Users Guide
Resource Management Portlets and Editors | Resource Management
182 OMNM 6.5.3 User Guide
Alarm Severity The highest alarm severity opened for a device and /or its subcomponents. Alarms
against the device as a whole are always considered and this also includes all alarms
that are against subcomponents (ports, interfaces, etc.) and whose Resource
Propagation is "Impacts Top Level" or "Both" but it does not include alarms against
subcomponents whose Resource Propagation is "Default" or "Impacts
Subcomponents".
This field displays on the expanded view by default.
Vendor Name The resource’s vendor name.
This field displays on the expanded view by default.
Location Name The location where the resource resides. Shows both text and icon.
This field displays on the expanded view by default.
Widgets Additional information about the selected rule, such as:
• Reference Tree shows the device and connected components
• Details shows information about equipment name, vendor, location, contact,
icon, and last modified and discovery date
• Utilization Summary graphs device utilization, such as CPU, disk I/O, memory
and ping rate
• Bandwidth Utilization graphs the device’s bandwidth utilization. Notice that you
can change the number of top interfaces graphed, when this is applicable. See also
Bandwidth Calculation on page 418
The Widgets field is available only from the expanded view.
Additional IP
Addresses
Any additional IP addresses assigned to the resource, other than the primary IP
address. For example, a resource might have an IPv4 address and a IPv6 address. If
this is the case, the primary IP address appears in the IP Address column and the
additional IP addresses appear in this column.
Alarm Suppression
Description
The description provided for an alarm suppression configuration.
Alarm Suppression
Mode
Indicates if the device is in alarm suppression, and if so, which mode of suppression
is active. The two modes of active alarm suppression are "Ad Hoc", which means that
suppression will remain indefinitely until it is stopped manually, and "Scheduled",
which means that suppression will automatically stop at some point in the future
(see the Schedules portlet). If the device is not in alarm suppression then a dash "-" is
listed.. If some form of alarm suppression is listed, the device does not receive alarms.
Asset Tag Any asset tag identifier for the device.
Contact Any contact associated with the resource.
Creator The user or process (such as, a discovery rule or device driver) that created this
resource.
DNS Hostname The resource’s host name.
Description A text field for a description of the resource.
Discovery Date
The date and time the resource was discovered.
Domain ID The identifier for the device’s domain. This is populated in a multitenant
environment.
Foreign ID An optional identifier for the customer’s organization.
Install Date The date and time that the resource was installed.
Last Configuration
Change
The time/date stamp for the last configuration change detected. This is driven from
Automations (which are a category of Event Processing Rules) whose configured
action is "Config Changed"
Column Description