{"id":463,"date":"2025-09-28T21:38:36","date_gmt":"2025-09-28T21:38:36","guid":{"rendered":"https:\/\/www.passguide.com\/blog\/?p=463"},"modified":"2025-12-06T11:15:05","modified_gmt":"2025-12-06T11:15:05","slug":"advanced-troubleshooting-with-logicmonitor-debug-mode","status":"publish","type":"post","link":"https:\/\/www.passguide.com\/blog\/advanced-troubleshooting-with-logicmonitor-debug-mode\/","title":{"rendered":"Advanced Troubleshooting with LogicMonitor Debug Mode"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The ability to effectively troubleshoot issues in IT environments is essential for any Managed Service Provider. Monitoring platforms are integral to ensuring system uptime and performance. Among the variety of tools available in these platforms, diagnostic and debugging utilities stand out for their ability to pinpoint and resolve problems quickly. One such tool found within LogicMonitor is its built-in Debug feature. This feature acts as a command-line-like interface, offering real-time diagnostics that help IT professionals identify and resolve issues across their monitored infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This in-depth explanation will break down the LogicMonitor Debug feature, focusing on its functionality, its role in streamlining troubleshooting workflows, and its application in real-world scenarios. This part will serve as an introduction to LogicMonitor and walk through the initial steps in using the Debug tool, setting the stage for deeper technical analysis in subsequent parts.<\/span><\/p>\n<p><b>Understanding LogicMonitor\u2019s Role in Monitoring<\/b><\/p>\n<p><span style=\"font-weight: 400;\">LogicMonitor is a cloud-based infrastructure monitoring platform designed to provide complete visibility into both on-premises and cloud environments. Managed Service Providers rely heavily on this platform to monitor the performance and health of their customers\u2019 devices and services. The platform can monitor a wide range of devices, including servers, switches, routers, firewalls, applications, databases, and cloud resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What sets LogicMonitor apart is its ability to discover devices automatically and apply monitoring templates known as datasources to begin collecting metrics without much manual intervention. This helps engineers and administrators streamline the onboarding process, making it faster to get insights into their IT environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Monitoring is not just about collecting metrics and displaying them on dashboards. A critical part of the process involves reacting to alerts and resolving issues as quickly as possible. When a device goes down, a service becomes unresponsive, or a threshold is breached, the platform triggers alerts to notify the appropriate teams. At this point, the real work begins\u2014identifying the root cause and resolving the issue. That is where tools like the Debug feature come into play.<\/span><\/p>\n<p><b>Common Use Case: SNMP Failure<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s consider a practical example that many network engineers can relate to\u2014troubleshooting an SNMP failure. SNMP, or Simple Network Management Protocol, is commonly used to collect information from network devices. When SNMP fails on a device, monitoring platforms can no longer poll data from it, which can trigger alerts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagine that you receive an alert from the monitoring system indicating that SNMP polling has stopped for a specific device. The alert might display an orange warning icon next to the SNMP datasource, signaling a degradation in data collection. Your goal as an engineer is to quickly determine whether this issue is caused by a configuration problem on the device, a credentials mismatch, network connectivity, or something else entirely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first step in the troubleshooting process is to log into the monitoring platform and locate the device that generated the alert. Upon selecting the device, navigating to the Alerts tab provides a summary of the active alerts along with relevant metadata. This includes the time the alert occurred, the severity, and a brief description of the error. This initial data gives you a snapshot of what\u2019s going wrong, but doesn\u2019t always provide the context or details needed to resolve the issue.<\/span><\/p>\n<p><b>Navigating to Device Details<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once you\u2019ve identified the device and reviewed the alerts, the next logical step is to dig deeper into the status of the device. Clicking on the device name again redirects you to its detailed monitoring view. Here you\u2019ll find various tabs such as Overview, Alerts, Raw Data, Graphs, and Debug. Each tab serves a unique function in providing insights into the performance and status of the device.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the left-hand navigation pane, there\u2019s a list of different metrics and categories being monitored for that device. These are typically grouped under headings such as CPU, Memory, Interface Traffic, Ping, and SNMP. If SNMP is not functioning properly, you might notice an orange triangle or similar indicator next to the SNMP category. This visual cue highlights which metric group is encountering issues, helping you focus your attention.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At this stage, it is important to confirm whether data is missing or delayed. Clicking on the Raw Data tab shows the actual values being polled from the device. This includes timestamps of the polling attempts and the responses received. If the SNMP datasource is experiencing problems, the entries in the Raw Data tab may display a message such as No Data or Timeout. This confirms that the monitoring system is unable to retrieve SNMP metrics from the device.<\/span><\/p>\n<p><b>Transitioning to the Debug Interface<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once you\u2019ve verified the issue in the Raw Data tab, the next step is to open the Debug interface. This is accessible through the Debug tab, typically located next to or below the Raw Data tab. The Debug interface is one of the most powerful tools within the platform because it allows engineers to execute diagnostic commands in real-time against the device.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Upon opening the Debug tab, you are presented with a terminal-like interface. On the left-hand side is a list of available commands, and on the right is a description of what each command does. The list of commands can be extensive, covering various protocols, metrics, and monitoring processes. Scrolling through the list gives you an idea of the diagnostic capabilities available.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the bottom-left corner of the Debug interface, there is an input box typically marked by a dollar sign symbol. This is where you type in the diagnostic commands. Think of it as a lightweight command line for interacting with the monitoring agent or collector that is responsible for polling the device.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In our SNMP troubleshooting scenario, the relevant command to use is! snmpdiagnose. This command helps determine whether the SNMP service on the target device is reachable and functioning properly. To run the command, you would type snmpdiagnose followed by the IP address of the device, and then press Enter.<\/span><\/p>\n<p><b>Running the SNMP Diagnose Command<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once the! snmpdiagnose command is executed, the system attempts to reach the device and simulate an SNMP polling session. You may see status messages indicating that the agent is fetching the diagnostic task. This is followed by a series of outputs that include details about the SNMP session.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the case of a failure, the output might indicate an error such as a timeout, invalid credentials, or an unreachable host. Additionally, a suggestion section at the bottom provides a summary of possible reasons for the failure and potential steps for remediation. This can include checking whether SNMP is enabled on the device, verifying community strings or credentials, and ensuring the device is reachable over the network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These diagnostic messages are extremely helpful because they save time by pointing you in the right direction. Instead of logging into the device via SSH or RDP and manually checking configurations, you get a quick snapshot of the problem from within the monitoring interface itself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, if the output indicates that the device is not pingable, that points to a network connectivity issue. If it shows an authentication error, you know to verify the SNMP credentials configured in the monitoring system. If the SNMP version is incorrect, the debug output will highlight that as well.<\/span><\/p>\n<p><b>Deep Dive into the Debug Output<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once the<\/span><span style=\"font-weight: 400;\">! The snmpdiagnose<\/span><span style=\"font-weight: 400;\"> command has been executed, and LogicMonitor provides detailed feedback in the Debug interface. This output is structured to help engineers identify exactly where the communication breakdown is occurring in the SNMP polling process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The output is typically divided into several sections:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Command Execution Status<\/b><span style=\"font-weight: 400;\">: This section confirms whether the collector was able to reach the device and initiate the SNMP session. Messages such as &#8220;Collector reached device successfully&#8221; or &#8220;Unable to contact device on port 161&#8221; provide immediate insight into connectivity.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>SNMP Version and Credentials<\/b><span style=\"font-weight: 400;\">: If the command includes multiple SNMP versions (v1, v2c, v3), LogicMonitor attempts each one in order. It displays whether the authentication succeeded or failed for each attempt. A message like \u201cAuthentication failed using SNMP v2c with community string \u2018public\u2019\u201d is a clear indicator of credential mismatch.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Timeouts and Delays<\/b><span style=\"font-weight: 400;\">: If the output includes messages such as \u201cSNMP request timed out after 5000 ms,\u201d this suggests network latency or that SNMP is not enabled on the device.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>OID Accessibility<\/b><span style=\"font-weight: 400;\">: In cases where SNMP is reachable, the tool will attempt to walk certain object identifiers (OIDs) to verify access. If this fails, the issue may lie in access restrictions or ACLs on the device.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Diagnostic Suggestions<\/b><span style=\"font-weight: 400;\">: At the end of the output, LogicMonitor typically includes a diagnostic summary. This includes recommendations like verifying SNMP settings on the device, checking community strings, or ensuring firewall ports are open.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Understanding and interpreting each section of this output is key to rapidly resolving SNMP-related monitoring issues.<\/span><\/p>\n<p><b>Advanced SNMP Troubleshooting with Debug<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If the initial diagnostic shows an error, there are several additional steps you can take using the Debug interface. These include manually running OID queries, switching SNMP versions, or testing against alternate IPs or interfaces.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, if the community string appears to be the issue, you can use the<\/span><span style=\"font-weight: 400;\">! The snmpget<\/span><span style=\"font-weight: 400;\"> command is used to test a specific OID with an alternate string. This might look like:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">cpp<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!snmpget 192.168.1.1 -v2c -c private 1.3.6.1.2.1.1.1.0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This command tells the collector to reach out to the device at 192.168.1.1 using SNMP v2c and community string \u201cprivate,\u201d attempting to retrieve the system description OID. If successful, the output will display the actual string returned by the device, such as \u201cCisco IOS Software, Version 15.2(4)M7.