Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual page 84

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

78
U
D
SING THE
EPLOYMENT
Step 3
Step 4
Step 5
Step 6
Step 7
E
DITOR
Enter values for the parameters:
Table 5-6 Event Processor Parameters
Parameter
Event Processor Server
Listen Port
In the toolbar, click Advanced to display the advanced parameters.
The advanced configuration parameters appear.
Enter values for the parameters, as necessary:
Table 5-7 Event Processor Parameters
Parameter
Overflow Routing
Threshold
Events database path
Payloads database path
Click Save.
The deployment editor appears.
Repeat for all Event Processors in your deployment you wish to configure.
STRM Log Management Administration Guide
Description
Specify the port that the Event Processor monitors for
incoming connections. The default range is from 32000 to
65535.
Description
Specify the events per second threshold that the Event
Processor can manage events. Events over this
threshold are placed in the cache.
Specify the location you wish to store events. The
default is /store/ariel/events.
Specify the location you wish to store payload
information. The default is /store/ariel/payloads.

Advertisement

Table of Contents
loading

Table of Contents