Meridian Dashboard

In Network Operations Centers (NOCs), an overview of issues occurring in the network is important. This information is often presented in customized dashboards, as appropriate for the monitored environment. A dashboard is an at-a-glance overview of the network, and it is often used as an entry point for more detailed diagnosis of issues using data Meridian provides.

Large networks have people (operators) who have different responsibilities, according to the organization’s monitoring needs. Each dashboard should show only the information pertaining to a specific monitoring context. Operators need to customize and filter information on the dashboard to create focused data sets.

Meridian UI showing a dashboard with a configured surveillance view. It displays an ongoing outage.
Figure 1. Dashboard with configured surveillance view and current outage
You can hide the upper navigation bar on any page by adding ?quiet=true; to the end of any Meridian URL. This is useful when viewing dashboards on a large screen.

Components

The dashboard includes the following components:

  • Surveillance view: Lets you model a monitoring context for the dashboard.

    You can reduce visible information by selecting rows, columns, and cells to focus on, limiting the data to sift through. The rest of the dashboard updates dynamically.

  • Alarms: Displays unacknowledged alarms whose severity is higher than Normal (1). An operator should escalate any alarms shown here.

  • Notifications: Displays outstanding and unacknowledged notifications that have been sent to recipients.

  • Outages: Displays all ongoing network outages.

  • Resource graphs: Displays time series reports for performance diagnosis.

Surveillance view

The surveillance view component has multiple functions:

  • It lets you model the network monitoring context.

  • It shows service and node outages in a compact matrix view.

  • It lets you limit the information displayed in the rest of the dashboard dynamically by manually selecting rows, columns, and cells.

By default, all entries in a surveillance view are selected. For more information on configuring the surveillance view component, see Surveillance View.

Meridian UI displaying a surveillance view in its default state. It displays an ongoing outage.
Figure 2. A surveillance view component in its default state (all entries selected)

Alarms

The alarms component displays an overview of all unacknowledged alarms whose severity is higher than Normal (1). It sorts alarms from most to least recent, and lets you scroll through the last 100 alarms.

Acknowledged alarms are removed from the operator’s responsibility and, therefore, the alarms component.

The component displays the following information:

Meridian UI displaying an alarms component with three active alarms.
Figure 3. An alarms component displaying three alarms—​two of Minor severity, and one of Warning severity
  • Node: The label of the node associated with the alarm.

  • Severity: Alarm severity.

  • UEI: The alarm’s unique event identifier.

  • Count: The number of alarms deduplicated by the alarm’s reduction key.

  • Last Time: The time at which the most recent alarm was generated.

  • Log Msg: The log message from the alarm’s event definition.

Notifications

The notifications component shows outstanding and unacknowledged notifications. It sorts notifications from most to least recent, and lets you scroll through the last 100 notifications.

Notifications inform people on a duty schedule of issues in the monitored network, so they can take action to fix or reconfigure systems immediately. In Meridian, you can acknowledge notifications to indicate that they are being worked on. When a notification is acknowledged, it is removed from the component.

A dashboard should show outstanding notifications in the NOC. This provides an overview of the monitored network and gives an opportunity for intervention.

The following information is shown in the component:

Meridian UI displaying a notifications component with three notifications.
Figure 4. A notifications component displaying three notifications
  • Node: The label of the node associated with the notification.

  • Service: The name of the service associated with the notification.

  • Message: The log message associated with the notification.

  • Sent Time: Time when the notification was sent.

  • Responder: Name of the user who acknowledged the notification.

  • Respond Time: The time when the responder acknowledged the notification.

Outages

The outages component shows all ongoing network outages. An acknowledged alarm doesn’t necessarily mean that an outage has been solved; for this reason, the outages component works alongside the alarms component to provide a holistic overview of the network.

Meridian UI displaying an outages component. Five nodes are listed, along with their availability statistics.
Figure 5. An outages component displaying five nodes and their availability stats
  • Node: The label of the node associated with the outage.

  • Current Outages: The number of services on the node experiencing outages. The number of outages is listed out of the total number of monitored services (for example, "3 of 3 services are affected").

  • 24 Hour Availability: The availability of all node services, calculated across the last 24 hours.

Resource graphs

The resource graphs component shows time series reports across a defined time range. It also lets you navigate to time series data reports, providing a quick entry point from which to diagnose performance issues.

The component filters nodes based on the surveillance view context. It shows only one graph report at a time, and lets you navigate sequentially through the data.