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The result verifies that the credentials are correct, the device is accessible, and SNMP is functioning as expected, narrowing down the cause of your monitoring failure.<\/span><\/p>\n<p><b>Exploring Other Debug Commands<\/b><\/p>\n<p><span style=\"font-weight: 400;\">While<\/span><span style=\"font-weight: 400;\">! snmpdiagnose<\/span><span style=\"font-weight: 400;\"> is one of the most common commands.nds, LogicMonitor\u2019s Debug feature supports a wide variety of other tools. These are invaluable when troubleshooting issues beyond SNMP, such as WMI, JDBC, scripts, and network-level diagnostics.<\/span><\/p>\n<p><b>1. !ping<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This command checks basic connectivity between the collector and the monitored device. A failed ping could mean the device is offline or there\u2019s a network path issue.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">diff<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!ping 192.168.1.1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The response includes latency statistics and packet loss. If ping fails, focus shifts to network connectivity or firewall rules.<\/span><\/p>\n<p><b>2. !nmap<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This command scans open ports on the device. It is helpful when determining if services like SNMP (UDP 161), HTTP (TCP 80), or SSH (TCP 22) are accessible.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">diff<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!nmap 192.168.1.1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The scan results can show if SNMP is filtered or blocked at the network level, even if the service is running on the device itself.<\/span><\/p>\n<p><b>3. !wmitest<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Used for testing Windows Management Instrumentation, particularly for monitoring Windows-based servers. This command verifies if the collector can authenticate and access WMI services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">diff<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!wmitest hostname<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It reports back on successful connections or errors, such as \u201cAccess denied\u201d or \u201cRPC server unavailable,\u201d which help pinpoint authentication or firewall issues.<\/span><\/p>\n<p><b>4. !traceroute<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This helps determine the network path between the collector and the monitored device. If latency or intermediate hops are an issue, this command helps visualize where the delay or drop is happening.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">diff<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!traceroute 192.168.1.1<\/span><\/p>\n<p><b>5. !jdbctest<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This command is used to test database connectivity for systems like MySQL, PostgreSQL. You can use it to validate database credentials and reachability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">bash<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!jdbctest jdbc:mysql:\/\/hostname:3306\/dbname username password<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The output will confirm if a connection was established or if there was a driver or authentication failure.<\/span><\/p>\n<p><b>The Role of the Collector in Debugging<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Understanding how LogicMonitor collectors work is essential when using the Debug tool. A collector is a lightweight software agent installed on a server within the customer environment. Its job is to poll devices, execute scripts, and relay data back to the LogicMonitor platform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you run any Debug command, it is not executed from your browser. Instead, the command is sent to the appropriate collector, which runs it in the local environment. This is why the collector must have network access to the target device and any necessary permissions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Collectors also determine the success of diagnostic tests. If the collector cannot reach the device due to routing issues, VLAN isolation, or firewall rules, even a properly configured device will appear unreachable. The Debug tool will reflect this with messages like \u201cNo route to host\u201d or \u201cConnection refused.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In distributed environments, choosing the right collector matters. For multi-site networks, each location may have its collector. When troubleshooting, make sure the debug command runs from the collector that is assigned to monitor the device in question.<\/span><\/p>\n<p><b>Filtering Debug Command Output<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Some debug commands generate lengthy outputs, especially when dealing with large SNMP walks or port scans. To avoid information overload, you can apply filters or narrow down the scope of the command.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, when running<\/span><span style=\"font-weight: 400;\">! Nmap<\/span><span style=\"font-weight: 400;\">, you can limit the port range:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">css<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!nmap 192.168.1.1 -p 161,22,80,443<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Likewise, for SNMP walks, specifying an OID subtree prevents unnecessary data:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">cpp<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!snmpwalk 192.168.1.1 -v2c -c public 1.3.6.1.2.1.2<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These filtered commands reduce clutter and help you focus on the relevant data during troubleshooting.<\/span><\/p>\n<p><b>Real-World Use Case: High CPU Alert on Server<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s consider another common scenario\u2014a server triggers a high CPU usage alert. The graphs show a spike, but the server team insists there is no issue.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By using the Debug tool, you can verify if the data is accurate or if there\u2019s a collection issue. First, run:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">diff<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!wmitest hostname<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This confirms whether WMI is working. Then, you can use the<\/span><span style=\"font-weight: 400;\">! Script<\/span><span style=\"font-weight: 400;\"> command to run the same script used by LogicMonitor\u2019s datasource for CPU metrics. The output will show raw values and calculation methods.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the script runs successfully and matches the data in LogicMonitor, the alert is legitimate. If not, the issue could be with outdated scripts, collection intervals, or duplicate instances.<\/span><\/p>\n<p><b>Optimizing Troubleshooting Workflows with the Debug Tool<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once you are familiar with the key debug commands, the next step is to optimize how you use them in day-to-day monitoring operations. Efficient troubleshooting is not just about resolving issues quickly\u2014it is about building repeatable processes that reduce downtime and increase response confidence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An optimized workflow begins with consistent documentation of debug use cases, common failure modes, and the exact commands that were used to isolate the problem. Teams that build internal runbooks using the Debug tool often experience faster mean time to resolution (MTTR) and fewer escalations.<\/span><\/p>\n<p><b>Example Workflow: SNMP Failure Playbook<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Alert Received<\/b><span style=\"font-weight: 400;\"> \u2013 An SNMP alert appears in LogicMonitor, indicating a \u201cNo Data\u201d issue.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Device Validation<\/b><span style=\"font-weight: 400;\"> \u2013 Navigate to the Alerts and Raw Data tabs to confirm the missing data.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Run Diagnostic Command<\/b><span style=\"font-weight: 400;\"> \u2013 Use<\/span><span style=\"font-weight: 400;\">! snmpdiagnose<\/span><span style=\"font-weight: 400;\"> from the Debug tab.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Interpret Output<\/b><span style=\"font-weight: 400;\"> \u2013 Identify errors such as timeout, auth failure, or unreachable device.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Verify Credentials<\/b><span style=\"font-weight: 400;\"> \u2013 Optionally run<\/span><span style=\"font-weight: 400;\">! snmpget<\/span><span style=\"font-weight: 400;\"> with known-good credentials.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Document Resolution<\/b><span style=\"font-weight: 400;\"> \u2013 Record cause and resolution in an internal knowledge base.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This standard sequence creates clarity and repeatability in resolving similar alerts.<\/span><\/p>\n<p><b>Leveraging Collector Groups for Better Debug Control<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In environments with multiple collectors, especially across different sites or customers, it is critical to understand how collector assignments impact debug accuracy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each monitored device is assigned to a collector or collector group. Debug commands execute only from the collector responsible for that device. Therefore, if a device is monitored by a collector in a remote location or behind a specific firewall, running debug from a different collector might result in misleading errors.<\/span><\/p>\n<p><b>Verifying the Assigned Collector<\/b><\/p>\n<p><span style=\"font-weight: 400;\">From the device view in LogicMonitor, there is a section that shows the collector assigned to that device. Always confirm this before running a debug command. Running the command from the correct collector ensures that the diagnostics reflect the actual environment the device resides.<\/span><\/p>\n<p><b>Using Collector Groups<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Collector groups allow you to segment collectors based on geography, customer, device type, or security zones. This enables more controlled execution of debug commands and can prevent accidental tests from the wrong location.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, you might have:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A collector group for cloud infrastructure<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A collector group for on-premises data centers<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A collector group per major client site<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When organizing devices and collectors this way, debugging becomes more precise and efficient.<\/span><\/p>\n<p><b>Custom Script Debugging and Output Interpretation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Many LogicMonitor datasources are script-based, especially for custom monitoring scenarios. These scripts can be written in PowerShell, Groovy, Python, or Bash. Understanding how to test and debug these scripts directly is essential for advanced users and MSPs offering custom monitoring services.<\/span><\/p>\n<p><b>Using the! script Command<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><span style=\"font-weight: 400;\">! script<\/span><span style=\"font-weight: 400;\"> command allows you to manually run the datasource\u2019s collection script from the collector.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Syntax:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">diff<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">!script deviceID datasourceName<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This runs the actual collection logic used in the datasource and displays both the standard output and any errors.<\/span><\/p>\n<p><b>Troubleshooting Custom Datasources<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Suppose you have a datasource that collects license expiration dates from a software API. If this datasource is failing, the<\/span><span style=\"font-weight: 400;\">! Script<\/span><span style=\"font-weight: 400;\"> output might reveal issues like:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">HTTP 401 Unauthorized errors<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">JSON parsing errors<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Timeout from the target system<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">You can then modify the script directly in the datasource definition or test parts of it in isolation using<\/span><span style=\"font-weight: 400;\">! Script<\/span><span style=\"font-weight: 400;\"> with different parameters.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Custom script troubleshooting is one of the most powerful use cases for the Debug tool, as it removes the guesswork from \u201cwhy the datasource is not working\u201d and instead provides you with the exact code output.<\/span><\/p>\n<p><b>Integrating Debug into Alert Triage<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Debug feature becomes especially valuable during alert storms or when multiple devices are triggering similar errors. Instead of manually reviewing each alert, you can batch triage affected devices using debug scripts or quick commands.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, if 15 switches are all reporting SNMP timeout, you can quickly:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filter affected devices in the Devices tab<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Run\u00a0 <\/span><span style=\"font-weight: 400;\">! snmpdiagnose<\/span><span style=\"font-weight: 400;\"> in sequence on each.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Document whether the root cause is common (e.g., firewall rule change)<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This reduces the need for unnecessary ticketing and helps you distinguish between device-specific and systemic problems.<\/span><\/p>\n<p><b>Creating a Debug SOP (Standard Operating Procedure)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Creating internal standard operating procedures that include the use of debug commands will improve operational consistency. A Debug SOP typically includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Common alert types and matching debug commands<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Expected outputs and what they mean<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Escalation thresholds and conditions<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Links to related documentation or scripts<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By documenting these procedures, any engineer\u2014regardless of experience level\u2014can handle alerts in a structured, confident way.<\/span><\/p>\n<p><b>Proactive Use of Debug for Environment Validation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Although the Debug tool is often used reactively, it is equally valuable as a <\/span><b>proactive<\/b><span style=\"font-weight: 400;\"> monitoring enhancement tool. By regularly using debug commands to test device accessibility, you can identify potential issues before they result in alerts.<\/span><\/p>\n<p><b>Scheduled Debug Tests<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Some organizations incorporate debug commands into their change management process. Before rolling out firmware updates, network changes, or cloud migrations, they run basic tests such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">! Ping<\/span><span style=\"font-weight: 400;\"> to confirm latency and reachability<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">!snmpget<\/span><span style=\"font-weight: 400;\"> to confirm protocol responses<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">!wmitest<\/span><span style=\"font-weight: 400;\"> to validate Windows monitoring readiness<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This practice helps ensure that after changes are made, the monitoring platform will continue to collect data without disruption.<\/span><\/p>\n<p><b>Post-Onboarding Validation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">After onboarding new customers or devices, debug commands can be used to verify configuration accuracy. Running<\/span><span style=\"font-weight: 400;\">! Script<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">!snmpdiagnose<\/span><span style=\"font-weight: 400;\">, and <\/span><span style=\"font-weight: 400;\">! nmap<\/span><span style=\"font-weight: 400;\"> can catch credential errors, open port mismatches, and inaccessible devices early, before they generate noise.<\/span><\/p>\n<p><b>Real-World Efficiency Gains<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Using Debug systematically can lead to significant operational improvements:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Faster Resolution Times<\/b><span style=\"font-weight: 400;\">: Engineers have instant access to root cause data without having to switch tools or escalate.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Fewer False Alerts<\/b><span style=\"font-weight: 400;\">: Many alert anomalies can be diagnosed as collector access issues, not true failures.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Improved Training<\/b><span style=\"font-weight: 400;\">: New hires can be trained faster by referencing documented debug use cases.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Stronger SLAs<\/b><span style=\"font-weight: 400;\">: Faster triage improves your ability to meet client service-level agreements.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><b>Security Considerations When Using Debug Commands<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As powerful as the Debug tool is, it also introduces operational risk if not governed properly. Debug commands can access sensitive systems, test credentials, and run scripts, so usage must be tightly controlled.<\/span><\/p>\n<p><b>Access Control and Role Management<\/b><\/p>\n<p><span style=\"font-weight: 400;\">LogicMonitor provides granular role-based access controls (RBAC). Administrators should ensure that only trusted, technically qualified users have access to the Debug tab. Granting Debug access by default to all users can lead to accidental misuse or information exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Typical role segmentation:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Read-Only Users<\/b><span style=\"font-weight: 400;\">: No Debug access<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Monitoring Analysts<\/b><span style=\"font-weight: 400;\">: View-only access to alerts and raw data<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Engineers \/ Admins<\/b><span style=\"font-weight: 400;\">: Full Debug access for diagnostics and script testing<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Third-Party Contractors<\/b><span style=\"font-weight: 400;\">: Restricted access, no Debug permissions<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Restricting access ensures that debug commands are executed only by those who understand the implications and output.<\/span><\/p>\n<p><b>Audit Logging and Accountability<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Every debug command execution is recorded in LogicMonitor\u2019s audit logs. These logs capture:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Who ran the command<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When it was run<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">On which device<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What command was executed<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The outcome<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reviewing audit logs regularly helps catch unusual or unauthorized activity. For high-security environments, audit logs should be integrated into your SIEM or compliance platform.<\/span><\/p>\n<p><b>Safeguarding Sensitive Information<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Debug outputs can include sensitive details, such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Community strings or SNMP credentials<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Windows domain accounts<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">API tokens or usernames in custom scripts<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Device hostnames, IP addresses, and operating systems<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Engineers should avoid sharing screenshots or logs from the Debug tab without reviewing them for sensitive content. Where possible, mask passwords, redact output, and follow your organization&#8217;s data handling policies.<\/span><\/p>\n<p><b>Debugging in Hybrid and Cloud Environments<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Today\u2019s monitoring environments span both on-premises infrastructure and cloud-based resources such as AWS, Azure, and Google Cloud. While the Debug feature works similarly across these environments, some additional considerations apply.<\/span><\/p>\n<p><b>Debugging Cloud Resources<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cloud-based services like EC2 instances, Azure VMs, or managed databases may have limited public interfaces. The collector responsible for these systems is often located within a virtual private cloud or peered network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When using Debug for cloud devices, keep in mind:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Collectors must reside inside the cloud VPC or have peering\/VPN access.<\/b>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Security groups and NACLs<\/b><span style=\"font-weight: 400;\"> may block SNMP, WMI, or SSH access.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Debug commands might fail if a collector is moved or redeployed without updating firewall rules.<\/b><b><br \/>\n<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Use the<\/span><span style=\"font-weight: 400;\">! Ping<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">!map<\/span><span style=\"font-weight: 400;\">, and\u00a0 <\/span><span style=\"font-weight: 400;\">! script<\/span><span style=\"font-weight: 400;\"> commands to verify network and service-level access from the collector to cloud-based devices.<\/span><\/p>\n<p><b>Containerized and Serverless Systems<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Monitoring containerized applications or serverless environments like AWS Lambda requires custom data sources and APIs. These environments do not expose traditional interfaces like SNMP or WMI.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Debugging these setups often involves:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Running API test scripts using<\/span><span style=\"font-weight: 400;\">! script<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Verifying endpoint reachability via <\/span><span style=\"font-weight: 400;\">\u00a0Curl<\/span><span style=\"font-weight: 400;\"> or custom HTTP requests<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Testing authentication with external secrets managers<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The Debug tool enables engineers to isolate failures in logic, authentication, or endpoint availability when using API-based data sources.<\/span><\/p>\n<p><b>Cross-Collector Debugging Strategies<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In large-scale environments, you may have dozens of collectors deployed globally. A device might be monitored by one collector but needs to be tested by another due to failover, reassignment, or replication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To debug issues accurately:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identify which collector currently monitors the device.<\/b><span style=\"font-weight: 400;\"> This is listed in the device\u2019s properties panel.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>If needed, temporarily reassign the device<\/b><span style=\"font-weight: 400;\"> to a different collector using the Manage Collector function.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Run Debug commands from each collector<\/b><span style=\"font-weight: 400;\"> to compare responses across regions or network zones.