All,
I managed to have linux log monitoring working successfully.
the problem I have is i don't managed to have a mail for each pattern text that zabbix_agentd has successfully found :
Log Monitoring parameter :
Item : log["/test21_logmon/tcsd.conf","Option","UTF-8",100] // Item parameter : Interval : 60 / History : 7 / Trends : 0
Trigger : {adm1.xxx.xxx:log["/test21_logmon/tcsd.conf","Option","UTF-8",100].str(Option)}=1
Trigger : "Normal" not "Normal + multiple TRUE events"
Action : Host = "adm1.xxx.xxx" and Trigger severity = "Warning" | Trigger severity = "Average" | Trigger severity = "High"
Enable Escalations : selected
Period (seconds) : 120
Recovery message : no recovery
Action operations :
Steps : 1 - 0 Send message to group "xxx"
Period (sec) : default
Delay : Immediately
Subject : {HOSTNAME} = {STATUS} : {TRIGGER.NAME} = [{ITEM.LASTVALUE}]
Message : XXX
Conditions : No conditions defined.
Zabbix GUI result :
[2011.Jan.12 10:19:27] - - Not classified - # Option: all_platform_classes
[2011.Jan.12 10:19:27] - - Not classified - # Option: host_platform_class
[2011.Jan.12 10:19:27] - - Not classified - # Option: enforce_exclusive_transport
[2011.Jan.12 10:19:27] - - Not classified - # Option: remote_ops
[2011.Jan.12 10:19:27] - - Not classified - # Option: endorsement_cred
[2011.Jan.12 10:19:27] - - Not classified - # Option: conformance_cred
[2011.Jan.12 10:19:27] - - Not classified - # Option: platform_cred
[2011.Jan.12 10:19:27] - - Not classified - # Option: kernel_pcrs
[2011.Jan.12 10:19:27] - - Not classified - # Option: firmware_pcrs
[2011.Jan.12 10:19:27] - - Not classified - # Option: kernel_log_file
[2011.Jan.12 10:19:27] - - Not classified - # Option: firmware_log_file
[2011.Jan.12 10:19:27] - - Not classified - # Option: system_ps_file
[2011.Jan.12 10:19:27] - - Not classified - # Option: num_threads
[2011.Jan.12 10:19:26] - - Not classified - # Option: port
Mail sent :
Only two or one mails have been sent
All tests I do, I have always only one mail (only first pattern found) or two mails (first and lastest pattern found)
I want to have a mail per each pattern found in the upper example 14 mails.
When I use in the trigger properties "Normal + multiple TRUE Events"
I receive 14 mails but 14 same mails the last pattern found ;
not 14 differents mails with a mail per pattern found in log file.
Do my problem comes from a mistake in the "Actions"
Do I need to use escalations ?
Any idea is welcome
Thanks for your help.
Bertrand.
I managed to have linux log monitoring working successfully.
the problem I have is i don't managed to have a mail for each pattern text that zabbix_agentd has successfully found :
Log Monitoring parameter :
Item : log["/test21_logmon/tcsd.conf","Option","UTF-8",100] // Item parameter : Interval : 60 / History : 7 / Trends : 0
Trigger : {adm1.xxx.xxx:log["/test21_logmon/tcsd.conf","Option","UTF-8",100].str(Option)}=1
Trigger : "Normal" not "Normal + multiple TRUE events"
Action : Host = "adm1.xxx.xxx" and Trigger severity = "Warning" | Trigger severity = "Average" | Trigger severity = "High"
Enable Escalations : selected
Period (seconds) : 120
Recovery message : no recovery
Action operations :
Steps : 1 - 0 Send message to group "xxx"
Period (sec) : default
Delay : Immediately
Subject : {HOSTNAME} = {STATUS} : {TRIGGER.NAME} = [{ITEM.LASTVALUE}]
Message : XXX
Conditions : No conditions defined.
Zabbix GUI result :
[2011.Jan.12 10:19:27] - - Not classified - # Option: all_platform_classes
[2011.Jan.12 10:19:27] - - Not classified - # Option: host_platform_class
[2011.Jan.12 10:19:27] - - Not classified - # Option: enforce_exclusive_transport
[2011.Jan.12 10:19:27] - - Not classified - # Option: remote_ops
[2011.Jan.12 10:19:27] - - Not classified - # Option: endorsement_cred
[2011.Jan.12 10:19:27] - - Not classified - # Option: conformance_cred
[2011.Jan.12 10:19:27] - - Not classified - # Option: platform_cred
[2011.Jan.12 10:19:27] - - Not classified - # Option: kernel_pcrs
[2011.Jan.12 10:19:27] - - Not classified - # Option: firmware_pcrs
[2011.Jan.12 10:19:27] - - Not classified - # Option: kernel_log_file
[2011.Jan.12 10:19:27] - - Not classified - # Option: firmware_log_file
[2011.Jan.12 10:19:27] - - Not classified - # Option: system_ps_file
[2011.Jan.12 10:19:27] - - Not classified - # Option: num_threads
[2011.Jan.12 10:19:26] - - Not classified - # Option: port
Mail sent :
Only two or one mails have been sent
All tests I do, I have always only one mail (only first pattern found) or two mails (first and lastest pattern found)
I want to have a mail per each pattern found in the upper example 14 mails.
When I use in the trigger properties "Normal + multiple TRUE Events"
I receive 14 mails but 14 same mails the last pattern found ;
not 14 differents mails with a mail per pattern found in log file.
Do my problem comes from a mistake in the "Actions"
Do I need to use escalations ?
Any idea is welcome

Thanks for your help.
Bertrand.

Comment