The most recent content from our members.
Hello Everone , I am trying to monitor some log files. And I am using log parser (Powershell) template. For testing purpose I have created new log file under c:\ disk and i searched 'error' keyword and everything looks fine. In fact , I want to monitor logs under shared paths. My customer mounted on Solarwinds Server some…
We are trying to use the log parser template on our linux machines, basically we are trying to read the files for ORA errors. We opened the log and saw that there are ORA errors present in the file. We enabled the application monitor and pass all the necessary arguments, when we tested it was testing successfully without…
What’s in a log file? The very purpose of IT security is to be proactive make it difficult for someone who attempts to compromise your network. You also need to be able to detect the actual breaches as they are being attempted. This is where log data really helps. Collecting and analyzing logs, help you can understand what…
How is everyone monitoring multiple logs (real time) from multiple linux servers?
For custom applications (or SolarWinds itself) one may need check given file for known messages (or REGEXP). If application don't report to WIndow's system logs then one need Application Monitor dedicated to check logs in flat (text) files, preferable with regexp and not reading whole file every time Logchecker store…
I am monitoring some log files for any error lines that may occur. The alerts themselves are working fine, however the DBA team has requested me to include the line of the error in the email that is sent to them. This is where I'm stuck. I'm not able to retrieve the line in the email. I can see the string in the database,…
In the first blog of this series, What are Logs?, we learned what logs are and why they are useful to your organization. Now we are going to learn what happens when you have different types of log data and how your System Administrators don’t go crazy going through the thousands of logs that are produced. System…
Verifying Data Now that LEM is collecting your log data, use nDepth and LEM Reports to search, analyze, and report on that data. In most cases, use the nDepth Explorer in the LEM Console to search and analyze your dataa and use the stand-alone LEM Reports application to report on your data. Which Do I Pick? Use nDepth if…
This week we are going to discuss Monitoring, Events, and Filters. For the purpose of this blog, I will be using SolarWinds Log & Event Manager (LEM) as our monitoring software. LEM collects, stores, and normalizes log data from a variety of sources and displays that data in an easy to use desktop or web console for…
An application team approached us and wanted us to monitor a log file. No problem! However, when we got a look at the log file we discovered that log file was set up to be a human-readable table -- complete with headers, columns and rows. The application team wanted us to check on a value in a specific column each time the…
It looks like you're new here. Sign in or register to get started.