Log files contain important information about system and application health and problems that may occur. The information should be recorded in the log to be used as one of your tools to monitor and troubleshoot once there is a failure. IT process automation can help you monitor and plan response actions to alerts and failures that were generated by your systems and was written to a log files such as:
Event log files on your Server Event Viewer
o DNS server
o Event logs created by other services or applications
Other log files. Log files created by other services or applications such as the Backup applications, antivirus programs, IIS, Apache and third-party applications that cannot be viewed in Event Viewer.
Learn how you can automate Log File monitoring and response actions in less than 5 min using IT process automation:
One of our clients in the insurance industry has a business process where it received files via FTP from insurance agents. These files contain critical data (photos, files related to damaged cars etc.) which needs to be extracted and moved to the back-end system.
The problem begins when a these file are corrupted and cannot be used or read – something which causes the entire business process to get stuck and fail. Since the back-end legacy system was lacking a log file, even identifying the event was not that obvious.
Our customer used the eyeShare IT process automation tool to resolve this issue. eyeShare validates the time stamp of these files. If the time stamp is over 2 hours (indicates the file could not be opened), it triggers an automated workflow in eyeShare, which sends notification via text message, and performs several corrective activities.