Chat now with support
Chat with Support

Foglight for Application Operations 5.9.8 - Dependency Mapping User Guide

Introduction to this Guide

This User Guide provides configuration steps, conceptual information, and instructions on how to use the Dependency Mapping functionality. It includes the following sections:
Dependency Mapping Administration: provides procedures for creating and deploying agents to monitor the dependencies in your environment.
Creating and Maintaining Services: provides information that helps you monitor your enterprise using Foglight for Application Operations. It presents workflows for grouping monitored resources into services, for investigating whether any service disruptions have occurred, and for editing existing services, as necessary.
Exploring Dependencies: presents how to explore the list of dependencies observed in your environment, from different perspectives (by host, or by service).
Appendix: Configuring Monitoring of Non-English Windows OS Hosts: provides a solution to issues that may arise when using a Foglight agent to monitor a non-English Windows OS host remotely.

Dependency Mapping Administration

To access the Dependency Mapping Administration dashboard, in the Foglight navigation panel, under Dashboards, click Dependency Mapping > Dependency Mapping Administration.

Configuring dependency monitoring

The Configure Dependency Monitoring dashboard helps Foglight administrators to create and manage Netstat agents. To access this dashboard, click Configure Dependency Monitoring in the Dependency Mapping Administration dashboard.

Create a Netstat agent

To collect process-to-process details of a dependency between two hosts, the agent must connect to both endpoints of the conversation in the same scan. For a host to be monitored by an agent, it must be configured in that agent’s Scan these hosts list or in the Referenced List in the advanced setup (for details, see Configuring the referenced list ). The “referenced hosts” list is ideal for including groups of hosts which vary and can be identified by naming convention, or which may only be part-time participants in an application.
Dell strongly recommends that you exclude end-user access from Netstat collection. This can be configured in the Create a New Agent dialog, through the Exclude these hosts list (generally by entering an IP range) or by excluding ports accessed by end users. You can exclude dependencies to common end-user ports 80 and 443 from all hosts for a single agent by using the check box provided in the Create a New Agent dialog. You can exclude ports on specific hosts by editing the agent settings after creating the agent. For details, see Configuring the scanning list .
Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials
RSS Feed
Contact Us
Licensing Assistance
Technical Support
View All
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating