Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Subprocess monitoring failed due to subprocess is no longer active. The subprocess is probably dead. Restarting the process. Error code: <error code>.
|English: Request a translation of the event description in plain English.|
As per MRTG FAQ: "The error messages are generated by FireDaemon's Service Monitoring Facility (SMF). In a nutshell: MRTG is dying because of a misconfiguration". See the link below for more details.
From a newsgroup post: "If this appear when you try to have MRTG run as a service, just add "RunAsDaemon: Yes" in your cfg file and restart the MRTG service in firedameon."
This error has been reported with various applications that use FireDaemon in order to run as a service. See the comments for event id 107 from Winlog.
|Private comment: Subscribers only. See example of private comment|
|Links: MRTG+FireDaemon FAQ, Event id 107 from Winlog|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated