2 |
In the Add Transactions dialog box, provide information about the Web site whose transactions you want to start monitoring. |
• |
URL: The URL of the Web site that you want to monitor. |
• |
Transaction Name: The name you want to associate with the transactions with this Web site. |
• |
Get Page Header Only: Indicates whether you want to collect the page header only. |
• |
Expected Content: If content validation is enabled for the agent instance that you want to monitor this URL, and the expected content type is HTML-based, type html in this column. Also, a text string could be used such as “laptop” and type laptop into this column. In case the monitoring agent detects binary content or the text string at this address, the validation fails and the agent logs an error message. |
• |
Unexpected Content: If unexpected content validation is enabled for the agent instance that you want to monitor this URL, and the unexpected content type is HTML-based, type html in this column. Also, a text string could be used such as “laptop” and type laptop into this column. In case the monitoring agent detects binary content or the text string at this address, the validation fails and the agent logs an error message. If this column is empty, that means the agent is not required to perform unexpected content validation. |
3 |
To add more URLs to the list, click Add, and populate the row that appears. To remove a row from the list, click . |
4 |
In the Deploy to Locations area, select one or more Web Monitor Agent locations that you want to use to monitor the transactions with the newly specified Web sites. |
5 |
Optional—Specify thresholds for alarm generation, authentication, and proxy settings. If the URL requires user authentication, you need to supply credentials for accessing that URL. |
a |
Click Optional Advanced Settings. |
b |
In the Advanced Settings dialog box, in the Response time alarm firing conditions area, review the thresholds for alarm generation, and edit them, if required. |
c |
In the Authentication and proxy settings area, specify the following information, as required. |
• |
URL authentication required: Select this check box only if the URL requires user authentication. If that is the case, you need to ensure that you have proper credentials in place to enable the Web Monitor Agent to access it. Click Manage Credentials to review the existing credentials, or to create new ones, as required. For more information, see Configuring credentials to access Web sites requiring user authentication. |
• |
Use proxy for URL connection: Select this check box only if the Web Monitor needs to use a proxy to access the specified URL. Click Manage Credentials to review the existing credentials, and create new ones, as required. For more information, see Configuring credentials to access Web sites requiring user authentication. |
• |
Server: If you need to configure proxy access, type the name of the proxy server followed by the port number. |
• |
Proxy authentication required: Select this check box if the proxy requires authentication. |
6 |
2 |
Click Yes to confirm the removal and close the message box. |
© ALL RIGHTS RESERVED. 이용 약관 개인정보 보호정책 Cookie Preference Center