Action

Revision as of 22:06, 21 March 2018 by Nigel (talk | contribs) (Created page with "Home > Administration > Action Administration > Action ---- == Overvi...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1 Overview

According to ITIL events can can be defined as: any detectable or discernible occurrence that has significance for the management of the IT Infrastructure or the delivery of IT service and evaluation of the impact a deviation might cause to the services.

2 Where events come from

Events come into Veloopti in the following ways:

  1. A policy on a Veloopti Agent detects a breach;
    1. A logfile policy detects a match;
    2. A SNMP trap is received that matches;
  2. A metric threshold is violated;
  3. An event storm rule detect a threshold violation and generates an event; and
  4. It is injected by the Veloopti agent Application Programming Interface (API)

2.1 A policy on a Veloopti Agent detects a breach

Policies that run on a Veloopti Agent are able to send an event to Veloopti.

2.1.1 A logfile policy detects a match

2.1.2 A SNMP trap is received that matches

2.2 A metric threshold is violated

Metrics that are sent by the Veloopti Agent are able to have a threshold set on it through the Threshold engine

2.3 It is injected by the Veloopti agent Application Programming Interface (API)

The Veloopti agent is able to receive events through the inbound API method.

2.4 An event storm rule detect a threshold violation and generates an event;

3 Event properties