Agent Monitorin
Agent Monitorin
Agent Monitorin
1
Introduction to the SL1 Agent
Overview
This chapter describes SL1 agents and provides instructions for viewing device and interface data collected by
agents.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all of the menu options, click the Advanced menu icon ( ).
4
What is an SL1 Agent?
The SL1 Agent is a program that you can optionally install on a device or element monitored by SL1. The SL1
Agent collects data from the device, interface, or other element and pushes that data back to SL1. You can install
and use multiple SL1 Agents, as needed.
Because an agent is always running on a device, the SL1 Agent can collect more granular data than can be
collected by polling the device periodically with a Data Collector. You can collect data from devices using only the
SL1 Agent or using a combination of the SL1 Agent and Data Collectors.
Agent PowerPacks
SL1 includes two PowerPacks that can be used to collect agent-based system configuration and performance data:
l The ScienceLogic: Agent PowerPack, which collects agent-based data for devices on SL1 systems running on
the SL1 extended architecture
l The Host Agent PowerPack, which collects agent-based data for devices on SL1 systems running on a
distributed architecture
Both of these PowerPacks are installed by default on your SL1 system. They include the following features:
l Dynamic Applications that collect configuration data and performance metrics from devices that are using
agent-based collection
l Event Policies and alerts that are triggered when devices that are using agent-based collection meet certain
status criteria
NOTE: Because it is required to collect data from devices that are using agent-based collection, SL1 does not
enable you to delete or modify the ScienceLogic Agent PowerPack.
l Device Availability. SL1 can determine the availability state of a device (available or unavailable) and
generate trended availability graphs based on uptime data collected by the agent.
l Host Performance Metrics. Using a Dynamic Application, SL1 translates data provided by an SL1 agent to
trend the following metrics:
o Overall CPU Utilization
o Per-Processor CPU Utilization
o Disk Average Queue Length
l Host Configuration. Using a Dynamic Application, SL1 collects the following configuration data based on
data provided by the SL1 Agent:
o The number and speed of the installed CPUs
o The amount of installed memory
o The overall and per-disk storage size
o The total swap capacity (SL1 extended architecture only)
You can view the collected configuration data on the [Configs] tab of the Device Investigator page and
the Device Summary panel.
l Network Interfaces. The SL1 Agent collects a list of the network interfaces running on the device. You can
view the list of interfaces on the [Interfaces] tab of the Device Investigator page and the Device Summary
panel. This list includes attributes such as the interface MAC address, IP address, position, and speed.
l System Processes. The SL1 Agent collects a list of all processes running on the device. You can view the list
of processes on the [Processes] tab of the Device Reports panel and the [Processes] tab of the Device
Investigator page. Monitoring policies can be configured to trend and alert on process availability, process
CPU usage, and process memory usage.
l Windows Services. The SL1 Agent collects a list of all Windows services enabled on the device. This list
includes attributes such as the service name and run state. You can view the list of Windows Services on the
[Services] tab of the Device Investigator page and the Device Summary panel.
l Logs. The SL1 Agent can be configured to push logs that match specific criteria from a log file or the
Windows Event Log to SL1. You can view logs collected by the SL1 Agent on the Device Investigator page
and the Device Logs page (Registry > Monitors > Logs) for a device. Logs can be configured to trigger
events.
NOTE: For more information about the data that SL1 agent can collect, see the Monitoring Device
Infrastructure Health manual.
l Debian 8 or later
l Ubuntu 14.04.5 or later
l Red Hat 6.10 or later
l CentOS 6.10 or later
l Oracle Linux 6.10 or later
l Windows Server 2016, Windows Server 2016 Core
l Windows Server 2012 R2, Windows Server 2012
l Windows Server 2008 R2
l Windows 10
l Windows 8.1
l Windows 8
l Windows 7
l BusyBox Linux (container guests only)
l Alpine Linux (container guests only)
NOTE: The agent runs on 64-bit Windows and Linux operating systems only.
NOTE: Users who are running version 102 or later of the Microsoft: Windows Server PowerPack can collect
data via the SL1 agent. For more information, see the Monitoring Windows Systems with
PowerShell manual.
Agent Versions
The following table indicates the Windows and Linux agent versions that are bundled with each version of SL1.
NOTE: The SL1agent is backwards- and forwards-compatible. Therefore, while these agent versions are
bundled with the SL1 versions listed below, you can use older versions of the agent with newer
versions of SL1 and vice-versa.
Agent Architecture
The following sections describe how the SL1 agent works in a distributed architecture and in an extended
architecture.
Distributed Architecture
In a distributed architecture, the SL1 Agent collects data from the device on which it is installed and transfers that
data to a Message Collector in an SL1 system using the HTTPS protocol. The Data Collector on which the
Dynamic Applications and collection processes run then poll the Message Collector using the HTTPS protocol to
transfer data to SL1.
TCP port 443 must be open between the the Message Collector and the device on which an agent is installed.
In a distributed architecture, the SL1 agent requires a standalone Message Collector. The Message Collector does
not need to be dedicated to the agent. The Message Collector cannot be a Data Collector that also performs
message collection
NOTE: Message Collectors that process data from the SL1 agent have different system requirements than
Message Collectors that do not process data from the SL1 agent. For more information about the
system requirements when running SL1 agents in a distributed architecture, see
https://support.sciencelogic.com/s/system-requirements.
The diagram below shows the collection layer of a distributed system containing both Data Collectors and
Message Collectors in which the SL1 Agent is installed on a managed device.
Agent Architecture 8
Extended Architecture
In an extended architecture, an SL1 agent collects data about the device on which it is installed and uploads it to
the streamer service that is running on the SL1 compute node cluster. The streamer is a web service that SL1
agents and Data Collectors use to deliver data about your monitored devices to the SL1 storage nodes and
Database Server using the HTTPS protocol.
Using an SL1 agent in an extended architecture provides more configuration and performance data than using an
SL1 agent in a distributed architecture. This additional data includes system vitals.
NOTE: For more information about the system requirements when running SL1 agents in an extended
architecture, see https://support.sciencelogic.com/s/system-requirements.
9 Agent Architecture
Chapter
2
Installing an SL1 Agent
Overview
This chapter describes how to install, upgrade, and uninstall SL1 agents for Windows and Linux operating systems.
l If you use the SL1 extended architecture (which includes Compute Nodes, Storage Nodes, and a
Management node), you can install the agent from the Agents page (Devices > Agent) in the unified user
interface. For details, see the section Installing an Agent from the Agents Page.
l If you use the SL1 architecture without the extended architecture, you can install the agent from the
Device Manager page. This page is available in the unified user interface when you click the menu icon (
) in the left navigation pane. For details, see the section Installing an Agent from the Device Manager
Page.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all of the menu options, click the Advanced menu icon ( ).
10
Using Agents with SELinux 15
Installing an Agent from the Device Manager Page 15
Installing the Classic Linux Agent 17
Installing the Classic Windows Agent 18
Viewing the Discovered Device 19
l For a Linux system, the Agents page provides commands that must be executed on the Linux system.
l For a Windows system, the Agents page provides an executable file to run on the Windows system.
NOTE: The Agents page appears as an option on the menu only when you are using the extended SL1
architecture. If you are using a distributed SL1 system or you are using the extended SL1 architecture
with the classic SL1 user interface, then you can install the agent from the Device Manager page.
For instructions, see the section Installing an Agent from the Device Manager Page.
The following sections describe how to install, upgrade, and delete agents from the Agents page.
1. On the Agents page (Devices > Agents), click the [New Agent] button. The Agent Installation page
appears:
NOTE: SL1 supports the use of proxy server connections when using the SL1 agent on Linux systems. To do
so, open a command window on the target server and first configure curl to use a proxy server using
the CURLOPT_PROXY option, and then to use a username and password combination for that proxy
server using the CURLOPT_PROXYUSERPWD option.
1. On the Agents page (Devices > Agents), click the [New Agent] button. The Agent Installation page
appears.
2. Click the Windows tab:
8. To verify that the installation was successful, open the Windows Task Manager or enter the TASKLIST
command to view running processes. The SiloAgent process will be running on the Windows machine.
NOTE: SL1supports the use of proxy server connections when using the SL1 agent on Windows systems. In
Windows 10, go to Settings > Network & Internet > Proxy to set up a proxy; in older versions of
Windows, you can do this by clicking on the Control Panel and going to Internet Options
> Connections > LAN Settings.
Upgrading an Agent
When you have the latest version of an agent, a check mark icon ( ) appears in the Newest Version column for
that agent. To upgrade to the latest version of an agent:
1. On the Agents page (Devices > Agents), locate the agent you want to upgrade.
2. Click the [Upgrade] button. The agent starts the upgrade process.
NOTE: Using the delete option for an agent does not actually remove the agent from the device. As a best
practice, use the delete process to delete the data gathered by the agent (the uninstallation process
does not delete this data), and then uninstall that agent, if needed. For uninstallation details, see
Uninstalling an Agent.
NOTE: If you used the Agents page to install an agent, then you should also use the Agents page to delete
that agent. If you attempt to delete the agent using the classic SL1 user interface rather than the
Agents page, SL1 deletes only some of the data gathered by the agent, rather than all of the data.
1. On the Agents page (Devices > Agents), locate the agent you want to delete.
2. Click the [Actions] button ( ) for that agent and select Delete. SL1 stops the agent from collecting data.
Uninstalling an Agent
When you uninstall an agent, you remove that agent completely from SL1, but you do not lose the data collected
by that agent.
1. Log in to the Linux system via the console or SSH as a user that has sudo administrator permissions.
2. Do one of the following:
3. Optionally, you can remove the agent configuration directory from the Linux system. The configuration
directory can be found at:
/etc/scilog (rm -rf /etc/scilog)
Uninstalling an Agent 14
Uninstalling a Windows Agent
To uninstall an agent on a Windows system:
In this situation, you can either disable SELinux or put SELinux into permissive mode.
l For a Linux system, the Agent Installation page provides commands that must be executed on the Linux
system.
l For a Windows system, the Agent Installation page provides an executable file to run on the Windows
system.
NOTE: If you are using a distributed SL1 system without the extended architecture (which includes Compute
Nodes, Storage Nodes, and a Management Node), you must use the Agent Installation page
(which you can access from the Device Manager page) to install the agent; you cannot do so from
the Agents page (Devices > Agents).
1. Go to the Device Manager page (Registry > Devices > Device Manager).
TIP: : In the unified SL1 user interface, you must first click the menu icon ( ) in the left navigation pane. You
can then navigate to the Device Manager page.
2. Click [Actions] and select Download/Install Agent. The Agent Installation page appears:
NOTE: If you require a FIPS-compliant version of the SL1 agent, select RedHat/CentOS 64-bit
(OS Libs).
l Select an Organization. Select an organization from the list of possible organizations. The list of
organizations is dependent on your user account. If the agent discovers a new device, that device will
be associated with the organization you select here.
NOTE: If you are installing an agent on a device that has already been discovered, you must
select the organization that is already aligned with the existing device.
l Select a Message Collector. Select the Message Collector to which the agent will send its collected
data.
4. If you selected a Linux operating system in the Select an OS field, the Agent Installation page displays a list
of commands to execute on the Linux system. Copy the commands for use during the installation on the
Linux device.
TIP: If you are installing an agent on multiple devices that run the same operating system, are part of the same
organization, and connect to the same Message Collector, you can re-use the same commands or
executable file on each of those devices.
1. Log in to the Linux system via the console or SSH as a user that has sudo administrator permissions.
2. Execute the commands that you copied from the Agent Installation page in SL1. If the installation was
successful, the output will look similar to the following:
[em7admin@em7ao ~]$ sudo wget --no-check-certificate
https://10.64.68.16/packages/initial/0/silo-agent-x86_64.rpm
[sudo] password for em7admin:
--2016-11-15 21:10:28-- https://10.64.68.16/packages/initial/0/silo-agent-x86_
64.rpm
Connecting to 10.64.68.16:443... connected.
WARNING: cannot verify 10.64.68.16's certificate, issued by
‘/C=US/ST=Silo/L=Reston/O=Silo/CN=10.64.68.16’:
Self-signed certificate encountered.
HTTP request sent, awaiting response... 200 OK
Length: 2018317 (1.9M) [application/x-rpm]
Saving to: ‘silo-agent-x86_64.rpm’
100%[=======================================>] 2,018,317 --.-K/s in 0.01s
2016-11-15 21:10:28 (169 MB/s) - ‘silo-agent-x86_64.rpm’ saved [2018317/2018317]
[em7admin@em7ao ~]$ sudo rpm -ihv silo-agent-x86_64.rpm
Preparing... ################################# [100%]
Updating / installing...
1:scilogd-0.128-0 ################################# [100%]
Created symlink from /etc/systemd/system/multi-user.target.wants/scilogd.service
to /etc/systemd/system/scilogd.service.
NOTE: SL1supports the use of proxy server connections when using the SL1 agent on Linux systems. To do so,
open a command window on the target server and first configure curl to use a proxy server using the
CURLOPT_PROXY option, and then to use a username and password combination for that proxy
server using the CURLOPT_PROXYUSERPWD option.
1. Log in to the Linux system via the console or SSH as a user that has sudo administrator permissions.
2. Execute the following command:
1. Log in to the Linux system via the console or SSH as a user that has sudo administrator permissions.
2. Execute the first command that you copied from the Agent Installation page.
3. Do one of the following:
1. Log in to the Linux system via the console or SSH as a user that has sudo administrator permissions.
2. Do one of the following:
3. Remove the agent configuration directory from the Linux system. The configuration directory can be found at:
/etc/scilog
1. Copy the SiloAgent-install.exe file you downloaded from the Agent Installation page to the Windows
system. You can go to the console of the Windows system or use a utility like WinSCP.
2. Run the following command as an Administrator:
SiloAgent-install.exe tenant=0 urlfront=<URL_for_your_SL1_system>
3. To verify that the installation was successful, open the Windows Task Manager or enter the TASKLIST
command to view running processes. The SiloAgent process will be running on the Windows machine.
l If the primary IP address of the device is not currently monitored by SL1, then SL1 creates a device record for
the device and populates the device record with data provided by the agent.The device record is assigned a
device class based on data reported by the agent.
l If the primary IP address of the device is currently monitored by SL1, the device record for the existing device
is updated with data provided by the agent.
During initial discovery, the agent returns operating system type and version information to SL1.
Based on this information, SL1 assigns one of the following device classes to a device monitored only by an agent:
NOTE: If a device is monitored by an agent and via SNMP, the device class assigned by SNMP discovery will
take precedence.
3
Configuring an SL1 Agent
Overview
This chapter describes how to configure the settings on the Message Collector with which the agent
communicates. This chapter also covers how to use the Agent Investigator page on the Agents page
(Devices > Agents), which provides access to all of the data associated with an agent, and on that page you can
configure the agent settings.
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all of the menu options, click the Advanced menu icon ( ).
21
Using the Agent Investigator
The Agent Investigator page appears when you click the name of an agent on the Agents tab. The Agent
Investigator page provides access to all of the data associated with an agent, using the following tabs:
l Config. Displays the agent name, install agent, and aligned device. On this tab, you can configure the disk
space, excludes, includes, and other metrics related to this agent.
l Polled Data. Displays the scripts that you execute to gather data by this agent over time. On this tab, you can
configure new sources for polled data, including scripts, URLs, JMX data, Windows performance counters,
and events.
l Log Sources. Displays the log files you are monitoring for the agent.
l Watched Files. Displays any watched files you have defined with regular expressions for the agent.
The Config Tab
The [Config] tab of the Agent Investigator page displays the agent name, agent nickname, install agent, and
aligned device. On this tab, you can configure the disk space, excludes, includes, and other settings related to this
agent. To view the Device Investigator page for the device monitored by this agent, click the device name in the
Device field.
NOTE: If a process or directory is included in both the Excludes field and the Includes field, that process or
directory will be monitored by the agent.
5. Click the [Save] button to save your configuration settings for the agent.
1. On the [Polled Data] tab of the Agent Investigator page, click the [New] button. A set of new fields
appear in the right-hand section:
o Script. Run a simple JSON script, such as {"script": "echo \"hello world\""}
o URL. Download a script (not a binary) from a URL and execute it, such as {"url": "https://my_
webserver /hello_world.sh"}. Both http and https are supported.
{"jmx": {
"process": "HelloWorld",
"object": "java.lang:type=Memory",
"attribute": "HeapMemoryUsage",
"subattribute": "used",
"warnthreshold": "3200000",
"critthreshold": "4500000"
}}
You can use the wildcard "*" for the process value when querying JMX beans in the Linux agent. If the
JMX bean exists in multiple Java Virtual Machines with names matching the specified regular
expression (regex), the results appear in a JVL format and are uploaded as a separate file.
In the Linux agent, you can also specify that multiple polled data commands be grouped together by
assigning them a common groupid.
o Windows Performance Counter. Use the specified Windows performance counter for polled data.
o Event. Use the specified event for polled data.
l Polling Interval. Specify the delay, in seconds, between samples. If you type "0" in this field, the
command is run only once. This field is required.
l Shell. If needed, specify the shell for the script or URL to run. By default, the command uses the default
Linux shell or Windows command prompt, depending on the agent type. You can also use Bash,
Python, and PowerShell shells. For example, you can use the following as a Windows Nagios shell:
{"script": "C:\\nagios\\plugins\\check_winprocess-1.6\\check_winprocess"}
l Username. For Linux, specify the username under which to run the command; root is the default. For
Windows, the user must exist and be logged in at the time the poll is run; the default is to run the
command as the system account.
3. To make the polled data data source active, select the Enabled checkbox.
4. Click the [Save] button.
Because the agent does not have a plug-ins directory, you need to create a polled data script that points to the
script you want to run.
{"script": "/usr/lib64/nagios/plugins/check_procs"}
1. From the list of polled data on the [Polled Data] tab, select the source you want to edit or delete.
l Edit. When you select this option, the fields for this polled data source appear in the right-hand panel,
and you can update the fields as needed.
l Delete. When you select this option, the polled data source is immediately deleted.
1. On the [Log Sources] tab of the Agent Investigator page, click the [New] button. A set of new fields
appear in the right-hand section:
o SysLog. The agent will monitor a syslog on the device. If you select this option, use the Source
field to specify the UDP port number to listen on.
o Event Log. The agent will monitor the Windows logs on the device. If you select this option,
specify an Event Log category in the Source field (Application, Security, System).
o File. The agent will monitor a file on the file system of the device. If you select this option, type
the full path of the file to monitor in the Source field.
l Limit. Specify the maximum number of lines in the log source. Optional.
l Log Filter. Specify a regular expression that will evaluate the log messages in the specified syslog, file,
or Windows log. If a log message matches this regular expression, the agent sends that log message
to SL1. Optional.
1. From the list of log sources on the [Log Sources] tab, select the source you want to edit or delete.
l Edit. When you select this option, the fields for this log source appear in the right-hand panel, and you
can update the fields as needed.
l Delete. When you select this option, the log source is immediately deleted.
A d d i ng Wa tched Fi l es
1. On the [Watched Files] tab of the Agent Investigator page, click the [New] button. A set of new fields
appears in the right-hand section:
(^/var/www/error/.*var$)
1. From the list of watched files on the [Watched Files] tab, select the file you want to edit or delete.
l Edit. When you select this option, the fields for this watched file appear in the right-hand panel, and
you can update the fields as needed.
l Delete. When you select this option, the watched file is immediately deleted.
NOTE: To configure agent settings, you must first add the SL Agent column to the Device Manager page in
the classic user interface. For more information about adding the SL Agent column, see Adding the
SL Agent Column to the Device Manager Page.
l Disk Space. Controls the amount of disk space that the agent can use to store data. If an agent loses
connectivity to SL1, this disk space will be used to store collected data until the connection to SL1 is restored.
l Data Directory. Defines the directory in which the agent will store temporary data.
l Excludes. Defines the list of processes and directories to explicitly exclude from monitoring by the agent.
l Includes. Defines the list of processes and directories that must be explicitly monitored by the agent. Use the
Includes field to ensure that specific processes are monitored.
NOTE: If a process or directory is included in both the Excludes field and the Includes field, that process or
directory will be monitored by the agent.
1. Go to the Device Manager page (Registry > Devices > Device Manager).
2. Click [Actions], and then select Device Manager Preferences. The Edit Device Manager Preferences
modal page appears:
1. Go to the Device Manager page (Registry > Devices > Device Manager).
NOTE: If a process or directory is included in both the Excludes field and the Includes field, that
process or directory will be monitored by the agent.
4. Click [Save].
1. Either go to the console of the device where the agent resides or open an SSH session to that device.
2. Using a text editor like "vi", open the main configuration file.
l On a Linux system, the main configuration file is:
/etc/scilog/scilog.conf
3. Locate the following line and change the IP address to the IP address of the new Message Collector:
URL https://<IP address>/SaveData.py/save_data
4. Locate the following line and change the IP address to the IP address of the new Message Collector:
URLfront <IP address>
4
Troubleshooting SL1 Agents
Overview
This chapter contains troubleshooting processes that you can use to address issues with the SL1 agent.
l /var/log/streamer_prime/streamer_prime.log
l /var/log/uwsgi/streamer_prime.log
Use the following menu options to navigate the SL1 user interface:
l To view a page containing all of the menu options, click the Advanced menu icon ( ).
To troubleshoot potential issues with SL1 agents, perform the following procedures, in the following order:
33
Example /var/log/uwsgi/streamer.log for successful discovery in streamer_prime 39
Save incoming data for a specific device ID (streamer_prime) 39
Save incoming data for a specific device ID (Converged Platform or SL1) 39
Additional Troubleshooting Situations and Best Practices 39
If you are using the new user interface for SL1 or the converged platform for the agent, determine if the agent was
deleted from the [Agents] tab instead of uninstalling the agent.
If the agent was deleted, SL1 shuts down the agent instead of uninstalling the agent. You should re-install the
agent that you deleted in the new user interface.
If the agent was not deleted, then the issue could be with the agent. You should generate diagnostics
information to share with your ScienceLogic contact.
2. Share the contents of the newly created diagnostic file in the current directory with your ScienceLogic contact.
Depending on your operating system, the file name is:
l Windows: C:\Program Files\ScienceLogic\SiloAgent\conf\scilog.conf
l Linux: /etc/scilogd/scilog.conf
l If there is no CollectorID tag, then the agent has not been able to reach the stream or message
collector.
3. Check the configuration item URLfront, which is where the agent attempts to get the configuration file.
n If the URL for URLfront is not correct, then re-install the agent. See the re-install steps in the
previous topic.
n If the URL for URLfront is correct, then determine if you can ping the host portion of URLfront.
These locations should only contain the cached system file named _active-scilog.sys.json (Windows) or .active-
scilog.sys.json (Linux). You might see other folders or files in this upload directory that are typically transient, and
those folders or files should go away within a few seconds.
The agent typically creates a new data folder every 20 seconds, and optionally (depending on configuration) the
agent creates log upload files every minute. If there are many items, then the agent is unable to upload.
o If the number of items is decreasing, the agent might have an issue. The agent is slowly catching up, but this
situation indicates that a previous issue existed.
o If the number of items continues to increase overall, check the configuration item URL:
NOTE: To prevent consuming the disk with backed-up data, the agent limits the size and count of items in the
upload directory.
