CO-logmon configuration file
The CO-logmon.cnf file contains the following sections:
Destination address and port number
The destination address and port number for syslog messages are required at the beginning of the file. You cannot move the directives to another section. If multiple entries exist, only the last entry recorded is used and the other directives are ignored.
They are set during the installation process, but you can modify the values.
The following table provides a description of the directives:
Directive | Description |
---|---|
DestinationAddress | IP address that corresponds to the location of the BMC Defender syslog receiver (typically the IP address of BMC Defender Server) If this value is invalid, the CO-logmon program does not send syslog messages. |
DestinationPort | UDP port number The value is not usually changed and is provided for reference. Default value: 514 (standard UDP port number used by syslog) |
The directives are identical to the directives of the CO-logmon.cnf file.
Remote configuration parameters (optional)
You can configure remote capabilities, including the required type of authentication and optional passkey.
If you comment out or remove the directives from the configuration file, then remote configuration is disabled and only manual configuration of the CO-logmon program is permitted.
CO-logmon supports remote configuration directives by BMC Defender Server or the rsmconf.exe remote configuration utility.
The following directives support this function:
Directive | Description |
---|---|
ListenAuthMode | Authentication mode used when processing remote requests The directive is followed one of the following numbers:
Default value: 3 |
ListenPassKey | Passkey used with remote configuration when the ListenAuthMode value is 2 or 3 The value is a simple password. The corresponding password is found in the System > Parameters tab of BMC Defender Server. |
ListenPort | TCP port number by which CO-logmon listens for remote requests The value is not usually changed and is provided for reference. Default value: 55514 |
The following parameters are optional:
Parameter | Description |
---|---|
MessagePrefix | Prefix for any message that the system sends A prefix can help to distinguish messages. For example, you could use a keyword, device name, or organization name as a message prefix. If you omit this parameter, the message has no prefix. Default value: hostName userName |
MsgDelaySecs | Number of milliseconds to wait after sending a message Any integer from 10 through 5,000 is valid. Use this value to limit the number of messages that can be sent (from 10 per second to 12 per minute) and prevent any one syslog process from flooding a syslog message receiver. If you omit this parameter, the default value is used. Default value: 100 milliseconds |
LogLocal | Whether all syslog messages that CO-logmon sends should be logged to the CO-logmon.log file If True, messages are logged in CO-logmon.log with any error messages that the program encounters. The process offers a simple way to verify whether UDP messages get dropped. If False, or if you omit this parameter, the messages are not logged to CO-logmon.log. Default value: False For more information, see Message-encryption. |
EncryptData | Whether message data encrypts before transmitting If True, message data encrypts before transmitting. This setting makes the CO-logmon program usable only with the BMC Defender Server. If False, or if you remove this parameter, the message data is not encrypted before transmitting. For more information, see Message encryption. Default value: True |
MessageFormat | Phrase or keyword flag that controls the message format of all messages from the agent Common values for this parameter are normal or LEEF, but other values might be available to support special message formats. For other values and variants, contact BMC Support. This parameter is usually omitted from the configuration file. |
Log file monitor specifications
You can configure one or more log file monitors, default facilities, severities, and match patterns that overwrite these defaults. Use the MatchKeyWord directive to configure multiple log files, each with multiple patterns, to control multiple facilities and severities.
For more information, see Log-file-specification-considerations.
The following directives are supported:
Directive | Description |
---|---|
LogFile | Path name to a streaming text log file on the system You can specify the path name relative to the location of the CO-logmon program or as an absolute path name by using either forward or backward slashes. All the directives that follow, until the next LogFile directive, apply to the specified log file. This directive can contain time-format values, such as %y, %m, and %d to match (respectively) the two-digit year, two-digit month, or two-digit day. For more information, see Time-format-symbols-for-log-file-names. |
LogName | Name of the log file or subsystem that is displayed in the syslog message The value can be any text string up to 500 characters. You can end the value with a colon (for example, Oracle Data: or HTTP Log File:). If you omit this directive, the event message is identified with the log file in the message content only. |
MaxSizeChange | Maximum size, as an integer value in bytes, that the file can increase during a 500-millisecond interval If a file size increases beyond the maximum size, a message is triggered. Use this directive to prevent excessive syslog messages when a file has extremely rapid updates, such as during a new file copy. If you omit this directive, the default value of 10,000 bytes applies. |
LogStatChange | Whether the monitor agent sends a syslog message (with DefaultFacilty and DefaultSeverity) if the file modification time changes Use this directive to monitor file objects that are not necessarily log files. The file object specified by LogFile can be a directory or any file, including an executable file or configuration file. If you omit this directive, changes to the file modification times are not monitored. |
DefaultFacility | Facility name or official facility number (between 0 and 23) that identifies the default facility code used in all messages that log to the specific file For more information about valid facilities, see Facilities-and-severities. If you omit this directive, the default facility is user. |
DefaultSeverity | Severity name or official facility number (between 0 and y) that identifies the severity code used in all messages that log to the specific The value of this directive is commonly disabled or -1, indicating that no message is processed unless it matches one of the UseSeverity patterns (described later in this topic). For more information, see Disabled severity. For more information about valid severities, see Facilities-and-severities. If you omit this directive, the default severity is disabled. |
UseFacility | Following the DefaultFacility and one or more MatchKeyWord directives, the message facility when followed by a series of match patterns The UseFacility operates identically to the Event Log monitor. The directive is followed by a series of match patterns, any of which will cause the UseFacility value to be specified as the message facility. You can configure multiple UseFacility directives, each followed by multiple MatchKeyWord directives. |
UseSeverity | Following the DefaultSeverity and one or more MatchKeyWord directives, the message severity when followed by a series of match patterns The UseSeverity directive operates identically to the Event Log monitor. You can configure multiple UseSeverity directives, each followed by multiple MatchKeyWord directives. |
MatchKeyWord | Nested under a UseFacility or UseSeverity directive, a single match keyword The keyword can use * or ? wildcards. The MatchKeyWord directive operates identically to the Event Log monitor. If a new log file entry matches the specified pattern, the related severity or facility is used. You can specify multiple patterns. Any other directive ends the MatchKeyWord list, so the MatchKeyWord directives must all be contiguous within a single UseFacility or UseSeverity block. |
Where to go from here
To modify the configuration values, see Modifying-the-configuration-files.