Difference between revisions of "Event"
From Veloopti Help
m (→How events are created) |
m (→How events are created) |
||
Line 30: | Line 30: | ||
=== An event storm rule detect a threshold violation and generates an event; === | === An event storm rule detect a threshold violation and generates an event; === | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Event properties == | == Event properties == | ||
[[Category:Event Administration]] [[Category:Events]] | [[Category:Event Administration]] [[Category:Events]] |
Revision as of 21:58, 4 December 2017
Home > Administration > Event Administration > Event
Contents
1 Overview
According to ITIL events can can be defined as: any detectable or discernible occurrence that has significance for the management of the IT Infrastructure or the delivery of IT service and evaluation of the impact a deviation might cause to the services.
2 Where events come from
Events come into Veloopti in the following ways:
- A policy on a Veloopti Agent detects a breach;
- A logfile policy detects a match;
- A SNMP trap is received that matches;
- A metric threshold is violated;
- An event storm rule detect a threshold violation and generates an event; and
- It is injected by the Veloopti agent Application Programming Interface (API)
2.1 A policy on a Veloopti Agent detects a breach
Policies that run on a Veloopti Agent are able to send an event to Veloopti.
2.1.1 A logfile policy detects a match
2.1.2 A SNMP trap is received that matches
2.2 A metric threshold is violated
Metrics that are sent by the Veloopti Agent are able to have a threshold set on it through the Threshold engine
2.3 It is injected by the Veloopti agent Application Programming Interface (API)
The Veloopti agent is able to receive events through the inbound API method.