Advertisement
osvaldohg

win32_2

Oct 5th, 2020
267
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
YAML 4.93 KB | None | 0 0
  1. init_config:
  2.   ## @param tag_event_id - boolean - optional - default: false
  3.   ## The `tag_event_id` setting adds an event id tag to each
  4.   ## event sent from this check.
  5.   #
  6.   # tag_event_id: false
  7.  
  8.   ## @param default_event_priority - string - optional - default: normal
  9.   ## Set priority level in event stream for all events created by integration
  10.   ## Options available are 'low' or 'normal'.
  11.   #
  12.   # default_event_priority: normal
  13.  
  14. instances:
  15.   -
  16.  
  17.     ## @param host - string - optional - default: localhost
  18.     ## By default, the local machine's event logs are captured. To capture a remote
  19.     ## machine's event logs, specify the machine name (DCOM has to be enabled on
  20.     ## the remote machine).
  21.     #
  22.     # host: <REMOTE_HOSNAME>
  23.  
  24.     ## @param username - string - optional
  25.     ## If authentication is needed, specify a `username` here.
  26.     #
  27.     # username: <USERNAME>
  28.  
  29.     ## @param password - string - optional
  30.     ## If authentication is needed, specify a `password` here.
  31.     #
  32.     # password: <PASSWORD>
  33.  
  34.     ## @param event_priority - string - optional - default: normal
  35.     ## Override default event priority by setting it per instance
  36.     ## Available values are: `normal` and `low`
  37.     #
  38.     # event_priority: normal
  39.  
  40.     ## FILTERS
  41.     ## At least one filter is required:
  42.     ## `log_file`, `source_name`, `type`, `event_id`, `message_filters`
  43.  
  44.     ## @param log_file - list of strings - optional
  45.     ## The `log_file` filter instructs the check to only capture events
  46.     ## that belong to one of the specified LogFiles (Application, System, Setup, Security,
  47.     ## or application-specific LogFile).
  48.     #
  49.     log_file:
  50.     - Application
  51.      - Setup
  52.     type:
  53.     - Warning
  54.  
  55.     ## @param source_name - list of strings - optional
  56.     ## The `source_name` filter instructs the check to only capture events
  57.     ## that come from one of the specified SourceNames.
  58.     #
  59.     #source_name:
  60.     #  - asus
  61.  
  62.     ## @param type - list of strings - optional - default: information
  63.     ## The `type` filter instructs the check to only capture events
  64.     ## that have one of the specified Types.
  65.     ## Standard values are: Critical, Error, Warning, Information, Audit Success, Audit Failure.
  66.     #
  67.     #type:
  68.     #  - information
  69.  
  70.     ## @param event_id - list of strings - optional
  71.     ## The `event_id` filter i5nstructs the check to only capture events
  72.     ## that have one of the specified EventCodes.
  73.     ## The event ID can be found through http://www.eventid.net/ and viewed in the
  74.     ## Windows Event Viewer.
  75.     #
  76.     # event_id:
  77.     #   - <EVENT_ID>
  78.  
  79.     ## @param message_filters - list of strings - optional
  80.     ## The `message_filters` filter instructs the check to only capture
  81.     ## events which Message field matches all of the specified filters.
  82.     ## Use % as a wildcard. See http://msdn.microsoft.com/en-us/library/aa392263(v=vs.85).aspx
  83.     ## for more on the format for LIKE queries.
  84.     ##
  85.     ## NOTE: Any filter that starts with "-" is NOT a query, e.g.: '-%success%'
  86.     ## searches for events without 'success' in the message.
  87.     #
  88.     message_filters:
  89.      - '-%test101%'
  90.  
  91.     ## @param event_format - list of strings - optional - default: Message
  92.     ## The `event_format` parameter instructs the check to generate
  93.     ## Datadog's event bodies with the specified list of event properties.
  94.     ## If unspecified, the EventLog's `Message` or `InsertionStrings` are used by default.
  95.     ## Available values are: Logfile, SourceName, EventCode, Message, InsertionStrings, TimeGenerated, Type
  96.     #
  97.     # event_format:
  98.     #   - Message
  99.  
  100.     ## @param tags - list of key:value elements - optional
  101.     ## List of tags to attach to every metric, event, and service check emitted by this Integration.
  102.     ##
  103.     ## Learn more about tagging: https://docs.datadoghq.com/tagging/
  104.     #
  105.     #tags:
  106.     #  - customTag:esp
  107.     #   - <KEY_2>:<VALUE_2>
  108.  
  109. ## Log Section (Available for Agent >=6.0)
  110. ##
  111. ## type - mandatory - Type of log input source (tcp / udp / file / windows_event)
  112. ## port / path / channel_path - mandatory - Set port if type is tcp or udp. Set path if type is file and channel_path if windows_event
  113. ## service - mandatory - Name of the service owning the log
  114. ## source  - mandatory - Attribute that defines which integration is sending the logs
  115. ## tags: - optional - Add tags to each logs collected
  116. ##
  117. ## Discover Datadog log collection: https://docs.datadoghq.com/logs/log_collection/
  118. #
  119. logs:
  120.   - type: windows_event
  121.     channel_path: Application
  122.     source: Application
  123.     service: myapp
  124.     log_processing_rules:
  125.     - type: exclude_at_match
  126.       name: exclude_lol
  127.       pattern: "\\Q Could not write logs to 'C:\\Program Files\\OutSystems\\Platform Server\\logs\\OsISAPI.log’. Please make sure IIS has write access to this folder. \\E"
  128. #
  129. #   - type: windows_event
  130. #     channel_path: <CHANNEL_2>
  131. #     source: <CHANNEL_2>
  132. #     service: <SERVICE_NAME>
  133.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement