Syslog Management Help >> Operation Guide >> Syslog-to-Alarm Rule

Syslog-to-Alarm Rule

To extract important information from Syslogs, the system only receives Syslogs that match the pre-defined rules of the Syslog management system, matches them against the Syslog-to-alarm rules, and promotes the matching Syslogs to alarms. With the alarms, the administrators can quickly discover network problems and locate the causes.

Syslog-to-Alarm Flowchart

The Syslogs are promoted to alarms in the following workflow.

  1. Syslog-to-alarm rules are defined in the system. For more information, see Add/Modify/Copy a Rule.
  2. The system receives Syslogs from devices.
  3. The system matches the Syslogs against the Syslog-to-alarm rules, and picks out the Syslogs if they match all the following options in a rule. The system determines whether a Syslog matches a Syslog template using the following rules:
  4. The system counts the matching Syslogs. If you specify the statistic method as Network, the matching Syslogs throughout the network are counted together. If you specify the statistic method as Single Device, the matching Syslogs are counted per device. The matching Syslogs are counted using the following rules:
  5. The system generates an alarm when a count reaches the repeat times within a repeat interval. For example, if you set the repeat interval to 60 seconds and the repeat times to 5, the system generates an alarm if a count reaches 5 within a consecutive 60 seconds.
  6. If you select the Yes option for Forward to SCC, the generated alarms will be sent to the security control center (SCC) for collaborative processing.
  7. If the system receives a Syslog that matches the alarm recovery rule in the Syslog-to-alarm rule, the system immediately generates a recovery alarm. To exactly recover the alarms generated by the Syslog-to-alarm rule, specify the alarm recovery key parameters, which are the location parameters for the recovery alarms. The system uses the location parameters to identify which alarms need be recovered according to the recovery alarms.

Functions