Checking compliance........................................................................................................................................................85
Editing baselines................................................................................................................................................................ 85
Managing catalogs............................................................................................................................................................ 85
Viewing catalogs..........................................................................................................................................................86
Adding catalogs............................................................................................................................................................86
Updating firmware.............................................................................................................................................................87
Rolling back firmware....................................................................................................................................................... 88
Deleting firmware.............................................................................................................................................................. 88
Chapter 14: Monitoring alerts and logs........................................................................................ 89
Alert log............................................................................................................................................................................... 89
Filtering alert logs........................................................................................................................................................89
Acknowledging alert logs...........................................................................................................................................90
Unacknowledging alert logs...................................................................................................................................... 90
Ignoring alert logs........................................................................................................................................................90
Exporting alert logs.....................................................................................................................................................90
Deleting alert logs........................................................................................................................................................90
Alert policies....................................................................................................................................................................... 90
Creating alert policies..................................................................................................................................................91
Enabling alert policies..................................................................................................................................................91
Editing alert policies....................................................................................................................................................92
Disabling alert policies................................................................................................................................................ 92
Deleting alert policies..................................................................................................................................................92
Alert definitions..................................................................................................................................................................92
Filtering alert definitions............................................................................................................................................ 92
Chapter 15: Monitoring audit logs................................................................................................94
Filtering audit logs.............................................................................................................................................................94
Exporting audit logs.......................................................................................................................................................... 94
Monitoring jobs.................................................................................................................................................................. 95
Filtering jobs................................................................................................................................................................. 95
Viewing job details.......................................................................................................................................................96
Running jobs................................................................................................................................................................. 96
Stopping jobs................................................................................................................................................................96
Enabling jobs................................................................................................................................................................. 97
Disabling jobs................................................................................................................................................................ 97
Deleting jobs................................................................................................................................................................. 97
Chapter 16: Use case scenarios................................................................................................... 98
Assigning backup to the MCM Lead.............................................................................................................................98
Creating chassis group with backup lead.............................................................................................................. 98
Monitoring the MCM group...................................................................................................................................... 99
Scenarios when backup lead can take over as lead chassis................................................................................. 100
Disaster recovery of lead chassis.......................................................................................................................... 100
Retiring lead chassis..................................................................................................................................................102
Chapter 17: Troubleshooting...................................................................................................... 103
Storage...............................................................................................................................................................................103
Firmware update is failing........................................................................................................................................ 103
6
Contents