Introduction

A SysLog monitoring rule filters incoming SysLog events using a RegEx pattern and generates alerts in OpsRamp based on user-defined metric names, component names, alert subjects, descriptions, and severities.

This is a two-step process:

  1. Define the SysLog rules.
  2. Install the SysLog Monitor Configuration

Define SysLog rule

Follow these steps to define SysLog rule:

  1. To select your client, click the Client/Partner dropdown from the top-left corner of the dashboards screen. Either type your client’s name in the search box or select your client from the list.

  2. Click Setup > Account. The Account Details screen is displayed.

  3. Click on the Monitoring tile and then click the SYSLOG RULES tab.

  4. Click +ADD in the SysLog rule listing screen. The ADD SYSLOG RULE screen is displayed.


  5. Enter the following information in the ADD SYSLOG RULE screen:

    Table Note
    Field NameField TypeDescription
    NameStringEnter the Rule name.
    ActionDropdownAction to apply to messages that match this rule:
    • INCLUDE: If the event matches a rule, it is processed further.
    • EXCLUDE: If the event matches a rule, it will not be processed further.
    RegEx PatternStringRegEx pattern to apply for matching messages.
    Metric NameStringUser-defined metric name, which can be specified using RegEx.
    ComponentStringUser-defined component name.
    Alert SubjectStringUser-defined alert subject.
    Alert DescriptionStringUser-defined alert description.
    Alert SeverityDropdownSelect an alert severity level:
    • Critical
    • Warning
    • Info
    • Ok
    TagsStringUser-defined tag name.
  6. Click ADD SYSLOG RULE. The SysLog rule is created, and a confirmation message appears.

You can view the rule in the SYSLOG RULES listing screen.


See Syslog Event Logging Overview for more information.