For a new installation, the agent reaches out to the streamer for a configuration file. If the configuration file can’t
reach the streamer, the streamer goes into a slow poll mode, waiting for a good configuration file. In the
meantime, the streamer does nothing else (it does not generate data or log files). As a result, even through it looks
like there is no backup of data files, in reality, there are no data files.
l After a restart, the agent reaches out to the streamer for a new configuration file.
l If the agent can't reach the streamer. the agent will still generate data files, because it has a valid
configuration file from a previous run. In this situation, you will see data files backing up if the streamer is
unreachable.
In summary, if you have a valid configuration, you will get data files. If you do not have a backup, streamer can be
reached.
NOTE: You might need to preface the following commands with sudo depending on if you are in root-
privileged mode.
1. SSH into the message collector and run the following command:
2. Look for lines starting with the IP of the server with the agent on it, such as the following:
10.2.16.40 - - [19/Apr/2018:17:04:55 +0000] "POST /SaveData.py/save_data HTTP/1.1"
200 59 "-" "Windows SiloAgent : aym-win2012r2-0"
3. If there are no matching lines, then the streamer is not getting data from that agent.
If you are using the new user interface or the converged platform:
1. Either SSH into the Compute Node or point your instance to the Rancher cluster.
2. Run the following command to view the logs:.
kubectl logs -l app=streamer
1. If you are using streamer_prime, locate the following files from the SL1 message collector and provide the
files to your ScienceLogic contact:
l /var/log/uwsgi/streamer_prime_uwsgi.log
l /var/log/streamer_prime/streamer_prime.log
2. If you are using the new user interface for SL1 or the converged platform, run the following command:
l /var/log/uwsgi/streamer.log
l /var/log/insight/streamer.log
3. Contact your ScienceLogic contact with any error messages you find in the log files. If you do not find any error
messages, then the issue is most likely with the Dynamic Application that runs on the collector unit.
l NIPD True. The agent library can not get into all processes at times, often on install. Non-intercepted
process discovery reports processes that are not intercepted via the library.
l SLPAggregation. This parameter takes short-lived processes that exist for less than 80 seconds and
rolls information about the processes into the information for their parents. As a result, the short-lived
processes will not be seen.
Troubleshooting Examples
Exa m p l e /va r/l og /strea m er_p ri m e/strea m er_p ri m e. l og for successful d i scovery
Exa m p l e /va r/l og /uwsg i /strea m er. l og for successful d i scovery i n strea m er_
p ri m e
You can find the host id from the ADS url, such as https://<sl1_address>/ads/servers/13/system). You can
located the files in the /tmp/save_agent_data directory.
Two device records exist in the new user interface for This situation occurs when the new user interface first
SL1 for the same device. discovered this device with SNMP, and then the agent
was installed and started polling that device. This
duplication of records also occurs if the agent was
installed first, and then you ran an SNMP discovery.
The SNMP device record has IPv4, but the agent The agent reports all network interfaces to the
device record has IPv6. message collector. The message collector uses the
first "bound" IP address reported by the agent.
If you uninstall an agent and then run a different After you uninstall the agent, the scilog.conf file is left
installation executable file, you still see the same on the server in case the agent is reinstalled. The new
organization ID for the agent record. user interface can reuse the same device record and
maintain historical performance data for that agent.
To address this issue, delete the file after you run the
uninstallation. If you install this agent again, the new
user interface assigns a new organization ID to the
agent and creates a new device record.
Other
If any provision of this agreement shall be unlawful, void, or for any reason unenforceable, then that
provision shall be deemed severable from this agreement and shall not affect the validity and enforceability
of any remaining provisions. This is the entire agreement between the parties relating to the matters
contained herein.
In the U.S. and other jurisdictions, trademark owners have a duty to police the use of their marks. Therefore,
if you become aware of any improper use of ScienceLogic Trademarks, including infringement or
counterfeiting by third parties, report them to Science Logic’s legal department immediately. Report as much
detail as possible about the misuse, including the name of the party, contact information, and copies or
photographs of the potential misuse to: [email protected]
800-SCI-LOGIC (1-800-724-5644)
International: +1-703-354-1010