Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Storage Agents|
Compaq SCSI Physcial Drive Status Change. The SCSI physical drive with SCSI target <value> connected to SCSI bus <value> of the controller in slot <value> has a new status of <value>.
(Drive status values: 1=other, 2=ok, 3=failed, 4=notConfigured, 5=badCable, 6=missingWasOk, 7=missingWasFailed, 8=predictiveFailure, 9=missingWasPredictiveFailure, 10=offline, 11=missingWasOffline)
[SNMP TRAP: 5017 in CPQSCSI.MIB].
|English: Request a translation of the event description in plain English.|
No information available. If you have additional details about this event, please, send them to us!
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated