Professional Documents
Culture Documents
RAN12.0 RNC
Serviceability Feature
www.huawei.com
ISSUE 1.0
WRAN Training Team
Huawei Confidential
Huawei Confidential
Page 2
Huawei Confidential
Page 3
Huawei Confidential
Page 4
Huawei Confidential
Page 5
Background Information
Version
MBSC
V912
No
Yes
No
No
Yes
Stiff
Placid
Huawei Confidential
Page 6
Function Description
Function description
The MML command INH DSP/INH BRD can be used to forbid allocating new
MS resources to the DPU or DSP of the specified subrack, slot, and
subsystem.
If the DSP has cell resources, the resources corresponding to the common
channel are deleted and the resources are re-created on another DSP. During
the re-creation process, the calls of MSs occupying FSCHs may be dropped. If
the cell is bound to the DSP, the binding relation needs to be released after the
DSP is inhibited.
MSs on the inhibited DPU/DSP are released naturally. You can run the DSP
UDSPRESOURCE command to query the remaining MSs on the inhibited
DPU/DSP. Do not replace the board until the number of MSs is decreased to
an acceptable value.
Huawei Confidential
Page 7
MML Command
MML command
Set INHT to LOGIC when running the INH BRD command for the
DPU.
INH BRD: INHT=LOGIC, SRN=1, SN=8;
Huawei Confidential
Page 8
MML Command
MML command
Huawei Confidential
Page 9
Huawei Confidential
Page 10
Function description
Huawei Confidential
Page 11
File generation
Core file
Name format:
The core file is named in the following format: module name + time information + .dmp.
Timed compression:
The core file is compressed at scheduled time. The compressed file is named in the following format:
module name + time information +.zip.
The time information is the number of seconds counting from January 1, 1970.
Deletion processing:
Up to two dump files generated by each module can be saved. If the module is not reset after an
exception occurs, up to three files can be saved.
The total size of all the core files is also restricted. When the total size exceeds 1 GB, the old core
files are deleted (if a module has only one dump file, this file is not deleted).
When a core file is stored for more than one month, it is regarded as an outdated file and then
deleted.
The core files are deleted at the startup of modules and each module deletes only its own core files.
Others:
In the Windows operating system, when an exception occurs frequently in a module (less than 10
minutes from the last time when a core file is generated), core files will not be generated
continuously. Nevertheless, a logfile will record the exception information. In the Linux operating
system, frequent exceptions are not restricted.
Huawei Confidential
Page 12
Logfile
Name format:
The logfile is named in the following format: module name + _crash.log.
Size restriction:
When the size of a file exceeds 2 MB, the file is automatically backed up. The
backup file is named in the following format: module name + _crash.bak. Each
module has up to one logfile and one backup file.
Content:
The logfile records two types of information: feature running information and
exception information. The feature running information begins with --- for
differentiation.
Huawei Confidential
Page 13
Huawei Confidential
Page 14
Usage description
Check
Method 1:
Check whether a core file or a compressed .zip file exists in
\mbsc\bam\version_X\ftp\crashfile\. If so, a module has restarted
abnormally.
Method 2:
When analyzing the COL log returned by an operator, you can determine
the size and content of each module. If dump file XXXX exists is
contained in the log, you must ask the field engineer to provide the core
file in \mbsc\bam\version_X\ftp\crashfile\ as soon as possible.
In the Windows operating system, you can view the exception
information in the log and directly use the information for troubleshooting.
Huawei Confidential
Page 15
analyze-v.txt
Huawei Confidential
Page 16
1. Run the following command to load the core file, module file, and
map file:
where is used to locate the exception, bt is used to view the called stack,
and p is used to view a parameter.
gdbdebug.txt
gdbLoad.txt
Huawei Confidential
Page 17
Introduction
Command definition:
MML command: SET OFFICENAME
Parameter: SID
SID restriction:
The SID restriction is consistent with the restriction of the office name during
the installation.
V1: It is a string of 6-32 characters, consisting of only numerals, letters,
hyphens (-), and underscores (_). It must begin with a letter.
V9: It is a string of 5-32 characters, consisting of only numerals, letters,
hyphens (-), and underscores (_). It must begin with a letter.
Huawei Confidential
Page 18
Precautions
V1:
After a valid office name is set successfully, the name takes effect
immediately and is displayed in the execution report of the MML command.
V2:
After a valid office name is set successfully, the name takes effect only after
manual soft reset of the active and standby OMUs. Otherwise, the following
case may occur: The command messages of some modules use the old office
name, and those of other modules use the new office name.
Huawei Confidential
Page 19
Introduction
Feature description:
The following four parameters are added to LST ALMLOG and EXP ALMLOG
in V9 for querying alarms by clearance time: CLRSD, CLRED, CLRST, and
CLRET. The four parameter are respectively used to set the start clearance
date, end clearance date, start clearance time, and end clearance time.
The definition and usage of the parameters are similar to those of SD, ED, ST,
and ET.
Precautions:
The four parameters can be used only in the case of querying/exporting fault
alarms, and cannot be used in the case of querying/exporting event alarms.
On the alarm query page of the WEBLMT, this function is provided by an MML
command.
Huawei Confidential
Page 20
Introduction:
Feature description:
Related commands:
Huawei Confidential
Page 21
Usage description
Notes:
Example:
Run the following command to query the alarm log where computer name is huawei-d5db447b and
service name is RemoteAccess in the alarm location information:
LST ALMLOG: ALMTP=all, LOCINFOKEY=compute name:huawei-d5db447b&service
name:RemoteAccess";
Result::
Huawei Confidential
Page 22
Background
Some modules have a lot of logs; however, the logfile size of each module is restricted in the
same way. Therefore, during log collection, logs that contain error information are overwritten.
Some modules such as the FTP server need to record the process log of each request.
Therefore, many logs exist. Because error logs are hidden in normal logs, it is difficult to find
the error logs for troubleshooting.
Each thread writes logs in files separately. When many logs exist, the thread may be blocked.
The amount of log information recorded by the BAM is increased and thus more effective
information is provided for troubleshooting.
Huawei Confidential
Page 23
Different mechanisms are used to record common logs and debug logs.
A thread is created in this module to record all common logs of this module.
MML commands are added to set and query various flags of the log functions.
Huawei Confidential
Page 24
Introduction to logfiles
There are four types of logfiles: module name.log, module name.out, module
name.flow, and module name_bin.out
Logfiles include a series of log backup files: module name + time.log, module
name + time.bak, module name_bin.bak, and module name_flow.bak
.log files mainly record major/minor/message logs. Such logs include the key
information for troubleshooting.
.out files mainly record debug logs and message frames in the inter-process
communication. Such logs are helpful during troubleshooting.
.flow files record transaction flow logs. If an exception occurs in a flow, the
problem can be quickly located according to such logs.
_bin.out files are the personalized logs of a few modules. At present, only the
alarm module and maintenance module have such logfiles.
Huawei Confidential
Page 25
set logcfg
lst logcfg
Huawei Confidential
Page 26
Background
Problems such as link break and FTP exception due to the inconsistent
setting of working modes of the external network adapter on the OMU
and those on other network devices occur in many offices.
Huawei Confidential
Page 27
The duplex mode of the external network adapter is checked regularly. When the
actual duplex mode of the network adapter is inconsistent with the expected
duplex mode, a fault alarm is generated.
An MML command is added to query the status of the network adapter.
An MML command is added to set the expected duplex mode of the network
adapter.
The alarm function is added. When the actual duplex mode of the network adapter
is inconsistent with the expected duplex mode, a fault alarm is generated.
Huawei Confidential
Page 28
SET EXPDPLXMODE
Expect duplex mode:
Including the half duplex mode, full
duplex mode, and auto negotiation
mode
LST DUPLEX
No input parameter is required.
The output result includes the
subrack ID and slot ID of the OMU,
expected duplex mode of the
network adapter, and actual duplex
mode of the network adapter.
Huawei Confidential
Page 29
Run LST DUPLEX to view the current duplex mode of the network adapter.
View the duplex mode of the network adapter on the upper-layer router.
If the duplex mode of the network adapter on the upper-layer router is
inconsistent with the actual duplex mode of the network adapter on the OMU,
change the actual duplex mode of the network adapter on the OMU to make it
consistent with that on the upper-layer router, and then wait for alarm clearance.
If the duplex mode of the network adapter on the upper-layer router is consistent
with the actual duplex mode of the network adapter on the OMU, the expected
duplex mode of the network adapter is set improperly. In this case, run SET
EXPDPLXMODE to reset the expected duplex mode of the network adapter to
make it consistent with the actual duplex mode of the network adapter on the
OMU, and wait for alarm clearance.
After the alarm is cleared, run LST DUPLEX again. Now, the actual duplex mode
of the network adapter on the OMU is consistent with the expected duplex mode
of the network adapter.
Huawei Confidential
Page 30
Background
When the RNC is an FTP server, if transit files are not deleted by a third
party in time, the transit folder becomes larger and larger, and eventually,
incidents occur.
The folders on the FTP server are monitored. The oversize of files on the
server is avoided.
Huawei Confidential
Page 31
The folder space on the FTP server is monitored. When the space reaches a set
space threshold, a log is recorded and the files on the server are deleted. The
rule for deletion is as follows: The oldest files are deleted according to the file
modification time, and the files in the transit folder are also processed.
The folder space on the FTP server is monitored. When the space reaches a set
time threshold, a log is recorded and the files on the server are deleted. The rule
for deletion is as follows: The files dated before the set time are deleted
according to the file modification time, and the files in the transit folder are also
processed.
The folder space on the FTP server is monitored. When the space reaches a set
file quantity limit, a log is recorded and the files on the server are deleted. The
rule for deletion is as follows: The oldest files are deleted according to the file
modification time, until the number of files is less than 80% of the limit.
The monitoring of customized folders is supported. Monitoring rules can be
customized. The supported monitoring modes include time monitoring, space
monitoring, file quantity monitoring, and hybrid monitoring.
The files on the server are stored in the following path: \mbsc\bam\common\ems
Huawei Confidential
Page 32
Huawei Confidential
Page 33
Optimization list
1. Differentiated Loading
2. Low-Loss Host Reset After Cold Patching
3. Decoupling of MML Commands
4. Auto Unlocking of Scheduled Tasks
5. Upgrade Procedure Optimization
6. Upgrade Automation
Huawei Confidential
Page 34
Differentiated Loading
To better satisfy the requirement for cold patching the host, differentiated
loading is implemented. That is, when the BAM maintenance module
processes the load command, the module first checks whether the version in
the Flash of the current board is consistent with that in the BIN file on the
BAM. If they are inconsistent, the module performs loading; otherwise, the
module does not perform loading.
The version description of the BIN file on the BAM is provided in the
verdes.xml file.
Huawei Confidential
Page 35
Differentiated Loading
Replace the BIN and verdes.xml files on the active OMU (maybe on
some boards). The verdes.xml file has the version number of each
BIN file.
Some commands for synchronization between the primary storage area and
the secondary storage area are progress messages, and at last an overall
load report is returned. If the return code of the MML command is 0, it
indicates success; otherwise, it indicates failure. Note that for a board not in
position, a non-zero value also indicates success.
Huawei Confidential
Page 36
In scenarios 1, 2, and 4, the differentiated load command is used to load the BIN files of the boards that are
cold patched to the Flash in the primary storage areas of the boards. In scenario 3, the workspace
synchronization command is used to load the BIN files of all boards to the Flash in the primary storage areas
of the boards.
The low-loss reset command RST UGPLANE:UPLN=STANDBY,UMD=UPGRADE; is delivered to reset the
standby plane. (In scenarios 1, 2, and 4, other commands rather than the reset command in the upgrade of
version B can be used to implement the function.)
The implementation of other functions is the same as the implementation of low-loss upgrade. That is, before
low-loss upgrade, the upgrade tool checks whether the maintenance path is normal through CHK MNTPATH;
after confirming that the maintenance path is normal, it performs low-loss reset. In addition, if the low-loss
reset command fails, or if the low-loss reset command is executed successfully but the execution result of
DSP UGRESULT:UPLN=STANDBY shows that the Result field value is not Standby Plane Upgrade
Incomplete or Upgrade Complete, the whole system is immediately reset. After the Result fields of all
subracks show Upgrade Complete, the upgrade tool starts to deliver the primary plane reset command RST
UGPLANE:UPLN=PRIMARY,UMD=UPGRADE;.
The final effect is that after reset, all boards run by loading BIN files from the Flash in the primary storage areas.
That is, the patch version runs on the cold patched boards.
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential
Page 37
Huawei Confidential
Page 38
Huawei Confidential
Page 39
Standby OMU
Check
Check before upgrade
Install BAM
standby area
Install BAM
standby area
Data check
Pre-upgrade
Data backup
Data upgrade
FMT DATA
Load FAM
standby area
Upgrade
Reset FAM
Services verification
Huawei Confidential
Page 40
Upgrade Automation
The input information of the client is stored to a configuration file. After the client of the
upgrade tool is started, the client obtains the current upgrade information from the
specified configuration file to automatically complete upgrade. If an error occurs, the
upgrade tool records the error information in a log for troubleshooting.
Different configuration files are provided to meet the requirements in various upgrade
scenarios.
Huawei Confidential
Page 41
Huawei Confidential
Page 42
Background
Huawei Confidential
Page 43
Wireless
products
Support
website
patch
packages
Publish
after tests
Release notes
Install
patch
packages
configure file
Front
engineers
patches
installation
Huawei Confidential
Page 44
Overall architecture
1.
OSS
NE
NE upgrade module
SHELL
Interface
FTP interfaces.
SW patch
3.
Huawei Confidential
Page 45
Procedure for
OSS
applying patches
NE
patches
manual
automatic
Upgrade execution
Upgrade execution feed back
Huawei Confidential
Page 46
Huawei Confidential
Page 47
Operation Introduction
Step 1: On the
M2000
operation page,
choose
Software > NE
Upgrade Task
Management >
NE Upgrade
Task. A dialog
box is
displayed.
Huawei Confidential
Page 48
Operation Introduction
Step 2: On the
previous tab
page, click
Create. A dialog
box is displayed.
Huawei Confidential
Page 49
Operation Introduction
Step 3: In the displayed dialog box, enter a task name, select an upgrade
type, a target version, and an NE, add the selected NE to the right box, and
then click Next. A dialog box is displayed.
Step 4: Complete the task configuration according to the prompt, and then
click Finish.
Step 5: After the task is created, the NE Upgrade Task Management tab
page is displayed automatically. The task is executed automatically according
to the task configuration.
Huawei Confidential
Page 50
Operation Introduction
Step 6: After the task is executed, the patch implementation report similar to the
preceding report is automatically generated.
Package-upgrade-report_modified.HTML
Huawei Confidential
Page 51
Thank you
www.huawei.com