Comments
-
I feel like this could very easily be done with an agent. Super useful info for asset tracking.
-
I'm assuming the credentials in the script are different than the credentials used to actually execute the script (inherited from node, etc). It would be great if you could enter credentials into Orion (in a secure manner, like the credential manager), and then pass them as an argument to the script like ${UName} ${Pword}.…
-
Done!
-
I think support for batch would be the most beneficial. Running EXE files could be a huge can of worms, though.
-
* How important is APM to your job?* It's basically 99% of my job. The other 1% is swapping nodes from SNMP polling to Agent. * How does it impact and benefit your business overall?* Immensely. Without it, we would never know when a product/service is experiencing issues. Some of our monitors can detect issues even before…
-
I feel the ability to edit the classification of any machine (not just Linux workstations) would be a useful feature to have for special circumstances. Sometimes a dev will have a VM running Windows 10, and it will be classified as a workstation. It'd be cool to add a custom type, such as "Development VM".
-
Monthly Mission: Using Wikipedia
-
Fastest upvote in the west
-
One of us... One of us...
-
Hopefully someone more knowledgeable than myself can chime in, but I'm assuming once it's changed in the database, it should just roll to the new email address on the next alert. The alerts themselves should still remain, as those aren't really tied to the emails that the notifications are sent to.
-
The function returns nothing but the timezone:
-
2019-07-31 11:15:13,117 [STP SmartThreadPool Thread #0] [C14867] ERROR SolarWinds.APM.Probes.PowerShellProbe - System.Management.Automation.Remoting.PSRemotingTransportException: Connecting to remote server 172.16.1.51 failed with the following error message : The WinRM client cannot process the request. Default…
-
See OP's response above; maybe it'll help you out? Re: Powershell Script Monitor "Not Defined"
-
Seeing as you have 800 alerts to change, I think your best bet is running a REPLACE() in SWQL. This may not be the best method, but it's what I'd do
-
I'm assuming you're talking about restarting a node automatically if certain conditions are met. It's not very safe, and I would not recommend doing it, but you could always do this with scripting: In Powershell (Windows nodes): Restart-Computer In Bash (Linux nodes): reboot Use carefully. Restarts without proper…
-
There are multiple methods to do this through scripting. The general idea is that you can read the page source and search for a specific string/value, then report that value back to APM as a statistic. I'd recommend doing this in Python or Perl, but it can be done in just about any language. If you'd like to avoid adding…
-
I actually made a Powershell script for this exact thing! Just enter the UAC path as the parameter (\\fileshare.solarwinds.com\reports\)
-
Sorry to bring up such an old question, but I have the answer for anyone who is desperately searching for it. You'll have to use an escape character before the special character. In Perl it is backslash \ and in Powershell it is the accent ` (same key as ~ NOT an apostrophe)
-
Figured out the problem! The Powershell script was comparing the IIS Log file timestamps (UTC) with the local time (UTC-5), causing the 5-hour gap between when the log file ends and the next day begins. I fixed it by setting a variable $currentdt = [System.DateTime]::UtcNow and comparing it to the datetime in the log file…
-
I've run into this several times, unfortunately. Sometimes the Powershell monitor can be screwy with exit codes. Try changing Exit 0; to just Exit
-
Solution for those desperately trying to google it: Powershell WAS running as v5, but the command I was running was showing v1 for some reason. The problem with my script is that I did not have the SqlServer module installed on the server I was polling against. To fix this, run the following command: Install-Module -Name…
-
About 90% of our SAM monitors are monitoring custom-built applications. It's especially useful if the application has log files or shell commands that return a statistic. With these, you can just parse the file/output however you see fit, and monitor it that way. It's really a breeze if you have some scripting experience.
-
In my environment, we ran into an issue while mass-deploying agents on Linux servers, rather than deploying through directly from SAM. The servers that we mass-deployed the agent to (using Salt) do not update the agent version when updating SAM. We have to manually push a command to these agents to force an update. I'd…
-
I found a simple Perl function here that may help: [Perl-beginners] how to get timezone in perl - Grokbase #!/usr/bin/perluse strict; use warnings; use POSIX; print strftime("%Z", localtime()), "\n"; You could pipe this output into a log file on the node, and then check to see if it changes and alert if it's not the…
-
What language are you using for the script? Most languages have a method to split a string (such as the entire line of the log file) by a specific character (the colon, in your case). This will split it into an array (in this example, we'll call it $resultArray). $resultArray now has 3 elements: $resultArray[0] will have…
-
The GetShadowCount function doesn't return anything, therefore the if statement will always be false. try adding return at the end of the function, and changing the if statement to something like if($result -ne $null)
-
To do this, you'll have to make sure the audit policy on the DC is configured correctly. By default, it doesn't log permission changes, so that has to be manually enabled. Here's an article on how to enable the logging of the exact data you are looking for: How to Configure the Monitoring of AD Objects in Windows Server…
-
You're on the right track by monitoring Event ID 4740. To do what you're wanting, you'll probably have to use Powershell. Here's a quick something I've whipped up for you. It's untested but you get the idea. $lockout = Get-EventLog -Log security | where {$_.eventID -eq 4740} | Sort-Object index -Descending | select -first…