A complete computer room management system can never avoid these contents

Mondo Workplace Updated on 2024-01-28

List of high-quality authors

How can you manage a computer room well?

A complete computer room management system can help you with long-term stability and reduce the occurrence of failure rates.

Principles of organizing cabinets

1. Organize the network cables according to the topology of the network and the existing equipment.

2. In principle, the power cord and network cable of the cabinet should be sorted out separately.

3. The placement of the equipment should be appropriate, avoid squeezing each other, avoid being too high or too low, and avoid being too close to each other.

4. If there are too many devices in the cabinet, the devices should be numbered.

5. For each line, it should be marked in the appropriate position.

6. Different identification methods should be used for different connections (such as general network connection lines, cross lines, dedicated lines, etc.).

7. The network cable arrangement is based on the room number and not the person.

It can be summed up in one sentence: clear layout, regular line order, clear marking, easy maintenance.

The daily code of conduct for computer room personnel

1. Attention must be paid to environmental hygiene. It is forbidden to eat, smoke, or spit in the computer roomIf the floor and other items in the computer room are soiled by accident or during work, measures must be taken to clean up the room in time to keep the computer room dust-free and clean.

2. Pay attention to personal hygiene. The staff should be neatly dressed, elegant in conversation, and generous in manners.

3. The supplies in the computer room should be in their own place and should not be placed at will.

4. Personnel should be arranged in the computer room to be on duty, responsible for the daily sorting and behavior supervision of the computer room.

5. Rain gear, articles and other items in and out of the computer room should be placed neatly according to the requirements.

6. Pay attention to check the sunscreen, waterproof, and moisture-proof of the computer room, maintain a smooth environment in the computer room, and pay attention to the influence of weather on the computer room. Take lightning protection measures.

7. The inside of the computer room should not be loud, pay attention to the noise and audio volume control, and maintain a quiet working environment.

8. Insist on cleaning up the desktop and placing items neatly before getting off work every day.

Electricity safety system in the computer room

1. The personnel of the computer room should learn Xi routine electricity safety operation and knowledge, and understand the operation procedures of the power supply and power facilities inside the computer room.

2. The personnel of the computer room should always Xi and master the emergency treatment steps, measures and essentials of the computer room.

3. The computer room should arrange personnel with professional qualifications to regularly inspect the power supply, electrical equipment and facilities.

4. Do not messily connect the wires, and choose safe and first-class power supply and electrical equipment.

5. Before really connecting the power supply of the equipment, it is necessary to check whether the lines and connectors are safely connected, whether the equipment is ready, and whether the personnel have safety protection.

6. It is strictly forbidden to cut off the power of the equipment at will, change the power supply line of the equipment, and it is strictly forbidden to connect, connect and lap various power supply lines at will. @网络工程师俱乐部.

7. If potential safety hazards are found, measures should be taken to solve them immediately, and if they cannot be solved, they must be solved by the relevant responsible personnel in a timely manner.

8. The personnel of the computer room are responsible for the safety of personal electricity. If outsiders need electricity, they must obtain the permission of the management personnel of the computer room, and use the power supply method that has the least impact on safety and equipment in the computer room.

9. The staff in the computer room need to leave the current electrical working environment, and should check and ensure the electrical safety of the working environment.

10. The staff who leave the computer room last should check all the electrical equipment, and should turn off the electrical equipment that may have serious consequences if the long-term live operation may have serious consequences.

11. It is forbidden to use high-temperature, red-hot and spark-generating electrical equipment in the computer room unattended.

12. Before using electrical equipment with power exceeding a certain wattage, it must be approved by the superior supervisor and used on the basis of ensuring line insurance.

13. Corresponding safety operation methods, warnings and guidelines should be posted in high-risk locations, and should be strictly implemented during actual operation.

14. In the event of a power failure in the external power supply system, the staff of the computer room shall fully cooperate to complete the emergency work of power outage.

15. Attention should be paid to saving electricity.

Water use system in the computer room

1. It is forbidden to install water supply pipelines and facilities in the computer room.

2. Comply with the safety operations, warnings and safety guidelines posted in the corresponding locations.

Software security use system

1. The running status of the software must be checked regularly, the software operation log records must be regularly accessed, and the data and software logs must be backed up.

2. It is forbidden to debug the experimental software on the server, and it is forbidden to install the software on the server at will. The server needs to be configured, and it must be debugged and confirmed to be feasible on other machines that can be tested before the server can be accurately configured.

3. Notices should be issued for software changes and debugging operations that will affect the overall situation, and sufficient time, plan and personnel should be prepared before the software configuration can be changed. @网络工程师俱乐部.

4. For major software configuration changes, a program document should be formed first, and after discussion and confirmation of feasibility, the change should be made by qualified technical personnel, and detailed changes and operation records should be made. Before you change, upgrade, or configure software, you should be fully prepared for the negative consequences caused by the change, upgrade, and configuration, and if necessary, you need to back up the original software system and implement emergency measures.

5. No personnel are allowed to debug and operate software unrelated to the scope of work on core equipment such as servers. Without the permission of superiors, it is not allowed to lead or instruct others to enter the computer room, change and operate the network and software environment.

6. The safety operation, warnings and safety guidelines posted in the corresponding position should be strictly observed.

Data center data, documents and data security system

1. Materials, documents, data, etc. must be effectively organized, sorted out and filed for the record.

2. It is forbidden for any person to provide the data, documents, data, configuration parameters and other information in the computer room to other unrelated personnel in any form or disseminate it to the outside world at will.

3. Important information, passwords, materials, documents, etc. related to network security and data security must be properly stored. If the external staff really needs to read the documents, materials or inquire about the relevant data, the relevant person in charge of the computer room should check it on their behalf, and can only provide them with data or materials related to their current work content.

4. Important data, documents and data should be encrypted, stored and backed up by corresponding technical means. Encrypted data should be restored to prevent the loss of important data.

Safe use system for hardware equipment in the computer room

1. The personnel in the computer room must be familiar with the basic safety operation and rules of the equipment in the computer room.

2. Regularly check and sort out the hardware physical connection lines, regularly check the hardware operation status (such as equipment indicators and instruments), and regularly access the hardware operation self-inspection report, so as to understand the hardware operation status in time.

3. It is forbidden to move the equipment at will, install or disassemble the hardware on the equipment at will, or change the connection of the equipment at will, and it is forbidden to reset the hardware at will.

4. It is forbidden to carry out experimental configuration operations on the server, and the server needs to be configured, and the server can only be accurately configured after debugging and confirming that it is feasible on other machines that can be tested. @网络工程师俱乐部.

5. Notices should be issued in advance for the changes and debugging of hardware devices that will affect the overall situation, and sufficient time, plans and personnel should be prepared before the changes to hardware devices can be made.

6. For the change of major equipment configuration, the program document must be formed first, and after discussion and confirmation of feasibility, the change and adjustment shall be made by qualified technical personnel, and detailed changes and operation records shall be made. Before changing, upgrading, and configuring equipment, you should be fully prepared for the negative consequences caused by the change, upgrade, and configuration, and if necessary, you need to prepare backup accessories and emergency measures.

7. No one is allowed to perform any operation unrelated to the scope of work on core equipment such as servers and switching equipment. Without the permission of the superior, others are not allowed to operate the equipment inside the computer room, and the adjustment and configuration of the core server and equipment can only be carried out after the joint consent of the team members.

8. Pay attention to and implement the maintenance measures of hardware equipment.

The registration and protection system of the computer room property

1. The daily items, equipment, consumables, etc. of the computer room must have clear quantity and model registration records, and a relatively complete borrowing and return system must be established for the management of items and important equipment for public use.

2. The staff of the computer room shall have the obligation to use any equipment, instruments and other items in the computer room safely and carefully, and shall return and store the items in their original place after use, and shall not be placed at will.

3. The items damaged, consumed and lost in the process of use should be reported and registered, and the responsible person should be held accountable. @网络工程师俱乐部.

4. Without the consent of the supervisor, it is not allowed to lend or provide equipment and items in the computer room to others.

Access management system for computer rooms

1. When non-computer room staff need to enter the computer room due to work, they should register first and enter the computer room only with permission.

2. Outsiders who enter the computer room and the items they carry must be inspected and registered, and fill in the relevant contents on the computer room entry and exit registration form in detail and truthfully, and the computer room management personnel are responsible for the supervision of the registration and can only enter after confirming that they are correct.

3. Before entering the computer room, employees from other units need to provide corresponding documents according to different work attributes. If it belongs to the engineering construction category, it is necessary to present the approval form for the construction of the computer room and the consent of the person with a valid ID card before entering and exiting the computer room.

4. Visitors entering the computer room must be accompanied by the management personnel of the computer room, and the accompanying personnel shall accompany them throughout the process and assume the management responsibility for the visit. Access to the central computer room of the sub-bureau is the responsibility of the Communications Section;The communications section is responsible for the access to the computer room of the management officeThe station attendant is responsible for entering and exiting the toll station room.

5. Outsiders entering and exiting the computer room must abide by the relevant management regulations of the computer room, keep the computer room hygienic and tidy, and wear special shoes or shoe covers when entering the computer room.

6. The access control card management system of the distribution motor room is managed by a special person, and the access control card is strictly controlled and uniformly deployedThe access control card is configured according to the principle of one person and one card, and the certain authority is set and shall not be lent to othersThe cardholder shall swipe the card to enter and exit the specified computer room to ensure that the records of the access control system are complete and trueIf the relevant unit adds an access control card or changes the access control card authority, a written application must be submitted and the access control system management personnel are responsible for approvalCard-holding employees should take good care of the access control card, and shall not lend the access card to others without authorization.

7. Personnel of equipment manufacturers entering the computer room of the sub-bureau shall submit applications and related materials to the Communications Section, and the Communications Section shall approve them. The operation plan provided by the equipment manufacturer clarifies the impact of each operation step on the network, equipment and business of the equipment manufacturer's technical personnel, and the emergency support plan should be formulated in advance, and the corresponding operation should be carried out in accordance with the plan after the emergency occurs.

8. After entering the computer room, the personnel of the equipment manufacturer shall strictly follow the operation plan, and shall not operate any equipment that is not within the scope of the approval plan or operate beyond the scope of the approval plan. If the network security failure is caused by the unplanned operation of the manufacturer's personnel, the relevant manufacturer will bear all the losses and the communications department will punish accordingly according to the situation.

9. After the personnel of the equipment manufacturer enter the computer room, the communication department will send a special person to cooperate with the whole process on site, and the personnel of the communication department will carefully supervise the process of cooperation, and carefully check each step of the operation of the equipment by the equipment manufacturer's personnel to ensure the safety of the network equipment. If network security failures are caused due to ineffective oversight, the relevant departments shall educate and punish the relevant responsible persons in accordance with these Management Regulations. @网络工程师俱乐部.

10. After the on-site operation of the equipment manufacturer's personnel is completed, the operation can only be deemed to be completed after confirmation by the relevant person in charge of the communication department.

O&M content of the data center

1. It is necessary to provide regular maintenance, maintenance, overhaul and emergency troubleshooting of system equipment for each system in the computer room to ensure the stable operation of the entire weak current system.

2. Improve the service efficiency of the user's weak current system through the effective management of operation and maintenance services, coordinate the internal operation of various business application systems, improve the operation status of the system, and improve the service quality. Combined with the characteristics of the user's existing environment, organizational structure, weak current resources and management process, the user's weak current system is planned from three aspects: process, personnel and technology.

3. The goal of the system services provided is to monitor and manage the user's existing weak current system basic resources, timely grasp the current situation and configuration information of system resources, reflect the availability and health status of system resources, and create a knowable and controllable intelligent operating environment, so as to ensure the reliable, efficient, continuous and safe operation of various business application systems of the user's weak current system. @网络工程师俱乐部.

The scope of the service project covers the information system resources in the following areas of critical status and:

Parameter indicators:

Running status and fault conditions.

Configuration information. Availability and health performance metrics.

This service is a basic service and is included in the operation and maintenance service, which helps us to understand the user's existing information assets and better provide the operation and maintenance service of the system.

Services include:

Statistical records of hardware device models, quantities, versions, and other information.

Statistical records of software product models, versions, patches, and other information.

Network structure, network routing, and network IP address statistics.

Drawing of the structure diagram of the integrated wiring system.

Statistical records of other ancillary equipment.

The operation and maintenance management of the network system is realized from three aspects: network connectivity, network performance, and network monitoring and management. Basic services of network and security system:

1. On-site technical duty

On-site technicians are on duty to ensure the real-time connectivity and availability of the network, and ensure the normal operation of access switches, aggregation switches, and core switches. On-site technicians log daily whether the ports of the network switch are functional.

2. On-site inspection content

Through this service, customers can obtain first-hand information on the operation of the equipment, find the hidden dangers as much as possible, and ensure the stable operation of the equipment. At the same time, we will put forward targeted early warning and solution suggestions, so that customers can prevent early and minimize operational risks.

The contents of the inspection are as follows:

3. Run analysis and management services

After periodic inspection and analysis of network operation status and network problems, engineers provide guidance and suggestions for customers

4. Operation and maintenance of the host and storage system

The O&M services provided for hosts and storage systems include: daily monitoring of hosts and storage devices, monitoring of the running status of devices, troubleshooting, operating system maintenance, patch upgrades, etc.

Basic services for the host storage system:

Related Pages