Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The description for Event ID ( 117 ) in Source ( SiSRaid ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. You may be able to use the /AUXSOURCE= flag to retrieve this description; see Help and Support for details. The following information is part of the event: \Device\Scsi\SiSRaid1.
|English: Request a translation of the event description in plain English.|
This event should read:
"The driver for device \Device\Scsi\SiSRaid1 detected a port timeout due to prolonged inactivity. All associated busses were reset in an effort to clear the condition."
See the link for event id 117 from adpu160m.
|Private comment: Subscribers only. See example of private comment|
|Links: Event id 117 from adpu160m|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated