Pool Configuration
Configure your Pools for efficient and secure management
Overview
OptiFleet's intelligent pool management system operates on three levels:
- Administrative Control: Define which pools and worker accounts are permitted
- Configuration Templates: Create standardized settings for different mining scenarios
- Automated Enforcement: Continuously monitor and correct pool configurations
This layered approach ensures your mining operation always directs hashpower to approved destinations while maintaining the flexibility to adapt to changing business requirements.
Key Business Benefits:
- Enhanced Security: Prevents unauthorized pool changes and malicious redirects
- Operational Consistency: Ensures all miners use approved pools and accounts
- Reduced Human Error: Eliminates manual configuration mistakes
- Compliance Control: Maintains audit trails for client requirements
- Faster Recovery: Quickly restore settings after miner repairs or maintenance
Permissions:
- Facility Technicians: Can apply pool configurations but cannot create or modify them
- Facility Admins: Have full access to create, modify, and deploy pool configurations
Allowed Pools and Sub Accounts
Pool configuration settings can be found by navigating to Management > Sites > select the site you want to configure > Pool Config tab
Managing Pool URLs
Step 1: In the Pool Config tab, choose the Allowed Pools and Accounts in the top right corner.
Step 2: In Allowed Pools and Subccounts, click Add Pool. Enter the selected Pool URL and verify that it correct.
Step 3: Remove unused pools by clicking the trash can icon
Managing SubAccounts
Step 1: In Allowed Pools and Subccounts, click Add Subaccount
Step 2: Enter the subaccount name
Step 3: Remove unused subaccounts using the trash can icon
⚠️ Important: Pools and sub accounts currently in use by any miner (even offline miners) cannot be deleted. The system will display an error message if you attempt this action.
To delete these you will need to remove the pool config from any miners containing that pool URL. You could do this in the miner list by search on the pool URL fields, and pushing updated configs to those miners.
Best practices:
- Organize subaccounts by location so you can track pool performance by location. You may also want to use subcustomers or other critical data in your subaccount naming .
- Review and validate Allowed Pools and Accounts regularly.
Creating Standardized Pool Configurations
Build reusable configuration templates that ensure consistency across your mining fleet and simplify deployment processes.
Step 1: Click Add Pool Configuration
Step 2: Enter a descriptive name for your configuration. Use clear naming conventions to make configs easy to manage and deploy
Step 3: Select from your approved pool URLs to provide primary and backup pools:
- Pool 1: Primary mining destination
- Pool 2: Failover destination
- Pool 3: Secondary failover
Step 4: Assign subaccounts by selecting from your approved list
Step 5: Configure the worker template to create a unique identifier for each worker in the target pool. Select a worker template type:
- Miner ID
- Serial #
- Model Name
- IP Address
- Asset ID
- Custom
Step 6: Enable auto pooling for security enforcement, if desired. (Recommended.)
- Check the box next to Force any pool not on config to the standard settings
- This automatically corrects miners that drift from approved settings
- Prevents manual changes outside of OptiFleet from compromising your configuration
Step 7: Save your configuration for immediate use
Applying Pool Configurations to Miners
Method 1: Bulk Assignment via Miner List
This method allows you to configure multiple miners simultaneously, making it ideal for large-scale deployments or routine maintenance.
Step 1: Select Your Target Miners
- Navigate to the Miner List
- Identify the miners you want to apply pool configs to
- You can use filters to create a target list. Select individual miners by checking the box next to each miner's name.
Step 2: Configure Miners
- Once the miners are selected, click on the Actions menu and select Configure Pools
- A configuration window will appear with available pool options
- Choose your desired pool configuration from the dropdown list of available pool configs
- Review the settings to make sure they are as expected
- Click Save to deploy the configuration
Step 3: Verify Deployment
- The system will push the selected configuration to all chosen miners
- Pool locking will be automatically enabled to enforce approved pools
- Most miners will apply these changes without requiring a reboot, minimizing operational downtime
Method 2: Individual Miner Configuration
For targeted configuration of specific miners, you can apply pool settings directly from a individual miner daashboard.
Step 1: Open the specific miner's detail page from the miner list, issues list or site map
Step 2: Click on the Actions menu > Configure Pools
Step 3: Select and apply the desired pool configuration by selecting from the dropdown menu. Use the Manage Pools link if you need to add or adjust pool configs.Pool Configuration Reports
Navigate to Reports on the left menu > Pools
Active Pools: contains a pie chart of pools in use, and lists all currently active miners and their pool connections. To see the backup pools, use the Pool Configurations view
Pool Accounts: displays total # of miners for each pool and sub-account combination
Duplicate Workers: Identifies duplicate worker IDs within your pool configuration
Unapproved Pools: critical security tool that identifies miners connected to unauthorized pools
User Permissions
Technical Considerations
- Pool Lock Enforcement: Once applied, pool configurations prevent miners from connecting to unauthorized pools
- Minimal Downtime: The system applies configuration changes without requiring miner reboots in most cases
- Automatic Failover: Miners will revert to approved configurations upon next boot if currently offline
Common Scenarios
- Post-Repair Miners: Units returning from repair may not have force configuration enabled, appearing in unapproved pools reports
- New Deployments: Freshly deployed miners require explicit pool configuration assignment
- Maintenance Windows: Configuration changes can be scheduled during low-impact periods
Best Practices
- Regular Monitoring: Review the Unapproved Pools report daily to maintain security
- Proactive Configuration: Apply pool configurations immediately after miner deployment or repair
- Documentation: Keep records of configuration changes for audit and troubleshooting purposes