지금 지원 담당자와 채팅
지원 담당자와 채팅

Foglight for Infrastructure 5.9.7 - Infrastructure Utilities User Guide

Monitoring Web transactions
Configuring credentials for Web sites requiring user or proxy authentication Exploring your collection of monitored Web sites Investigating the performance of Web transactions and monitoring locations Exploring Web Monitor services Generating reports Configuring Web Monitor agent properties View reference
Monitoring network devices

Removing Web sites from the existing collection

The Transaction Management dashboard allows you to remove URLs from the existing collection of monitored sites. Removing a URL from the list causes the Web Monitor Agent to stop collecting Web site transaction information about that URL. The data collected from a removed URL is kept in the Foglight database in accordance with the existing persistence settings. For more information, refer to the Administration and Configuration Help.

The Confirm message box appears.
2
Click Yes to confirm the removal and close the message box.
The Operation(s) Complete message box appears.
Click OK to close it.

Moving multiple transactions as a group

Moving multiple transactions in a single operation may be accomplished via the Transaction Management dashboard.

4
Click Move Transactions.
6
Click Move.

Removing stale transactions from the Performance Browser dashboard

Occasionally, the list of transactions in the Performance Browser dashboard Quick View may contain a stale transaction that does not appear on the Transaction Management dashboard. You may remove stale transactions from the Performance Browser dashboard Quick View via the Foglight Data Management dashboard.

2
On the navigation panel, under Dashboards, click Management Server > Servers > Data Management.

Viewing and editing individual Web transaction details

Every monitored Web site is associated with a number of transaction-related settings. You can view and edit these settings using the Transaction Detail dashboard.

To access the Transaction Detail dashboard, click on a transaction name on the Transaction Management dashboard.

For more information about the Transaction Management dashboard, see Exploring your collection of monitored Web sites. For complete details about the data appearing on this dashboard, see Transaction Detail view.

You can make changes to any transaction details that appear on this dashboard by clicking the appropriate Edit button and making the required changes.

Any changes you make to transaction alarm thresholds results in creating topology-scoped values of the registry variables that control these thresholds, and the other way around. The topology type used to contain Web transaction definitions is Internal Synthetic Transaction (Webmonitor), and the Internal Synthetic Transaction (Webmonitor) topology object names are the configured transactions names.

For more information about the Foglight registry, see the Administration and Configuration Help.

The Update Basic Transaction Information dialog box appears.
The Edit Monitoring Locations dialog box appears.
The Update Advanced Settings dialog box appears.
To specify different thresholds for alarm generation, in the Response time alarm firing conditions area, type the desired values.
To change the authentication or proxy settings, in the Authentication and proxy settings area, select and type the desired values.
URL authentication required: Select this check box only if the specified URL requires user authentication. If that is the case, you need to ensure that you have proper credentials in place to enable the Web Monitor Agent to access this URL. Click Manage Credentials to review the existing credentials, or to create new ones, as required. For more information, see Configuring credentials to access Web sites requiring user authentication.
Use proxy for URL connection: Select this check box only if the Web Monitor needs to use a proxy to access the specified URL. Click Manage Credentials to review the existing credentials, and create new ones, as required. For more information, see Configuring credentials to access Web sites requiring user authentication.
Server: If you need to configure proxy access, type the name of the proxy server followed by the port number.
2
Click Save.
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택