User guide (new CSA)

Upload and analyze log file(s)

On the main screen, select the Log analysis tool by clicking on Upload files.

images/csa/tool_list-new.png


You can upload new files by dragging them over to the dropzone and then clicking Upload.

_images/upload_files.png

CSA will then load the files and automatically detect the product type. The list of files available for analysis is the listed below the dropzone. You can see the file name, size and product type.

_images/available_files.png


Note

If the product type is not automatically detected, the file you have uploaded may be corrupt or it is not supported by the tool. For the list of the supported products and log file formats please refer to this document: Product and feature support.

You can select one or more files at once and hit Run Analysis button to start the analysis. As discussed in the following Analysis section, the output shown will differ for single or multiple file analysis.

Packet captures (PCAPs)

Packet capture files (.pcap, .pcapng) have their own product type and can be used in several ways when selected for analysis:

  1. Single standalone pcap will be result in single product (pcap) analysis.

  2. Multiple pcap files without any other product result in multiple pcap files analysis. Each pcap is treated individually.

  3. Selecting one or more pcaps along with one other product will result in the pcaps being associated with that one product and the information extracted from pcap files will be used in the main product analysis. This is useful when the packet captures were upload separately to main product archive.

  4. Selecting multiple products and one or more pcaps will result in pcaps being analyzed individually as we can’t know to which product to link them to.

Note

Any pcap file that is contained within a folder or archive that was identified as specific product will be automatically associated with this product. If multiple products each having one or more pcaps need to be analyzed at once, the way to do it is to create an archive for each product containing the product logs and the pcaps. The above only applies when pcap files are individually selected and identified as pcap product type.

Analysis

Files selected for analysis are parsed for system information and communication flows. If more than one file (product) was selected, the communication flows are correlated across these products and later on displayed in such way. Additionally, we try to automatically detect common configuration mistakes or known defects using our Diagnostic signatures.

The analysis display is organized in two pages as follows:

  1. Diagnostics page - displays results of various diagnostic signatures (both CSA native and external integrations).

  2. Analysis result - page contains multiple sections organised vertically:

    • System information - system configuration and other static information

    • Log overview - selectable communication flows list

    • Detail view - details regarding any specific communication flow selected in Log overview section

Switching between multiple analysis options

When multiple files are analyzed, you can switch between combined analysis (communication flows combined across different devices) and individual analysis options (analysis of single log file). This is done by clicking on the Combined analysis button in the header.

_images/analysis_multiple_analysis_button.png


A list of analysis options is then shown below and clicking on any of the options will switch the analysis. The button in page header will reflect the switch by showing the log file name in case of individual analysis.

_images/analysis_multiple_analysis_options.png


Timezone selector

In the top header there is also a timezone selector. By default, all the timestamps within CSA analysis (log overview, detail sections) are normalized to UTC. User has the option to change the timezone in which to see the timestamps and this value will be remembered.

_images/analysis_timezone_selector.png


Diagnostic signatures

If any issues were found by diagnostic signatures, the first thing displayed to the user is the summary view of these issues. If no issues are found, the page scrolls down to System information section if one file was selected for analysis, or to `Multiple analysis options`_ section if more files were selected.

_images/csa_callengine_diagnostic_signatures.jpg


At the time of analysis first the CSA own diagnostic signatures are shown and other external diagnostic signatures sources are called in the background. This is indicated by the messages below and could result in more signatures matched once the process finishes:

_images/csa_callengine_additional_diag.png


Clicking on any of the items shown will display more details about the issue including the more detailed issue description, appearance in logs and action plan to fix or further troubleshoot the issue. If there is a known defect related to the issue, or there is external document available, the link will be shown.

_images/csa_callengine_diagnostic_signature_detail.jpg


Some diagnostic signatures may contain a direct link Show in analysis to the communication flow in log analysis itself. To get to the log analysis, you can alternatively scroll down to System information section or click on Continue to analysis link above the Diagnostic signature list.

If you’re interested in seeing what other diagnostic signatures were run, but did not find any issues, you can select other Result type in the control panel on the left. More information about the specific result type is shown when hovering over the ? button on the top right of the diagnostic signatures list. Additionally there is a toggle button to only show defect-related diagnostic signatures.

_images/csa_callengine_ds_filter.jpg


All diagnostic signatures are listed here

System information

This section shows system status and configuration gathered from the product logs, which is often used for troubleshooting. The output varies for different products.

_images/csa_callengine_system_information.jpg


CMS console

If live.json is present in the CMS archive uploaded to the tool, the CMS console is shown and works the same as the actual MMP console of the CMS server, when you connect to it over console or SSH.

Note

Not all the MMP commands are supported, and it will be indicated by the console if unsupported command is entered.


Log overview

The section displays the communication flows found in logs organised in tabs. Each tab contains the list of all the flows found that can be sorted and/or searched through using the search input field. With multiple files selected for analysis, the amount of information shown depends based on type of analysis chosen. See the above `Multiple analysis options`_ section for more information.

Combined analysis

_images/csa_callengine_log_overview_combined.jpg


Single product analysis

_images/csa_callengine_log_overview_single.jpg


Clicking on any item in the table for some of the tabs will display a detailed view for the communication flow as shown in next section.

Detail

After clicking on item in the table in Log overview section more details are shown for the particular communication flow. Below are some examples for SIP/H323 calls.

Single product analysis - SIP call

General call information

_images/csa_callengine_detail_single_call1.jpg


RTP streams linked to SIP call

_images/csa_callengine_detail_single_call2.jpg


Signaling

_images/csa_callengine_detail_signaling.jpg


Multiple products analysis - ladder diagram of SIP call

_images/csa_callengine_detail_multiple_ladder.jpg


STUN ^^^^

This section explains how to read the tables in the STUN tab.

Allocate Requests

_images/csa_callengine_stun_allocate_request.png

In the above screenshot, we can see that 173.38.220.60:64267 has sent an Allocate Request to 213.33.49.40.
213.33.49.40 has responded with an Allocate Success Response with the NATted address of 173.38.220.60 (XOR-MAPPED-ADDRESSED) and the address of the relay and the port allocated by the relay.

When clicking on one of the rows, we can see the all the STUN messages related to the allocation in a ladder:

_images/csa_callengine_stun_binding_details.png

When hovering the icons, additional information is provided:

_images/csa_callengine_stun_allocate_hover.png

Permission Requests

_images/csa_callengine_stun_permission_request.png

In the above screenshot, we can see that 10.58.9.191 has sent a Create Permission Request to 10.52.254.54 to allow traffic from the below addresses to be forwarded to 10.58.9.191:17728 :
- 192.168.1.4:2438
- 2.34.97.130:2438
- 10.51.28.179:37336
- 173.38.168.144:24006

A Create Permission Success Response has been sent by 10.52.254.54 to 10.58.9.191.

Binding Requests

_images/csa_callengine_stun_binding_request_1.png

The green checkbox highlighted in blue means that 213.33.49.40:24007 has sent a Binding Request to 213.33.49.40:24001 while the green checkbox highlighted in orange means that a Binding Success Response has been sent from 213.33.49.40:24001 to 213.33.49.40:24007. If the checkbox highlighted in orange was red, it would mean that no Binding Success Response has been received by 213.33.49.40:24007.

When clicking on one of the rows, we can see the details of the stream:

_images/csa_callengine_stun_binding_details.png _images/csa_callengine_stun_binding_request_2.png

The highlighted checkboxes in the above means that 60.60.60.100:2338 has sent a Bind Request to 10.10.10.10:2330 and has received a Binding Success Response.

_images/csa_callengine_stun_binding_request_3.png

The highlighted checkboxes in the above means that 10.10.10.10:2330 has sent a Bind Request with the Use-Candidate attribue to 60.60.60.100:2338 and has received a Binding Success Response.

_images/csa_callengine_stun_binding_from_indication.png

In the above screenshot, when hovering over the sheet icon, the IP address and port of the host will be displayed.
This means that the binding request sent from 173.38.168.144:24002 to 10.58.9.191:17064 has been initiated by a STUN Send Indication from 2.34.97.130:2326.
We can verify it by:
- clicking on a row to get the details

_images/csa_callengine_stun_binding_from_indication_details.png


- take note of the the transaction ID
- open the packet capture
- filter with “stun.type==0x0016 and data.data contains [transactionID]”. The transactionID should be edited to insert “:” after every 2 charachters

_images/csa_callengine_stun_binding_from_indication_ws_1.png

We can see that the first 4 hex is 0001 of the data (highlighted in blue). This means that the Send Indication message contains a STUN Binding Request message. A couple of hexadecimal after (just after the STUN magic cookie) we can find the transaction ID.
- We can now filter the packet capture with “stun.id == [transactionID]”

_images/csa_callengine_stun_binding_from_indication_ws_2.png


We can see that the message type is 0x0001 (Binding Request) and the transaction ID is the same. This message is the Binding Request sent from 173.38.168.144:24002 to 10.58.9.191:17064 initiated by the Send Indication.

Channel Bind Requests

_images/csa_callengine_stun_channel_binding.png

In the screenshot above, we can see that 10.10.254.18:36654 sent a Channel Bind Request to 10.10.254.10:3478 and received a Channel Bind Success Response. The channel number that will be used fot Channel Data is 0x4000.