm can trigger again in the Time until alarm can be raised again field. This prevents a large number of alarms being triggered, if many flows match the alarm criteria. If you select Never, the alarm only triggers one time. Once you manually clear the alarm, it can be triggered again.
      5. Select Select Groups if the alarm only applies to a specific group of devices. Select the groups of devices in the Alarm Group Selection window and select OK. Not selecting any device groups means the alarm applies to all devices.
      6. Select the Actions tab to configure the actions performed when the alarm is triggered.
    • Custom Criteria Alarm

      1. Select the Add drop-down list and select the criteria by which the alarm triggers.
        •  Severity Criteria — Select one or more severity levels against which to match.
          •  Match Selected — The reported Severity is matched against any of the Severity levels selected in the list.
          •  Exclude Selected — The reported Severity matches if it is not one of the Severity levels selected in the list.
        • Category Criteria — Select one or more event categories to match against the Category column of the event. An event category is a way to group related events. For example, all events related to device discovery would be in the "Discover" category.
          • Match Selected — The reported Category is matched against any of the categories selected in the list.
          • Exclude Selected — The reported Category matches if it is not one of the categories selected in the list.
        • Type Criteria — Select one or more message types (Event, Inform, Trap) to match against the Type column of the event.
          • Match Selected — The reported Type is matched against any of the types selected in the list.
          •  Exclude Selected — The reported Type matches if it is not one of the message types selected in the list.
        • Event Criteria — Select one or more event types to match against the Event column of the event.
          • Match Selected — The reported Event is matched against any of the event types selected in the list.
          •  Exclude Selected — The reported Event matches if it is not one of the event types selected in the list.
        • Host or IP Criteria — Select one or more host names or IP/Subnet addresses to match against the value of the address appearing in the Source column of the event. The list of host names and IP/ Subnet addresses can be edited by selecting the Edit List button.
          • Match Selected — The reported host name or IP/Subnet address is matched against any of the host or IP/Subnets selected in the list.
          • Exclude Selected — The reported host name or IP/Subnet address matches if it is not one of the host or IP/Subnets selected in the list.
        • Log Criteria — Select one or more Event Logs against which to match.
          • Match Selected — The log where the event was received is matched against any of the logs selected in the list.
          • Exclude Selected — The log where the event was received matches if it is not one of the logs selected in the list.
        • Information Criteria — Select one or more text strings (phrases) to match against text in the Information column of the event or trap. The list of text phrases can be edited by selecting the Edit List button.
          • Match Selected — The information text string is matched against one or more phrase selected from the list.
          • Exclude Selected — The information text string matches if it is not one of the phrases selected from the list.
      2. Select Select Groups if the alarm only applies to a specific group of devices. Select the groups of devices in the Alarm Group Selection window and select OK. Not selecting any device groups means the alarm applies to all devices.
      3. Select the Actions tab to configure the actions performed when the alarm is triggered.
    • Threshold Alarm

      1. Select a Threshold Type.
        • OneView — The Extreme Management Center (formerly OneView) Collector gathers historical reporting data over time, which is then used in Extreme Management Center reports. Threshold alarms are raised when the reporting data matches a threshold alarm criteria.
        • ExtremeAnalytics — The ExtremeAnalytics engine generates ExtremeAnalytics threshold alarms as part of the application usage collection process. Threshold alarms are raised when hourly or high-rate usage data matches a threshold alarm criteria. Each target record produced on the ExtremeAnalytics engine is evaluated at the end of each collection interval to see if it matches alarm criteria. If a statistic has crossed a configured threshold, an alarm in raised. Alarms can track single target types as well as target combinations. They can reference specific targets, for example a specific application such as Facebook, or they can reference all the targets in a target type, for example all applications. Only the target types and target combinations that are collected by ExtremeAnalytics can be used in alarms.
      2. Select the criteria against which the threshold is compared.
      3. Enter the threshold value. When the value crosses the established threshold for the criteria you select, the alarm triggers.
      4. Select Select Groups if the alarm only applies to a specific group of devices. Select the groups of devices in the Alarm Group Selection window and select OK. Not selecting any device groups means the alarm applies to all devices.
      5. Select the Actions tab to configure the actions performed when the alarm is triggered.
  6. Select the Add drop-down list to select the actions performed when the alarm is triggered.

    • Add Email Action — Sends an email when the alarm is triggered. Use the Destination drop-down list to select one of your pre-defined email lists. Extreme Management Center comes preloaded with a default email list called Helpdesk. You can rename this list, but it cannot be deleted. Select the Edit Email Lists button to define a new list. Use semicolons or commas to separate individual email addresses, but do not include spaces. (You must have your SMTP E-Mail Server options configured.) There are default formats for the subject and body of the email you can override by selecting the Override Content checkbox. You can view a list of alarm keywords by selecting Show Keywords. Select the Save button to save the email action to the list of actions for the alarm definition.
    • Add Syslog Action — Creates a syslog message when the alarm is triggered. Enter the IP address or hostname that identifies the syslog server where the message is sent. There is a default format for the syslog message sent to the server you can override by selecting the Override Content checkbox. You can view a list of alarm keywords by selecting Show Keywords. Select the Save button to save the syslog action to the list of actions for the alarm definition.
    • Add Trap Action — Sends an SNMP trap when the alarm is triggered. Enter the IP address for a trap receiver where the trap is sent in the Trap Server field. Valid trap receivers are systems running an SNMP Trap Service. From the Credential drop-down list, select the appropriate SNMP credential to use when sending the trap to the trap receiver. Credentials are defined in the Profiles/Credentials tab in the Authorization/Device Access window (Tools > Authorization/Device Access). There is a default format for the trap message you can override by selecting the Override Content checkbox. You can view a list of alarm keywords by selecting Show Keywords. Select the Save button to save the trap action to the list of actions for the alarm definition.
    • Add Custom Action — Runs a custom program or script on the Extreme Management Center Server when the alarm is triggered. In the Program field, enter the name of the program. In the Working Directory field, enter the path to the directory from which the program is executed. Any path references within your program that are not absolute paths, are relative to the working directory. There is a default set of arguments passed to the program you can override by selecting the Override Content checkbox. You can view a list of alarm keywords by selecting Show Keywords. Keywords are used to override content, or a custom action. Select the Save button to save the email action to the list of actions for the alarm definition.
    • Add Task Action — Select to configure a workflow task to run when the event triggers the alarm. From the Tasks drop-down menu, choose from the list of workflows which have been configured to be available as Alarm Actions.
    • External Workflow Action — Runs a workflow action configured via a third-party application, such as StackStorm, when the alarm is triggered. Select External Workflow Action and then select a third-party application workflow.
    • If you want to set a limit on the number of times the system performs the alarm action for this alarm, check Enable Alarm Action Limit and type a number into the Max Count field. Once the limit is reached, the alarm is still recorded, but no further actions are performed. If you have configured multiple action types, the limit is for the number of times the set of configured actions is performed, not for each individual action. Each alarm source has its own action count for an alarm, so when the Max Count limit is reached for one alarm source, actions may still occur for other alarms from that alarm source as well as for other alarm sources. If Save is not checked, there is no limit placed on the number of times the action is performed.
    • You can specify a Reset Interval, which automatically resets the action count after the time limit specified, allowing actions to resume for that alarm source. If the reset interval is set to None, then once the alarm limit is reached, the alarm does not reset unless manually reset.
    • You can test an alarm action by selecting the Test button. (You must save an alarm before you can test it.) You can also override the action.
  7. In the Other Options subtab, select how you want to clear the alarm.
    • No Current Alarm (action only) — When this option is selected, the trigger event causes the system to perform the configured actions, but does not raise an alarm that becomes associated with the alarm source. The alarm status of the alarm source does not change, and no alarm is added to the system.
    • Cleared by Alarm — This option allows you to select the alarm(s) used to clear the alarm you are defining. You must first create the alarm definitions for the clearing alarms, which must have the alarm severity set to "Clear". The clearing alarms are triggered when the problem or condition is removed. Then, use the Select Alarms button to open a window to select one or more clearing alarms that clear the alarm you are defining.
  8. SelectSave to create the alarm and close the Alarm Configuration window.

To modify an existing alarm:

  1. In the Alarm Configurations view, select the alarm definition you want to change. 
  2. Double-click the Alarm Definition. You can also select the Edit button or right-click the alarm definition, and select Edit. The Alarm Configuration window opens.
  3. Edit the necessary fields. For additional information, see To create a new alarm definition.
  4. SelectSave to edit the alarm definition and close the Alarm Configuration window.

Copying an Alarm

You can also copy and modify existing alarm definitions using the Alarm Configuration. This provides you with a template from which to configure a new alarm.

To copy an alarm, right-click the alarm and select Copy to open the Copy Alarm Definition window. Enter a unique name for the new alarm and select OK. You can then edit the alarm to the desired configuration.

Disabling Alarms

There may be times when you want to disable an alarm definition without deleting it. For example, you might want to temporarily disable a Device Down alarm definition while you are performing maintenance on that device.

To disable an alarm, open the Alarm Configuration view, right-click the alarm you want to disable, and select Disable.

Deleting Alarms

To completely remove an alarm definition you no longer use, you can delete the alarm definition from Extreme Management Center.

To delete an alarm, open the Alarm Configuration view, select the alarm definition you want to delete, and select the Delete button.

Configuring Email Settings

From the Alarm Configuration tab, you can configure or edit the email address or email list to which alarm information is sent for an alarm definition when the alarm is triggered.

To configure the email address or email list to which alarm information is sent, open the Alarm Configuration tab, select the alarm definition for which you want to configure or change the email settings, select the Menu icon () or right-click the alarm definition and select the Edit button. Email actions are configured on the Actions tab of the Alarm Configuration window.

  NOTE: When creating a list of email addresses, use semicolons to separate different addresses.

Resetting Alarm Action Limits

Once an action limit is reached for an alarm, the action no longer occurs when an alarm triggers. From the Alarm Configuration tab, you can reset the action limits for your alarms so the actions occur when an alarm is triggered.

To reset the action limits, open the Alarm Configuration tab, select the alarm definition for which you want to reset the action limits, select the Menu icon () or right-click the alarm definition and select Reset Alarm Action Limits.

Enabling/Disabling All

From the Alarm Configuration tab, you can enable or disable all of your alarms at once.

To enable or disable all of your alarms, open the Alarm Configuration tab, select the Menu icon (), and select Enable All or Disable All, respectively.

Restoring Default Alarms

From the Alarm Configuration tab, you can restore the default alarms that you delete or modify.

To restore the default alarms, open the Alarm Configuration tab, select the Menu icon (), and select Restore Default Alarms.

  NOTE: The time required to restore default alarms can vary. When the process is complete, you are notified by a confirmation window.

Viewing Alarms

You can view device/alarm status in multiple places throughout Extreme Management Center.

Extreme Management Center

Every Extreme Management Center page includes a system-wide Alarm Summary in the lower right corner. This indicates the number of current alarms for each severity (Critical, Error, Warning, and Info) that is present in the entire system. If there are no current alarms, the status displays all zeroes. Select on an indicator to open the Alarms tab filtered to display the alarms of that severity.

Alarms & Events Tab

View current alarm information in the Alarms & Events > Alarms tab. Use the configuration menu button or right-click on an alarm to clear the selected alarm or all alarms. If desired, you can supply a reason you cleared the alarm, which is recorded in the Alarm History.

Network Tab

View the alarm status for a device in the Status column from within the My Network navigation tree on the Network tab. The colored circle indicates the severity of the most severe alarm on the device. A green icon indicates that there are no alarms and the device is up. A red icon indicates a critical alarm or the device is down. Double-click on the Status icon to open a new page with detailed information about the alarms for that device. For additional information, see Network tab help topic.

View the alarm status for a device in device maps, found in the World map navigation tree. Topology and geographic maps show the status of devices in your network and floor plans show the status of wireless access points. As with devices in the My Network navigation tree, the colored circle associated with a device or access point in a map indicates the severity of the most severe alarm on the device. For additional information, see View and Search Maps.

Clearing Alarms

An alarm can be cleared manually or automatically.

To clear an alarm manually:

In the Alarms & Events > Alarms tab, Menu icon () in the upper left corner or right-click on an alarm to clear the selected alarm or all alarms. If desired, you can supply a reason that the alarm was cleared, which is recorded in the Alarm History.

To clear an alarm automatically:

An alarm is cleared automatically by another alarm called a "Clearing Alarm". For example, you can create a Device Up alarm so that when contact is established with a device, the alarm automatically clears a Device Down alarm.

Clearing Alarms are configured in the Alarm Configuration window with an Alarm Severity set to Clear. The alarm is defined so that when it is triggered, it removes an alarm rather than adds one.

In addition, a threshold alarm can be configured to "self-clear". This is called re-arming the alarm. Re-arming allows the threshold alarm to clear itself when the monitored statistic is restored to an acceptable range, without requiring a clearing alarm. When an alarm self-clears, no action is triggered.

Buttons, Search Field, and Paging Toolbar

Filter Show Filters
Use the filter functions to view, modify, apply, or remove filters from a table column. You can filter multiple columns in a table.
Search Show Filters
The search tool enables you to search for full or partial matches on fields in the table.
Paging Toolbar Paging Toolbar
The paging toolbar provides four buttons that let you easily page through the table: first, previous, next, and last page.
Refresh Refresh Button
Use the refresh button to update the data in the table.
Reset Reset Button
The reset button clears the search field and search results, clears all filters, and refreshes the table.

For information on related concepts: