This article was updated to support v11.7.8 of Goliath Performance Monitor.
With all rules/alerts, custom remediation actions can execute a custom program, batch, or command file. PLEASE NOTE: A Goliath Agent must be installed on the server/endpoint where the remediation will take place.
Configure Custom Remediation Actions
- Check the box for “run a program”. When checked and alert conditions have been met, the program, Powershell script, batch, or command file name specified in the Program Name field is executed either on the Goliath Server, the monitored server or a different server.
- Select the appropriate radio button in the “At” field to choose to run the remediation action at the MonitorIT Server, at the monitored server, a different server, or to Restart the Monitored computer.
- In the “Program Name” field, define the name of the program, Powershell, command line, batch file, etc toto be opened when the alert triggers. This must be a fully qualified program name path. In order to access the network share, the agent must have rights to the share. Additional Examples:
- Powershell: C:\Windows\sysnative\WindowsPowerShell\v1.0\powershell.exe or powershell.exe
- Command line: C:\Windows\system32\cmd.exe or cmd.exe
- Bat File: C:\Temp\Test.bat
- Executable: \\10.2.1.1\c$\scripts\alerts.exe
- In the “Program Args” field, define an 'Argument' string passed to the program, batch, or command file named in the Program Name field when executed. The 'Argument' string text supports "macro substitution" based on macro parameters listed below. The parameters are case sensitive and must be upper case. You can find these macros in the Examples:
- Powershell: -ExecutionPolicy Bypass -File "C:\Program Files\MonitorIT\Scripts\test.ps1"
- Command: net stop Spooler
- The optional username and password is where you would, if necessary, define a user that the Goliath Agent will use to run the remediation. This username must be in the form of domain\user
- Set the “Show Program Window” check box to have the remediation actions appear on the screen or uncheck to run the remediation in the background; hidden.
- Press the “Test Program” button to test the remediation execution. The test will only process the Program Args macros, if any, and will return a message.
Macros for Program Arguments
- &D for Date
- &T for Time
- &N for Name of the Server/Device causing the alert condition
- &P for the Server/Device Description
- &O for the Server/Device Notes
- &G for the Name of the Group that the Server/Device belongs
- &C for the Group Description
- &A for IP Address of the Server/Device causing the alert condition
- &W for the Monitoring Rule ‘Name’ responsible for the alert
- &R for the Monitoring Rule ‘Description’ text
- &L for the Monitoring Rule ‘Severity’ level
- &E for the Monitoring Rule Notes
- &S for Status message or code associated with the alert
- &V for the CounterWatch value that exceeded a threshold in this type alert.