New Question
 
 
PRTG Network Monitor

Intuitive to Use.
Easy to manage.

200.000 administrators have chosen PRTG to monitor their network. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free PRTG
Download >>

 

What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general. You are invited to get involved by asking and answering questions!

Learn more

 

Top Tags


View all Tags


Identifying the device a device cloned itself from ideally via API?

Votes:

0

Your Vote:

Up

Down

Hi Guys,

I suspect this is an incredibly long shot but is there a way to identify which clone device a device used to deploy a new device. We have 5 example devices for Server, network, ESX, UTM and EFM lines. Our CRM then uses these to set example sensors for these devices to speed up deployment. I need to identify which clone item all our devices used.

Not sure if this is possible with the traditional API or with LordMilkos PRTGAPI tool but any guidance would be appreciated.

Kindest Samuel

api clone lordmilko parent

Created on May 17, 2018 2:06:14 PM by  Samuel Ashdown (60) 1 1



2 Replies

Votes:

0

Your Vote:

Up

Down

Hi Sam,

This information does not appear to be stored in the logs of cloned or created objects, indicating this most likely is not a thing. For future reference I recommend assigning some tags to your device templates, so that you can easily look up the source and category of the device at a later date

Regards, lordmilko

Created on May 18, 2018 5:09:28 AM by  lordmilko (1,572) 2 1



Votes:

0

Your Vote:

Up

Down

Lordmilko is correct here, it will just state "Created" in the logs, including a timestamp. The approach pointed out is correct as well. Thanks for jumping in!


Kind regards,
Stephan Linke, Tech Support Team

Created on May 18, 2018 10:26:35 AM by  Stephan Linke [Paessler Support]



Please log in or register to enter your reply.


Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.