Configuration Guide
Operation and Alarm Management
13 min
firmware management is an important feature of the controller for managing version image files and patch files for network devices users can upload local images to the controller for easy deployment of new software versions throughout the network, or update network devices directly with the uploaded firmware administrators can upload local version images to the controller and record basic information about software versions firmware managemen firmware managemen t t firmware upload firmware upload the administrator can upload the local version image to the controller and record the basic information of the software version operation steps true 97,565 unhandled content type unhandled content type unhandled content type unhandled content type unhandled content type unhandled content type unhandled content type unhandled content type unhandled content type unhandled content type firmware use firmware use true 95,567 unhandled content type unhandled content type unhandled content type unhandled content type unhandled content type unhandled content type patch management patch management patch upload patch upload patch management allows administrators to upload patch files to the controller, the controller automatically parses the patch content to ensure that patches are applied to the correct device platforms, thereby enhancing network security and device stability key functions click \[operation] \[firmware] \[patch] \[+] to enter the patch upload view administrators can upload patch files in various formats (such as bin, tar gz, patch) patch apply patch apply on the \[device] interface, select the corresponding device type, choose the device that needs to be upgraded, click the \[operation] button in the upper right corner, and select \[patch apply] filter the required patches and devices on the pop up view, and click \[next] to apply the patches alarm management alarm management alarm item configuration alarm item configuration administrators can configure the recipients of alarm emails and alarm thresholds in the \[configuration] \[operations configuration] view of the designated venue by default, all alarms supported by the controller are enabled the controller supports the following alarms true 195,467#4283c7 unhandled content type #4283c7 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type mail sender mail sender click \[system] \[mail sender] to modify the source mailbox for sending alerts click \[connectivity] to test the connectivity between the controller and the email server, preventing alarm emails from failing to be sent normally due to network connectivity issues alarm message alarm message administrators can view alarm information for all devices within their management authority in the \[operations] \[alarm] view active alarms displays alarm items that still exist currently alarms history displays alarm items that showed abnormalities before but have returned to normal click the alarm item to view specific alarm information and process it click the \[edit] button, fill in the processing information for the current alarm in the \[analysis] section, and click the \[save] button to complete the edit after that, this alarm information will no longer be displayed in \[active alarms] but will be stored as a processed alarm in \[alarm history] device inspection device inspection the device inspection feature is designed to regularly check and monitor network devices to ensure their normal operation and detect potential faults in a timely manner its main functions include device status monitoring checks critical parameters such as cpu usage, memory usage, storage, and port status to ensure devices are functioning properly log and alarm management collects device logs, analyzes abnormal events, and triggers alarm mechanisms critical process status check monitors the status of essential processes to ensure smooth business operations automated inspection tasks supports scheduled inspection tasks, generates inspection reports, and facilitates network maintenance system inspection system inspection system inspection refers to the periodic check of the controller's internal system to ensure stable and efficient operation key inspection items include cpu & memory usage monitors cpu load and memory consumption to prevent system failures due to resource exhaustion disk usage check examines disk usage to prevent logs or cached data from consuming all available storage, which could impact system performance files descriptor verifies the proper functioning of critical services (e g , network management, authentication, logging) and automatically restarts abnormal processes e mail server connected tests the controller's connectivity with the email server to ensure alert notifications are successfully sent system inspections can be scheduled at fixed intervals (e g , every 5 minutes or every hour) and automatically generate inspection reports for administrators to analyze and optimize system performance business inspection business inspection business inspection refers to periodic or on demand checks of network device operation to ensure stable business operations and prevent potential failures one click inspection one click inspection this feature allows users to specify inspection items and target venues for an instant inspection, defining the scope of the inspection accordingly cycle inspection cycle inspection cycle inspection is configured based on the needs of different venues, allowing for automated inspections at scheduled intervals without manual intervention, thus improving operational efficiency click the \[view details] button to view/edit the periodic inspection settings for the selected venue inspection records inspection records both one click inspections and periodic inspections are logged in the inspection records click the \[view details] button to check the inspection results all detected anomalies will be listed under the \[abnormal] section administrators can click \[actions] \[view details] to check the inspection results of a specific device click on the mac address to directly navigate to the device management interface for further analysis