Meridian UI displaying a resource graphs component, showing ICMP response time data from 11:00 a.m. to 12:00 p.m.
Figure 6. A resource graph component displaying ICMP response time data

Advanced configuration

The surveillance view component lets you model views for different monitoring contexts. Use it to create a special view as an example for network or server operators. The dashboard displays only one configured surveillance view. You can, however, let certain users define their surveillance view to fit their requirements by mapping their account to a configured surveillance view component.

Any nodes selected in the surveillance view are also aware of the User Restriction Filter. If you have a group of users who should see only a subset of nodes, the surveillance view will filter the data appropriately.

The dashboard is designed to focus, and therefore also restrict, a user’s view of monitored devices. To do this, Meridian includes a dashboard user role that restricts the user to viewing only the dashboard.

Dashboard role

The following example shows how you can use the Dashboard role (ROLE_PROVISION). This procedure shows how to assign the Dashboard role to the drv4doe user:

  1. Create a new user named drv4doe. The user represents a router and switch jockey.

  2. Add the ROLE_PROVISION role to the account through the web UI or by manually editing ${OPENNMS_HOME}/etc/users.xml:

    • Web UI

      1. Click the gear symbol at the top-right of the page.

      2. Under OpenNMS System, click Configure Users, Groups and On-Call Roles.

      3. On the Users and Groups page, click Configure Users.

      4. Click Modify beside the drv4doe account.

      5. In the Security Roles section, select ROLE_PROVISION in the Available Roles list and click Add >> to add it to the account.

      6. Click Finish at the bottom of the page to update the account.

    • Manually via code

      1. Add the following code to ${OPENNMS_HOME}/etc/users.xml:

        <user>
            <user-id>drv4doe</user-id>
            <full-name>dashboard User</full-name>
            <password salt="true">6FOip6hgZsUwDhdzdPUVV5UhkSxdbZTlq8M5LXWG5586eDPa7BFizirjXEfV/srK</password>
            <role>ROLE_DASHBOARD</role>
        </user>
  3. Define the surveillance view for drv4doe in ${OPENNMS_HOME}/etc/surveillance-view.xml:

    <?xml version="1.0" encoding="UTF-8"?>
    <surveillance-view-configuration
      xmlns:this="http://www.opennms.org/xsd/config/surveillance-views"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.opennms.org/xsd/config/surveillance-views http://www.opennms.org/xsd/config/surveillance-views.xsd"
      default-view="default" >
      <views >
        <view name="drv4doe" refresh-seconds="300" >
          <rows>
            <row-def label="Servers" >
              <category name="Servers"/>
            </row-def>
          </rows>
          <columns>
            <column-def label="PROD" >
              <category name="Production" />
            </column-def>
            <column-def label="TEST" >
              <category name="Test" />
            </column-def>
          </columns>
        </view>
        <!-- default view here -->
        <view name="default" refresh-seconds="300" >
          <rows>
            <row-def label="Routers" >
              <category name="Routers"/>
            </row-def>
            <row-def label="Switches" >
              <category name="Switches" />
            </row-def>
            <row-def label="Servers" >
              <category name="Servers" />
            </row-def>
          </rows>
          <columns>
            <column-def label="PROD" >
              <category name="Production" />
            </column-def>
            <column-def label="TEST" >
              <category name="Test" />
            </column-def>
            <column-def label="DEV" >
              <category name="Development" />
            </column-def>
          </columns>
        </view>
      </views>
    </surveillance-view-configuration>

When a user logs in using the drv4doe account, they are taken directly to the dashboard page and presented with a custom dashboard based on the drv4doe surveillance view definition. All other users will see the default dashboard.

After logging in, the person using the drv4doe account is taken directly to the dashboard page. They are not allowed to navigate to other Meridian URLs. If they try to do so, they receive an access denied error.

Anonymous dashboards

You can modify the security framework configuration files to allow access to one or more dashboards without requiring a user to log in:

  1. Create users and configure surveillance views as shown in Dashboard role. For this example, we will create two dashboards and two users: dashboard1 and dashboard2.

