![]() ![]() The Log File Monitoring Policies page displays a list of all Log File Monitoring policies. From this page, you can also create, edit, and delete Log File Monitoring policies. To sort the list of Log File Monitoring policies, click on a column heading. The list will be sorted by the column value, in ascending order. The Last Edited column sorts by descending order on the first click to sort by ascending order, click the column heading again.įor each Log File Monitoring Policy, the page displays: To sort by descending order, click the column heading again. Unique numeric ID, automatically assigned by SL1 to each Log File Monitoring policy. The source of the logs on the monitored device. The agent will monitor a file on the file system of the device(s). The agent will monitor the Windows log on the device(s). The full path of the log file or the name of the log that the agent will monitor.įor Linux or Unix operating systems, use "/" in the file paths. #Monit log file monitoring windowsįor Windows you can use "\" in the file paths, but a double slash "\\" will escape the "\" to ensure the file path ends up with a legitimate slash in it. The regular expression that the agent uses to determine whether a log message is sent to SL1. The number of devices with which the policy is aligned. Date and time the Log File Monitoring policy was created or last edited.įiltering the List of Log File Monitoring Policies SL1 user who created or last edited the Log File Monitoring policy. To filter the list of credentials in the Log File Monitoring Policies page, use the search fields at the top of each column. Additionally, you can use the following special characters in each filter: The search fields are find-as-you-type filters as you type, the page is filtered to match the text in the search field, including partial matches.
0 Comments
Leave a Reply. |