Fix unparsable json files
[demo.git] / vnfs / VES5.0 / evel / evel-library / code / VESreporting_fault / flt_config.json
1 {
2    "tmp_directParameters": {
3        "eventType": "applicationVnf",
4        "nfcNamingCode": "AFX",
5        "nfNamingCode": "AFX",
6        "priority": "Low",
7        "reportingEntityId": "cc305d54-75b4-431b-adb2-eb6b9e541234",
8        "reportingEntityName": "ibcx0001vm002oam001",
9        "sourceId": "de305d54-75b4-431b-adb2-eb6b9e546014",
10        "sourceName": "scfx0001vm002cap001",
11        "vfStatus": "Idle",
12        "tmp_device": ["lo", "enp0s3", "docker0"]
13
14     },
15     "tmp_indirectParameters": {
16        "tmp_faultInstance01": {
17           "eventName": "Fault_vFirewall-AT&T_linkDownError",
18           "eventCategory": "link",
19           "eventSourceType": "router",
20           "tmp_init":{
21                "tmp_t0BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2",
22                "tmp_t0BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10", 
23                "tmp_t0PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3", 
24                "tmp_t0PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11" 
25           },
26           "alarmInterfaceA": "$tmp_device",
27           "tmp_faultCheckInterval": 20,
28           "tmp_lowWaterMark": 100,
29           "tmp_command": {
30                "tmp_t1BytesIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f2", 
31                "tmp_t1BytesOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f10", 
32                "tmp_t1PacketsIn": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f3", 
33                "tmp_t1PacketsOut": "sudo cat /proc/net/dev | grep $tmp_device | tr -s ' ' | cut -d ':' -f2 | cut -d ' ' -f11" 
34           },
35           "tmp_BytesIn": "$(tmp_t1BytesIn - tmp_t0BytesIn)",
36           "tmp_PacketsIn": "$(tmp_t1PacketsIn - tmp_t0PacketsIn)",
37           "tmp_BytesOut": "$(tmp_t1BytesOut - tmp_t0BytesOut)",
38           "tmp_PacketsOut": "$(tmp_t1PacketsOut - tmp_t0PacketsOut)",
39           "tmp_alarmSetParameters": {
40                "specificProblem": "physical or logical connection to a remote router is down",
41                "eventSeverity": "MAJOR",
42                "alarmCondition": "link down trap_alarm"
43           },
44           "tmp_alarmClearParameters": {
45                "specificProblem": "physical or logical connection to a remote router is up",
46                "eventSeverity": "NORMAL",
47                "alarmCondition": "link up trap_alarm"
48           }
49        },
50        "tmp_faultInstance02": {
51           "eventName": "Fault_vFirewall-AT&T_serviceDownError",
52           "alarmInterfaceA": "afx@input.service",
53           "eventCategory": "other",
54           "eventSourceType": "virtualMachine",
55           "tmp_faultCheckInterval": 10,
56           "tmp_command": {
57                "tmp_cmd1": "/bin/systemctl is-active afx@input* |grep -E 'inactive|failed' | wc -l"
58           },
59           "tmp_alarmSetParameters": {
60                "specificProblem": "service is down",
61                "eventSeverity": "MAJOR",
62                "alarmCondition": "service down trap_alarm"
63           },
64           "tmp_alarmClearParameters": {
65                "specificProblem": "service is up",
66                "eventSeverity": "NORMAL",
67                "alarmCondition": "service up trap_alarm"
68           }
69        }
70     }
71 }