Additionally, you can use the following special characters in each filter: The search fields are find-as-you-type filters as you type, the page is filtered to match the text in the search field, including partial matches. To filter the list of credentials in the Log File Monitoring Policies page, use the search fields at the top of each column. Date and time the Log File Monitoring policy was created or last edited.įiltering the List of Log File Monitoring Policies SL1 user who created or last edited the Log File Monitoring policy. The number of devices with which the policy is aligned. The regular expression that the agent uses to determine whether a log message is sent to SL1.
#Monit log file monitoring windows
For Windows you can use "\" in the file paths, but a double slash "\\" will escape the "\" to ensure the file path ends up with a legitimate slash in it.
#Monit log file monitoring full
The full path of the log file or the name of the log that the agent will monitor.įor Linux or Unix operating systems, use "/" in the file paths. The agent will monitor the Windows log on the device(s). The agent will monitor a file on the file system of the device(s). The source of the logs on the monitored device. Unique numeric ID, automatically assigned by SL1 to each Log File Monitoring policy. The Last Edited column sorts by descending order on the first click to sort by ascending order, click the column heading again.įor each Log File Monitoring Policy, the page displays: To sort by descending order, click the column heading again. The list will be sorted by the column value, in ascending order. To sort the list of Log File Monitoring policies, click on a column heading. From this page, you can also create, edit, and delete Log File Monitoring policies. The Log File Monitoring Policies page displays a list of all Log File Monitoring policies. Viewing the List of Log File Monitoring Policies For information about including a Log File Monitoring Policy in a PowerPack, see the PowerPacks section. Log File Monitoring policies can be included in a PowerPack. You can define event policies that specify how logs collected by an agent will trigger events. The same logs also appear on the Logs tab in the Device Properties and Device Summary pages for that device. You can view logs collected by the SL1 agent on the Logs panel on the Device Investigator page for the device on which the agent is installed.
![monit log file monitoring monit log file monitoring](https://i.etsystatic.com/18888584/r/il/0b8285/2619813756/il_fullxfull.2619813756_7bzt.jpg)
After creating a Log File Monitoring policy, you must align the policy to one or more devices either from the Log File Monitoring page or by using a Device Template.
![monit log file monitoring monit log file monitoring](https://images.sampletemplates.com/wp-content/uploads/2017/06/Equipment-Cleaning-Log-Sheet.jpg)
You can create, edit, and delete Log File Monitoring policies from the Log File Monitoring Policies page ( System > Manage > Log File Monitoring Policies).