Gateway Alerts—Sample JSON
This section includes sample JSON JavaScript Object Notation. JSON is an open-standard, language-independent, lightweight data-interchange format used to transmit data objects consisting of attribute–value pairs. JSON uses a "self-describing" text format that is easy for humans to read and write, and that can be used as a data format by any programming language. content for the following alerts:

{ "id": "AXeDCfY2o68tULajXkth", "nid": 1358, "alert_type": "CONTROLLER BGP NEIGHBOR ROUTE LIMIT", "setting_id": "a847a3aea73d4ba7b34c00323fb9ee7a-1358", "device_id": "CV0012105", "description": "BGP neighbor 172.30.1.102 route limit exceeded on device MDC1-VPNC1-KSA-03_E1_A0(router_id=10.53.9.44, ASN=3002, serial=CV0012105, limit=1,action=warning)", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612811204, "details": { "serial": "CV0012105", "action": "warning", "hostname": "MDC1-VPNC1-KSA-03_E1_A0", "limit": "1", "nbr_addr": "172.30.1.102", "nbr_id": "10.53.9.44", "nbr_as": "3002", "group": "12", "time": "2021-02-08 19:06:44 UTC" }, "webhook": "f6f2b19a-31d5-445c-b340-eb1ca8a6fdd8", "text": "BGP neighbor 172.30.1.102 route limit exceeded on device MDC1-VPNC1-KSA-03_E1_A0(router_id=10.53.9.44, ASN=3002, serial=CV0012105, limit=1,action=warning)" } |

{ "id": "AXdnqE9jo68tULajSR8X", "nid": 1554, "alert_type": "CFG_SET_ADVERTISEMENT_FAILURE", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1554", "device_id": "BIM0010001", "description": "CFG-Set advertisement failure for Gateway BIM0010001 with serial BIM0010001 on tunnel default-local-vpnip-data-ipsecmap-00:1a:1e:04:27:48-link6 from 10.1.1.1 to 200.1.1.6", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612351819, "details": { "src_ip": "10.1.1.1", "dst_ip": "200.1.1.6", "alias_map_name": "default-local-vpnip-data-ipsecmap-00:1a:1e:04:27:48-link6", "map_name": "default-local-vpnip-data-ipsecmap-00:1a:1e:04:27:48-link6", "hostname": "BIM0010001", "serial": "BIM0010001", "group": "0", "labels": [], "time": "2021-02-03 11:30:19 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "CFG-Set advertisement failure for Gateway BIM0010001 with serial BIM0010001 on tunnel default-local-vpnip-data-ipsecmap-00:1a:1e:04:27:48-link6 from 10.1.1.1 to 200.1.1.6" } |

{ "id": "AXeCfcXbbbaB9p462rCU", "nid": 1355, "alert_type": "CONTROLLER BGP SESSION ERROR", "setting_id": "417fc95887044bcba9b3e2ce3830aecb-1355", "device_id": "DL0002986", "description": "BGP neighbor 103.1.1.2 is down (router-id=197.0.0.3, ASN=103, serial=DL0002986)", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612802016, "details": { "serial": "DL0002986", "nbr_addr": "103.1.1.2", "nbr_as": "103", "nbr_id": "197.0.0.3", "group": "57", "time": "2021-02-08 16:33:36 UTC" }, "webhook": "5cbc87e4-9eb5-45d2-b890-b21db89ca5b4", "text": "BGP neighbor 103.1.1.2 is down (router-id=197.0.0.3, ASN=103, serial=DL0002986)" } |

{ "id": "AXvSPh4-Kzxaq3kj2rgh7", "nid": 1701, "alert_type": "EST enrollment failure", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1504", "device_id": "CZ0003243", "description": " EST enrollment failure for Virtual Gateway with name : 7024-HF-254, serial :CZ0003243, mac :00:0b:86:f9:0d:d1.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1648194475, "details": { "mac": "00:0b:86:f9:0d:d1", "hostname": "7024-HF-254", "serial": "CZ0003243", "group": "6", "labels": "2", "_rule_number": "0", "params": "", "time": "2022-03-25 13:17:51 UTC" }, "webhook": "87fae42a-78ec-45c0-a22a-4f81417cad56", "text": "EST enrollment failure for Virtual Gateway with name : 7024-HF-254, serial :CZ0003243, mac :00:0b:86:f9:0d:d1." } |

{ "id": "AXdi7ppYo68tULajRVeA", "nid": 1351, "alert_type": "CONTROLLER_CPU_OVER_UTILIZATION", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1351", "device_id": "CNJJKLB0HB", "description": "CPU utilization for Gateway WTH_9004-2 with serial CNJJKLB0HB has been above 10% for about 5 minutes since 2021-02-02 13:24:00 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612272540, "details": { "name": "WTH_9004-2", "unit": "%", "serial": "CNJJKLB0HB", "group": "36", "labels": "8", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.CNJJKLB0HB.cpu_utilization.5m", "duration": "5", "threshold": "10", "time": "2021-02-02 13:24:00 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "CPU utilization for Gateway WTH_9004-2 with serial CNJJKLB0HB has been above 10% for about 5 minutes since 2021-02-02 13:24:00 UTC." } |

{ "id": "AXdjJsYpo68tULajRXTU", "nid": 1353, "alert_type": "CONTROLLER_EMERGENCY_UP_LINK_MODE", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1353", "device_id": "BIM0010002", "description": "Gateway BIM0010002 with serial BIM0010002 is operating on emergency mode at 2021-02-02 14:30:21 UTC", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612276221, "details": { "name": "BIM0010002", "serial": "BIM0010002", "group": "0", "labels": [], "time": "2021-02-02 14:30:21 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Gateway BIM0010002 with serial BIM0010002 is operating on emergency mode at 2021-02-02 14:30:21 UTC" } |

{ "id": "AXeBVwDSXFtba20Mo_fm", "nid": 1702, "alert_type": "VGW_HEALTH_STATE_CHANGE_DETECTED", "setting_id": "417fc95887044bcba9b3e2ce3830aecb-1702", "device_id": "VG2101216619", "description": "VGW VM DOWN -- User: jagwani.karan+aruba@gmail.com Cloud-Account: Karan-Azure Cloud-Provider: Azure Region-Id: canadacentral VPC-Id: /karan_res_canada/canadavnet VM-Id: /subscriptions/2bf1e338-5361-470d-bcba-78c50b2b7f16/resourceGroups/karan_res_canada/providers/Microsoft. Compute/virtualMachines/ArubaVGW-92-1A-3A Serial-Number: VG2101216619 Mac-Address: 02:1A:1E:92:1A:3A", "state": "Open", "severity": "Major", "operation": "create", "timestamp": 1612782698, "details": { "account_id": "4c0116d9-a26b-4b4b-8be0-350631e434be", "mac": "02:1A:1E:92:1A:3A", "serial": "VG2101216619", "vm_id": "/subscriptions/2bf1e338-5361-470d-bcba-78c50b2b7f16/resourceGroups/karan_res_canada /providers/Microsoft.Compute/virtualMachines/ArubaVGW-92-1A-3A", "account_name": "Karan-Azure", "region_id": "canadacentral", "customer_name": "jagwani.karan+aruba@gmail.com", "health": "DOWN", "vpc_id": "/karan_res_canada/canadavnet", "provider_name": "Azure", "customer_id": "417fc95887044bcba9b3e2ce3830aecb", "time": "2021-02-08 11:11:38 UTC" }, "webhook": "5cbc87e4-9eb5-45d2-b890-b21db89ca5b4", "text": "VGW VM DOWN -- User: jagwani.karan+aruba@gmail.com Cloud-Account: Karan-Azure Cloud-Provider: Azure Region-Id: canadacentral VPC-Id: /karan_res_canada/canadavnet VM-Id: /subscriptions/2bf1e338-5361-470d-bcba-78c50b2b7f16/resourceGroups/karan_res_canada/providers/Microsoft. Compute/virtualMachines/ArubaVGW-92-1A-3A Serial-Number: VG2101216619 Mac-Address: 02:1A:1E:92:1A:3A" } |

{ "id": "AXvSPh4-Kzxaq3kj2rgh7", "nid": 1504, "alert_type": "WAN_UPLINK_LOAD_BALANCE_VPNC_PEER_FAILOVER", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1504", "device_id": "CZ0003243", "description": " VPN peer failover for gateway 7024-HF-254 with serial CZ0003243", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1648061695, "details": { "mac": "00:0b:86:f9:0d:d1", "hostname": "7024-HF-254", "serial": "CZ0003243", "group": "6", "labels": "2", "_rule_number": "0", "params": "", "time": "2022-03-23 00:24:51 UTC" }, "webhook": "87fae42a-78ec-45c0-a22a-4f81417cad56", "text": "VPN peer failover for gateway 7024-HF-254 with serial CZ0003243" } |

{ "id": "AXdiyfwQo68tULajRTiG", "nid": 1352, "alert_type": "CONTROLLER_MEMORY_OVER_UTILIZATION", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1352", "device_id": "CNJJKLB0G6", "description": "Memory utilization for Gateway WTH_9004-1 with serial CNJJKLB0G6 has been above 30% for about 30 minutes since 2021-02-02 12:19:00 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612270140, "details": { "name": "WTH_9004-1", "unit": "%", "serial": "CNJJKLB0G6", "group": "36", "labels": "8", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.CNJJKLB0G6.memory_utilization.5m", "duration": "30", "threshold": "30", "time": "2021-02-02 12:19:00 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Memory utilization for Gateway WTH_9004-1 with serial CNJJKLB0G6 has been above 30% for about 30 minutes since 2021-02-02 12:19:00 UTC." } |

{ "alert_type": "CONTROLLER OSPF SESSION ERROR", "description": "OSPF session state change for Gateway with hostname GSK_VPNC2 and serial CW0003307 from Init State to Down State for neighbor 1.0.0.2 on interface 100 with reason No hello packets received from neighbour.Inactivity timer fired", "timestamp": 1564121712, "webhook": "60785e88-9513-4352-94d6-ec25fedbeddc", "setting_id": "b27f67fa44234c51a890fccea7c9b83e-1354", "state": "Open", "nid": 1354, "details": { "dst_state": "Down State", "neighbour_ip": "1.0.0.2", "group": "4", "uniq_identifier": "100-16777218", "labels": [ "2", "11", "12", "15", "13", "8" ], "src_state": "Init State", "reason": "No hello packets received from neighbour.Inactivity timer fired", "time": "2019-07-26 06:15:12 UTC", "interface": "100", "serial": "CW0003307", "hostname": "GSK_VPNC2" }, "operation": "create", "device_id": "CW0003307", "id": "AWws60Yxon2R5PyMmUU4", "severity": "Major" } |

{ "alert_type": "DHCP_POOL_CONSUMPTION_ALERT", "description": "DHCP Pool Consumption on Gateway CNHHKLB031 is 12% at 2019-07-25 13:02:39 UTC for 192.168.53.0/24", "timestamp": 1564059759, "webhook": "394c7a3c-ca41-4476-8afc-857e54aa4b3b", "setting_id": "abce082bef4a428bb31366f6d6ff223f-1510", "state": "Open", "nid": 1510, "details": { "subnet": "192.168.53.0/24", "group": "77", "name": "None", "labels": "8,661", "time": "2019-07-25 13:02:39 UTC", "threshold": "12", "serial": "CNHHKLB031", "unit": "%" }, "operation": "create", "device_id": "CNHHKLB031", "id": "AWwpOfQAVQO1ZtiGiE2H", "severity": "Critical" } |

{ "ack_by": null, "ack_ts": 1579828824000, "acknowledge": 0, "cid": "201804172180", "description": "SLA DPS Compliance Violations for Customer : aruba, Device Hostname : bg2-ha2, Policy : all, Uplink : 400_lte, Probe Ip: 52.52.253.87, Threshold Profile : {u'dps_threshold_profile_name': u'BestForInternet', u'dps_threshold_profile_packet_loss_value': 1, u'dps_threshold_profile_bw_util_value': 80, u'dps_threshold_profile_latency_value': 1}, Violation Reason: Latency, Violation Value: 1.363ms", "group_name": "", "id": "AW_VItEnenGOhQ4XrMp_", "labels": [], "nid": 20, "severity": 5, "sites": [ { "id": 38, "name": "site_2" } ], "ts": 1579828824000, "type": "DPS_COMPLIANCE_ALERT", "type_desc": "SLA DPS Compliance Violations" } |

{ "id": "AXd9xwjio68tULajWyCm", "nid": 1802, "alert_type": "GATEWAY_CONNECTED_TO_CLUSTER", "setting_id": "abce082bef4a428bb31366f6d6ff223f-1802", "device_id": "None", "description": "Gateway with name: c2c-7010-4-1 and serial: CG0020729 joined cluster: C2C-253-YODA.", "state": "Open", "severity": "Warning", "operation": "create", "timestamp": 1612722931, "details": { "group": "278", "labels": [], "name": "c2c-7010-4-1", "serial": "None", "gateway": "CG0020729", "cluster_name": "C2C-253-YODA", "alert_key": "CG0020729", "time": "2021-02-07 18:35:31 UTC" }, "webhook": "52e0abbd-cdda-45f2-bd68-3107fef43841", "text": "Gateway with name: c2c-7010-4-1 and serial: CG0020729 joined cluster: C2C-253-YODA." } |

{ "id": "AXd9vPKro68tULajWxzi", "nid": 1803, "alert_type": "GATEWAY_DISCONNECTED_FROM_CLUSTER", "setting_id": "abce082bef4a428bb31366f6d6ff223f-1803", "device_id": "54", "description": "Gateway with name: c2c-7010-4-1 and serial: CG0020729 left cluster: C2C-253-YODA.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612722270, "details": { "group": "278", "labels": [], "name": "c2c-7010-4-1", "serial": "54", "gateway": "CG0020729", "cluster_name": "C2C-253-YODA", "alert_key": "CG0020729", "time": "2021-02-07 18:24:30 UTC" }, "webhook": "52e0abbd-cdda-45f2-bd68-3107fef43841", "text": "Gateway with name: c2c-7010-4-1 and serial: CG0020729 left cluster: C2C-253-YODA." } |

{ "id": "AXd9wglqo68tULajWx7a", "nid": 1804, "alert_type": "GATEWAY_CLUSTER_LEADER_CHANGE", "setting_id": "abce082bef4a428bb31366f6d6ff223f-1804", "device_id": "54", "description": "Gateway with name: c2c-7010-3 and serial: CG0021234 became the leader of cluster: C2C-253-YODA.", "state": "Open", "severity": "Minor", "operation": "create", "timestamp": 1612722604, "details": { "group": "278", "labels": [], "name": "c2c-7010-3", "serial": "54", "gateway": "CG0021234", "cluster_name": "C2C-253-YODA", "alert_key": "CG0021234", "time": "2021-02-07 18:30:04 UTC" }, "webhook": "52e0abbd-cdda-45f2-bd68-3107fef43841", "text": "Gateway with name: c2c-7010-3 and serial: CG0021234 became the leader of cluster: C2C-253-YODA." } |

{ "id": "AXvSPh4-Kzxaq3kj2rgh7", "nid": 1805, "alert_type": "GATEWAY_CLUSTER_CLIENT_CAPACITY_EXCEEDED", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1805", "device_id": "CZ0003243", "description": " Client Capacity for Gateway Cluster C2C-254 has been above 90% for about 30 minutes since 2022-03-24 16:14:00 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1648095240, "details": { "mac": "00:0b:86:f9:0d:d1", "hostname": "7024-HF-254", "serial": "CZ0003243", "group": "6", "labels": "2", "_rule_number": "0", "params": "", "time": "2021-09-11 00:24:51 UTC" }, "webhook": "87fae42a-78ec-45c0-a22a-4f81417cad56", "text": "Client Capacity for Gateway Cluster C2C-254 has been above 90% for about 30 minutes since 2022-03-24 16:14:00 UTC" } |

{ "id": "AXdr-dsfo68tULajS0bj", "nid": 1356, "alert_type": "GATEWAY_BASE_LICENSE_CAPACITY_EXCEEDED", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1356", "device_id": "SCA0000073", "description": "Base license capacity limit exceeded for Gateway with name: CSIM_SCA0000073, serial: SCA0000073", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612424272, "details": { "group": "0", "labels": [], "name": "CSIM_SCA0000073", "serial": "SCA0000073", "time": "2021-02-04 07:37:52 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Base license capacity limit exceeded for Gateway with name: CSIM_SCA0000073, serial: SCA0000073" } |

{ "alert_type": "GW_IDS_IPS_ALERT_THREAT_OVER_A_PERIOD", "id": "AXX7N0IhaFBUFq6FQ2R1", "nid": 2305, "setting_id": "8fc0df01a43b42aa9f8e9fbc3d3b9d35-2305", "device_id": "TWJ6KSP005", "description": "Dear Incident Manager, Your Aruba Central Portal admin configured an email alert notification to be sent to this email address Why this alert? Aruba Branch Gateway https://app-yoda.arubathena.com/frontend/#/GATEWAYDETAIL/OVERVIEW/TWJ6KSP005aruba9004 _lte with serial number TWJ6KSP005exceeded 50 threat events in last 10 minutes, triggering this CRITICAL Alert notification What is next? Reach out to your Aruba Central Portal admin to address this incident .If not addressed or if the situation escalates, you may continue to receive similar alert notifications. More Information Go to https://app-yoda.arubathena.com/frontend/#/IDPS_DASHBOARDSystem Generated Email from Aruba Central based on alert configuration; do not reply Thanks, Aruba Central", "state": "Close", "severity": "Critical", "operation": "update", "timestamp": 1606238738, "details__threshold": 50, "details__agg_field_name": "device", "details__duration": 10, "details__device": "TWJ6KSP005", "details__severity": "CRITICAL", "details__rule_id": 0, "details__serial": "TWJ6KSP005", "details__name": "aruba9004_lte", "details__group_id": 73, "details__time": "2020-11-24 16:55:04 UTC", "webhook": "001378a5-bfb1-465e-a955-0034ef801136", "text": "Dear Incident Manager, Your Aruba Central Portal admin configured an email alert notification to be sent to this email address Why this alert? Aruba Branch Gateway https://app-yoda.arubathena.com/frontend/#/GATEWAYDETAIL/OVERVIEW/TWJ6KSP005aruba9004 _lte with serial number TWJ6KSP005exceeded 50 threat events in last 10 minutes, triggering this CRITICAL Alert notification What is next? Reach out to your Aruba Central Portal admin to address this incident. If not addressed or if the situation escalates, you may continue to receive similar alert notifications. More Information Go to https://app-yoda.arubathena.com/frontend/#/IDPS_DASHBOARDSystem Generated Email from Aruba Central based on alert configuration; do not reply Thanks, Aruba Central" } |

{ "id": "AXdmLPpwo68tULajSCh_", "nid": 303, "alert_type": "GATEWAY_DISCONNECTED", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-303", "device_id": "CNJJKLB0NZ", "description": "Gateway WTH-9004-3 with serial CNJJKLB0NZ, MAC address 20:4c:03:b1:e0:22 and IP address 192.168.142.2 disconnected. , Group:UTM, Site:UTM", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612326959, "details": { "params": [ "CNJJKLB0NZ", "20:4c:03:b1:e0:22", "192.168.142.2", "WTH-9004-3", "", "" ], "group": "36", "ts": "1612326547369", "labels": "8", "serial": "CNJJKLB0NZ", "conn_status": "disconnected", "time": "2021-02-03 04:35:59 UTC", "group_name": "UTM", "site_name": "UTM" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Gateway WTH-9004-3 with serial CNJJKLB0NZ, MAC address 20:4c:03:b1:e0:22 and IP address 192.168.142.2 disconnected. , Group:UTM, Site:UTM" } |

{ "id": "AXdr6Yf3o68tULajSz4Y", "nid": 2306, "alert_type": "GW_IDS_IPS_ALERT_THREAT_SID_OVER_A_PERIOD", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-2306", "device_id": "2821300", "description": "Dear Incident Manager,<br/>Your <b>Aruba Central Portal</b> admin configured an email alert notification to be sent to this email address <br/><br/><b>Why this alert?</b><br/>Threat events of signature id <b>2821300</b> exceeded the threshold <b>50</b> in last <b>30</b> minutes, triggering this <b>CRITICAL</b> Alert notification. <br/><br/><b>What is next? </b><br/>Reach out to your <b>Aruba Central Portal</b> admin to address this incident.<br/>If not addressed or if the situation escalates, you may continue to receive similar alert notifications. <br/><br/><b>More Information</b> <br/>Go to \"https://app-yoda.arubathena.com/frontend/#/IDPS_DASHBOARD\" <br/><br/><i>System Generated Email from Aruba Central based on alert configuration; do not reply.</i> <br/><br/>Thanks,<br/><br/>Aruba Central", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612423202, "details": { "threshold": "50", "agg_field_name": "signature", "duration": "30", "signature": "2821300", "severity": "CRITICAL", "rule_id": "0", "serial": "2821300", "time": "2021-02-04 06:50:02 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Dear Incident Manager,<br/>Your <b>Aruba Central Portal</b> admin configured an email alert notification to be sent to this email address <br/><br/><b>Why this alert?</b><br/>Threat events of signature id <b>2821300</b> exceeded the threshold <b>50</b> in last <b>30</b> minutes, triggering this <b>CRITICAL</b> Alert notification. <br/><br/><b>What is next? </b><br/>Reach out to your <b>Aruba Central Portal</b> admin to address this incident.<br/>If not addressed or if the situation escalates, you may continue to receive similar alert notifications. <br/><br/><b>More Information</b> <br/>Go to \"https://app-yoda.arubathena.com/frontend/#/IDPS_DASHBOARD\" <br/><br/><i>System Generated Email from Aruba Central based on alert configuration; do not reply.</i> <br/><br/>Thanks,<br/><br/>Aruba Central" } |

{ "id": "AXdq-8_vo68tULajSqJi", "nid": 2301, "alert_type": "GW_IDS_IPS_ENGINE_ERROR_STATE_ALERT", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-2301", "device_id": "CNJJKLB0G6", "description": "IDS/IPS engine on Gateway WTH_9004-1 with serial CNJJKLB0G6 has moved to an error (Stopped) state.", "state": "Close", "severity": "Critical", "operation": "update", "timestamp": 1612407706, "details": { "serial": "CNJJKLB0G6", "hostname": "WTH_9004-1", "state": "Stopped", "time": "2021-02-04 03:00:23 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "IDS/IPS engine on Gateway WTH_9004-1 with serial CNJJKLB0G6 has moved to an error (Stopped) state." } |

{ "id": "AXdq9flmo68tULajSqDN", "nid": 2302, "alert_type": "GW_IDS_IPS_ENGINE_CPU_OVER_UTILIZATION", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-2302", "device_id": "CNJJKLB0HB", "description": "CPU utilization for IDS/IPS engine on Gateway WTH_9004-2 with serial CNJJKLB0HB has been above 10% for about 11 minutes since 2021-02-04 02:43:01 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612407241, "details": { "name": "WTH_9004-2", "unit": "%", "serial": "CNJJKLB0HB", "group": "36", "labels": "8", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.CNJJKLB0HB.idps.cpu.5m", "duration": "11", "threshold": "10", "time": "2021-02-04 02:43:01 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "CPU utilization for IDS/IPS engine on Gateway WTH_9004-2 with serial CNJJKLB0HB has been above 10% for about 11 minutes since 2021-02-04 02:43:01 UTC." } |

{ "id": "AXdq9fkVo68tULajSqDL", "nid": 2303, "alert_type": "GW_IDS_IPS_ENGINE_MEMORY_OVER_UTILIZATION", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-2303", "device_id": "CNJJKLB0HB", "description": "Memory utilization for IDS/IPS engine on Gateway WTH_9004-2 with serial CNJJKLB0HB has been above 2% for about 5 minutes since 2021-02-04 02:49:00 UTC.", "state": "Open", "severity": "Minor", "operation": "create", "timestamp": 1612407240, "details": { "name": "WTH_9004-2", "unit": "%", "serial": "CNJJKLB0HB", "group": "36", "labels": "8", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.CNJJKLB0HB.idps.mem.5m", "duration": "5", "threshold": "2", "time": "2021-02-04 02:49:00 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Memory utilization for IDS/IPS engine on Gateway WTH_9004-2 with serial CNJJKLB0HB has been above 2% for about 5 minutes since 2021-02-04 02:49:00 UTC." } |

{ "id": "AXdr8CPmo68tULajS0K8", "nid": 2304, "alert_type": "GW_IDS_IPS_ENGINE_PACKET_DROPPED_DETECTED", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-2304", "device_id": "SCA0000004", "description": "Packet drop for IDS/IPS engine on Gateway CSIM_SCA0000004 with serial SCA0000004 has been above 75% for about 5 minutes since 2021-02-04 07:22:15 UTC.", "state": "Open", "severity": "Minor", "operation": "create", "timestamp": 1612423635, "details": { "name": "CSIM_SCA0000004", "serial": "SCA0000004", "threshold": "75", "duration": "5", "time": "2021-02-04 07:22:15 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Packet drop for IDS/IPS engine on Gateway CSIM_SCA0000004 with serial SCA0000004 has been above 75% for about 5 minutes since 2021-02-04 07:22:15 UTC." } |

{ "id": "AXd9rMzXo68tULajWxbZ", "nid": 1801, "alert_type": "GW_CLUSTER_VLAN_MISMATCH", "setting_id": "abce082bef4a428bb31366f6d6ff223f-1801", "device_id": "54", "description": "There is a VLAN mismatch in cluster C2C-253-YODA between Gateway with serial: CG0020729 and Gateway with serial: CG0021234.", "state": "Close", "severity": "Minor", "operation": "update", "timestamp": 1612722281, "details": { "gateway2": "CG0021234", "gateway1": "CG0020729", "serial": "54", "alert_key": "CG0020729-CG0021234", "time": "2021-02-07 18:06:52 UTC", "cluster-name": "C2C-253-YODA", "group": "278", "labels": [] }, "webhook": "52e0abbd-cdda-45f2-bd68-3107fef43841", "text": "There is a VLAN mismatch in cluster C2C-253-YODA between Gateway with serial: CG0020729 and Gateway with serial: CG0021234." } |

{ "id": "AXd96oFqo68tULajWy28", "nid": 301, "alert_type": "NEW_GATEWAY_DETECTED", "setting_id": "abce082bef4a428bb31366f6d6ff223f-301", "device_id": "CP0021763", "description": "New Gateway GSK-7005-2 with serial CP0021763, MAC address 20:4c:03:11:eb:78 and IP address 172.168.1.1 connected, Group:unprovisioned", "state": "Open", "severity": "Warning", "operation": "create", "timestamp": 1612725256, "details": { "group": "1", "labels": "", "_rule_number": "0", "params": [ "CP0021763", "20:4c:03:11:eb:78", "172.168.1.1", "GSK-7005-2" ], "serial": "CP0021763", "time": "2021-02-07 19:14:16 UTC", "group_name": "unprovisioned" }, "webhook": "52e0abbd-cdda-45f2-bd68-3107fef43841", "text": "New Gateway GSK-7005-2 with serial CP0021763, MAC address 20:4c:03:11:eb:78 and IP address 172.168.1.1 connected, Group:unprovisioned" } |

{ "id": "AXeC5dlWo68tULajXiwK", "nid": 1359, "alert_type": "CONTROLLER OAP CONNECTION", "setting_id": "a847a3aea73d4ba7b34c00323fb9ee7a-1359", "device_id": "CP0048220", "description": "Overlay Route Orchestrator control connection is down for Legacy2.0-BGW1-A7005-39_82_AC (serial=CP0048220)", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612808837, "details": { "hostname": "Legacy2.0-BGW1-A7005-39_82_AC", "serial": "CP0048220", "group": "22", "time": "2021-02-08 18:27:17 UTC" }, "webhook": "f6f2b19a-31d5-445c-b340-eb1ca8a6fdd8", "text": "Overlay Route Orchestrator control connection is down for Legacy2.0-BGW1-A7005-39_82_AC (serial=CP0048220)" } |

{ "id": "AXeEaOYlo68tULajX4gT", "nid": 1357, "alert_type": "CONTROLLER ROUTE TABLE CAPACITY", "setting_id": "a847a3aea73d4ba7b34c00323fb9ee7a-1357", "device_id": "CP0059047", "description": "Routing table for device Legacy-2.1-BGW2-A7005_5F_9A_2A exceeded threshold(serial=CP0059047, IP=111.1.10.1, count=3463, max=4096)", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612834203, "details": { "serial": "CP0059047", "ip_address": "111.1.10.1", "count": "3463", "hostname": "Legacy-2.1-BGW2-A7005_5F_9A_2A", "max": "4096", "group": "21", "time": "2021-02-09 01:30:03 UTC" }, "webhook": "f6f2b19a-31d5-445c-b340-eb1ca8a6fdd8", "text": "Routing table for device Legacy-2.1-BGW2-A7005_5F_9A_2A exceeded threshold(serial=CP0059047, IP=111.1.10.1, count=3463, max=4096)" } |

{ "id": "AXeCfX4pPppb5nv9WSDi", "nid": 1357, "alert_type": "CONTROLLER ROUTE TABLE CAPACITY", "setting_id": "417fc95887044bcba9b3e2ce3830aecb-1357", "device_id": "DL0003539", "description": "Routing table for device DC3_VPNC8_7240XM exceeded threshold (serial=DL0003539, IP=2.3.1.5, count=29268, max=32768)", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612801998, "details": { "serial": "DL0003539", "ip_address": "2.3.1.5", "count": "29268", "hostname": "DC3_VPNC8_7240XM", "max": "32768", "group": "57", "time": "2021-02-08 16:33:18 UTC" }, "webhook": "5cbc87e4-9eb5-45d2-b890-b21db89ca5b4", "text": "Routing table for device DC3_VPNC8_7240XM exceeded threshold (serial=DL0003539, IP=2.3.1.5, count=29268, max=32768)" } |

{ "id": "AXdnjuvwo68tULajSQyc", "nid": 1506, "alert_type": "WAN_UPLINK_AUTONEGOTIATION_STATE_CHANGE", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1506", "device_id": "CNJJKLB0NZ", "description": "WAN ports autonegotiaton speed changed from 1000 Mbps to Auto Mbps for device WTH-9004-3 with serial CNJJKLB0NZ for uplink GE0/0/1 at 2021-02-03 11:02:35 UTC", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612350155, "details": { "intf_name": "GE0/0/1", "speed": "1000", "new_speed": "Auto", "hostname": "WTH-9004-3", "serial": "CNJJKLB0NZ", "group": "36", "labels": [ "8" ], "time": "2021-02-03 11:02:35 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "WAN ports autonegotiaton speed changed from 1000 Mbps to Auto Mbps for device WTH-9004-3 with serial CNJJKLB0NZ for uplink GE0/0/1 at 2021-02-03 11:02:35 UTC" } |

{ "id": "AXdk2LK6o68tULajRvY4", "nid": 1501, "alert_type": "WAN_UPLINK_REACHABILITY_HEALTH_CHECK_IP_FAILED", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1501", "device_id": "CNJJKLB0HB", "description": "WAN reachability check failed for Gateway WTH_9004-2 with serial CNJJKLB0HB to Health Check IP 52.52.253.87 on uplink inet2_inet. Default-gateway is reachable.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612304659, "details": { "default_gw_status": "reachable", "intf_name": "inet2_inet", "ip": "52.52.253.87", "hostname": "WTH_9004-2", "serial": "CNJJKLB0HB", "group": "36", "labels": [ "8" ], "time": "2021-02-02 22:24:19 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "WAN reachability check failed for Gateway WTH_9004-2 with serial CNJJKLB0HB to Health Check IP 52.52.253.87 on uplink inet2_inet. Default-gateway is reachable." } |

{ "id": "AXdncVpfo68tULajSPzi", "nid": 1502, "alert_type": "WAN_UPLINK_REACHABILITY_VPN_PEER_FAILED", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1502", "device_id": "CNJJKLB0HB", "description": "WAN reachability check failed for Gateway WTH_9004-2 with serial CNJJKLB0HB to VPN peer 192.168.103.99 on uplink inet2_inet. Default-gateway is unreachable.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612348217, "details": { "ip": "192.168.103.99", "intf_name": "inet2_inet", "default_gw_status": "unreachable", "hostname": "WTH_9004-2", "serial": "CNJJKLB0HB", "group": "36", "labels": [ "8" ], "time": "2021-02-03 10:30:17 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "WAN reachability check failed for Gateway WTH_9004-2 with serial CNJJKLB0HB to VPN peer 192.168.103.99 on uplink inet2_inet. Default-gateway is unreachable." } |

{ "id": "AXdnjgBlo68tULajSQwz", "nid": 1505, "alert_type": "WAN_UPLINK_STATUS_CHANGE", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1505", "device_id": "CNJJKLB0NZ", "description": "Uplink port inet_inet status change UP -> DOWN for device WTH-9004-3 with serial CNJJKLB0NZ at 2021-02-03 11:01:35 UTC", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612350095, "details": { "intf_name": "inet_inet", "status": "UP", "current_status": "DOWN", "uplink_tag": "inet_inet", "hostname": "WTH-9004-3", "serial": "CNJJKLB0NZ", "group": "36", "labels": [ "8" ], "time": "2021-02-03 11:01:35 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Uplink port inet_inet status change UP -> DOWN for device WTH-9004-3 with serial CNJJKLB0NZ at 2021-02-03 11:01:35 UTC" } |

{ "id": "AXe2GwY1o68tULajexWO", "nid": 1600, "alert_type": "WAN_UPLINK_FLAP", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1600", "device_id": "CNJJKLB0G6", "description": "Uplink inet_inet link status flapped 1% on device WTH_9004-1 with serial CNJJKLB0G6 for about 15 minutes since 2021-02-18 16:51:00 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1613667960, "details": { "intf_name": "inet_inet", "status": "DOWN", "current_status": "UP", "uplink_tag": "inet_inet", "hostname": "WTH_9004-1", "unit": "%", "serial": "CNJJKLB0G6", "group": "36", "labels": "8", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.CNJJKLB0G6.uplink.flap.5m", "duration": "15", "threshold": "1", "time": "2021-02-18 16:51:00 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Uplink inet_inet link status flapped 1% on device WTH_9004-1 with serial CNJJKLB0G6 for about 15 minutes since 2021-02-18 16:51:00 UTC." } |

{ "id": "AXe2H5oGo68tULajexfD", "nid": 1601, "alert_type": "WAN_TUNNEL_FLAP", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1601", "device_id": "CNJJKLB0G6", "description": "Tunnel WTH_9004-1:inet_inet::GSK_VPNC2:vlan103 status flapped 1% on device WTH_9004-1 with serial CNJJKLB0G6 for about 15 minutes since 2021-02-18 16:56:00 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1613668260, "details": { "src_ip": "192.168.32.10", "dst_ip": "192.168.103.99", "alias_map_name": "WTH_9004-1:inet_inet::GSK_VPNC2:vlan103", "uplink_tag": "inet_inet", "hostname": "WTH_9004-1", "unit": "%", "serial": "CNJJKLB0G6", "group": "36", "labels": "8", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.CNJJKLB0G6.uplink.tunnel.flap.5m", "duration": "15", "threshold": "1", "time": "2021-02-18 16:56:00 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "Tunnel WTH_9004-1:inet_inet::GSK_VPNC2:vlan103 status flapped 1% on device WTH_9004-1 with serial CNJJKLB0G6 for about 15 minutes since 2021-02-18 16:56:00 UTC." } |

{ "id": "AXdi4-5Bo68tULajRU_R", "nid": 1550, "alert_type": "WAN_IPSEC_SA_ESTABILSHMENT_FAILED", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1550", "device_id": "CNJJKLB0NZ", "description": "IPSec Tunnel Establishment from 192.168.36.10 to 192.168.103.99 failed on device WTH-9004-3 with serial CNJJKLB0NZ at 2021-02-02 13:17:20 UTC", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612271840, "details": { "src_ip": "192.168.36.10", "dst_ip": "192.168.103.99", "alias_map_name": "WTH-9004-3:inet_inet::GSK_VPNC2:vlan103", "link_tag": "inet_inet", "hostname": "WTH-9004-3", "serial": "CNJJKLB0NZ", "group": "36", "labels": [ "8" ], "time": "2021-02-02 13:17:20 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "IPSec Tunnel Establishment from 192.168.36.10 to 192.168.103.99 failed on device WTH-9004-3 with serial CNJJKLB0NZ at 2021-02-02 13:17:20 UTC" } |

{ "id": "AXdi4Qjgo68tULajRUzp", "nid": 1551, "alert_type": "WAN_IPSEC_SA_DOWN", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1551", "device_id": "CNJJKLB0G6", "description": "IPSec tunnel WTH_9004-1:inet2_inet::GSK_VPNC2:vlan103 from 192.168.31.10 to 192.168.103.99 is DOWN on device WTH_9004-1 with serial CNJJKLB0G6. Reason: Administrator cleared IPSEC SA at 2021-02-02 13:14:11 UTC", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612271651, "details": { "src_ip": "192.168.31.10", "dst_ip": "192.168.103.99", "reason": "Administrator cleared IPSEC SA", "alias_map_name": "WTH_9004-1:inet2_inet::GSK_VPNC2:vlan103", "uplink_tag": "inet2_inet", "hostname": "WTH_9004-1", "serial": "CNJJKLB0G6", "group": "36", "labels": [ "8" ], "time": "2021-02-02 13:14:11 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "IPSec tunnel WTH_9004-1:inet2_inet::GSK_VPNC2:vlan103 from 192.168.31.10 to 192.168.103.99 is DOWN on device WTH_9004-1 with serial CNJJKLB0G6. Reason: Administrator cleared IPSEC SA at 2021-02-02 13:14:11 UTC" } |

{ "id": "AXdi4Qoyo68tULajRUzs", "nid": 1552, "alert_type": "WAN_IPSEC_SA_ALL_DOWN", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1552", "device_id": "CNJJKLB0G6", "description": "All IPSec SAs down for device WTH_9004-1 with serial CNJJKLB0G6 at 2021-02-02 13:14:11 UTC", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1612271651, "details": { "hostname": "WTH_9004-1", "serial": "CNJJKLB0G6", "group": "36", "labels": [ "8" ], "time": "2021-02-02 13:14:11 UTC" }, "webhook": "a82456c8-1402-4fe1-a195-0131e6b392ee", "text": "All IPSec SAs down for device WTH_9004-1 with serial CNJJKLB0G6 at 2021-02-02 13:14:11 UTC" } |

{ "id": "AXuqDamDKFHq3kj2qihO", "nid": 1511, "alert_type": "CELLULAR_DATA_USAGE", "setting_id": "082445a5b8264597bce334f932c9a3a4-1511", "device_id": "TWJCKSP01C", "description": "Cellular data usage 11 MB has exceeded the configured limit 1 MB for Gateway Aruba9004-LTE with serial TWJCKSP01C", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1630645627, "details": { "usage": "11 MB", "limit": "1 MB", "name": "Aruba9004-LTE", "serial": "TWJCKSP01C", "group": "6", "labels": [], "time": "2021-09-03 05:07:07 UTC" }, "webhook": "a7b7f0de-2465-4340-b491-d9ea676326f3", "text": "Cellular data usage 11 MB has exceeded the configured limit 1 MB for Gateway Aruba9004-LTE with serial TWJCKSP01C" } |

{ "id": "AXvSPh4-KFHq3kj2rcg9", "nid": 2201, "alert_type": "GW_FW_UPGRADE_FAILURE", "setting_id": "082445a5b8264597bce334f932c9a3a4-2201", "device_id": "", "description": "Firmware upgrade failed for gateway (NAME Aruba9004-LTE_95_EA_76 SN MAC 20:4c:03:95:ea:76)", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1631319891, "details": { "mac": "20:4c:03:95:ea:76", "hostname": "Aruba9004-LTE_95_EA_76", "serial": "", "group": "6", "labels": "", "_rule_number": "0", "params": "", "time": "2021-09-11 00:24:51 UTC" }, "webhook": "87fae42a-78ec-45c0-a22a-4f81417cad56", "text": "Firmware upgrade failed for gateway (NAME Aruba9004-LTE_95_EA_76 SN MAC 20:4c:03:95:ea:76)" } |

{ "id": "AXwCtmSrKFHq3kj2s2hh", "nid": 1602, "alert_type": "WAN_AUTO_NEGOTIATION_FLAP", "setting_id": "082445a5b8264597bce334f932c9a3a4-1602", "device_id": "TWJCKSP01C", "description": "Uplink GE0/0/1 speed flapped 1% on device Aruba9004-LTE_95_EA_76 with serial TWJCKSP01C for about 15 minutes since 2021-09-20 10:03:00 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1632133080, "details": { "intf_name": "GE0/0/1", "speed": "1000", "new_speed": "100", "hostname": "Aruba9004-LTE_95_EA_76", "serial": "TWJCKSP01C", "group": "6", "labels": "8,7", "unit": "%", "_rule_number": "0", "ds_key": "082445a5b8264597bce334f932c9a3a4.TWJCKSP01C.uplink.speed.flap.5m", "duration": "15", "threshold": "1", "time": "2021-09-20 10:03:00 UTC" }, "webhook": "4a1b58b1-3371-471e-8093-73c07fb6b384", "text": "Uplink GE0/0/1 speed flapped 1% on device Aruba9004-LTE_95_EA_76 with serial TWJCKSP01C for about 15 minutes since 2021-09-20 10:03:00 UTC." } |

{ "id": "AX0JamvlJ_Ty_F5wJkqF", "nid": 1507, "alert_type": "WAN_UPLINK_INPUT_ERRORS", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1507", "device_id": "SCA0000006", "description": "Input errors for Uplink Interface GE 0/0/0 on Gateway CSIM_SCA0000006 with serial SCA0000006 has been above 1% for about 5 minutes since 2021-11-10 10:30:09 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1636540509, "details": { "intf_name": "GE 0/0/0", "hostname": "CSIM_SCA0000006", "serial": "SCA0000006", "group": "0", "labels": "48", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.SCA0000006.intf.inerrors_percent.5m", "duration": "5", "threshold": "1", "time": "2021-11-10 10:30:09 UTC" }, "webhook": "4c09b716-eb38-4c4f-8a3f-61f476eb9ca6", "text": "Input errors for Uplink Interface GE 0/0/0 on Gateway CSIM_SCA0000006 with serial SCA0000006 has been above 1% for about 5 minutes since 2021-11-10 10:30:09 UTC.", "cluster_hostname": "app-yoda.arubathena.com" } |

{ "id": "AX0JazwZJ_Ty_F5wJkqp", "nid": 1508, "alert_type": "WAN_UPLINK_OUTPUT_ERRORS", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1508", "device_id": "SCA0000096", "description": "Output errors for Uplink Interface GE 0/0/2 on Gateway CSIM_SCA0000096 with serial SCA0000096 has been above 1% for about 5 minutes since 2021-11-10 10:31:02 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1636540562, "details": { "intf_name": "GE 0/0/2", "hostname": "CSIM_SCA0000096", "serial": "SCA0000096", "group": "0", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.SCA0000096.intf.outerrors_percent.5m", "duration": "5", "threshold": "1", "time": "2021-11-10 10:31:02 UTC" }, "webhook": "4c09b716-eb38-4c4f-8a3f-61f476eb9ca6", "text": "Output errors for Uplink Interface GE 0/0/2 on Gateway CSIM_SCA0000096 with serial SCA0000096 has been above 1% for about 5 minutes since 2021-11-10 10:31:02 UTC.", "cluster_hostname": "app-yoda.arubathena.com" } |

{ "id": "AX0Jamx2J_Ty_F5wJkqG", "nid": 1509, "alert_type": "WAN_UPLINK_PHY_ERRORS", "setting_id": "6039f9543bac449291bfcd19eb10d1eb-1509", "device_id": "SCA0000006", "description": "PHY errors for Uplink Interface GE 0/0/2 on Gateway CSIM_SCA0000006 with serial SCA0000006 has been above 1% for about 5 minutes since 2021-11-10 10:30:09 UTC.", "state": "Open", "severity": "Critical", "operation": "create", "timestamp": 1636540509, "details": { "intf_name": "GE 0/0/2", "hostname": "CSIM_SCA0000006", "serial": "SCA0000006", "group": "0", "labels": "48", "_rule_number": "0", "ds_key": "6039f9543bac449291bfcd19eb10d1eb.SCA0000006.intf.phyerrors_percent.5m", "duration": "5", "threshold": "1", "time": "2021-11-10 10:30:09 UTC" }, "webhook": "4c09b716-eb38-4c4f-8a3f-61f476eb9ca6", "text": "PHY errors for Uplink Interface GE 0/0/2 on Gateway CSIM_SCA0000006 with serial SCA0000006 has been above 1% for about 5 minutes since 2021-11-10 10:30:09 UTC.", "cluster_hostname": "app-yoda.arubathena.com" } |