Basic configuration of rule chains

Version 1.1 by Hera Guo on 2024/10/31 12:04

1.About rule chains

The system provides a rule chain library for developers to configure message transformation, filtering, computation, and transmission on their own.

2.Rule chain creation

The system provides a default root rule chain that supports user use. No changes are made on the root rule chain, but the root rule chain is exported and re imported, and then modified and configured in the newly imported rule chain.

Firstly, follow the steps below to export the root rule chain. After clicking on export, the system will automatically download it, and the exported file will be in JSON format.

1730343544790-113.png

Re import the exported configuration into the system. After clicking on import, the system will directly jump to the configuration page of the newly imported rule chain. Simply click on the "Apply Change" button in the bottom right corner.

Re exit to the rule chain library menu to see the newly imported rule chain library configuration.

1730344152898-509.png4

1730344348542-260.png

3.Rule chain modification

Follow the steps below to modify the basic information of the rule chain. You can rename the rule chain imported in the previous section.

1730344632740-435.png

1730345137320-999.png

1730345353615-959.png

4.Rule chain deletion

You can delete a newly created rule chain by following the following steps.

note: the default root rule chain provided by the system cannot be deleted.

1730346321550-495.png

5.Rule chain configuration

If you need to configure the rule chain, you need to follow the following steps to enter the configuration page of the rule chain.

1730346571913-889.png

1730346890962-926.png

1730347084731-765.png

1730347231071-931.png

Next, we will explain the configuration of rule nodes that may be commonly used in different classes to manipulate data. As the default device configuration was applied in the creation of the previous device ,

the rule chain used in the default device configuration is the Root Rule Chain. Therefore, the following demonstrations are all configurations made in the Root Rule Chain.

6.About Nodes

6.1 filter

6.1.1 check fidles presence

6.1.2 script

6.1.3 switch

6.2 properties

6.2.1 calculate delta

6.2.2 customer attributes

6.2.3 customer details

6.2.4 tenant attributes

6.2.5 tenant details

6.2.6 fetch device credentials

6.3 transformation

6.3.1 copy keys

6.3.2 delete keys

6.3.3 rename keys

6.3.4 deduplication

6.3.5 script

6.4 action

6.4.1 math function

6.4.2 create alarm && clear alarm

6.4.3 delay

6.4.4 generator

6.4.5 log

6.5 external

6.5.1 kafka

6.5.2 mqtt

6.5.3 rest api call