Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Storage Agent|
The COMPAQ PROLIANT 4LEE storage system connected to SCSI Port 1 of the controller in Slot 0 has a new temperature status of 3.
(Temperature status values: 1=other2=ok3=degraded4=failed5=notInstalled)
[SNMP TRAP: 8030 in CPQSTSYS.MIB].
|English: Request a translation of the event description in plain English.|
This event appeared followed by “EventID 24589 from source CPQCISSE” and “EventID 24590 from source CPQCISSE” when the server room was overheating due to chiller failure. Had alternating status of 3 (degraded) and 4 (failed). Server (Compaq/HP DL380 G4) had amber (failure) lights on drives. A reboot of the server once the room was ventilated cleared the error. It may clear on its own but if not, reboot once the temperature is lower.
|Private comment: Subscribers only. See example of private comment|
|Links: EventID 24589 from source CPQCISSE, EventID 24590 from source CPQCISSE|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated