VMWARE-NSX-MANAGER-MIB

File: VMWARE-NSX-MANAGER-MIB.mib (151550 bytes)

Imported modules

SNMPv2-SMI SNMPv2-CONF SNMPv2-TC
UUID-TC-MIB VMWARE-ROOT-MIB

Imported symbols

MODULE-IDENTITY OBJECT-IDENTITY OBJECT-TYPE
NOTIFICATION-TYPE Integer32 MODULE-COMPLIANCE
OBJECT-GROUP NOTIFICATION-GROUP TEXTUAL-CONVENTION
DateAndTime UUID vmwNsxManager

Defined Types

VmwNsxManagerTypeSeverity  
Severity enumeration definition of NSX Manager events
TEXTUAL-CONVENTION    
  INTEGER informational(1), low(2), medium(3), major(4), critical(5), high(6)  

Defined Values

vmwNsxManagerMIB 1.3.6.1.4.1.6876.90.1
This MIB file contains the information that the receiving party needs in order to interpret SNMP traps sent by NSX Manager. VMware NSX for vSphere is a key product in the SDDC architecture. With NSX, virtualization delivers for networking what it has already delivered for compute and storage. In much the same way that server virtualization programmatically creates, snapshots, deletes and restores software-based virtual machines (VMs), NSX network virtualization programmatically creates, snapshots, deletes, and restores software-based virtual networks. The result is a completely transformative approach to networking that not only enables data center managers to achieve orders of magnitude better agility and economics, but also allows for a vastly simplified operational model for the underlying physical network. With the ability to be deployed on any IP network, including both existing traditional networking models and next-generation fabric architectures from any vendor, NSX is a completely non-disruptive solution. In fact, with NSX, the physical network infrastructure you already have is all you need to deploy a software-defined data center. The NSX Manager provides the graphical user interface (GUI) and the REST APIs for creating, configuring, and monitoring NSX components, such as controllers, logical switches, and edge services gateways. The NSX Manager provides an aggregated system view and is the centralized network management component of NSX. NSX Manager is installed as a virtual appliance on any ESX host in your vCenter environment. Support requests can be filed with VMware using KB article: http://kb.vmware.com/kb/2006985 To reach NSX Manager Service Composer UI, login to vSphere UI(https://)->Networking & Security->Service Composer
MODULE-IDENTITY    

vmwNsxMAlertData 1.3.6.1.4.1.6876.90.1.1
This members of this group are the OIDs for VarBinds that contain data for ALL Alerts.
Status: current Access: read-only
OBJECT-IDENTITY    

vmwNsxMNotification 1.3.6.1.4.1.6876.90.1.2
All notifications for NSX Manager use this oid prefix.
Status: current Access: read-only
OBJECT-IDENTITY    

vmwNsxMEventCode 1.3.6.1.4.1.6876.90.1.1.1
The event code of the alert that was generated. To fetch a list of all the events with their code, severity and description please invoke the nsx-manager url https:///api/2.0/systemevent/eventcode . The event code specifically identifies each individual event type. This event code is uniquely assigned only once to a particular event type.
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  Integer32 1..2147483647  

vmwNsxMEventTimestamp 1.3.6.1.4.1.6876.90.1.1.2
The timestamp when the event was raised in the NSX Manager.
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  DateAndTime  

vmwNsxMEventMessage 1.3.6.1.4.1.6876.90.1.1.3
This object provides a human readable description of the event or group of events
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  OCTET STRING  

vmwNsxMEventSeverity 1.3.6.1.4.1.6876.90.1.1.4
The severity for the event that was generated. The severity is pre-defined and can only be changed from the NSX Manager section of vsphere web client if the administrator so wishes.
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  VmwNsxManagerTypeSeverity  

vmwNsxMEventComponent 1.3.6.1.4.1.6876.90.1.1.5
The NSX manager component where this event was generated.
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  OCTET STRING  

vmwNsxMUuid 1.3.6.1.4.1.6876.90.1.1.6
The NSX manager UUID where this event was generated.
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  UUID  

vmwNsxMCount 1.3.6.1.4.1.6876.90.1.1.7
The count of the number of events for a particular group raised in the last 5 minute interval.
Status: current Access: accessible-for-notify
OBJECT-TYPE    
  Integer32 1..2147483647  

vmwNsxMBranch 1.3.6.1.4.1.6876.90.1.2.0
Branch segregated out for various groups and other future requirements.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMGroupsBranch 1.3.6.1.4.1.6876.90.1.2.0.1
Grouped Notifications will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMGroupsPrefix 1.3.6.1.4.1.6876.90.1.2.0.1.0
Prefix added to place zero in penultimate sub-identifier of group oids.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMConfigGroup 1.3.6.1.4.1.6876.90.1.2.0.1.0.1
Configuration notifications that are grouped will have this OID prefix.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSnmp 1.3.6.1.4.1.6876.90.1.2.1
Notifications that are Snmp related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMSnmpPrefix 1.3.6.1.4.1.6876.90.1.2.1.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Snmp module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMSnmpDisabled 1.3.6.1.4.1.6876.90.1.2.1.0.1
This notification is sent when the sending out of Snmp traps is disabled. This would most likely be the last Snmp trap the snmp manager receives. You may some times not receive it in case of high volume of traps. In those cases you can rely on the heartbeat traps not being sent out. Action required: None. If the sending of Snmp traps is enabled a warmStart trap is received. Frequency of traps: Once, whenever the sending snmp traps is disabled.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSnmpManagerConfigUpdated 1.3.6.1.4.1.6876.90.1.2.1.0.2
This notification is sent when the snmp manager configuration has been updated. The event message will carry the semicolon separated new snmp managers' details. Action required: None Frequency of traps: Once, whenever the Snmp manager configuration is updated.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSecurity 1.3.6.1.4.1.6876.90.1.2.2
Notifications that are security related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMSecurityPrefix 1.3.6.1.4.1.6876.90.1.2.2.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for security module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMIpAddedBlackList 1.3.6.1.4.1.6876.90.1.2.2.0.1
Whenever user authentication fails for number of times that user is blacklisted and further login attempts are disabled for that user from given IP address for some time. Action required: None Frequency of traps: Whenever user authentication fails consecutively within some time.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMIpRemovedBlackList 1.3.6.1.4.1.6876.90.1.2.2.0.2
After user is blacklisted, after blacklist duration expires, user is removed from blacklist. Action required: None Frequency of traps: Whenever blacklist duration expires for any user.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSsoConfigFailure 1.3.6.1.4.1.6876.90.1.2.2.0.3
Whenever configuration of lookup service / SSO fails due to various reasons like invalid credentials, invalid configuration, time sync problem etc. Action required: Check the event message and reconfigure lookup service with correct details. Frequency of traps: Once per failed configuration of lookup service.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSsoUnconfigured 1.3.6.1.4.1.6876.90.1.2.2.0.4
Whenever user unconfigures lookup service. Action required: None Frequency of traps: Once per unconfiguration event of lookup service.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMUserRoleAssigned 1.3.6.1.4.1.6876.90.1.2.2.0.5
When role is assigned on NSX manager for vCenter user. Action required: None Frequency of traps: Once for each user who is assigned role.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMUserRoleUnassigned 1.3.6.1.4.1.6876.90.1.2.2.0.6
When role is unassigned on NSX manager for vCenter user. Action: None Frequency of traps: Once for each user where role is removed.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGroupRoleAssigned 1.3.6.1.4.1.6876.90.1.2.2.0.7
When role is assigned on NSX manager for vCenter group. Action required: None Frequency of traps: Once for each group who is assigned role.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGroupRoleUnassigned 1.3.6.1.4.1.6876.90.1.2.2.0.8
When role is unassigned on NSX manager for vCenter group. Action required: None Frequency of traps: Once for each group where role is removed.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVcLoginFailed 1.3.6.1.4.1.6876.90.1.2.2.0.9
Whenever Connection with vCenter starts failing due to invalid credentials. Action required: Reconfigure NSX Manager vCenter configuration with correct credentials.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVcDisconnected 1.3.6.1.4.1.6876.90.1.2.2.0.10
Whenever there is disconnectivity for default VCenter Connection maintained by NSX. Action required: Administrator needs to check the connectivity with vCenter for network problems or any other reasons.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMLostVcConnectivity 1.3.6.1.4.1.6876.90.1.2.2.0.11
Whenever there is disconnectivity for default VCenter Connection maintained by NSX. Action required: Administrator needs to check the connectivity with vCenter for network problems or any other reasons.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSsoDisconnected 1.3.6.1.4.1.6876.90.1.2.2.0.12
Whenever there is disconnection with SSO lookup service. Action required: Please check the configuration for possible disconnection reasons like Invalid Credentials, Time sync issues, Network connectivity problems etc. Navigate to Appliance management Web UI in browser (https:///) traverse to Manage vCenter Registration tab and verify the configuration for SSO Lookupservice. Frequency of traps: Once per disconnect event, default frequency to check SSO connection state is 1 hour.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewall 1.3.6.1.4.1.6876.90.1.2.3
Notifications that are firewall related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMFirewallPrefix 1.3.6.1.4.1.6876.90.1.2.3.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for firewall module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMFltrCnfgUpdateFailed 1.3.6.1.4.1.6876.90.1.2.3.0.1
NSX Manager failed to enforce DFW. VMs on this host may not be protected by the DFW. Contextual data provided with this event may indicate the cause of this failure. This could happen if the VIB version mismatches on the NSX Manager and ESX host. This may happen during an upgrade. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFltrCnfgNotAppliedToVnic 1.3.6.1.4.1.6876.90.1.2.3.0.2
NSX Manager failed to enforce DFW configuration on a vnic. This particular VM may not be protected by the DFW. Contextual data provided with this event may indicate the cause of this failure.This could happen if the VIB version mismatches on the NSX Manager and ESX host. This may happen during an upgrade. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFltrCnfgAppliedToVnic 1.3.6.1.4.1.6876.90.1.2.3.0.3
Successfully updated filter config. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFltrCreatedForVnic 1.3.6.1.4.1.6876.90.1.2.3.0.4
Filter created. DFW is enforced in the datapath for the vnic. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFltrDeletedForVnic 1.3.6.1.4.1.6876.90.1.2.3.0.5
Filter deleted. DFW is removed from the vnic. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallConfigUpdateFailed 1.3.6.1.4.1.6876.90.1.2.3.0.6
Firewall rule Configuration between the NSX Manager and the host is not in sync. Contextual data provided with this event may indicate the cause of this failure. Verify that the host in question was properly prepared by NSX Manager. Collect error logs (vsfwd.log) when the host received firewall config. Force sync firewall config using ForceSync API/UI. See kb.vmware.com/kb/2125437 . If the issue persists, please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallRuleFailedVnic 1.3.6.1.4.1.6876.90.1.2.3.0.7
Failed to apply Distributed Firewall configuration. Contextual data provided with this event may indicate the cause of this failure. Collect error logs (vmkernel.log) when the firewall configuration was applied to the vnic. vsip kernel heaps may not have enough free memory. Check VSFWD logs . See kb.vmware.com/kb/2125437. If the issue persists, please collect the ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallRuleAppliedVnic 1.3.6.1.4.1.6876.90.1.2.3.0.8
Applied firewall config. Key value will have context info like generation number and also other debugging info. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMCntnrCnfgUpdateFailed 1.3.6.1.4.1.6876.90.1.2.3.0.9
Failed receive, parse or update the container configuration. Contextual data provided with this event may indicate the cause of this failure. Collect error logs (vmkernel.log) when firewall configuration was applied to the vnic. Verify that vsip kernel heaps have enough free memory. Check VSFWD logs. See kb.vmware.com/kb/2125437 . If the issue persists, please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFlowMissed 1.3.6.1.4.1.6876.90.1.2.3.0.10
Flow missed. Contextual data provided with this event may indicate the cause of this failure. Collect error logs (vmkernel.log) when firewall configuration was applied to the vnic. Verify that vsip kernel heaps have enough free memory and vsfwd memory consumption is within resource limits. Check VSFWD logs. See kb.vmware.com/kb/2125437. If the issue persists, please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSpoofGuardCnfgUpdateFailed 1.3.6.1.4.1.6876.90.1.2.3.0.11
Failed to receive, parse or Update the spoofguard configuration. Contextual data provided with this event may indicate the cause of this failure. Verify that the host in question was properly prepared by NSX Manager. Collect error logs (vmkernel.log) when the spoofguard configuration was applied to the host. For Sync the firewall configuration . See kb.vmware.com/kb/2125437.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSpoofGuardFailed 1.3.6.1.4.1.6876.90.1.2.3.0.12
Failed to apply spoofguard to the vnic. Contextual data provided with this event may indicate the cause of this failure. Verify that vsip kernel heaps have enough free memory. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSpoofGuardApplied 1.3.6.1.4.1.6876.90.1.2.3.0.13
Enabled spoofguard for vnic. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSpoofGuardDisableFail 1.3.6.1.4.1.6876.90.1.2.3.0.14
Failed to disable spoofguard on the vnic. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSpoofGuardDisabled 1.3.6.1.4.1.6876.90.1.2.3.0.15
Disabled spoofguard for vnic. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMLegacyAppServiceDeletionFailed 1.3.6.1.4.1.6876.90.1.2.3.0.16
A notification generated when legacy application service VM deletion failed.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallCpuThresholdCrossed 1.3.6.1.4.1.6876.90.1.2.3.0.17
vsfwd CPU usage threshold was exceeded. Reduce the amount of traffic of VMs on the host in question.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallMemThresholdCrossed 1.3.6.1.4.1.6876.90.1.2.3.0.18
vsfwd memory threshold exceeded. Reduce the number of of VMs on the host in question, reduce the number of rules or containers in firewall config. Use appliedTo feature to limit the number of rules for the current cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMConnPerSecThrshldCrossed 1.3.6.1.4.1.6876.90.1.2.3.0.19
vsfwd Connectons Per Second (CPS) threshold exceeded. Reduce the amount of new connections of VMs on the host in question.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallCnfgUpdateTimedOut 1.3.6.1.4.1.6876.90.1.2.3.0.20
NSX Manager waits for 2 minutes after publishing the Firewall configuration to each host in the cluster. If a host takes more than 2 minutes to process the data, it times out. Please check the Host in question. See if VSFWD is functioning or not. Also use CLI commands to verify if the rule realization is working properly or not. See kb.vmware.com/kb/2125437. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSpoofGuardCnfgUpdateTmOut 1.3.6.1.4.1.6876.90.1.2.3.0.21
NSX Manager waits for 2 minutes after publishing the Spoofguard configuration to each host in the cluster. If a host takes more than 2 minutes to process the data, it times out. Please check the Host in question. See if VSFWD is functioning or not. Also use CLI commands to verify if the rule realization is working properly or not. See kb.vmware.com/kb/2125437. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallPublishFailed 1.3.6.1.4.1.6876.90.1.2.3.0.22
Firewall Configuration Publishing has failed for a given cluster/host. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMCntnrUpdatePublishFailed 1.3.6.1.4.1.6876.90.1.2.3.0.23
Publishing of container (IP/MAC/vNIC) update pdate failed for a given host/cluster object. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSpoofGuardUpdatePublishFailed 1.3.6.1.4.1.6876.90.1.2.3.0.24
The publishing of the spoofguard updates on this host has failed. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMExcludeListPublishFailed 1.3.6.1.4.1.6876.90.1.2.3.0.25
The publishing of the exclude list or updates to the exclude list on this host has failed. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallCnfgUpdateOnDltCntnr 1.3.6.1.4.1.6876.90.1.2.3.0.26
Deletion of the object referenced in firewall rules. Action required: Go to the NSX manager DFW UI. All the invalid reference are marked invalid on the UI as well. Please remove the orphaned referenced and update the firewall rules.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMHostSyncFailed 1.3.6.1.4.1.6876.90.1.2.3.0.27
Host-level force synchronization has failed. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMHostSynced 1.3.6.1.4.1.6876.90.1.2.3.0.28
Force Sync operation for host succeeded. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallInstalled 1.3.6.1.4.1.6876.90.1.2.3.0.29
The Distributed Firewall was successfully Installed on the host.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallInstallFailed 1.3.6.1.4.1.6876.90.1.2.3.0.30
The Distributed Firewall Installation has failed. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallClusterInstalled 1.3.6.1.4.1.6876.90.1.2.3.0.31
The Distributed Firewall has been installed at the request of a user.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallClusterUninstalled 1.3.6.1.4.1.6876.90.1.2.3.0.32
The Distributed Firewall has been uninstalled at the request of a user.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallClusterDisabled 1.3.6.1.4.1.6876.90.1.2.3.0.33
The Distributed Firewall has been disabeld on the cluster at the request of a user.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallForceSyncClusterFailed 1.3.6.1.4.1.6876.90.1.2.3.0.34
Force Sync operation for the cluster has failed. Use CLI commands to look at the logs and verify if any error messages appeared during the operation. See kb.vmware.com/kb/2125437. Please collect ESX and NSX Manager tech support bundle and open a SR with Vmware techsupport. See http://kb.vmware.com/kb/2074678 and http://kb.vmware.com/kb/1010705
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallForceSyncClusterSuccess 1.3.6.1.4.1.6876.90.1.2.3.0.35
Force Sync operation for cluster succeeded. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallVsfwdProcessStarted 1.3.6.1.4.1.6876.90.1.2.3.0.36
vsfwd process started on host. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdge 1.3.6.1.4.1.6876.90.1.2.4
Notifications that are edge related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMEdgePrefix 1.3.6.1.4.1.6876.90.1.2.4.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for edge module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMEdgeNoVmServing 1.3.6.1.4.1.6876.90.1.2.4.0.1
None of the Edge VMs found in serving state. There is a possibility of network disruption. Action required: System auto recovers from this state today. Event should be followed by traps with event code 30202 or 30203
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeGatewayCreated 1.3.6.1.4.1.6876.90.1.2.4.0.2
Edge Gateway created. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmBadState 1.3.6.1.4.1.6876.90.1.2.4.0.3
Edge VM in bad state. Needs a force sync. Action required: System auto triggres force sync but if problem is sustained then manual force sync should be triggered. For ESG force sync is disruptive and will reboot edge VMs.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmCommFailed 1.3.6.1.4.1.6876.90.1.2.4.0.4
Failed to communicate with the Edge VM. Action required: Need investigation depending upon comunication channel. Log needs to be checked for VIX error code for futher action.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmCnfgChanged 1.3.6.1.4.1.6876.90.1.2.4.0.5
A notification generated when NSX Edge VM configuration is changed. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeGatewayDeleted 1.3.6.1.4.1.6876.90.1.2.4.0.6
A notification generated when Edge Gateway is deleted. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeGatewayReDeployed 1.3.6.1.4.1.6876.90.1.2.4.0.7
A notification generated when Edge Gateway is redeployed. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmPowerOff 1.3.6.1.4.1.6876.90.1.2.4.0.8
A notification generated when NSX Edge VM is powered off. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeApplianceSizeChanged 1.3.6.1.4.1.6876.90.1.2.4.0.9
A notification generated when Edge appliance size has changed. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeUpgrade51x 1.3.6.1.4.1.6876.90.1.2.4.0.10
A notification generated when Edge Gateway is upgraded to 5.1.x. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeLicenseChanged 1.3.6.1.4.1.6876.90.1.2.4.0.11
A notification generated when Edge licensing changed on vCenter Server. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeApplianceMoved 1.3.6.1.4.1.6876.90.1.2.4.0.12
A notification generated when Edge appliance is moved in the vCenter inventory.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeApplianceNotFound 1.3.6.1.4.1.6876.90.1.2.4.0.13
A notification generated when Edge appliance not found in the vCenter inventory. Action required: If VM is accidentally deleted, redeploy edge.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVMHealthCheckMiss 1.3.6.1.4.1.6876.90.1.2.4.0.14
A notification generated when Edge VM is not responding to health check. Action required: Communicaiton issues between manager and edge. Log analysis required to root cause issue.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeHealthCheckMiss 1.3.6.1.4.1.6876.90.1.2.4.0.15
A notification generated when none of the Edge VMs are found in serving state. There is a possibility of network disruption. Action required: Commnunicaiton issues between manager and edge. Log analysis required to root cause issue.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeCommAgentNotConnected 1.3.6.1.4.1.6876.90.1.2.4.0.16
A notification generated when Edge Communication Agent is not connected to vCenter Server. Action required: Check VSM and VC connectivity. Try registering VSM to VC
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMApplianceWithDifferentId 1.3.6.1.4.1.6876.90.1.2.4.0.17
A notification generated when Edge VM is discovered with a different vmId. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFirewallRuleModified 1.3.6.1.4.1.6876.90.1.2.4.0.18
A notification generated when Edge firewall rule is modified. Action required: Revisit firewall rule and perform required updates
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeAntiAffinityRuleViolated 1.3.6.1.4.1.6876.90.1.2.4.0.19
A notification generated when powering on NSX Edge appliance violates a virtual machine anti-affinity rule. Action required: Anti affinity rules removed from cluster. Both HA VM may run on same host. Go to VC and please revisit anti affinity rules on Cluster
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeHaEnabled 1.3.6.1.4.1.6876.90.1.2.4.0.20
A notification generated when NSX Edge HighAvailability is enabled. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeHaDisabled 1.3.6.1.4.1.6876.90.1.2.4.0.21
A notification generated when NSX Edge HighAvailability is disabled. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeGatewayRecovered 1.3.6.1.4.1.6876.90.1.2.4.0.22
A notification generated when NSX Edge Gateway has recovered and now responding to health check. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmRecovered 1.3.6.1.4.1.6876.90.1.2.4.0.23
A notification generated when NSX Edge VM has recovered and now responding to health check. Actione required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeGatewayUpgraded 1.3.6.1.4.1.6876.90.1.2.4.0.24
A notification generated when Edge Gateway is upgraded. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmHlthChkDisabled 1.3.6.1.4.1.6876.90.1.2.4.0.25
A notification generated when Edge VM health check is disabled on consecutive critical vix errors. Please redeploy or force sync vm to resume health check. Action required: This points to environmental issues that lead to repeated failure over vix. Log analysis needs to be done to identify root cause. Post resoving issues force sync edge vm to resume health check. Force sync and redeploy are disruptive operation.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgePrePublishFailed 1.3.6.1.4.1.6876.90.1.2.4.0.26
A notification generated when Pre Publish has failed on Edge VM. Action required: Firewall rules might be out of sync. System auto recovers but if problem persists then trigger force sync.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeForcedSync 1.3.6.1.4.1.6876.90.1.2.4.0.27
A notification generated when Edge VM was force synced. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmBooted 1.3.6.1.4.1.6876.90.1.2.4.0.28
A notification generated when Edge VM was booted. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmInBadState 1.3.6.1.4.1.6876.90.1.2.4.0.29
A notification generated when Edge VM is in Bad State. Needs a force sync. Action required: Force sync required.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmCpuUsageIncreased 1.3.6.1.4.1.6876.90.1.2.4.0.30
A notification generated when Edge VM CPU usage has increased. Action required: Spikes are normal but collect tech support logs for further analysis if high CPU sustained for longer duration.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmMemUsageIncreased 1.3.6.1.4.1.6876.90.1.2.4.0.31
A notification generated when Edge VM Memory usage has increased. Action required: System recovers but collect tech support logs for further analysis.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmProcessFailure 1.3.6.1.4.1.6876.90.1.2.4.0.32
A notification generated when Edge VM process monitor detects a process failure. Action required: System recovers but collect tech support logs for further analysis.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmSysTimeBad 1.3.6.1.4.1.6876.90.1.2.4.0.33
A notification generated when Edge VM system time is bad. Action required: System recovers. Check NTP setting on hosts.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmSysTimeSync 1.3.6.1.4.1.6876.90.1.2.4.0.34
A notification generated when Edge VM system time sync up happens. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeAesniCryptoEngineUp 1.3.6.1.4.1.6876.90.1.2.4.0.35
A notification generated when AESNI crypto engine is up. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeAesniCryptoEngineDown 1.3.6.1.4.1.6876.90.1.2.4.0.36
A notification generated when AESNI crypto engine is down. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeVmOom 1.3.6.1.4.1.6876.90.1.2.4.0.37
A notification generated when Edge VM is out of memory. The Edge is rebooting in 3 seconds. Action required: Collect tech support for further analysis.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeFileSysRo 1.3.6.1.4.1.6876.90.1.2.4.0.38
A notification generated when Edge file system is read only. Action required: Check datastore issues, once resolved force sync is required.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeHaCommDisconnected 1.3.6.1.4.1.6876.90.1.2.4.0.39
A notification generated when Edge HighAvailability communication channel is disconnected from peer node. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeHaSwitchOverSelf 1.3.6.1.4.1.6876.90.1.2.4.0.40
A notification generated when High Availability is disabled for NSX Edge. The primary NSX Edge VM has its state transitioned from ACTIVE to SELF. High Availability (HA) ensures that NSX Edge services are always available, by deploying an additional Edge VM for failover. The primary NSX Edge VM is the ACTIVE node and the secondary VM is the STANDBY node. Whenever the ACTIVE VM is unreachable on account of VM powered off or network connectivity issues, the STANDBY VM takes over the ACTIVE vm's role. In the event NSX Edge High Availability is disabled, the STANDBY VM is deleted and the ACTIVE VM continues to function with its ACTIVE state transitioned to SELF. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeHaSwitchOverActive 1.3.6.1.4.1.6876.90.1.2.4.0.41
A notification generated when High Availability switch over has happened for NSX Edge. The secondary NSX Edge VM has its state transitioned from STANDBY to ACTIVE. High Availability (HA) ensures that NSX Edge services are always available, by deploying an additional Edge VM for failover. The primary NSX Edge VM is the ACTIVE node and the secondary VM is the STANDBY node. Whenever the ACTIVE VM is unreachable on account of VM powered off or network connectivity issues, the STANDBY VM takes over the ACTIVE vm's role. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeHaSwitchOverStandby 1.3.6.1.4.1.6876.90.1.2.4.0.42
A notification generated when High Availability switch over has happened for NSX Edge. The primary NSX Edge VM has its state transitioned from ACTIVE to STANDBY. High Availability (HA) ensures that NSX Edge services are always available, by deploying an additional Edge VM for failover. The primary NSX Edge VM is the ACTIVE node and the secondary VM is the STANDBY node. Whenever the ACTIVE VM is unreachable on account of VM powered off or network connectivity issues, the STANDBY VM takes over the ACTIVE vm's role. When connectivity is re-established between the NSX Edge VM's, one of the VM's state is transitioned from ACTIVE to STANDBY. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeMonitorProcessFailure 1.3.6.1.4.1.6876.90.1.2.4.0.43
A notification generated when Edge process monitor detected a process failure. Action required: Collect tech support logs for further analysis.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMLbVirtualServerPoolUp 1.3.6.1.4.1.6876.90.1.2.4.0.44
A notification generated when LoadBalancer virtualServer/pool is up. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMLbVirtualServerPoolDown 1.3.6.1.4.1.6876.90.1.2.4.0.45
A notification generated when LoadBalancer virtualServer/pool is down.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMLbVirtualServerPoolWrong 1.3.6.1.4.1.6876.90.1.2.4.0.46
A notification generated when LoadBalancer virtualServer/pool state is wrong.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMLbPoolWarning 1.3.6.1.4.1.6876.90.1.2.4.0.47
A notification generated when LoadBalancer pool changed to a warning state.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMIpsecChannelUp 1.3.6.1.4.1.6876.90.1.2.4.0.48
A notification generated when IPsec Channel is up. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMIpsecChannelDown 1.3.6.1.4.1.6876.90.1.2.4.0.49
A notification generated when IPsec Channel is down. Action required: Collect tech support logs for further analysis.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMIpsecTunnelUp 1.3.6.1.4.1.6876.90.1.2.4.0.50
A notification generated when IPsec Tunnel is up. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMIpsecTunnelDown 1.3.6.1.4.1.6876.90.1.2.4.0.51
A notification generated when IPsec Tunnel is down. Action required: Collect tech support logs for further analysis.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMIpsecChannelUnknown 1.3.6.1.4.1.6876.90.1.2.4.0.52
A notification generated when IPsec Channel status is unknown. Action required: Collect tech support logs for further analysis.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMIpsecTunnelUnknown 1.3.6.1.4.1.6876.90.1.2.4.0.53
A notification generated when IPsec Tunnel status is unknown. Action required: Collect tech support logs for further analysis.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGlobalLbMemberUp 1.3.6.1.4.1.6876.90.1.2.4.0.54
A notification generated when Global Loadbalancer member status is up. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGlobalLbMemberWarning 1.3.6.1.4.1.6876.90.1.2.4.0.55
A notification generated when Global Loadbalancer member status is warning.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGlobalLbMemberDown 1.3.6.1.4.1.6876.90.1.2.4.0.56
A notification generated when Global Loadbalancer member status is down.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGlobalLbMemberUnknown 1.3.6.1.4.1.6876.90.1.2.4.0.57
A notification generated when Global Loadbalancer member status is unknown.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGlobalLbPeerUp 1.3.6.1.4.1.6876.90.1.2.4.0.58
A notification generated when Global Loadbalancer peer status is up. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGlobalLbPeerDown 1.3.6.1.4.1.6876.90.1.2.4.0.59
A notification generated when Global Loadbalancer peer status is down.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDhcpServiceDisabled 1.3.6.1.4.1.6876.90.1.2.4.0.60
A notification generated when DHCP Relay Service is disabled.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeResourceReservationFailure 1.3.6.1.4.1.6876.90.1.2.4.0.61
Insufficient CPU and/or Memory Resources available on Host or Resource Pool, during resource reservation at the time of NSX Edge deployment. Resources are explicitly reserved to ensure sufficient resources are available for NSX Edge to service High Availability. User can view the available resources vs reserved resources by navigating to the page Home > Hosts and Clusters > [Cluster-name] > Monitor > Resource Reservation. Action required: After checking available resources, re-specify the resources as part of appliance configuration so that resource reservation succeeds.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeSplitBrainDetected 1.3.6.1.4.1.6876.90.1.2.4.0.62
Split Brain detected for NSX Edge with HighAvailability. NSX Edge VM's configured for High Availability are unable to determine if the other VM is alive due to network failure. In such scenario, both the VM's think the other is not alive and take on the ACTIVE state. This may cause network disruption. Action required: User will need to check network infrastructure (virtual and physical) to look for any failures, specially on the interfaces and the path configured for HA.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeSplitBrainRecovered 1.3.6.1.4.1.6876.90.1.2.4.0.63
Resolved Split Brain for NSX Edge with HighAvailability. The network path used by the NSX Edge VM's High Availability has been re-established. NSX Edge VM's are able to communicate with each other, and one of the VM has taken the STANDBY role, resolving the ACTIVE-ACTIVE split brain scenario. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEdgeSplitBrainRecoveryAttempt 1.3.6.1.4.1.6876.90.1.2.4.0.64
Attempted Split Brain resolution for NSX Edge. Split Brain recovery will be attempted on NSX Edge versions prior to 6.2.3, which are not based on BFD. Action required: None
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEndpoint 1.3.6.1.4.1.6876.90.1.2.5
Notifications that are Endpoint related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMEndpointPrefix 1.3.6.1.4.1.6876.90.1.2.5.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Endpoint module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMEndpointThinAgentEnabled 1.3.6.1.4.1.6876.90.1.2.5.0.1
A notification generated when Thin agent is enabled.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGuestIntrspctnEnabled 1.3.6.1.4.1.6876.90.1.2.5.0.2
A notification generated when Guest Introspection solution is enabled.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGuestIntrspctnIncompatibleEsx 1.3.6.1.4.1.6876.90.1.2.5.0.3
A notification generated when Guest Introspection solution was contacted by an incompatible version of the ESX module.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGuestIntrspctnEsxConnFailed 1.3.6.1.4.1.6876.90.1.2.5.0.4
A notification generated when connection between the ESX module and the Guest Introspection solution failed.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGuestIntrspctnStatusRcvFailed 1.3.6.1.4.1.6876.90.1.2.5.0.5
A notification generated when failed to receive status from Guest Introspection solution.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEsxModuleEnabled 1.3.6.1.4.1.6876.90.1.2.5.0.6
A notification generated when ESX module is enabled.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEsxModuleUninstalled 1.3.6.1.4.1.6876.90.1.2.5.0.7
A notification generated when ESX module is uninstalled.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMGuestIntrspctnHstMxMssngRep 1.3.6.1.4.1.6876.90.1.2.5.0.8
A notification generated when Guest Introspection host MUX is missing report.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEndpointUndefined 1.3.6.1.4.1.6876.90.1.2.5.0.9
A notification generated when Endpoint is undefined.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMEam 1.3.6.1.4.1.6876.90.1.2.6
Notifications that are Eam related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMEamPrefix 1.3.6.1.4.1.6876.90.1.2.6.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Eam module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMEamGenericAlarm 1.3.6.1.4.1.6876.90.1.2.6.0.1
EAM reports problems to NSX during vib/service VM install/upgrade as these traps. Action required: Use resolve API to resolve the Alarm. Frequency of traps: N times per cluster per user action, where N is number of hosts in a cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabric 1.3.6.1.4.1.6876.90.1.2.7
Notifications that are Fabric related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMFabricPrefix 1.3.6.1.4.1.6876.90.1.2.7.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Fabric module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMFabricDplymntStatusChanged 1.3.6.1.4.1.6876.90.1.2.7.0.1
The status of a service on a cluster has changed. It can change to RED(Failure), GREEN(Success), YELLOW(in-progress). Action required: RED state would be accompanied with an EAM Alarm/Event/Trap, that indicates root cause. Use resolver API to fix it. Frequency of traps: Once per state change. State could change 2-3 times per user operation [Deploy/Undeploy/Update]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricDplymntUnitCreated 1.3.6.1.4.1.6876.90.1.2.7.0.2
NSX Manager has created the required objects for deploying a service on a cluster. This would be followed by deployment of the service on all hosts in the cluster. Action required: None Frequency: Once per cluster
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricDplymntUnitUpdated 1.3.6.1.4.1.6876.90.1.2.7.0.3
NSX Manager has made changes in the objects required for deploying a service on a cluster. This would be followed by updation of the service on all hosts in the cluster. Action required: None Frequency of traps: Once per cluster per user operation [Update]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricDplymntUnitDestroyed 1.3.6.1.4.1.6876.90.1.2.7.0.4
A service has been removed from all hosts in a cluster. NSX Manager has deleted the objects for the service on the cluster. Action required: None Frequency of traps: Once per cluster
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDataStoreNotCnfgrdOnHost 1.3.6.1.4.1.6876.90.1.2.7.0.5
Datastore could not be configured on host, probably its not connected. Action required: Ensure that datastore is connected to the host. Use resolve API to resolve the Alarm. Service will be deployed. Frequency of traps: Once per cluster per user operation [Deploy].
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricDplymntInstallationFailed 1.3.6.1.4.1.6876.90.1.2.7.0.6
Installation of service failed, please check if ovf/vib urls are accessible, in correct format and all the properties in ovf environment have been configured in service attributes. Please check logs for details. Action required: Ensure that ovf/vib urls accessible from VC and are in correct format. Use resolve API to resolve the Alarm. Service will be deployed. Frequency of traps: Once per cluster per user operation [Deploy].
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricAgentCreated 1.3.6.1.4.1.6876.90.1.2.7.0.7
The service has been successfully installed on a host. Action required: None Frequency of traps: N times per cluster, where N is number of hosts in a cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricAgentDestroyed 1.3.6.1.4.1.6876.90.1.2.7.0.8
The service has been successfully removed from a host. Action required: None Frequency of traps: N times per cluster, where N is number of hosts in a cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricSrvceNeedsRedplymnt 1.3.6.1.4.1.6876.90.1.2.7.0.9
Service will need to be redeployed as the location of the OVF / VIB bundles to be deployed has changed. Action required: Use resolve API to resolve the Alarm. Service will be redeployed. Frequency of traps: N times per NSX Manager IP change, where N is number of cluster and service combinations deployed.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMUpgradeOfDplymntFailed 1.3.6.1.4.1.6876.90.1.2.7.0.10
Upgrade of deployment unit failed, please check if ovf/vib urls are accessible, in correct format and all the properties in ovf environment have been configured in service attributes. Please check logs for details. Action required: Ensure that ovf/vib urls accessible from VC and are in correct format. Use resolve API to resolve the Alarm. Service will be redeployed. Frequency of traps: Once per cluster per user operation [Upgrade]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricDependenciesNotInstalled 1.3.6.1.4.1.6876.90.1.2.7.0.11
The service being installed is dependent on another service that has not yet been installed. Action required: Deploy the required service on the cluster. Frequency of traps: Once per cluster per user operation [Deploy]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricErrorNotifSecBfrUpgrade 1.3.6.1.4.1.6876.90.1.2.7.0.12
Error while notifying security solution before upgrade. The solution may not be reachable/responding. Action required: Ensure that solution urls are accessible from NSX. Use resolve API to resolve the Alarm. Service will be redeployed. Frequency of traps: Once per cluster per user operation [Upgrade]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricErrCallbackNtRcvdUpgrade 1.3.6.1.4.1.6876.90.1.2.7.0.13
Did not receive callback from security solution for upgrade notification even after timeout. Action required: Ensure that solution urls are accessible from NSX, and NSX is reachable from the solution. Use resolve API to resolve the Alarm. Service will be redeployed. Frequency : Once per cluster per user operation [Upgrade]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricErrCallbackNtRcvdUninstall 1.3.6.1.4.1.6876.90.1.2.7.0.14
Uninstallation of service failed. Action required: Ensure that solution urls are accessible from NSX, and NSX is reachable from the solution. Use resolve API to resolve the Alarm. Service will be removed. Frequency of traps: Once per cluster per user operation [Uninstall]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricUninstallServiceFailed 1.3.6.1.4.1.6876.90.1.2.7.0.15
Error while notifying security solution before uninstall. Resolve to notify once again, or delete to uninstall without notification. Action required: Ensure that solution urls are accessible from NSX, and NSX is reachable from the solution. Use resolve API to resolve the Alarm. Service will be removed. Frequency of traps: Once per cluster per user operation [Uninstall]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricErrorNotifSecBfrUninstall 1.3.6.1.4.1.6876.90.1.2.7.0.16
Error while notifying security solution before uninstall. Resolve to notify once again, or delete to uninstall without notification. Action required: Ensure that solution urls are accessible from NSX, and NSX is reachable from the solution. Use resolve API to resolve the Alarm. Service will be removed. Frequency of traps: Once per cluster per user operation [Uninstall]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricServerRebootUninstall 1.3.6.1.4.1.6876.90.1.2.7.0.17
Server rebooted while security solution notification for uninstall was going on. Action required: Ensure that solution urls are accessible from NSX. Use resolve API to resolve the Alarm. Service will be uninstalled. Frequency of traps: Once per cluster per user operation [Uninstall]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricServerRebootUpgrade 1.3.6.1.4.1.6876.90.1.2.7.0.18
Server rebooted while security solution notification for upgrade was going on. Action required: Ensure that solution urls are accessible from NSX. Use resolve API to resolve the Alarm. Service will be redeployed. Frequency of traps: Once per cluster per user operation [Upgrade]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricConnEamFailed 1.3.6.1.4.1.6876.90.1.2.7.0.19
NSX Manager relies on the ESX Agent Manager service in VC for deploying/monitoring NSX vibs on ESX. The connection to this EAM service has gone down. This could be due to EAM service or VC restart/stop or an issue in the EAM service. Action required: In the NSX UI, traverse to Manage, then NSX Management Service. Verify that the status of VC connection on this page is Green. Use the VC IP to verify that EAM is UP by visiting https:///eam/mob. Frequency of traps: Once per switch from success to failed EAM connection
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricConnEamRestored 1.3.6.1.4.1.6876.90.1.2.7.0.20
NSX Manager relies on the EAM service in VC for deploying/monitoring NSX vibs on ESX. The connection of NSX to this EAM service was re-established successfully. Action required: None Frequency of traps: Once per switch from failed to success EAM connection
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricPreUninstallCleanUpFailed 1.3.6.1.4.1.6876.90.1.2.7.0.21
Pre Uninstall cleanup failed. Action required: Use resolve API to resolve the Alarm. Service will be removed. Frequency of traps: Once per cluster per user operation [Uninstall]
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMFabricBackingEamNotFound 1.3.6.1.4.1.6876.90.1.2.7.0.22
The backing EAM agency for this deployment could not be found. It is possible that the VC services may still be initializing. Please try to resolve the alarm to check existence of the agency. In case you have deleted the agency manually, please delete the deployment entry from NSX. Action required: Use resolve API to check existence of the agency, if backing agency exists in EAM, else delete the deployment entry from NSX. Frequency of traps: Once per cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDepPlugin 1.3.6.1.4.1.6876.90.1.2.8
Notifications that are DeploymentPlugin related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMDepPluginPrefix 1.3.6.1.4.1.6876.90.1.2.8.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for DeploymentPlugin module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMDepPluginIpPoolExhausted 1.3.6.1.4.1.6876.90.1.2.8.0.1
When deploying Guest Introspection or other VM based service with static IP, NSX Manager needs to have a IP pool, for IP assignment to the VM. This pool has been exhausted, and new service VMs cannot be provisioned. Action required: Traverse to the Networking & Security page on VMWare vSphere Web Client, then go to Installation, followed by Service Deployments. Note the IP pool name for the failed service. Now traverse to NSX Managers, then go to Manage tab, followed by Grouping Objects sub-tab. Click on IP Pools, and add more Ips to the static IP pool. Use resolve API to resolve the Alarm. Service will be deployed. Frequency of traps: N times per cluster, where N is number of hosts in the cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDepPluginGenericAlarm 1.3.6.1.4.1.6876.90.1.2.8.0.2
Deployment plugin generic alarm. Action required: Use resolve API to resolve the Alarm. Service will be deployed. Frequency of traps: N times per cluster, where N is number of hosts in the cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDepPluginGenericException 1.3.6.1.4.1.6876.90.1.2.8.0.3
Deployment plugin generic exception alarm. Action required: Use resolve API to resolve the Alarm. Service will be deployed. Frequency of traps: N times per cluster, where N is number of hosts in the cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDepPluginVmReboot 1.3.6.1.4.1.6876.90.1.2.8.0.4
VM needs to be rebooted for some changes to be made/take effect. Action required: Use resolve API to resolve the Alarm. Frequency of traps: N times per cluster, where N is number of hosts in the cluster.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMMessaging 1.3.6.1.4.1.6876.90.1.2.9
Notifications that are Messaging related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMMessagingPrefix 1.3.6.1.4.1.6876.90.1.2.9.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Messaging module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMMessagingConfigFailed 1.3.6.1.4.1.6876.90.1.2.9.0.1
A notification generated when host messaging configuration failed.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMMessagingReconfigFailed 1.3.6.1.4.1.6876.90.1.2.9.0.2
A notification generated when host messaging connection reconfiguration failed.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMMessagingConfigFailedNotifSkip 1.3.6.1.4.1.6876.90.1.2.9.0.3
A notification generated when host messaging configuration failed and notifications were skipped.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMMessagingInfraUp 1.3.6.1.4.1.6876.90.1.2.9.0.4
Manager runs a heartbeat with all hosts it manages. Missing heartbeat responses from a host indicate a communication issue between manager and the host. Such instances are indicated by event code 391002. When the communication is restored after such an instance, it is indicated by this event/trap. Action required: Refer to KB article https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2133897 Frequency of traps: Will be seen within 3 minutes of communication being restored between manager and a host. URL: https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2133897
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMMessagingInfraDown 1.3.6.1.4.1.6876.90.1.2.9.0.5
Manager runs a heartbeat with all hosts it manages. Missing heartbeat responses from a host indicate a communication issue between manager and the host. In the case of such a communication issue, this trap will be sent. Action required: Refer to KB article https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2133897 Frequency of traps: Will be seen within 6 minutes of a communication failure between manager and a host. URL: https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2133897
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMMessagingDisabled 1.3.6.1.4.1.6876.90.1.2.9.0.6
A messaging client such as a Host, an Edge appliance or a USVM appliance is expected to change its password within 2 hours of being prepped or deployed. If the password isn't changed in this duration, the messaging account for the client is disabled. Action required: This event will indicate communication issue between the manager and the client. Verify if the client is running. If running, in case of a Host, re-sync messaging. In case of an Edge or a USVM, redeploy. Frequency of traps: Will be seen 2 hours after prep, host re-sync or deployment of appliance. URL: https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2133897
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposer 1.3.6.1.4.1.6876.90.1.2.10
Notifications that are ServiceComposer related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMServiceComposerPrefix 1.3.6.1.4.1.6876.90.1.2.10.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for ServiceComposer module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMServiceComposerPolicyOutOfSync 1.3.6.1.4.1.6876.90.1.2.10.0.1
Service Composer encountered an error while attempting to enforce rules on this Policy. Action required: Administrator needs to check the rules on the given Policy for any errors, as reported in the message. After fixing the rules in the Policy, user would need to resolve the alarm to bring this Policy back in sync. Policy's alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once, if an error is encountered while enforcing the Policy.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerPolicyDeleted 1.3.6.1.4.1.6876.90.1.2.10.0.2
A Policy got deleted as a result of the internal SecurityGroup, over which the Policy was created, got deleted. Frequency of traps: This event is generated once every time any internal SecurityGroup, that is being consumed by a policy, gets deleted.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerFirewallPolicyOutOfSync 1.3.6.1.4.1.6876.90.1.2.10.0.3
Service Composer encountered an error while attempting to enforce Firewall rules on this Policy. Firewall related changes on this Policy will not take effect, until this alarm is resolved. Action required: Administrator needs to check the rules on the given Policy for any errors, as reported in the message. After fixing the rules in the Policy, user would need to resolve the alarm to bring this Policy back in sync. Policy's alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once, if an error is encountered while enforcing the Policy.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerNetworkPolicyOutOfSync 1.3.6.1.4.1.6876.90.1.2.10.0.4
Service Composer encountered an error while attempting to enforce Network Introspection rules on this Policy. Network Introspection related changes on this Policy will not take effect, until this alarm is resolved. Action required: Administrator needs to check the rules on the given Policy for any errors, as reported in the message. After fixing the rules in the Policy, user would need to resolve the alarm to bring this Policy back in sync. Policy's alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once, if an error is encountered while enforcing the Policy.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerGuestPolicyOutOfSync 1.3.6.1.4.1.6876.90.1.2.10.0.5
Service Composer encountered an error while attempting to enforce Guest Introspection rules on this Policy. Guest Introspection related changes on this Policy will not take effect, until this alarm is resolved. Action required: Administrator needs to check the rules on the given Policy for any errors, as reported in the message. After fixing the rules in the Policy, user would need to resolve the alarm to bring this Policy back in sync. Policy's alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once, if an error is encountered while enforcing the Policy.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerOutOfSync 1.3.6.1.4.1.6876.90.1.2.10.0.6
Service Composer encountered an error synchronizing Policies. Any changes on Service Composer will not be pushed to Firewall/Network Introspection Services, until this alarm is resolved. Action required: Administrator needs to check Policies and/or Firewall sections for any errors, as reported in the message. After fixing the errors, user would need to resolve the alarm to bring Service Composer back in sync. Alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once, whenever an error is encountered.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerOutOfSyncRebootFailure 1.3.6.1.4.1.6876.90.1.2.10.0.7
Service Composer encountered an error while synchronizing Policies on reboot. Action required: Administrator needs to check Policies and/or Firewall config for any errors, as reported in the message. After fixing the errors, user would need to resolve the alarm to bring Service Composer back in sync. Alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once on NSX Manager reboot, if an error is encountered.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerOutOfSyncDraftRollback 1.3.6.1.4.1.6876.90.1.2.10.0.8
Service Composer went out of sync due to rollback of drafts from Firewall. Any changes on Service Composer will not be pushed to Firewall/Network Introspection Services, until this alarm is resolved. Action required: Administrator needs to resolve the alarm to bring Service Composer back in sync. Alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once, whenever Firewall config is reverted to an older version of drafts.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerOutOfSyncSectionDeletionFailure 1.3.6.1.4.1.6876.90.1.2.10.0.9
Service Composer encountered an error while deleting the section corresponding to the Policy. This generally happens if third party(NetX) service's Manager is not reachable. Action required: Administrator needs to check connectivity with third party(NetX) service's Manager. Once the connectivity is restored, user would need to resolve the alarm. Alarm can either be resolved from Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once if a failure is encountered while deleting a Policy's section on Policy deletion.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerOutOfSyncPrecedenceChangeFailure 1.3.6.1.4.1.6876.90.1.2.10.0.10
Service Composer encountered an error reordering sections to reflect Policy's precedence change. This generally happens if there are Alarms on any other Policy. Action required: Administrator needs to check Policies and/or Firewall sections for any errors, as reported in the message. After fixing the errors, user would need to resolve the alarm. Alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once if a failure is encountered while reordering section to reflect precedence change.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMServiceComposerOutOfSyncDraftSettingFailure 1.3.6.1.4.1.6876.90.1.2.10.0.11
Service Composer encountered an error while initializing auto save drafts setting. Action required: Administrator needs to check Policies and/or Firewall sections for any errors, as reported in the message. After fixing the errors, user would need to resolve the alarm. Alarm can either be resolved from NSX Manager Service Composer UI or by using alarms API. Frequency of traps: This trap is generated only once if a failure is encountered while initializing auto save drafts setting.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSvmOperations 1.3.6.1.4.1.6876.90.1.2.11
