Each connector that is based on the same integration returns event logs collected from the event source to the CA Enterprise Log Manager collection server in a log file with a predefined name.The log name prompt queries for events involving the log name you specify.
Use the log name prompt to query for events transferred in a log file with the specified name. Each connector is based on an integration. Each integration uses a predefined log name. A query for a given log name returns results of events collected by different agents that use connectors based on the same integration or similar integrations.
A variety of conventions are used for naming logs:
Some log names are reused as new releases or platforms are added. For example, NT-Security is the log name for security logs for the following integrations: NTEventLog, Windows2k8, and WinRM.
To use the Log Name prompt
The Query List displays the Prompts folder and one or more folders for other queries.
The Log name prompt filter appears with the following field:
Is the name of a log file associated with a specific integration.
Results of the log name prompt query appear.
Indicates the severity of the event, where the values in increasing order of severity include: Information, Warning, Minor Impact, Major Impact, Critical, and Fatal.
Indicates when the event occurred.
Identifies the high-level category of the corresponding event action. For example, System Access is the category for the Authentication action.
Identifies the event action performed by the corresponding performer.
Identifies the event source host from which the connector is collecting events.
Identifies the source actor of the event, that is, the identity that initiated the action. The performer can be expressed as the source username or source process name.
Identifies the username of the account used for authentication. When the connector attempts a connection to the event source, authentication occurs. Authentication typically uses a low-privileged account. During connector deployment, the administrator configures credentials for this account on the event source and then identifies this account on the log sensor.
Specifies a code for the event result of the corresponding action, where S means Success, F means Failure, A means Accepted, D means Dropped, R means Rejected, and U means Unknown.
The log name entered in the prompt filter field.
Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |