Configuration Process
Before using SystemReporter to monitor storage systems, you need to log in to SystemReporter to register storage systems that you want to register. If you want to obtain monitoring data of a certain type, follow the configuration flowchart to implement initial configuration.
Figure 3-1 shows the configuration process.
Table 3-1 shows each configuration step.
No. |
Step |
Description |
---|---|---|
1 |
You can perform this operation if the web browser displays a security certificate error when you log in to SystemReporter. |
|
2 |
Before using SystemReporter to monitor storage systems, you need to log in to SystemReporter first. |
|
3 |
Data of storage systems can be monitored only after the storage systems have been registered with SystemReporter. |
|
4 |
You can perform this operation if you want to customize other collection policies in addition to the default data collection and frequently accessed data save policies. |
|
5 |
If you want SystemReporter to automatically generate alarms, set alarm thresholds first. |
|
6 |
SystemReporter has default indicator templates. You can perform this operation if you want to monitor certain indicators. |
|
7 |
Configure a notification server if you want to send alarm information or exported monitoring data to a specified email address. |
|
NOTE:
In the configuration process, registration is the primary configuration operation and other operations are for reference only. You can perform configuration when using SystemReporter. |