You can create alert matching rules that contain conditions, such as the alert type or the date an alert is received. Alert Matching rules let you identify specific alerts as the Event Console receives them. These rules can be used when you launch tasks, forward alerts, and block alerts from being received. You can use conditions in combinations to create complex rules. For example, a sequence of conditions could be composed as as follows:
where Alert Category equals Environmental and Alert Host Name contains My-Host and Alert Time of Day after 3:00 am and Alert Time of Day before 4:00 am
You can match alerts by using the following condition types:
Alert Rule Condition Types
The category of an alert.
The resource or collection (in which the resource resides) of an alert.
The date an alert is raised (can be used in pairs to indicate a date range).
Alert Day Of Week
The day of the week an alert is raised, Sunday through Saturday (can be used in pairs to indicate a day of week range).
The PPA alert definition of the alert.
The number of duplicate alerts and, optionally, the duration or period of time (in seconds).
Alert Host name (or IP)
The hostname or IP address of the resource that raised the alert.
The text message of the alert.
The product GUID of the NS Solution that raised the alert.
The protocol from which the alert originated.
The severity level of the alert.
Alert Time of day
The date and time that the alert originated.
Alert Unknown Host
Whether or not the resource that raised the alert is known to NS.
The key-value pair variable data in the alert (SNMP varbinds, metrics, etc).
Imported Document ID: DOC1738
Subscribing will provide email updates when this Article is updated. Login is required.