  2. Edit ${OPENNMS_HOME}/jetty-webapps/opennms/WEB-INF/web.xml to create aliases for the dashboards. Add the following code just before the first <servlet-mapping> tag:

        <servlet>
            <servlet-name>dashboard1</servlet-name>
            <jsp-file>/dashboard.jsp</jsp-file>
        </servlet>
    
        <servlet>
            <servlet-name>dashboard2</servlet-name>
            <jsp-file>/dashboard.jsp</jsp-file>
        </servlet>

    Add the following code just before the first <error-page> tag:

        <servlet-mapping>
            <servlet-name>dashboard1</servlet-name>
            <url-pattern>/dashboard1</url-pattern>
        </servlet-mapping>
    
        <servlet-mapping>
            <servlet-name>dashboard2</servlet-name>
            <url-pattern>/dashboard2</url-pattern>
        </servlet-mapping>

    Add the following code after the final <filter-mapping> tag:

      <filter-mapping>
        <filter-name>AddRefreshHeader-120</filter-name>
        <url-pattern>/dashboard.jsp</url-pattern>
      </filter-mapping>
      <filter-mapping>
        <filter-name>AddRefreshHeader-120</filter-name>
        <url-pattern>/dashboard1</url-pattern>
      </filter-mapping>
      <filter-mapping>
        <filter-name>AddRefreshHeader-120</filter-name>
        <url-pattern>/dashboard2</url-pattern>
      </filter-mapping>
  3. Edit ${OPENNMS_HOME}/jetty-webapps/opennms/WEB-INF/applicationContext-acegi-security.xml to enable anonymous authentication for the /dashboard1 and /dashboard2 aliases:

    Add the following code in the <bean id="filterChainProxy" …​> block, after the entry for /rss.jsp*:

      <bean id="filterChainProxy" class="org.acegisecurity.util.FilterChainProxy">
        <property name="filterInvocationDefinitionSource">
          <value>
            CONVERT_URL_TO_LOWERCASE_BEFORE_COMPARISON
            PATTERN_TYPE_APACHE_ANT
            /rss.jsp*=httpSessionContextIntegrationFilter,logoutFilter,authenticationProcessingFilter,basicProcessingFilter,securityContextHolderAwareRequestFilter,anonymousProcessingFilter,basicExceptionTranslationFilter,filterInvocationInterceptor
            /dashboard1*=httpSessionContextIntegrationFilter,logoutFilter,securityContextHolderAwareRequestFilter,dash1AnonymousProcessingFilter,filterInvocationInterceptor
            /dashboard2*=httpSessionContextIntegrationFilter,logoutFilter,securityContextHolderAwareRequestFilter,dash2AnonymousProcessingFilter,filterInvocationInterceptor
            /**=httpSessionContextIntegrationFilter,logoutFilter,authenticationProcessingFilter,basicProcessingFilter,securityContextHolderAwareRequestFilter,anonymousProcessingFilter,exceptionTranslationFilter,filterInvocationInterceptor
    
    ...

    Add the following code in the <bean id="filterInvocationInterceptor" …​> block, after the entry for /dashboard.jsp:

      <bean id="filterInvocationInterceptor" class="org.acegisecurity.intercept.web.FilterSecurityInterceptor">
    
    ...
    
            /frontpage.htm=ROLE_USER,ROLE_DASHBOARD
            /dashboard.jsp=ROLE_USER,ROLE_DASHBOARD
            /dashboard1=ROLE_USER,ROLE_DASHBOARD
            /dashboard2=ROLE_USER,ROLE_DASHBOARD
            /gwt.js=ROLE_USER,ROLE_DASHBOARD
    
    ...

    Add a new AnonymousProcessingFilter instance for each alias near the bottom of the file:

      <!-- Set the anonymous username to dashboard1 so the dashboard page can match it to a surveillance view of the same name. -->
      <bean id="dash1AnonymousProcessingFilter" class="org.acegisecurity.providers.anonymous.AnonymousProcessingFilter">
        <property name="key"><value>foobar</value></property>
        <property name="userAttribute"><value>dashboard1,ROLE_DASHBOARD</value></property>
      </bean>
    
      <bean id="dash2AnonymousProcessingFilter" class="org.acegisecurity.providers.anonymous.AnonymousProcessingFilter">
        <property name="key"><value>foobar</value></property>
        <property name="userAttribute"><value>dashboard2,ROLE_DASHBOARD</value></property>
      </bean>
  4. Restart Meridian.

  5. Navigate to http://hostname/opennms/dashboard1 to test your settings. You should be able to see a dashboard without logging in.

There is no way to view another dashboard without closing the browser, or deleting the JSESSIONID cookie.
If you accidentally click a link that requires full user privileges, you will see a login form. Once you are directed to the login form, you cannot return to the anonymous dashboard without restarting the browser. If this bothers you, you can set the ROLE_USER role alongside the ROLE_DASHBOARD role in the userAttribute property definition. Note, however, that setting this role provides full user access to anonymous browsers.