Solved

Can't Access event log through VB.Net on Windows server 2008 with IIS 7.0

Posted on 2008-06-24
3
1,431 Views
Last Modified: 2013-11-07
I am catching errors in my web app and writing custom error messages to the application log. The application is deployed on WIndows Server 2008 running IIS 7.0. When an error occurs and tries to write to the log I get the error:

 Security Exception
Description: The application attempted to perform an operation not allowed by the security policy.  To grant this application the required permission please contact your system administrator or change the application's trust level in the configuration file.

Exception Details: System.Security.SecurityException: The source was not found, but some or all event logs could not be searched.  Inaccessible logs: Security.

how can it be fixed? on the provided snippet the error occurs in the second line "If not eventlog.sourceexists...."

scd.MachineName = "."

        If Not EventLog.SourceExists(scd.Source, scd.MachineName) Then

               EventLog.CreateEventSource(scd)

        End If

Open in new window

0
Comment
Question by:gregx1973
  • 2
3 Comments
 
LVL 18

Accepted Solution

by:
philipjonathan earned 500 total points
ID: 21855736
It's something to do with permission.
One shortcut, if you just need to run this on a specific server, you can write a Winforms app, just to create the said event log and source.
Afterwards, you would be able to use this event log and source from your web app / IIS.
0
 

Author Comment

by:gregx1973
ID: 21855878
but the exception does not occur when I am trying to create the source. It's happening when it checks to see if the source exists
0
 
LVL 18

Expert Comment

by:philipjonathan
ID: 21862921
Hmm, if manage to create the event log and source somehow using Winform, you don't need to check whether it exists in your actual code.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Today I had a very interesting conundrum that had to get solved quickly. Needless to say, it wasn't resolved quickly because when we needed it we were very rushed, but as soon as the conference call was over and I took a step back I saw the correct …
Real-time is more about the business, not the technology. In day-to-day life, to make real-time decisions like buying or investing, business needs the latest information(e.g. Gold Rate/Stock Rate). Unlike traditional days, you need not wait for a fe…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now