Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Port <port number>: Link never up at boot
|English: Request a translation of the event description in plain English.|
From "Emulex Documentation, Drivers and Software": The Event ID table describes event IDs shown in the event log. Most Event ID messages do not require a "DriverTraceMask" setting, except for a few. Several event IDs are primarily used by Emulex technical support. These are noted with asterisks.
(*) Emulex Internal Status ·
(**) Event ID 26, 27 35 and 36 need SLI_TRACE_INIT mask enable ·
(***) Event ID 37 needs SLI_TRACE_ELS_ERRORS mask enable
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated