- #Cisco ise 2.4 high disk space utilization bug pdf
- #Cisco ise 2.4 high disk space utilization bug serial
- #Cisco ise 2.4 high disk space utilization bug upgrade
- #Cisco ise 2.4 high disk space utilization bug password
#58:Checking:Rabbitmq Queues with Unacknowledged messages #50:Checking:Checking if MongoDB is locked #49:Checking:Checking MongoDB CPU in docker stats #48:Checking:Checking MongoDB for Stale Connections from collector-manager #47:Checking:MongoDB Cluster Health and Sync Status #44:Checking:ETCD binding to loopback(localhost/127.0.0.1) #37:Checking:Checking Count of Scalable Groups, Contracts and Access Policies in DNAC DB #36:Checking:External authentication configured for DNAC users #34:Checking:Check Services for High Restart Counts #27:Checking:NTP Service status on the Cisco DNA Center #26:Checking:Expiry of truststore certificates #25:Checking:Certificate Validity and Expiry #24:Checking:check kernel logs for errors
#23:Checking:DCBX upstream causing tx drops #21:Checking:DNS server can resolve #22:Checking:NTP server Sync : #19:Checking:DNS config - /etc/network/interfaces #18:Checking:Number of /etc/nf entries (<=4) #17:Checking:Number of DNS servers configured in etcd on nodes (<=3)
#15:Checking:Interface Reachability - all nodes : #14:Checking:Cluster Node Reachability - nodes : #13:Checking:Version of Cisco DNA Center this was built from #09:Checking:Processor Cores Enabled and Status #08:Checking:DRAMs Installed in the appliance #06:Checking:Disk I/O throughput (>200MB/s) #05:Checking:Disk Space and iNodes Utilization #02:Checking:Determine Cisco DNA Center memberid
#Cisco ise 2.4 high disk space utilization bug serial
#01:Checking:Determine Cisco DNA Center Product Type, Serial number, SW Version & Node IP Here is a sample of some of the checks that are run: YouĬan choose 2 timestamps from previous captures taken c Compare configurations across multiple devices. Ensure you have theĬaptureFile.yaml in the same folder as this tool. o To collect CLI outputs from the network devices via d Perform all DNA Center Infrastructure Health checks Maglev admin user (webUI user, default is admin)
#Cisco ise 2.4 high disk space utilization bug password
Maglev admin password (this is the UI password for
#Cisco ise 2.4 high disk space utilization bug pdf
n N Add customer name to the PDF report on the first page
SR and password in the format sr_number:sr_password u U Upload report and logs file to the SR.
The tool will login to other devices in the fabric and h, -help show this help message and exit
#Cisco ise 2.4 high disk space utilization bug upgrade
Upgrade Readiness Checks (including bugs)ĭNA Center Scale (Fabric & Non Fabric scale parameters)Ĭapture CLI Outputs from the fabric devices and store locally on the DNA Center - command and device list provided via file captureFile.yamlĬompare configurations across multiple devices (based on outputs captured using -o option) SDA(Fabric Device CLI collection, Control Plane & Security Plane Audit and Compatibility Check) All relevant output logs for this run can also be found here : /data/tmp/dnac_aura/logs/_04:20:09īasic SDA Checks (Inventory check) DNAC-ISE Integration (only if ISE is integrated) Cisco DNA Center AURA tar file with all logs included : /data/tmp/dnac_aura/logs/DNAC_AURA_Logs_04:20:09.tar.gz Cisco DNA Center AURA Report : /data/tmp/dnac_aura/reports/DNAC_AURA_Report_04:20:09.pdf First ssh to DNAC.Ĭisco DNA Center AURA tool has successfully completed. This script needs to be downloaded onto Cisco DNA Center. This is used in the run_remote script, and can also be used for direct ssh connection as well as ansible To Download For an ssh connection, the "-o ServerAliveInterval=3" flag will send keepalives and maintain the session. This can impact AURA being run from an ssh session either directly on DNAC, or indirectly via the run_remote script or ansible, as the underlying ssh session will timeout, terminating AURA. Later versions (2.1+, 1.3.3.8+) of Cisco DNA Center have an ssh idle timeout. Note about remote execution (session timeout) The tool uses API calls, DB reads & show commands (read only operations) and hence, doesn't affect performance or cause impact to the DNA Center or the networking devices. The tool is extremely simple to run and is executed on the DNA Center. The Cisco DNA Center AURA (Audit & Upgrade Readiness) command line tool performs a variety of health, scale & upgrade readiness checks for the DNA Center and the rest of the Fabric network.