Objective
EventLog Analyzer can be accessed using a server identity address, like Hostname/FQDN/IP, along with a web server port (default ports: HTTP-TCP 8400 and HTTPS-TCP 8445). This article will explain how to update the web server port for EventLog Analyzer.
Prerequisites
Have access to the EventLog Analyzer user interface as an admin.
Ensure the new port number is unused in the EventLog Analyzer server.
Steps to follow
Log in to EventLog Analyzer as an admin.
Update the port number for the enabled protocol.
Save the settings.
Note: Enter an unused port which is not utilized by other applications in the server. If you attempt to use the same port used by another application or process, you may get an error stating that the port is already in use (see the screenshot below).
e. You can switch the protocol from HTTP to HTTPS. It is recommended to apply an SSL certificate when switching to HTTPS. Refer to How to apply an SSL certificate in EventLog Analyzer for information on that process. You can also switch between HTTPS to HTTP in this same setting (if required).
Tips
Apply an SSL certificate for secure communication.
Use an unused port which is not utilized by other applications in the server.
How to check if the port is occupied:
Windows:
Option 1: PowerShell command: The command below returns the process name for the respective port number specified.
Get-Process -Id (Get-NetTCPConnection -LocalPort <PORT>).OwningProcess
Replace <PORT> with the actual port number.
Note: If nothing is returned, it likely means no process is currently using that port.
Option 2: Resource monitor
Steps:
1. Press Win + R > type resmon > hit Enter.
2. Go to the Network tab.
3. Expand Listening Ports.
4. Check the Port, PID, and Associated Process columns.
You can see all the listening ports and their associated processes.
Linux/Unix:
Execute ss -tulnp to get the list of processes and their ports used in the server. Identify if the port that you are looking for is in use. If not, proceed to use the port number.
You can also use sudo ss -tulnp | grep :<PORT> to check if the specified <PORT> is used by any process in the background.