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This approach is useful for isolating regional routing issues, intermittent firewall behavior, or performance inconsistencies tied to collector load.<\/span><\/p>\n<p><b>Example: Troubleshooting Intermittent Monitoring Failures<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Scenario: A cloud-hosted router occasionally stops reporting SNMP metrics. A pattern emerges showing issues only during overnight hours.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Debugging steps:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Run <\/span><span style=\"font-weight: 400;\">! ping<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">! snmpdiagnose<\/span><span style=\"font-weight: 400;\"> from the assigned collector during normal hours to establish a baseline.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Schedule or manually run the same commands during the failure window.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If the command fails only during that time frame, examine cloud security group rules, cron jobs, or backup processes that may interfere with SNMP.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">You can also compare outputs across collectors if multiple are deployed in that region.<\/span><\/p>\n<p><b>Best Practices for Long-Term Use of the Debug Tool<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To get the most value from the Debug feature without introducing risk, consider the following best practices:<\/span><\/p>\n<p><b>1. Maintain a Debug Command Library<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Create a shared document or internal knowledge base that contains:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Common debug commands by protocol<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Example outputs and what they mean<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Known issues and their fixes<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scripts used for custom testing<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This resource accelerates onboarding and standardizes how your team responds to incidents.<\/span><\/p>\n<p><b>2. Use Debug During Device Onboarding<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As part of your device onboarding checklist, include running basic debug tests like<\/span><span style=\"font-weight: 400;\">! Ping<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">!snmpdiagnose<\/span><span style=\"font-weight: 400;\">, and\u00a0 <\/span><span style=\"font-weight: 400;\">! script<\/span><span style=\"font-weight: 400;\">. This verifies that the device is reachable, properly credentialed, and ready for monitoring.<\/span><\/p>\n<p><b>3. Limit Overuse of Debug on Production Devices<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Avoid running high-frequency or resource-intensive debug commands (like full SNMP walks or <\/span><span style=\"font-weight: 400;\">! nmap<\/span><span style=\"font-weight: 400;\"> scans) against production systems during business hours. Some commands can impact performance or trigger security alerts.<\/span><\/p>\n<p><b>4. Train Engineers on Interpreting Output<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Make sure all engineers who have Debug access are trained not just on running commands but also on reading the results. Misinterpreting outputs can lead to incorrect escalations or unnecessary device changes.<\/span><\/p>\n<p><b>5. Monitor Collector Health<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Debug commands rely on collectors functioning properly. Regularly monitor collector CPU, memory, and disk usage to ensure they are capable of executing debug commands without delay.<\/span><\/p>\n<p><b>Final Thoughts<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Debug tool in LogicMonitor is more than just a troubleshooting aid, it is a gateway to real-time diagnostics, deep visibility, and operational efficiency. When used properly, it enables teams to resolve issues faster, reduce alert fatigue, and proactively validate environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Across this four-part series, we\u2019ve covered:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The fundamentals of the Debug interface and how to use it for SNMP troubleshooting<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Core commands like<\/span><span style=\"font-weight: 400;\">! Ping<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">!nmap<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">!script<\/span><span style=\"font-weight: 400;\">, and how to interpret their output<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Workflow optimization, collector architecture, and proactive validation techniques<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security, access control, hybrid-cloud debugging, and cross-collector testing strategies<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By embedding Debug into your monitoring strategy and operational workflows, you strengthen your monitoring practice and provide better service to internal teams or customers.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ability to effectively troubleshoot issues in IT environments is essential for any Managed Service Provider. Monitoring platforms are integral to ensuring system uptime and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[200],"tags":[],"class_list":["post-463","post","type-post","status-publish","format-standard","hentry","category-logicmonitor"],"_links":{"self":[{"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/posts\/463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/comments?post=463"}],"version-history":[{"count":2,"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/posts\/463\/revisions"}],"predecessor-version":[{"id":4440,"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/posts\/463\/revisions\/4440"}],"wp:attachment":[{"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/media?parent=463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/categories?post=463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.passguide.com\/blog\/wp-json\/wp\/v2\/tags?post=463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}