Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Server Agents|
The system may or may not shutdown depending on the state of the thermal degraded action value '<value>' Chassis: '<chassis>'; Location: '<location>'
(Thermal degraded action values: 1=other, 2=continue, 3=shutdown)
(Location values: 1=other, 2=unknown, 3=system, 4=system board, 5=I/O board, 6=CPU, 7=memory, 8=storage, 9=removable media, 10=power supply, 11=ambient, 12=chassis, 13=bridge card).
|English: Request a translation of the event description in plain English.|
The temperature status has been set to degraded in the specified chassis and location. The server's temperature is outside of the normal operating range. The server will be shutdown if the cpqHeThermalDegradedAction variable is set to shutdown(3). See "Compaq Microsoft Windows Event ID and SNMP Traps" for information.
|Private comment: Subscribers only. See example of private comment|
|Links: Compaq Microsoft Windows Event ID and SNMP Traps|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated