The List page lists recent events in chronological order (with newest events at the top of the list).
Topics:
- What are the different columns in the table?
- What do the different status colors mean?
- How do I select which events will be displayed?
- How do I get more detail on a specific event?
- How can I get events sent to me?
- How do I control the events that are generated?
See Also:
What are the different columns in the table?
Each event has the following attributes:
- Status, the status box indicates the severity of the event.
- Time, the time when the event occurred.
- Type, the type of the event (e.g. Threshold, Security etc.)
- Name, the name of the specific event (e.g. for threshold events: Utilization, Errors etc.)
- Value, a value associated with the event (e.g. up, down etc.)
- Address, an address associated with the event (e.g. the IP address of a switch that is down.)
- Interface, an ifIndex associated with the event (e.g. the ifIndex of an interface exceeding a threshold.)
- Comment, additional information associated with the event.
What do the different status colors mean?
The following colors are used in the Status column:
- Inform An event provided for informational purposes, no action is required.
- Warn An event reporting a problem that may require investigation.
- Critical An event requiring immediate attention.
How do I select which events will be displayed?
The Filter options at the top of the screen control the Interval, Severity and Type of events displayed. The Truncate option controls the number of events displayed.
How do I get more detail on a specific event?
Click on any event to see additional information, including links to other applications that will help identify the cause of the event.
How can I get events sent to me?
Click on the button to access the filtered event list as an RSS feed.
You can also forward events as SNMP traps, syslog events or email (see File>Configure).
How do I control the events that are generated?
Scheduled reports may post Security, Threshold, or Configuration events (see Report). You will need to install a signature file before signature-based security events will be generated (see Sentinel:Signatures>Configure). You will need to configure thresholds before counter-based threshold events will be generated (see File>Configure).