Sponsored Content
Full Discussion: ALOM Email Alerts
Operating Systems Solaris ALOM Email Alerts Post 302511919 by La-Paloma78 on Friday 8th of April 2011 01:23:58 AM
Old 04-08-2011
ALOM Email Alerts

Hi

I'm new to this forum and I was hoping you can help me with this strange activity.
I have a Sol10 sun4u sparc SunFireV250 machine. Currently running ALOM 1.6.8 firmware.
The following error was experienced on this machine:
"Input power unavailable for PSU @ PS0"

Reading the documention this particular message is considered to be a Major event. And if the ALOM email settings are correct and email should have been sent, which in this case it has'nt.

To confirm my ALOM config is correct and the alerts are working I ran the following command from the OS.
/usr/platform/`uname -i`/sbin/scadm send_event -c "Test event message please ignore"

The above seem to have worked , though the -c option will send a custom critical alert which will act on only critical alerts. So I then decided to run the command without the -c option which sends a major event.
/usr/platform/`uname -i`/sbin/scadm send_event "Test event message please ignore"

The above command did not send out an email alert.
Does this mean only critical events are only sent out via email and not Major events such as "Input power unavailable for PSU @ PS0" ? I would like ALOM to send alerts when these events occur.
 

10 More Discussions You Might Find Interesting

1. IP Networking

Email Alerts

Dear Network Masters, I want to know who brought up the concept of Email Alerts Feature. are their any RFC's on Email Alerts???? Please let me know. Thanks in Adv, meti (1 Reply)
Discussion started by: ashokmeti
1 Replies

2. Solaris

configure solaris 10 mail to relay email alerts from SAN switch

I want to be able to use an account on a solaris 10 server, eg root@myhost to act as a relay to forward mail to my domain account me@mycompany.com The reason for this is to configure root@myhost as a mail relay on Brocade SAN switches - so that when a port goes bad i get an email alert.... (0 Replies)
Discussion started by: wibidee
0 Replies

3. AIX

email alerts for memory or cpu exceeding thresholds

Hi Guys, I hope this is an easy question: I need some kind of script or an idea how I can convince syslog to send an email to root or someone else once cpu usage exceeds 95% or the memory consumption (maybe via AVM value times 4k) exceeds 85% of my real memory on any of my 700 lpars. We're... (4 Replies)
Discussion started by: zxmaus
4 Replies

4. UNIX for Dummies Questions & Answers

Email Alerts

hi I am running so scripts that clean up empty folders on our servers once a week. I run from a cron. But what i would like to do is add a email notfication so i can be notified that it completed. The script is #Clean Empty Folders on Studio Share perl... (1 Reply)
Discussion started by: treds
1 Replies

5. Shell Programming and Scripting

Logic to send email alerts only 5 times a day

Hi, I have written below disk space monitoring script to monitor disk space every minute. I have scheduled this script through cron. But now my problem is this script alerts the users continuously until the space is freed up. These emails are filling up the inbox exponentially until the space... (3 Replies)
Discussion started by: svajhala
3 Replies

6. Solaris

Difference b/n ALOM and ALOM CMT

Hi Everyone. What is the differece b/n ALOM and ALOM CMT Service processor. I am trying reset ALOM login/passwd using scadm utility on T2000, while I am googling I came cross ALOM CMT doesnt support scadm utility, but ALOM supports. Not sure how different are these. Thanks, (0 Replies)
Discussion started by: bobby320
0 Replies

7. Shell Programming and Scripting

Email alerts whenever someone logs into server via SSH any user?

Hi all, Thanks in Advance!! I dont know how to start to write script for this process, my requirement is if any user logs into server automatically Admin get mail alert. how is this possible? any one guide me to complete this process. (1 Reply)
Discussion started by: anishkumarv
1 Replies

8. AIX

Will it affect my AIX LPAR security, when i set up email alerts on AIX server.

Hello, I've set up email alerts on AIX Servers. so that i can get email notifications (via mail relay server) when ever there is abnormal behavior. for example 1) my script monitors CPU/disk/memory etc... when it reaches high water ark, it will send an email alert. 2) disk usage alerts 3)... (5 Replies)
Discussion started by: System Admin 77
5 Replies

9. AIX

Would like to get email alerts when user password going to expire

Hello, I am trying to write a shell script, which will send email alerts to Admin/users when users password is going to expire in 15 days. Can you please help me with the script. thank you. (3 Replies)
Discussion started by: Kumar7997
3 Replies

10. UNIX for Dummies Questions & Answers

Send email attachment using Operating System Script(UNIX) in Oracle Alerts

Good Day Kindly assist: I am creating an Alert that will notify supervisors of staff members who are due for probation report. I am using Operating System Script(Unix) as source.I have already developed the script. Now the challenge is if there are 3 employee records then the alert... (2 Replies)
Discussion started by: nosi27
2 Replies
sealert(8)																sealert(8)

NAME
sealert - setroubleshoot client tool SYNOPSIS
sealert [-b] [-f local_id] [-h] [-s] [-S] [-l id] [-a file] [-u] [-p] [-P plugin_name] DESCRIPTION
This manual page describes the sealert program. sealert is the user interface component (either GUI or command line) to the setroubleshoot system. setroubleshoot is used to diagnose SELinux denials and attempts to provide user friendly explanations for a SELinux denial (e.g. AVC) and recommendations for how one might adjust the system to prevent the denial in the future. In a standard configuration setroubleshoot is composed of two components, setroubleshootd and sealert. setroubleshootd is a system daemon which runs with root privileges and listens for audit events emitted from the kernel related to SELinux. The audit daemon must be running. The audit daemon sends a dbus message to the setroubleshootd daemon when the system gets an SELinux AVC denial. The setroubleshootd daemon then runs a series of analysis plugins which examines the audit data related to the AVC. It records the results of the analysis and signals any clients which have attached to the setroubleshootd daemon that a new alert has been seen. sealert can be run in either a GUI mode or a command line mode. In both instances sealert run as a user process with the privileges associ- ated with the user. In GUI mode it attaches to a setroubleshootd server instance and listens for notifications of new alerts. When a new alert arrives it alerts the desktop user via a notification in the status icon area. The user may then click on the alert notification which will open an alert browser. In addition to the current alert sealert communicates with the setroubleshootd daemon to access all prior alerts stored in the setroubleshoot database. The user may elect to tag any given alert as "ignore" in the browser which prevents any future notification for the given alert. This is useful when a user is already aware of a reoccurring problem. sealert may also be run in command line mode. The two most useful command line options are -l to "lookup" an alert ID and -a to "analyze" a log file. When setroubleshootd generates a new alert it assigns it a local ID and writes this as a syslog message. The -l lookup option may then be used to retrieve the alert from the setroubleshootd alert database and write it to stdout. This is most useful when setroubleshootd is being run on a headless system without the GUI desktop alert facility. The -a analyze option is equivalent to the "Scan Logfile" command in the browser. The log file is scanned for audit messages, analysis is performed, alerts generated, and then written to stdout. LOG FILE SCANNING
You may ask sealert to parse a file accumulating all the audit messages it finds in that file. As each audit event is recognized it is pre- sented for analysis which may generate an alert report if the analysis was successful. If the same type of event is seen multiple times resulting in the same report the results are coalesced into a single report. The report count field will indicate the number of times the tool thought it saw the same issue. The report will also include a list of every line number on which it found an audit record which con- tributed to the coalesced report. This will allow you to coordinate the contents of the file with the analysis results if need be. Log file scanning may be initiated from the sealert browser via the File::ScanLogFile menu or from the command line via 'sealert -a file- name'. Please note that sealert runs as a user level process with the permissions of the user running it. Many system log files are read- able by root only. To work around this if you have root access one can copy the file as root to a temporary file and change its permis- sions. This is a good solution when scanning via the GUI as a normal user. Or you might consider su'ing to root and run the analysis via the command line (e.g. sealert -a filename). The audit records in the log file must be valid syntactically correct audit messages or the parser will ignore them. OPTIONS
-b --browser Launch the browser -f --fix Execute the fix command for the avc with the given uuid and plugin, requires --plugin option. -h --help Show this message -s --service Start sealert service, Usually used by dbus. -S --noservice Start sealert without dbus service as stand alone app -l --lookupid id Lookup alert by id, if id is wildcard * then return all alerts -a --analyze file Scan a log file, analyze its AVC's -u --user logon as user -p --password set user password -P --plugin Set plugin name associated with the --fix option AUTHOR
This man page was written by John Dennis <jdennis@redhat.com> and Dan Walsh <dwalsh@redhat.com>. SEE ALSO
selinux(8), 20061121 sealert(8)
All times are GMT -4. The time now is 09:21 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy