Performing Summit WM Controller Software Maintenance
Summit WM20 User Guide, Software Release 4.2
211
4
To complete a Summit WM Controller upgrade or an AP upgrade go to the appropriate
Software
Maintenance
screen. For more information, see
“Updating Summit WM Controller Software” on
page 202
or
“Updating Operating System Software” on page 204
.
Configuring Summit WM Controller, Access Points and Software
Logs and Traces
The system stores configuration data and log files. These files include:
●
event and alarm logs (triggered by events)
●
trace logs (triggered by component activity)
●
accounting files (created every 30 minutes, to a maximum of six files)
The files are stored in the operating system and have a maximum size of one GB. The accounting files
are stored in flat files in a directory that is created every day. Eight directories are maintained in a
circular buffer (when all are full, the most recent replaces the earliest).
Viewing Log, Alarm and Trace Messages
The Summit WM Controller generates three types of messages:
●
Logs (including alarms) – Messages that are triggered by events
●
Audits – Files that record administrative changes made to the system (the GUI Audit displays
changes to the Graphical User Interface on the Summit WM Controller)
●
Traces – Messages that display activity by component, for system debugging, troubleshooting and
internal monitoring of software
CAUTION
In order for the
Debug Info
option on the
Wireless AP Traces
screen to return Trace messages, this option must
enabled while Wireless AP debug commands are running. To do so, you need to run a Wireless AP CLI command to
turn on a specific Wireless AP debug. Once the CLI command is run, select the
Debug Info
option, and then click
Retrieve Traces.
For more information, see the Summit WM Controller, Access Points and Software CLI Reference
Guide.
Because Wireless AP debugging can affect the normal operation of Wireless AP service, enabling debugging is not
recommended, unless specific instructions are provided.
Logs Including Alarms
The log messages contain the time of event, severity, source component and any details generated by
the source component. The messages are classified at four levels of severity:
●
Informational, the activity of normal operation
●
Minor (alarm)
●
Major (alarm)
●
Critical (alarm)
The alarm messages (minor, major or critical log messages) are triggered by activities that meet certain
conditions that should be known and dealt with.
Содержание Summit WM20
Страница 8: ...Table of Contents Summit WM20 User Guide Software Release 4 2 8 ...
Страница 20: ...About this Guide Summit WM20 User Guide Software Release 4 2 20 ...
Страница 54: ...Configuring the Summit WM Controller Summit WM20 User Guide Software Release 4 2 54 ...
Страница 96: ...WM Access Domain Services Summit WM20 User Guide Software Release 4 2 96 ...
Страница 150: ...WM Access Domain Services Configuration Summit WM20 User Guide Software Release 4 2 150 ...
Страница 168: ...Availability and Controller Functionality Summit WM20 User Guide Software Release 4 2 168 ...
Страница 172: ...Working With Third Party APs Summit WM20 User Guide Software Release 4 2 172 ...
Страница 184: ...Working With the Summit WM Series Spy Summit WM20 User Guide Software Release 4 2 184 ...
Страница 194: ...Working With Reports and Displays Summit WM20 User Guide Software Release 4 2 194 ...
Страница 216: ...Performing System Maintenance Summit WM20 User Guide Software Release 4 2 216 ...