Notifications that are SvmOperations related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMSvmOperationsPrefix 1.3.6.1.4.1.6876.90.1.2.11.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for SvmOperations module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMInconsistentSvmAlarm 1.3.6.1.4.1.6876.90.1.2.11.0.1
Service VMs are deployed per ESX host, to provide functionality like guest introspection and McAfee/Trend virus checking in VMs on the host. An issue is detected with the state of the deployed Service VM. Follow instructions in http://kb.vmware.com/kb/2125482 to analyze the logs further. Warning: Resolving this alarm will delete the VM. After deletion you will see a different alarm saying VM is deleted. If you resolve same, it will reinstall the VM. If redeployment of the VM does not fix the original issue, the original alarm will be added back immediately. Action required: Use resolve API to resolve the Alarm. Frequency of traps: Once per host.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSvmRestartAlarm 1.3.6.1.4.1.6876.90.1.2.11.0.2
Service VMs are deployed per ESX host, to provide functionality like guest introspection and McAfee/Trend virus checking in VMs on the host. An issue is detected with the state of the deployed Service VM. Follow instructions in http://kb.vmware.com/kb/2125482 to analyze the logs further. Warning: Resolving this alarm will restart the VM. If the root cause here is not solved, the same alarm will be added back immediately. Action required: Use resolve API to resolve the Alarm. Frequency of traps: Once per host.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSvmAgentUnavailable 1.3.6.1.4.1.6876.90.1.2.11.0.3
An issue is detected while marking agent as available. Kindly check the logs. Resolving this alarm will attempt to mark the agent as available. Action required: Use resolve API to resolve the Alarm. Frequency of traps: Once per host.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMTranslation 1.3.6.1.4.1.6876.90.1.2.12
Notifications that are Translation related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMTranslationPrefix 1.3.6.1.4.1.6876.90.1.2.12.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Translation module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMVmAddedToSg 1.3.6.1.4.1.6876.90.1.2.12.0.1
A VM has got added to the SecurityGroup. Frequency of traps: Once for every VM getting added to any SecurityGroup.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVmRemovedFromSg 1.3.6.1.4.1.6876.90.1.2.12.0.2
A VM has got removed from the SecurityGroup. Frequency of traps: Once for every VM getting removed from any SecurityGroup.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMUniversalSync 1.3.6.1.4.1.6876.90.1.2.13
Notifications that are UniversalSync related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMUniversalSyncPrefix 1.3.6.1.4.1.6876.90.1.2.13.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for UniversalSync module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMFullUniversalSyncFailed 1.3.6.1.4.1.6876.90.1.2.13.0.1
A failure is encountered when doing full sync of universal objects on a secondary NSX manager. IP address of the secondary NSX manager is present in event's message variable. Action required: Kindly check NSX manager logs on the secondary NSX manager on which the full sync has failed. Frequency of traps: This trap is generated once per NSX manager on which full sync failure is seen.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSecondaryDown 1.3.6.1.4.1.6876.90.1.2.13.0.2
Secondary NSX manager is unreachable. Action required: Kindly check if NSX manager is running and is reachable from primary NSX manager. IP address of the secondary NSX manager is present in event's message variable. Frequency of traps: This trap is generated once per NSX manager for which connection issue is seen.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMUniversalSyncFailedForEntity 1.3.6.1.4.1.6876.90.1.2.13.0.3
A failure is encountered when doing sync of universal object on a secondary NSX manager. IP address of the secondary NSX manager is present in event's message variable. Action required: Kindly check NSX manager logs on the secondary NSX manager on which the sync has failed. Frequency of traps: This trap is generated once per universal object on a NSX manager on which sync failure is seen.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMAsyncRest 1.3.6.1.4.1.6876.90.1.2.14
Notifications that are AsyncRest related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMAsyncRestPrefix 1.3.6.1.4.1.6876.90.1.2.14.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for AsyncRest module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMServerUp 1.3.6.1.4.1.6876.90.1.2.14.0.1
Denotes that NSX manager server is up and in running state, Informs clients of NSX Manager of the current state. Action required: None Frequency of traps: Once for every query
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMExtensionRegistration 1.3.6.1.4.1.6876.90.1.2.15
Notifications that are ExtensionRegistration related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMExtensionRegistrationPrefix 1.3.6.1.4.1.6876.90.1.2.15.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for ExtensionRegistration module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMExtensionRegistered 1.3.6.1.4.1.6876.90.1.2.15.0.1
Registers NSX manager as a vCenter extenstion. This is applicable when no other NSX Manager is registered with vCenter and the current NSX manager is the one registering with vCenter. Action required: None Frequency of traps: Only once when the extension is registered for the very first time.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMExtensionUpdated 1.3.6.1.4.1.6876.90.1.2.15.0.2
Updates the vCenter extension registration with the new NSX Manager. This is applicable when there already exists another NSX manager that is registered as a vCenter extension and the current one overwrites it. Action required: None Frequency of traps: Every time a NSX Manager registers as a vCenter extension when there already exists another NSX manager registered with vCenter
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDlp 1.3.6.1.4.1.6876.90.1.2.16
Notifications that are Dlp related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMDlpPrefix 1.3.6.1.4.1.6876.90.1.2.16.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Dlp module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMDataSecScanStarted 1.3.6.1.4.1.6876.90.1.2.16.0.1
A notification generated when NSX Data Security scan started on VirtualMachine.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDataSecScanEnded 1.3.6.1.4.1.6876.90.1.2.16.0.2
A notification generated when NSX Data Security scan ended on VirtualMachine.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSamSystem 1.3.6.1.4.1.6876.90.1.2.17
Notifications that are SamSystem related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMSamSystemPrefix 1.3.6.1.4.1.6876.90.1.2.17.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for SamSystem module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMSamDataCollectionEnabled 1.3.6.1.4.1.6876.90.1.2.17.0.1
Service Activity Monitoring will start collecting data. Action required: None Frequency of traps: Event is triggered when SAM data collection state is toggled.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSamDataCollectionDisabled 1.3.6.1.4.1.6876.90.1.2.17.0.2
Service Activity Monitoring will stop collecting data. Action required: SAM data collection can be enabled to start collectiing data. Frequency of traps: Event is triggered when SAM data collection state is toggled
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSamDataStoppedFlowing 1.3.6.1.4.1.6876.90.1.2.17.0.3
Service Activity Monitoring data stopped flowing from USVM Action required: Check the following - USVM log to see if heartbeats are recieved and sent - is the USVM running - is the Mux - USVM connection healthy - is the USVM - RMQ connection healthy - does the VM have endpoint driver installed Frequency of traps: Event is triggered when NSX Manager does not receives SAM data from USVM
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMSamDataResumedFlowing 1.3.6.1.4.1.6876.90.1.2.17.0.4
Service Activity Monitoring data resumes flowing from USVM Action required: None Frequency of traps: Event is triggered when SAM data is received from USVM.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMUsvm 1.3.6.1.4.1.6876.90.1.2.18
Notifications that are Usvm related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMUsvmPrefix 1.3.6.1.4.1.6876.90.1.2.18.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Usvm module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMUsvmHeartbeatStopped 1.3.6.1.4.1.6876.90.1.2.18.0.1
USVM stopped sending heartbeats to management plane. Action required: Connection to NSX Manager was lost. Check why the Manager didn't send a heartbeat. Frequency of traps: Event is triggered when NSX Manager does not receives heartbeats from USVM
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMUsvmHeartbeatResumed 1.3.6.1.4.1.6876.90.1.2.18.0.2
USVM will start sending heartbeats to management plane. Action required: None Frequency of traps: Event is triggered when NSX Manager receives heartbeats from USVM
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMUsvmReceivedHello 1.3.6.1.4.1.6876.90.1.2.18.0.3
USVM sent a HELLO message to Mux Action: None Frequency of traps: Event is triggered when Epsec Mux receives HELLO message from USVM during initial connection establishement.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVsmCore 1.3.6.1.4.1.6876.90.1.2.19
Notifications that are VsmCore related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMVsmCorePrefix 1.3.6.1.4.1.6876.90.1.2.19.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for VsmCore module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMUpgradeSuccess 1.3.6.1.4.1.6876.90.1.2.19.0.1
A notification generated when NSX Manager upgraded successfully.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMRestoreSuccess 1.3.6.1.4.1.6876.90.1.2.19.0.2
A notification generated when NSX Manager restored successfully.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMDuplicateIp 1.3.6.1.4.1.6876.90.1.2.19.0.3
The NSX Manager IP has been assigned to another machine Action: None Frequency: This is triggered whenever NSX Manager detects that its IP address is being used by another machine in the same network
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlan 1.3.6.1.4.1.6876.90.1.2.20
Notifications that are Vxlan related will have this OID prefix.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMVxlanPrefix 1.3.6.1.4.1.6876.90.1.2.20.0
This group is actually the prefix one uses when creating vmware NSX manager specific trap OID's for Vxlan module.
Status: current Access: accessible-for-notify
OBJECT-IDENTITY    

vmwNsxMVxlanLogicalSwitchImproperlyCnfg 1.3.6.1.4.1.6876.90.1.2.20.0.1
This event is triggered if one or more distributed virtual port groups backing a certain Logical Switch were modified and/or removed. Or if migration of Control plane mode for a Logical Switch/Transport Zone failed. Action required: (1) If the event was triggered due to deletion/modification of backing distributed virtual port groups, then the error will be visible on Logical Switch UI page. Resolve from there will try and create missing distributed virtual port groups for the Logical Switch. (2) If event was triggered due to failure of Control plan mode migration, redo the migration for that Logical Switch or Transport Zone. Frequency of traps: Event is triggered due to user actions as explained in description. Affects: Logical Switch network traffic.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanLogicalSwitchProperlyCnfg 1.3.6.1.4.1.6876.90.1.2.20.0.2
Logical Switch status has been marked good, most probably as result of resolving any errors on it. Action required: None Frequency of traps: Event is triggered when user resolves the Logical Switch error and as a result missing backing distributed virtual port groups are recreated.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanInitFailed 1.3.6.1.4.1.6876.90.1.2.20.0.3
Failed to configure vmknic as a VTEP, VXLAN traffic through this interface will be dropped until this is resolved. Action required: Check the host's vmkernel.log for more details. Frequency of traps: Every time a VTEP vmknic tries to connect to it's Distributed Virtual Port. Affects: VXLAN traffic on the affected Host.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanPortInitFailed 1.3.6.1.4.1.6876.90.1.2.20.0.4
Failed to configure VXLAN on the Distributed Virtual Port, the port will be disconnected. Action required: Check the host's vmkernel.log for more details. Frequency of traps: Every time a VXLAN vNic tries to connect to it's Distributed Virtual Port on the host. Affects: VXLAN traffic on the affected Host.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanInstanceDoesNotExist 1.3.6.1.4.1.6876.90.1.2.20.0.5
VXLAN configuration was received for a Distributed Virtual Port, but the host has not yet enabled VXLAN on the vSphere Distributed Switch. VXLAN ports on affected Host will fail to connect until resolved. Action required: See KB 2107951 (https://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=2107951&sliceId=1&docTypeID=DT_KB_1_1&dialogID=40732862&stateId=0%200%2040754197) Frequency of traps: Every time any VXLAN related port (vNic or vmknic) tries to connect to it's Distributed Virtual Port on the host. Affects: VXLAN Traffic on that Host.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanLogicalSwitchWrkngImproperly 1.3.6.1.4.1.6876.90.1.2.20.0.6
VTEP interface was unable to join the specified multicast address, the VTEP will be unable to receive some traffic from other hosts until this is resolved. The host will periodically retry joining the group until it is successful. Action required: Check the host's vmkernel.log for more details. Frequency of traps: NSX retries joining failed mcast groups every 5 seconds. Affects: Logical Switch associated with problem VTEP interface won't work properly.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanTransportZoneIncorrectlyWrkng 1.3.6.1.4.1.6876.90.1.2.20.0.7
The IP address of a VTEP vmknic has changed. Action required: None. Frequency of traps: Every time a VTEP IP changes
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanTransportZoneNotUsed 1.3.6.1.4.1.6876.90.1.2.20.0.8
VTEP vmknic does not have a valid IP address assigned, all VXLAN traffic through this vmknic will be dropped. Action required: Verify the IP configuration for the interface, and the DHCP server if DHCP is used. Frequency of traps: Once per VTEP loosing it's IP address.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanOverlayClassMissingOnDvs 1.3.6.1.4.1.6876.90.1.2.20.0.9
NSX packages where not installed prior to DVS configuration for VXLAN. All VXLAN ports will fail to connect until resolved. Action required: See KB 2107951 https://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=2107951&sliceId=1&docTypeID=DT_KB_1_1&dialogID=40732862&stateId=0%200%2040754197 Frequency of traps: Once per setting of the com.vmware.netoverlay.layer0=vxlan opaque property or whenver the host is configured for vxlan or Host reconnects to VCEnter and host has some problem. Affects: VXLAN Traffic for that Host will be affected.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanControllerRemoved 1.3.6.1.4.1.6876.90.1.2.20.0.10
A notification generated when VXLAN Controller has been removed due to the connection cant be built, please check controller IP configuration and deploy again.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanControllerConnProblem 1.3.6.1.4.1.6876.90.1.2.20.0.11
NSX manager detected the connection between two controller nodes is broken. Action required: It is a warning event, users need to check the controller cluster for the further steps. Check following KB 2127655 https://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=2127655&sliceId=1&docTypeID=DT_KB_1_1&dialogID=40732913&stateId=0%200%2040754965 to see if issue matches. Frequency of traps: Whenever the controller reports the issue. Affects: Networking might get affected.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanControllerInactive 1.3.6.1.4.1.6876.90.1.2.20.0.12
Host Certification information couldn't be sent to NSX Controllers. Action required: Ensure that NSX Controller cluster is in healthy state before preparing a new Host. Invoke Controller Sync API to try and rectify this error. Frequency of traps: When a new host is prepared for NSX networking. Affects: Newly prepared Host. Communication channel between Host and NSX Controllers might have issues.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanControllerActive 1.3.6.1.4.1.6876.90.1.2.20.0.13
A notification generated when Controller cluster state is now active. Controller Synchronization job is in progress. Frequency of traps: Controller cluster becomes active again from a previous inactive state. Action required: User doesnt have to take any corrective action. NSX will auto-sync the controllers.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanVmknicMissingOrDeleted 1.3.6.1.4.1.6876.90.1.2.20.0.14
VXLAN vmknic is missing or deleted from host. Action required: Issue can be resolved from Logical Network Preparation - VXLAN Transport UI section. Clicking on resolve will try to rectify the issue. Frequency of traps: First time NSX Manager finds that VXLAN vmknic is missing or deleted from Host. Affects: VXLAN Traffic to/from the mentioned Host will be affected.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanInfo 1.3.6.1.4.1.6876.90.1.2.20.0.15
NSX Manager will raise this event when connection between either of the following component is established/re-established (i) connection between NSX Manager and Host Firewall agent. (ii) connection between NSX Manager and Control Plane Agent. (iii) connection between Control Plane Agent to Controllers. Action required: None Frequency of traps: NSX Manager will raise this event when connection between either of the following component is established/re-established (i) connection between NSX Manager and Host Firewall agent. (ii) connection between NSX Manager and Control Plane Agent (iii) connection between Control Plane Agent to Controllers.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanVmknicPortGrpMissing 1.3.6.1.4.1.6876.90.1.2.20.0.16
NSX manager detected one vxlan vmknic is missing on VC. Action required: Check the host, if that vmknic is deleted, click on the resolve button on UI, or call the remediate API (POST /api/2.0/vdn/config/host/{hostId}/vxlan/vteps?action=remediate) to recreate the vxlan vmknic. Frequency of traps: First time when vxlan vmknic is detected missing (manually deleted by user or inventory report the incorrect information) Affects: The VXLAN traffic on that host may be interrupted.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanVmknicPortGrpAppears 1.3.6.1.4.1.6876.90.1.2.20.0.17
NSX manager detected one vxlan vmknic that was marked as missing has now reappeared on VC. Action required: None Frequency of traps: When that missing vmknic re-appears again. Affects: The VXLAN traffic on that host may be resumed.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanConnDown 1.3.6.1.4.1.6876.90.1.2.20.0.18
This event is triggered when either of the following connections are detected down by NSX Manager: (i) connection between NSX Manager and Host Firewall agent. (ii) connection between NSX Manager and Control Plane Agent. (iii) connection between Control Plane Agent to Controllers. Action required: (i) If NSX Manager to Host Firewall Agent connection is down, check NSX Manager and Firewall Agent logs to get error details. You can try Fabric Synchronize API to try and retificy this issue. (ii) If NSX Manager to Control Plane Agent connection is down, please check NSX Manager and Control Plane Agent logs to get the error detail, check whether the Control Plane Agent process is down. (iii) If Control Plane Agent to Controllers connection is down, please go to UI Installation page to check the connection status for crossponding Host. Frequency of traps: When (i) NSX Manager looses connection with Firewall agent on host or (ii) NSX Manager losses connection with Control plane agent on host or (iii) Control plane agent on Host looses connection with NSX Controllers. Affects: VMs on that Host might get affected.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMBackingPortgroupMissing 1.3.6.1.4.1.6876.90.1.2.20.0.19
NSX manager detected one backing portgroup of a logical switch is missing on VCenter. Action required: Click on the resolve button on UI or call the API (POST https:///api/2.0/vdn/virtualwires//backing?action=remediate) to recreate that backing portgroup. Frequency of traps: Whenever logical switch backing portgroup is missing on VC. Affects: VMs cannot be connected to this Logical Switch.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMBackingPortgroupReappears 1.3.6.1.4.1.6876.90.1.2.20.0.20
NSX manager detected one backing portgroup of a logical switch that was missing reappears on VC. Action required: None Frequency of traps: Whenever user triggered remediate API on Logical Switch which has missing backing portgroup.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMManagedObjectIdChanged 1.3.6.1.4.1.6876.90.1.2.20.0.21
NSX manager detected the Managed Objectid of one backing portgroup of a logical switch changed. Action required: None Frequnecy of traps: This typically happens when user restores a backup of Logical Switch backing portgroup.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMHighLatencyOnDisk 1.3.6.1.4.1.6876.90.1.2.20.0.22
NSX manager detected some disk on a NSX Controller has high latency. Action required: Rectify the issue on specified device and controller. Frequency of traps: First time NSX detected this issue as reported by Controller. When this issue gets resolved another Informational event will be raised by NSX Manager indicating the same. Affects: NSX Controller.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMHighLatencyOnDiskResolved 1.3.6.1.4.1.6876.90.1.2.20.0.23
NSX manager detected the disk high latency alert on a some disk on a NSX Controller has been resolved. Frequency of traps: First time NSX detected, previously raised disk latency issue has been resolved.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMControllerVmPoweredOff 1.3.6.1.4.1.6876.90.1.2.20.0.24
NSX manager detected a Controller Virtual Machine is powered off from vCenter. Action required: Click on the 'Resolve' button on Controller page on UI or call the API (POST https:///api/2.0/vdn/controller/{controllerId}?action=remediate) to power on the Controller Virtual Machine. Frequency of traps: This event wil be raised when controller Virtual Machine is powered off from vCenter. Affects: Controller cluster status might go to disconnected if a controller Virtual Machine is powered off. Any operation that requires an active Controller Cluster may be affected.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMControllerVmDeleted 1.3.6.1.4.1.6876.90.1.2.20.0.25
NSX manager detected a Controller Virtual Machine is deleted from vCenter. Action required: Click on the Resolve button on Controller page on UI or call the API (POST https:///api/2.0/vdn/controller/{controllerId}?action=remediate) to clean up NSX manager's database state. Frequency of traps: This event will be raised when Controller Virtual Machine is deleted from vCenter. Affects: Controller cluster status might go to disconnected if a controller Virtual Machine is powered off. Any operation that requires an active Controller Cluster may be affected.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxMVxlanConfigNotSet 1.3.6.1.4.1.6876.90.1.2.20.0.26
NSX manager detected the VXLAN configuration is not set on the host (would-block issue). And this event indicates NSX Manager tried to rectify this issue by resending the VXLAN configuration on Host. Action required: See KB 2107951 https://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=2107951&sliceId=1&docTypeID=DT_KB_1_1&dialogID=40732862&stateId=0%200%2040754197 for more information. Frequency of traps: This event will generate when host preparation task is triggered for a host and Host encounters would-block issue. Affects: It is a notification, no specific guide for the next step.
Status: current Access: accessible-for-notify
NOTIFICATION-TYPE    

vmwNsxManagerMIBConformance 1.3.6.1.4.1.6876.90.1.99
OBJECT IDENTIFIER    

vmwNsxManagerMIBCompliances 1.3.6.1.4.1.6876.90.1.99.1
OBJECT IDENTIFIER    

vmwNsxManagerMIBGroups 1.3.6.1.4.1.6876.90.1.99.2
OBJECT IDENTIFIER    

vmwNsxManagerMIBBasicCompliance 1.3.6.1.4.1.6876.90.1.99.1.3
The compliance statement for entities which implement VMWARE-NSX-MANAGER-MIB.
Status: current Access: accessible-for-notify
MODULE-COMPLIANCE    

vmwNsxManagerNotificationInfoGroup1 1.3.6.1.4.1.6876.90.1.99.2.2
These objects provide details in NSX Manager notifications.
Status: current Access: accessible-for-notify
OBJECT-GROUP    

vmwNsxManagerNotificationGroup1 1.3.6.1.4.1.6876.90.1.99.2.3
Group of objects describing notifications (traps, informs).
Status: current Access: accessible-for-notify
NOTIFICATION-GROUP