Syslog Kernel Critical Alert Rule Rule

  • ID:  Microsoft.Solaris.8.LogFile.Syslog.Kernel.Critical.Alert
  • Description:  Alert rule for syslog kernel critical messages.
  • Target:  Solaris 8 Computer
  • Enabled:  Yes

Overridable Parameters

Parameter Name Default Value Description Override
Host $Target/Property[Type="Unix!Microsoft.Unix.Computer"]/PrincipalName$ Host where log file resides.
LogFile /var/adm/messages Path to log file.
RegExpFilter .*[Kk]ern\.([Cc]rit|[Ee]merg|[Aa]lert).* Regular expression to use for filtering log file records.
IndividualAlerts false The default behavior of this data source module is to search the UNIX/Linux log file for lines matching a rule, and present all matches as a single alert. If the ‘Individual Alert’ property is set to ‘true’, then the module will generate an individual alert for each line in the log file that matches the rule.
Priority 1  
Severity 2  

Run As Profiles

Name
Default

Alert Details

Message Priority Severity
Kernel Critical Alert detected Medium Critical

Rule Knowledgebase

Summary

A kernel critical event was detected in the system log files.

Causes

A failure may happen due to several reasons. Information about the failure is available in the associated output data item, events and alerts.

Resolutions

The description of the alert and/or the output data item contains information on the problem encountered. Please check the associated event details and any other events that happened around the time of this failure to diagnose the problem.

External References
This rule does not contain any external references.

See Also for System Center Operations Manager 2007 R2 Cross Platform Management Pack


Downloads for System Center Operations Manager 2007 R2 Cross Platform Management Pack

AZURE OPTIMIZATION ASSESSMENT GET STARTED
MIGRATION TO AZURE GET STARTED
SYSTEM CENTER MIGRATION TO AZURE GET STARTED
MIGRATION TO AZURE FOR SQL AND WINDOWS 2008 GET STARTED