789
Cisco Systems, Inc.
www.cisco.com
Configuring Embedded Event Manager
Embedded Event Manager (EEM) is a distributed and customized approach to event detection and recovery within a Cisco
IOS device. EEM offers the ability to monitor events and take informational, corrective, or any other EEM action when the
monitored events occur or when a threshold is reached. An EEM policy defines an event and the actions to be taken when
that event occurs.
This chapter describes how to configure EEM and how to use it to monitor and manage the Cisco Industrial Ethernet
Switches, hereafter referred to as
switch
.
Note:
For complete syntax and usage information for the commands used in this chapter, see the documents listed in
the
This chapter includes these sections:
Information About Embedded Event Manager, page 789
Guidelines and Limitations, page 793
Configuring Embedded Event Manager, page 793
Verifying Configuration, page 795
Configuration Example, page 795
Information About Embedded Event Manager
EEM monitors key system events and then acts on them through a set policy. This policy is a programmed script that you
can use to customize a script to invoke an action based on a given set of events occurring. The script generates actions
such as generating custom syslog or Simple Network Management Protocol (SNMP) traps, invoking CLI commands,
forcing a failover, and so forth. The event management capabilities of EEM are useful because not all event management
can be managed from the switch and because some problems compromise communication between the switch and the
external network management device. Network availability is improved if automatic recovery actions are performed
without rebooting the switch.
shows the relationship between the EEM server, the core event publishers (event detectors), and
the event subscribers (policies). The event publishers screen events and when there is a match on an event specification
that is provided by the event subscriber. Event detectors notify the EEM server when an event occurs. The EEM policies
then implement recovery based on the current state of the system and the actions specified in the policy for the given
event.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...