Chatee ahora con Soporte
Chat con el soporte

Foglight for Application Operations 5.9.8 - Dependency Mapping User Guide

Introduction to this Guide

This User Guide provides configuration steps, conceptual information, and instructions on how to use the Dependency Mapping functionality. It includes the following sections:
Dependency Mapping Administration: provides procedures for creating and deploying agents to monitor the dependencies in your environment.
Creating and Maintaining Services: provides information that helps you monitor your enterprise using Foglight for Application Operations. It presents workflows for grouping monitored resources into services, for investigating whether any service disruptions have occurred, and for editing existing services, as necessary.
Exploring Dependencies: presents how to explore the list of dependencies observed in your environment, from different perspectives (by host, or by service).
Appendix: Configuring Monitoring of Non-English Windows OS Hosts: provides a solution to issues that may arise when using a Foglight agent to monitor a non-English Windows OS host remotely.

Dependency Mapping Administration

To access the Dependency Mapping Administration dashboard, in the Foglight navigation panel, under Dashboards, click Dependency Mapping > Dependency Mapping Administration.

Configuring dependency monitoring

The Configure Dependency Monitoring dashboard helps Foglight administrators to create and manage Netstat agents. To access this dashboard, click Configure Dependency Monitoring in the Dependency Mapping Administration dashboard.

Create a Netstat agent

To collect process-to-process details of a dependency between two hosts, the agent must connect to both endpoints of the conversation in the same scan. For a host to be monitored by an agent, it must be configured in that agent’s Scan these hosts list or in the Referenced List in the advanced setup (for details, see Configuring the referenced list ). The “referenced hosts” list is ideal for including groups of hosts which vary and can be identified by naming convention, or which may only be part-time participants in an application.
Dell strongly recommends that you exclude end-user access from Netstat collection. This can be configured in the Create a New Agent dialog, through the Exclude these hosts list (generally by entering an IP range) or by excluding ports accessed by end users. You can exclude dependencies to common end-user ports 80 and 443 from all hosts for a single agent by using the check box provided in the Create a New Agent dialog. You can exclude ports on specific hosts by editing the agent settings after creating the agent. For details, see Configuring the scanning list .
Herramientas de autoservicio
Base de conocimientos
Notificaciones y alertas
Soporte de productos
Descargas de software
Documentación técnica
Foros de usuarios
Tutoriales en video
Aviso de actualizaciones de páginas web (RSS)
Comuníquese con nosotros
Obtenga asistencia con las licencias
Soporte Técnico
Ver todos
Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación