Submit a ticketCall us

Announcing NCM 7.7
With NCM 7.7, you can examine the rules that make up an access control list for a Cisco ASA device. Then you can apply filters to display only rules that meet the specified criteria, order the rules by line number or by the hit count, and much more.
See new features and improvements.

Home > Success Center > Log & Event Manager (LEM) > SolarWinds LEM Quick Start and Deployment Guide > Collect log data > Set up your agent nodes

Set up your agent nodes

Created by Caroline Juszczak, last modified by Caroline Juszczak on Aug 05, 2016

Views: 158 Votes: 0 Revisions: 3

After you configure your syslog server, install the LEM agent on your servers and workstations. Log & Event Manager will collect the syslog data from the operating system logs and applications running on each system, normalize the data into readable information, and send it to the LEM manager for processing. All events received from the LEM agents display in the Monitor view.

Using LEM agents, you can:

  • Capture events in real-time.
  • Encrypt and compress the data for efficient and secure transmission to the LEM manager.
  • Buffer the events locally if you lose network connectivity to the LEM manager.

The LEM agent runs on your agent nodes until you stop or uninstall the agent.

You can install the LEM agent by clicking Add Nodes to Monitor in the Getting Started widget.

LEM agent installation checklist

Before installing your LEM agents, complete the pre-installation checklist below. This checklist helps you:

  • Verify that system requirements are met and all required software is installed.
  • Gather the information required to complete the installation.

[ ] Verify that you have administrative access to the servers and workstations you plan to monitor

Windows-based systems require Domain or Local administrative privileges. Linux or Unix systems require root-level access.

[ ] Change the LEM hostname. This will minimize hostname issues before you install the LEM agent.

[ ] Set an exception in your antivirus or antimalware scanning software for the ContegoSPOP folder where the LEM agents will be installed.

The alerts are stored in queue files, which change constantly as they are normalized and encrypted.

[ ] Turn off any anti-malware or endpoint protection applications on host systems during the installation process.

These applications can affect the process by which installation files are transferred to the hosts. This will assist Technical Support if you have issues with your agents.

[ ] Ensure that your target node can support the agent hardware requirements.

[ ] Record the paths to the installation folders on your target server.

Installation folders

LEM agents are installed to the following folders based on the operating system. See the table below.

Operating System Installation Folder
Windows Server 32-bit C:\Windows\system32\ContegoSPOP
Windows Server 64-bit C:\Windows\sysWOW64\ContegoSPOP

 

 
Last modified
09:20, 5 Aug 2016

Tags

Classifications

Public