26
[1]Oracle® Communications Network Intelligence System Administrator’s Guide Release 7.3 E56693-01 July 2015

Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

  • Upload
    others

  • View
    15

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

[1] Oracle® Communications Network IntelligenceSystem Administrator’s Guide

Release 7.3

E56693-01

July 2015

Page 2: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Oracle Communications Network Intelligence System Administrator’s Guide, Release 7.3

E56693-01

Copyright © 2013, 2015, Oracle and/or its affiliates. All rights reserved.

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.

If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable:

U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.

This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle.

Page 3: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

iii

Contents

Preface ................................................................................................................................................................. v

Audience....................................................................................................................................................... vRelated Documents ..................................................................................................................................... vDocumentation Accessibility ..................................................................................................................... viDocument Revision History ...................................................................................................................... vi

1 Network Intelligence System Administration Overview

Overview of Network Intelligence Administration Tasks .............................................................. 1-1Directory Placeholders Used in This Guide ....................................................................................... 1-1

2 Starting and Stopping Network Intelligence

About Starting and Stopping Network Intelligence ......................................................................... 2-1Opening the Network Intelligence Administration Page ................................................................ 2-1Starting the Network Intelligence Client ............................................................................................ 2-2

3 Managing Network Intelligence Security

About Network Intelligence Security .................................................................................................. 3-1About User Groups............................................................................................................................ 3-1

Managing User Groups ........................................................................................................................... 3-2Creating or Modifying User Groups ............................................................................................... 3-2Deleting User Groups........................................................................................................................ 3-4Working with Regions....................................................................................................................... 3-5Working with Technologies.............................................................................................................. 3-5

Managing Users ........................................................................................................................................ 3-6Creating or Modifying User Profiles ............................................................................................... 3-6Managing User Passwords ............................................................................................................... 3-7

Changing Your Password.......................................................................................................... 3-7Changing the Password of Another User................................................................................ 3-7

Deleting a User Profile ...................................................................................................................... 3-8Viewing Logged-In Users ................................................................................................................. 3-8

4 Managing Network Intelligence

Assigning the Network Intelligence Administrator Role ................................................................ 4-1Configuring and Reading Log Files ..................................................................................................... 4-1

Page 4: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

iv

Using log4j for Logging within Network Intelligence.................................................................. 4-1Logging for Oracle WebLogic Server .............................................................................................. 4-2

Monitoring Database Tablespace Requirements............................................................................... 4-3Tuning the Oracle Database................................................................................................................... 4-3Load Balancing a Clustered Server ....................................................................................................... 4-3

Configuring the Load Balancer ........................................................................................................ 4-3F5 BIG-IP Configuration Scenarios........................................................................................... 4-4Cisco CSS 1150X Configuration Example................................................................................ 4-4

Configuring the Proxy Server........................................................................................................... 4-4

5 Loading Data

About Loading Data................................................................................................................................. 5-1Configuring How Network Intelligence Loads Data ................................................................... 5-1Configuring the Data Loading Schedule ........................................................................................ 5-2Loading Data On Demand................................................................................................................ 5-2

Page 5: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

v

Preface

This guide contains information about administering Oracle Communications Network Intelligence. This guide includes information about how to start and stop Network Intelligence, an overview of security for Network Intelligence, and how to manage Network Intelligence.

AudienceThis guide is intended for system administrators and other individuals who are responsible for ensuring that Network Intelligence is operating in the manner required for your business.

This document assumes that you have a good working knowledge of Sun Solaris, Windows, UNIX, IBM AIX, Oracle Fusion Middleware, Oracle WebLogic, and Java J2EE software.

Related DocumentsNetwork Intelligence System Administrator’s Guide is one book in the Oracle Communications Network Intelligence documentation set. For more information, refer to the following documents:

■ Network Intelligence Installation Guide: Describes the requirements for installing Network Intelligence, installation procedures, and post-installation tasks.

■ Network Intelligence User’s Guide: Provides information about how to use Network Intelligence.

■ Network Intelligence Developer’s Guide: Describes the architecture of Network Intelligence and explains how to customize reports and maps, extend the user interface, configure extensible attributes, configure security, populate the staging database, and load the database.

■ Network Intelligence Concepts: Provides an overview of important concepts and an introduction to using Network Intelligence.

■ Network Intelligence Security Guide: Provides an overview of important concepts and an introduction to using Network Intelligence.

Note: Documentation on third-party software products is limited to the information needed to use Network Intelligence. If you need additional information on a third-party software application, consult the documentation provided by the product’s manufacturer.

Page 6: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

vi

■ Network Intelligence Release Notes: Describes the new features, fixes and enhancements to existing features, known issues, troubleshooting tips, and required third party products and licensing.

Documentation AccessibilityFor information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.

Access to Oracle SupportOracle customers that have purchased support have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Document Revision HistoryThe following table lists the revision history for this guide:

Version Date Description

E56693-01 July 2015 Initial release.

Page 7: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

1

Network Intelligence System Administration Overview 1-1

1Network Intelligence System AdministrationOverview

This chapter provides an overview of Oracle Communications Network Intelligence basic administration tasks and the tools to perform those tasks.

Overview of Network Intelligence Administration TasksA Network Intelligence administrator is responsible for the day-to-day tasks of maintaining and managing Network Intelligence and its users. The tasks also include managing Network Intelligence components and database.

You perform the following tasks as a Network Intelligence administrator:

■ Starting and stopping the Network Intelligence server. See "Starting and Stopping Network Intelligence" for more information.

■ Managing Network Intelligence security. See "Managing Network Intelligence Security" for more information.

■ Managing Network Intelligence. See "Managing Network Intelligence" for more information.

Directory Placeholders Used in This GuideTable 1–1 lists the placeholders that are used in this guide to refer to directories related to the Network Intelligence application.

Table 1–1 Directory Placeholders

Placeholder Directory Description

MW_Home The location where the Oracle Middleware product was installed. This directory contains the base directory for the WebLogic Server, a utilities directory, and other files and directories.

WL_Home The base directory for the WebLogic Server core files. It is located in the MW_Home directory.

Domain_Home The directory that contains the configuration for the domain into which Network Intelligence is typically installed, but it is frequently set to some other directory at installation.

Page 8: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Directory Placeholders Used in This Guide

1-2 Network Intelligence System Administrator's Guide

Page 9: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

2

Starting and Stopping Network Intelligence 2-1

2Starting and Stopping Network Intelligence

This chapter describes how to start and stop Oracle Communications Network Intelligence.

About Starting and Stopping Network IntelligenceNetwork Intelligence runs in an Oracle WebLogic Server instance.

You can start and stop the Network Intelligence application using the WebLogic Administration Console to start or stop the WebLogic Service instance in which Network Intelligence runs. Refer to the application server documentation for further information.

You can also start and stop the Network Intelligence application by starting or stopping the application server in which Network Intelligence runs.

Opening the Network Intelligence Administration PageYou can use the Network Intelligence administration page to perform several different administration tasks.

Before you can log onto the administration page, the application server in which Network Intelligence is installed must be running.

To open the Network Intelligence administration page:

1. In an Internet browser, enter the following URL:

http://server_name:port/netintel-server/

where server_name is either the server name or IP address of the application server in which Network Intelligence is installed, and port is the port number for the server.

The login screen appears.

2. Enter the administrator user name and password that were set up during the Network Intelligence database installation.

3. Click Login.

The Network Intelligence administration Welcome page appears, as shown in Figure 2–1.

Page 10: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Starting the Network Intelligence Client

2-2 Network Intelligence System Administrator's Guide

Figure 2–1 Network Intelligence Administration Welcome Page

Starting the Network Intelligence ClientThe client machine must meet the software requirements to run the Network Intelligence client. See Network Intelligence Installation Guide for more information.

To start the Network Intelligence client:

1. In the Network Intelligence administration page, click Main Menu.

See "Opening the Network Intelligence Administration Page" for more information about opening the administration page.

The Network Intelligence administration Welcome page appears.

2. Click Start Network Intelligence.

The Network Intelligence Web Start portal appears.

3. Click the image.

A Java Network Launch Protocol (JNLP) file is downloaded. If you are asked to confirm that you want to download the file, accept to download it.

4. Open the downloaded JNLP file.

The Network Intelligence login screen appears.

5. Enter the administrator user name and password that were set up during the Network Intelligence database installation.

6. Click Login.

Note: For information on how to use the Network Intelligence GUI, from the menu bar, select Help, then select Online Documentation.

Page 11: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

3

Managing Network Intelligence Security 3-1

3Managing Network Intelligence Security

This chapter describes managing user-based security in Oracle Communications Network Intelligence.

About Network Intelligence SecurityNetwork Intelligence user security consists of:

■ Authenticating users with a user name and password when they log in to the system

■ Authorizing users to access specific parts and technologies of Network Intelligence (such as pages, actions, geographical areas, technologies, and entities), based on the user groups to which the user belongs

You are responsible for managing user security by:

■ Managing User Groups

■ Managing Users

About User GroupsUser groups are used to grant and restrict user access within Network Intelligence. All users belong to user groups.

User groups are made up of the following elements:

■ Roles: Network Intelligence comes with a set of preconfigured roles that define the level of access for users:

– The Administrator role grants the user the ability to create and manage users, to create and manage user groups, and to manage Network Intelligence. Administrators also have the same level of access in Network Intelligence as those with the Power User role. The Administrator role is assigned to the default Network Intelligence user during installation.

– The Power User role grants the user the ability to create, modify, view, and delete entities in Network Intelligence.

– The User role grants user the ability to view entities in Network Intelligence.

– The Report User role grants the user access to view reports.

You cannot add, delete, or modify roles.

■ Regions: You can define geographic regions that grant users the ability to perform actions on entities within the specified geographical area.

Page 12: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Managing User Groups

3-2 Network Intelligence System Administrator's Guide

See "Working with Regions" for information about creating and modifying regions.

■ Technologies: You can define technology types that grant users the ability to perform actions on specific types of entities.

See "Working with Technologies" for information about creating and modifying technologies.

A user group must have at least one role, region, or technology, though it can have multiples of each.

You can assign multiple user groups to a single user profile.

By assigning one or more user groups to a user profile, a user profile must include at least one role, region, and technology. A user group can include multiple roles, regions, and technologies.

For example, if you assign two users groups to a user profile, those two user groups must combine to provide the user profile with access to at least one role, one region, and one technology.

When Network Intelligence is installed, the following default user groups are created in the system:

■ The Administrator user group: a user group with the Administrator role, All Regions region, and the All Technologies technology assigned.

■ The Power User user group: a user group with the Power User role assigned.

■ The User user group: a user group with the User role assigned.

■ The Report User user group: a user group with the Report User role assigned.

■ The All Region Group user group: a user group with the All Region region assigned, granting the user access to entities in all geographical areas.

■ The All Technologies Group user group: a user group with the All Technologies technology assigned, granting the user access to all types of technologies.

You cannot delete or modify the default user groups.

Managing User GroupsYou use user groups to grant and restrict user access within Network Intelligence. You assign one or more user groups to a user. See "About User Groups" for more information.

Managing user groups includes:

■ Creating or Modifying User Groups

■ Deleting User Groups

■ Working with Regions

■ Working with Technologies

Creating or Modifying User GroupsCreate or modify a user group, then assign the user group to users.

To create or modify a user group:

1. Open the Network Intelligence administration page.

Page 13: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Managing User Groups

Managing Network Intelligence Security 3-3

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the Administration menu, select User Groups.

The User Groups page appears.

3. Do one of the following:

■ To create a new user group, click Add.

■ To modify an existing user group, click the Edit icon for the user group you wish to modify.

The User Group Details page appears.

4. In the User Group Name field, enter a name for the user group.

5. (Optional) In the User Group Description field, enter a description for the user group.

6. In the Assign Roles section, assign roles to or remove roles from the user group:

■ To assign a role, select a role from the Available Roles list and click the Right Arrow icon.

The selected role moves to the Current Roles list.

■ To remove a role, select a role from the Current Roles list and click the Left Arrow icon.

The selected role moves to the Available Roles list.

■ To assign all roles, click the Double Right Arrow icon.

All the roles move to the Current Roles list.

■ To remove all roles, click the Double Left Arrow icon.

All the roles move to the Available Roles list.

Roles listed in the Available Roles list are not assigned to the user group. Roles listed in the Current Roles list are assigned to the user group.

7. In the Assign Regions section, assign regions to or remove regions from the user group.

■ To assign a region, select a region from the Available Regions list and click the Right Arrow icon.

The selected region moves to the Current Regions list.

■ To remove a region, select a region from the Current Regions list and click the Left Arrow icon.

The selected region moves to the Available Regions list.

■ To assign all regions, click the Double Right Arrow icon.

All the regions move to the Current Regions list.

■ To remove all regions, click the Double Left Arrow icon.

All the regions move to the Available Regions list.

Regions listed in the Available Regions list are not assigned to the user group. Regions listed in the Current Regions list are assigned to the user group.

Page 14: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Managing User Groups

3-4 Network Intelligence System Administrator's Guide

8. In the Assign Technologies section, assign technologies to or remove technologies from the user group.

■ To assign a technology, select a technology from the Available Technologies list and click the Right Arrow icon.

The selected technology moves to the Current Technologies list.

■ To remove a technology, select a technology from the Current Technologies list and click the Left Arrow icon.

The selected technology moves to the Available Technologies list.

■ To assign all technologies, click the Double Right Arrow icon.

All the technologies move to the Current Technologies list.

■ To remove all technologies, click the Double Left Arrow icon.

All the technologies move to the Available Technologies list.

Technologies listed in the Available Technologies list are not assigned to the user group. Technologies listed in the Current Technologies list are assigned to the user group.

9. Click Save.

The user group is saved.

You can now assign the new user group to users.

Deleting User GroupsYou can delete a user group only if it is not assigned to any users. Before attempting to delete a user group, ensure that it is unassigned.

You cannot delete any of the default user groups. See "About User Groups" for more information.

To delete a user group:

1. Open the Network Intelligence administration page.

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the Administration menu, select User Groups.

The User Groups page appears.

3. Click the user group that you want to delete.

The User Group Details page appears.

4. Click Delete.

The user group is deleted.

Note: User groups must be assigned at least one role, region, or technology.

You cannot modify a user group if the changes would cause any user to be without a role, region, or technology.

Page 15: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Managing User Groups

Managing Network Intelligence Security 3-5

Working with RegionsA region is used to help define a user group by geographic area. See "About User Groups" for more information.

The All Regions region is created by default when Network Intelligence is installed.

When you create a new region, users with access to the region can view its entities and can assign it to entities in Network Intelligence.

To create or modify a region:

1. Open the Network Intelligence administration page.

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the Administration menu, select Regions.

The Regions page appears. The Regions page lists existing regions.

3. Do one of the following:

■ To create a new region, click Add.

■ To modify an existing region, click the Edit icon for the desired region.

The Region Details page appears.

4. In the Region Name field, enter a name for the region.

5. (Optional) In the Region Description field, enter a description for the region.

6. Click Save.

The region is created. You can now assign the region to a user group. Also, users with access to the region can create, modify, and view entities in their region.

Working with TechnologiesA technology is used to help define a user group by granting the user access to specific types of equipment. A technology can contain multiple types of equipment. See "About User Groups" for more information.

The All Technologies technology is created by default when Network Intelligence is installed.

When you create a new technology, users with access to the technology can view, create, and modify equipment types that belong to the technology.

To create or modify a technology:

1. Open the Network Intelligence administration page.

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the Administration menu, select Technologies.

The Technologies page appears. The Technologies page lists existing technologies.

3. Do one of the following:

■ To create a new technology, click Add.

Page 16: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Managing Users

3-6 Network Intelligence System Administrator's Guide

■ To modify an existing technology, click a technology name.

The Technology Details page appears.

4. In the Technology Name field, enter a name for the technology.

5. (Optional) In the Technology Description field, enter a description for the technology.

6. Click Save.

The Technologies page appears. The technology is created or updated.

7. Add one or more equipment types to a technology:

a. Click the Add Equipment Type icon for the desired technology.

The Technology Type page appears.

b. In the Equipment Type field, enter the equipment type to be associated with the technology.

c. (Optional) In the Description field, enter a description for the equipment type.

d. Click Save.

The Types page appears, listing all technologies and equipment types.

You can now assign the technology to a user group. Also, users with access to the technology can create, modify, and view entities belonging to the technology.

Managing UsersManaging user profiles includes:

■ Creating or Modifying User Profiles

■ Managing User Passwords

■ Viewing Logged-In Users

■ Deleting a User Profile

Creating or Modifying User ProfilesYou create and modify user profiles to grant and restrict user access within Network Intelligence.

To create or modify a user profile:

1. Open the Network Intelligence administration page.

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the Administration menu, select Users.

The Users page appears.

3. Do one of the following:

■ To create a new user profile, click Add.

■ To modify an existing user profile, click Change Profile for the desired user profile.

Page 17: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Managing Users

Managing Network Intelligence Security 3-7

The User Profile page appears.

4. If you are creating a new user profile, do the following:

a. In the Username field, enter the user name.

b. In the Password field, enter the password.

c. In the Confirm Password field, reenter the same password.

d. In the Password Hint field, enter a hint the user can use to remember his password, if the user should forget it.

5. In the First Name and Last Name fields, enter the user’s name.

6. In the E-Mail field, enter the user’s email address.

7. (Optional) In the Phone Number field, enter the user’s phone number.

8. (Optional) In the Website field, enter the user’s Web site.

9. (Optional) In the Address section, enter the user’s address.

10. In the Assign User Groups section, assign user groups to or remove user groups from the user profile.

User groups define a user’s level of access in Network Intelligence. Using a combination of one or more user groups, a user profile must include access to one role, one region, and one technology. See "About User Groups" for more information.

11. Click Save.

The user profile is saved. Changes take affect the next time the user logs in.

Managing User PasswordsAll users can change their own passwords, regardless of the role they are assigned. Also, a user with the Administrator role can change the password of another user.

Changing Your PasswordTo change your password:

1. Open the Network Intelligence administration page.

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the My Profile menu, select Change Password.

The Change Password page appears.

3. Make any changes and click Save.

The new password is saved.

Changing the Password of Another UserYou can change password for any user profile.

Note: You cannot save a user profile if its user groups don’t include a role, a region, and a technology.

Page 18: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Managing Users

3-8 Network Intelligence System Administrator's Guide

To change another user’s password:

1. Open the Network Intelligence administration page.

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the Administration menu, select View Users.

The Users page appears, showing all user accounts.

3. For the user whose password you want to change, click Change Password.

4. Make any changes and click Save.

The new password is saved.

Deleting a User ProfileYou can delete any user profile except your own.

To delete a user profile:

1. Open the Network Intelligence administration page.

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the Administration menu, select Users.

The Users page appears, listing all existing user profiles.

3. Click Change Profile for the user you want to delete.

The User Profile page for the selected user appears.

4. Click Delete.

5. Confirm the deletion.

The user profile is deleted.

Viewing Logged-In UsersTo view a list of all users currently logged in to Network Intelligence:

1. Open the Network Intelligence administration page.

See "Opening the Network Intelligence Administration Page" for more information.

The Network Intelligence administration Welcome page appears.

2. From the Administration menu, select Logged In Users.

The Logged In Users page appears listing all users that are currently logged in and whose sessions have not expired.

Page 19: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

4

Managing Network Intelligence 4-1

4Managing Network Intelligence

This chapter describes how to manage Oracle Communications Network Intelligence.

Assigning the Network Intelligence Administrator RoleThe scheduling of the loader is managed by a user with the Administrator role. This administrator is generally a member of the network planning or network design team and works closely with the inventory users. Ensuring that the loader process runs at appropriate times, and monitoring the success of each load through the loader reports are among the main responsibilities of the Network Intelligence administrator.

To create and manage users, see "Managing Network Intelligence Security".

Configuring and Reading Log FilesLog files are used to record server and client activity in a Network Intelligence deployment.

Using log4j for Logging within Network IntelligenceNetwork Intelligence uses the log4j framework to manage its logging. The log4j.properties file controls the log levels. This file is located in the Network Intelligence EAR file (network-intelligence.ear) which is contained in the netintel-server.war file in the Web-INF/classes directory.

Table 4–1 lists the log levels for log4j.

Table 4–1 log4j Log Levels

Log Level Description

ALL Has the lowest possible rank and is intended to turn on logging.

DEBUG Designates high level informational events that are useful to debug an application.

ERROR Designates error events that will allow the application to continue running.

FATAL Designates severe error events that will presumably lead the application to quit.

INFO Designates informational messages that highlight the progress of the application at a low level.

OFF Has the highest possible rank and is intended to turn off logging.

TRACE Designates more detailed informational events than the DEBUG level.

WARN Designates potentially harmful situations.

Page 20: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Configuring and Reading Log Files

4-2 Network Intelligence System Administrator's Guide

Setting the logging to FATAL produces the lowest amount of logging while TRACE produces the most. By default, the root logger is assigned to the INFO level.

Network Intelligence logging levels are set in the following lines:

log4j.logger.com.netsure.ano=WARNlog4j.logger.com.netsure.capman=WARNlog4j.logger.oracle.communications.networkintelligence=WARNlog4j.logger.com.netsure.ano.admin.util=WARN

Refer to the log4j Web site for further information:

http://logging.apache.org

To change the Network Intelligence log level (see "Configuring and Reading Log Files") you must edit a file within an EAR file, and then repackage the contents of the EAR.

To update and repackage an EAR file:

1. Create an empty directory and copy the archive to it.

2. From the command line, change to the new directory.

3. On the command line, enter the following to extract the contents of the EAR:

jar xvf ear-file file-to-be-extracted

For example,

jar xvf ear-file dir1/file1 dir1/dir2/file *

The file is extracted.

4. Perform modifications on the file.

5. From the command line, enter the following, from the same directory where the original jar xvf command was performed.

jar uvf0 ear-file path-to-file

This updates the file and saves it to the archive.

Logging for Oracle WebLogic ServerWithin Oracle WebLogic Server, the WebLogic Server Administration Console provides separate but similar log viewers for the local server log and the domain-wide message log.

The log files are located in the following directories (depending where Network Intelligence is running):

Note: If the file that is to be updated is contained within an archive, which is itself within an archive, the above steps must be repeated for the internal archive.

To view the contents of an archive without extracting the files, on the command line, enter the following:

jar tvf ear-file

For example,

jar tvf myear.ear *

Page 21: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Load Balancing a Clustered Server

Managing Network Intelligence 4-3

■ The standard WebLogic log files are located in domain/servers/Server name/logs, on the Managed Server or Administration Server.

■ The Network Intelligence log file location is configured using the log4j.properties file; For example:

$WL_HOME/domain_name/log4j.appender.R.File=newDirectory/newLogFilename.log

Monitoring Database Tablespace RequirementsWhen Network Intelligence is running, you may need to monitor the tablespace requirements of the core and staging databases. Requirements vary according to the size of the network, but typical allocations are in the range of 1 to 10 GB.

Tuning the Oracle DatabaseOracle recommends that you tune the following parameters of your Oracle Database to improve performance with Network Intelligence:

■ Increase sequence intervals to 10,000

■ Upgrade dbms to 11.2.0.4.1

■ Replace existing redo logs with five 10 GB redo logs files

■ Set memory_target to 12 GB

■ Set filesystemio to SETALL

■ Set cursor_sharing to SIMILAR

■ Set open_cursors to 10,000

See your Oracle Database documentation for information about tuning the Oracle Database.

Load Balancing a Clustered ServerThe two methods for load balancing a clustered server include a hardware-based load balancer and a software-based proxy server.

Depending on the type of environment being deployed, do one of the following:

■ Configure the load balancer

■ Configure the proxy server

Configuring the Load BalancerThe requirement for the load balancer service is server affinity, also known as a sticky session. For example, a user starts a new session and it is load balanced to a server called Server 2. The subsequent HTTP requests in this session will always be routed to Server 2 until Server 2 fails.

Note: Oracle recommends using the hardware-based load balancer in production environments. Use either the hardware-based load balancer or the software-based proxy server in test or development environments.

Page 22: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

Load Balancing a Clustered Server

4-4 Network Intelligence System Administrator's Guide

For information on load balancer requirements, refer to the Oracle WebLogic document: Using WebLogic Server Clusters (see Load Balancing in a Cluster).

F5 BIG-IP Configuration ScenariosFor information about configuration scenarios, see the deployment guide Deploying the BIG-IP System with Oracle WebLogic Server, located at:

http://www.f5.com/pdf/deployment-guides/iapp-weblogic-dg.pdf

Cisco CSS 1150X Configuration ExampleThe following is an example configuration using Cisco CSS 1150X machines.

service netintel01port 8026protocol tcpstring netintel01keepalive type httpkeepalive maxfailure 2keepalive retryperiod 2keepalive uri "/inv"ip address 10.143.34.53 (netintel01 listening ip address)active

service netintel02port 8026protocol tcpstring netintel02keepalive type httpkeepalive maxfailure 2keepalive retryperiod 2keepalive uri "/inv"ip address 10.143.34.56 (netintel02 listening ip address)active

Owner testcontent NETINTELClusterip address 10.143.36.12protocol tcpport 8026add service netintel01add service netintel02advanced-balance arrowpoint-cookiebalance leastconnparam-bypass enableno persistentactive

Configuring the Proxy ServerThere are several options available for the proxy server. Refer to the Oracle WebLogic Server documentation for information on configuring the various proxy server options.

Page 23: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

5

Loading Data 5-1

5Loading Data

This chapter describes how to load data for Oracle Communications Network Intelligence.

See Network Intelligence Developer’s Guide for information about creating and implementing the data loader.

About Loading DataYou want the data in Network Intelligence to match the data in the inventory system. Loading data from the staging schema (the changes to the inventory system data) with the core schema (the Network Intelligence database) synchronizes the data in Network Intelligence with the data in the inventory system.

Managing how and when Network Intelligence loads inventory data is performed by a user with the Administrator role, working closely with the inventory users. See "Managing Network Intelligence Security" for more information about creating and managing users.

You can configure Network Intelligence to load inventory data incrementally or in bulk. See "Configuring How Network Intelligence Loads Data" for more information.

You can configure Network Intelligence to load data on a schedule. See "Configuring the Data Loading Schedule" for more information. Also, you can load data on demand. See "Loading Data On Demand" for more information.

You cannot undo a data load operation.

Configuring How Network Intelligence Loads DataYou can configure how Network Intelligence performs data loading:

■ Incrementally: Network Intelligence uploads only the changes since the last upload to the core schema.

■ In Bulk: Network Intelligence uploads all the data to the core schema, ignoring constraints and indexing.

By default, Network Intelligence loads data incrementally.

If you have a lot of data to load, bulk loading can be faster than incremental loading. For example, it would be faster to load data in bulk for the first data load to the core schema.

Caution: To avoid duplicating data entries in the core schema, clean the core schema before loading data in bulk.

Page 24: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

About Loading Data

5-2 Network Intelligence System Administrator's Guide

To configure how Network Intelligence loads data:

1. Open an SQL connection to the core schema.

2. Run the following SQL command:

update app_configuration set value = '{Y|N}' where property = 'BULK_MODE'

where:

■ Y indicates to load data in bulk.

■ N indicates to load data incrementally.

The BULK_MODE parameter value in the APP_CONFIGURATION database table is updated.

Configuring the Data Loading ScheduleYou can configure Network Intelligence to load data on a schedule. For example, if you want Network Intelligence to upload all inventory data changes that occurred during the week, you can schedule Network Intelligence to load data every Friday evening.

Loading data is an intensive process. Oracle recommends loading data during off-peak hours.

Network Intelligence loads data either incrementally or in bulk, depending on how Network Intelligence is configured. See "Configuring How Network Intelligence Loads Data" for more information.

To configure the data loading schedule:

1. Open the Network Intelligence administration page. See "Opening the Network Intelligence Administration Page" for more information.

2. From the Loader Admin menu, select Loader Schedules.

The administration Loader Job Schedule page appears.

3. Do one of the following:

■ If a schedule exists, select the schedule.

■ If no schedule exists, click Add.

The administration Loader Job Schedule Information page appears.

4. In the Start Date Time field, enter the start date and time for the data load.

5. (Optional) To set up a repeating schedule:

a. Select the Recurring check box.

b. From the Frequency Type list, select the recurring pattern: Daily, Weekly, Monthly, Quarterly, or Yearly.

6. Click Save.

Loading Data On DemandIf you cannot wait for the next scheduled data upload, you can load data on demand.

Note: You can configure only one data loading schedule.

Page 25: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

About Loading Data

Loading Data 5-3

Network Intelligence loads data either incrementally or in bulk, depending on how Network Intelligence is configured. See "Configuring How Network Intelligence Loads Data" for more information.

To load data on demand:

1. Open the Network Intelligence administration page. See "Opening the Network Intelligence Administration Page" for more information.

2. From the Loader Admin menu, select Loader Admin.

The administration Loader Status page appears.

3. Click Start Loader Job Now.

The Start Loader Job Now button is not available if Network Intelligence is in the process of loading data.

Page 26: Oracle Communications Network Intelligence System ... · 2-2 Network Intelligence System Administrator's Guide Figure 2–1 Network Intelligence Administration Welcome Page Starting

About Loading Data

5-4 Network Intelligence System Administrator's Guide