Version 2.0
Mellanox Device Manager (VDM)
34
Mellanox Technologies
It is done in switch VFM, when configuring the policy table via both the GUI and the CLI.
Note that these settings are done via the switch only.
The user may define events severity as well as filter the events via the GUI and CLI. The
filtering policy determines for each event whether it is logged and whether a trap is generated.
3.6
Trap Table
The Trap Table is displayed at the bottom of the main window. It provides a wide range of
information on the events and alarms in the Switch system.
Figure
3-12. Trap Table (Log)
For each event/alarm, the Trap Table displays the following information:
Table
3-5. Trap Log Information
Event
Information
Description
Severity
Displays the severity of the event/alarm.
Date/Time
Displays the date and time of the event/alarm occurrence.
Source
Displays the GUID and the module name of the source of the event/alarm.
Category
Displays the source of the event. Possible values are:
SA
– for events that occurred in the Subnet Administration
SM
– for events that occurred in the Subnet Manager
Event ID
Displays a system generated ID number that identifies the event.
Description
Displays a short description of the event/alarm.
3.6.1
Resizing the
Trap Table
The Trap Log can be resized as follows: position the cursor on the top border line of the Trap
Log. The cursor changes into a double-headed arrow with two lines in between; drag the
cursor up or down to increase or decrease the size of the Trap Log area.
3.6.2
Rearranging Columns
You can rearrange columns positions within the Trap Log table, by dragging and dropping a
selected column in the new desired position as well as resizing the column width.
3.6.3
Viewing and Hiding Events
You can hide the Events Log from view by selecting View/View Events from the main menu.