Recent Discussions
🛠️ Feature Request: Optimize Dell ME4 LogicModules to Reduce Excessive Login Activity
Summary: We’ve observed that the Dell PowerVault ME4 LogicModules in LogicMonitor are generating an excessive number of login events—up to 90+ per hour—using the same service account. This behavior is causing the Dell SAN Management Controller to interpret the activity as a brute-force attempt, leading to memory exhaustion and controller resets. Details: Each polling instance (volumes, pools, controllers, etc.) performs its own login once per hour. The Groovy scripts used in the LogicModules: Authenticate for every collection. Do not reuse tokens. Do not call /logout after completing the task. This results in a buildup of session data, triggering alerts like:“The Management Controller entered a memory exhaustion state and will reboot to recover.” Impact: Controller memory buffers fill up due to unclosed sessions. The SAN reboots to recover, risking operational stability. Audit logs show consistent spikes in login/session-expired events. Request: Please consider enhancing the Dell ME4 LogicModules to: Reuse authentication tokens across polling instances within the same collector session. Explicitly call /logout after each session to release memory. Consolidate login activity to reduce overhead and improve SAN performance. Why It Matters: This change would significantly reduce unnecessary login traffic, prevent SAN controller resets, and improve overall system reliability—especially in environments with high instance counts. Thank you for considering this request. Happy to provide logs and examples if needed.dmassiah7 days agoNeophyte16Views2likes1CommentDependent Alert Mapping - defining the originating alert
In the current Dependent Alert Mapping feature, alert suppression will only take place if an upstream device has an alert for the Ping or Host Status datasources for overall reachability. There are many cases where the upstream device will not be completely down, and instead will have an alert for an interface or BGP peer going down. This will still impact downstream devices, but Dependent Alert Mapping does not work correctly in these cases because the upstream device was not technically "down". I would like to request that the Dependent Alert Mapping feature give us the option to allow other types of alerts be considered when it determines what alert is "Originating" vs "Dependent". Ideally we would be able to define this when we are defining entry points. We could have the option of only using Ping or Host Status like the feature does today, or we could choose to select our own datasources for determining what the "Originating" alert is. This would allow us to get a lot more granular and make the feature a lot more flexible/powerful than it is today.Matt_Whitney21 days agoExpert19Views1like0CommentsDashboard Interlinking
Hi Team,<br><br> Is there a feature available to interlink dashboards? As per our requirement, when clicking on a device in the dashboard, it currently redirects to the resource tree info page. However, we need it to redirect to the graphs page instead.<br><br> If this isn't feasible, our alternative is to redirect to a new dashboard, passing the device name as a token.<br><br> Regards,<br> Sreekanth17Views1like0CommentsAllow Read-Only Accounts To Stay Logged in
We use multiple TVs as dhasboards, we currently have individual widgets on them, we would like to display dashboards on the TVs. We were informed by an engineer that we cannot select accounts to stay logged in only all accounts. We would like the option have a ready-only account stayed logged in so we can display dashboards.20Views0likes0Comments- phakesley2 months agoNeophyte19Views0likes0Comments
Windows agent-based monitoring
By far the most time consuming and difficult parts of onboarding a customer into our managed services is getting servers onboarded. We advise customers use Group Policy to push out settings for Windows Firewall and add the monitoring users to some groups. We also advise using it to run a PowerShell script on each server to implement least priv access. This is based largely on the same code LM uses in the Non-Admin script with a bunch of extra features we've added ourselves. Getting this GPO implemented though often requires jumping through a lot of change control and security related questions. In larger organisations, it often requires several levels of approval before it can be implemented. Then we have the non-domain joined machines, which need this all run manually. It's often not practical to install collectors in each subnet, so we also need to get a whole host of firewall rules opened up across the network to allow the collectors to reach each server to be monitored. Again, time consuming to explain the requirements, get approval and get implemented. In cases where we need to monitor applications, like SQL Server, this requires a more ports being opened - sometimes custom ports depending on how it's been setup and additional permissions for user accounts, which again we always try to do with 'least priv' in mind. I know LM is all about "agentless" but it would be great if we could have a lightweight agent for Windows (and maybe Linux) that could collect data for a machine then forward it to a local collector for onward transmission to LM. It would reduce requirements for a lot of network changes. I'm not sure if this could also reduce the need for running scripts etc for "least priv" access. Possibly not as I guess running this agent thing as system wouldn't be ideal either. I'm talking out loud here a little, but wondering if others have similar frustrations with getting servers into monitoring.Dave_Lee2 months agoAdvisor26Views0likes2CommentsActive Discover Filters with non-existent properties
I've been looking for an easy way to exclude instances by manually creating properties like ##exclude.volumes## or ##exclude.replicationjobs## which can be referenced in Active Discovery filters. Normally you can use something like NotContain or RegexNotMatch (ie "Name NotContain ##exclude.volumes##") but that only works if the property exists. If it doesn't existing (which provides an empty string) then that filter ends up excluding everything. Which means you can't just add it when you need to exclude something. I tried several different ways to write regex to make this work but I don't think it's possible (but open to hearing a way!). Note that this needs to account for instances that can change automatically, like temporary drive mounts for example. So just disabling the instances manually wouldn't be enough. I also don't really want to set a "default" value for all these possible Exclude properties at the root level. I also wanted something that can be easily modified on any existing multi-instance DataSources, including common built-in ones and DataSources that just use WMI or SNMP without scripting. I could clone the existing DataSource and switch to using a scripted Active Discovery to deal with it in code. But I already have so many parallel DataSources with official ones and a simple Filter change would be better. So what I would like to see, and I'm sure it's come up before, is for Active Discover filters to support nested AND. So a filter can contain something like (##exclude.volumes## Exists AND Name RegexNotMatch ##exclude.volumes##). That should provide a way to do what I'm looking to do. Or something that might be easier but messier is a new option like NotContainUnlessBlank or similar that will ignore values that are blank, although that sounds messy and confusing. I'm open to any suggestions to workaround if anyone has any.Mike_Moniz2 months agoProfessor64Views0likes8Comments