Policy Manager Faults

fltFirmwareDownloadPolicyError

Fault Code: F10000242

Message

[type] Download Policy Configuration Error. Check scheduler Name, Username, Password and HTTP URL

Explanation

This fault typically occurs when the download configuration is not correct

Recommended Action

If you see this fault, take the following actions:


Step 1 Review the fault and the error message on the FSM tab.

Step 2 Check scheduler Name, Username, Password and HTTP URL in download configuration

Step 3 If the above actions did not resolve the issue, create a show tech-support file and contact Cisco TAC.

Fault Details

Severity: minor
Cause: configuration-error
mibFaultCode: 10000242
mibFaultName: fltFirmwareDownloadPolicyError
moClass: firmware:DownloadPolicy
Type: management
Auto Cleared: true
Affected MO: domaingroup-[name]/dl-policy-[type]

fltCommSvcEpCommSvcNotDeployed

Fault Code: F10000339

Message

Communication Service configuration can’t be deployed. Error: [configStatusMessage]

Explanation

This fault typically occurs because Cisco UCS Manager has detected an invalid communication policy confiuration.

Recommended Action

If you see this fault, take the following actions:


Step 1 Verify that ports configured across all communication services is unique.

Fault Details

Severity: major
Cause: comm-svc-config-error
mibFaultCode: 10000339
mibFaultName: fltCommSvcEpCommSvcNotDeployed
moClass: comm:SvcEp
Type: comm-svc-not-deployed
Auto Cleared: true
Affected MO: compute/sys-[id]/svc-ext
Affected MO: sys/svc-ext

fltPkiTPStatus

Fault Code: F10000591

Message

[name] Trustpoint’s cert-chain is invalid, reason: [certStatus].

Explanation

This fault occurs when certificate status of TrustPoint has become invalid.

Recommended Action

Copy the message exactly as it appears on the console or in the system log. Research and attempt to resolve the issue using the tools and utilities provided at http://www.cisco.com/tac. If you cannot resolve the issue, create a show tech-support file and contact Cisco Technical Support.

Fault Details

Severity: major
Cause: invalid-trustpoint-cert-chain
mibFaultCode: 10000591
mibFaultName: fltPkiTPStatus
moClass: pki:TP
Type: security
Auto Cleared: true
Affected MO: domaingroup-[name]/tp-[name]
Affected MO: org-[name]/deviceprofile-[name]/pki-ext/tp-[name]
Affected MO: sys/pki-ext/tp-[name]

fltPkiKeyRingStatus

Fault Code: F10000592

Message

[name] Keyring’s certificate is invalid, reason: [certStatus].

Explanation

This fault occurs when certificate status of Keyring has become invalid.

Recommended Action

Copy the message exactly as it appears on the console or in the system log. Research and attempt to resolve the issue using the tools and utilities provided at http://www.cisco.com/tac. If you cannot resolve the issue, create a show tech-support file and contact Cisco Technical Support.

Fault Details

Severity: major
Cause: invalid-keyring-certificate
mibFaultCode: 10000592
mibFaultName: fltPkiKeyRingStatus
moClass: pki:KeyRing
Type: security
Auto Cleared: true
Affected MO: org-[name]/deviceprofile-[name]/pki-ext/keyring-[name]
Affected MO: sys/pki-ext/keyring-[name]

fltMgmtExportPolicyNo-scheduler-exists

Fault Code: F10000645

Message

scheduler [schedName] not found

Explanation

None set.

Recommended Action

Copy the message exactly as it appears on the console or in the system log. Research and attempt to resolve the issue using the tools and utilities provided at http://www.cisco.com/tac. If you cannot resolve the issue, create a show tech-support file and contact Cisco Technical Support.

Fault Details

Severity: major
Cause: not-found
mibFaultCode: 10000645
mibFaultName: fltMgmtExportPolicyNoSchedulerExists
moClass: mgmt:ExportPolicy
Type: management
Auto Cleared: true
Affected MO: domaingroup-[name]/
Affected MO: org-[name]/
Affected MO: org-[name]/deviceprofile-[name]/