How do I disable log collection for individual log types?

How do I disable log collection for individual log type

Let's say you're collecting logs from different sources like Windows event logs, SQL server logs, and Cassandra logs. If you notice that you're reaching the log upload limit for the month you can choose to disable collection for one of the log types, say Cassandra logs, while continue log collection for SQL server logs and Apache access logs.

To do this, navigate to Admin > AppLogs > Log  Types > Cassandra Logs (or any  log type for which you want to disable collection) > Disable auto discovery.




When this is done, auto discovery will be disabled and logs from the newly installed servers will not be added to the log profile.

To stop log collection from servers that already have 'Cassandra logs' log profile configured:

1. Open the corresponding Log Profile.

2. From the drop-down Associate this log profile with these servers deselect all servers or the ones that consume most space.

 If you've selected a monitor group(s) from which application logs can be uploaded, deselect them as well.

 Note: Logs that are already collected for the current billing cycle cannot be removed until the next billing cycle.


    • Related Articles

    • Site24x7 Real User Monitoring (RUM) - Data Collection

      When you include Site24x7 RUM beacon script in your web pages, the following data is collected. All data that's being collected is in accordance with GDPR compliance. Performance details of web page load time - Metrics like response time of web page ...
    • Troubleshoot the Error 404 and Error 99 for RabbitMQ

      When installing the RabbitMQ plugin, you may encounter the following errors: HTTP Error 404: Not Found: This error usually occurs when Site24x7's RabbitMQ monitoring plugin attempts to access the /api/overview page of RabbitMQ, but the resource ...
    • Roles supporting tunnel management and path data in VMware VeloCloud SD-WAN

      Introduction In VMware VeloCloud SD-WAN, the ability to create or modify tunnels and view path (tunnel) data depends on the user role. This ensures that configuration changes and diagnostic insights are restricted to authorized users. The table below ...
    • Exclude Site24x7 monitoring traffic from Google Analytics

      You can exclude traffic from the Site24x7 Web Transaction (Browser) monitor and Webpage Speed (Browser) traffic from Google Analytics in two ways. To exclude traffic for the Web Defacement monitor, you can follow the first method. 1. Creating a ...
    • Validating sender email using DKIM authentication

      What is DKIM? DomainKeys Identified Mail (DKIM) is an advanced authentication method used widely by email service providers to verify the email from the point of its origin by validating the email sender. It allows the email senders to authenticate ...