Chat now with support
Chat with Support

Foglight Agent Manager 5.8.5.2 - Guide

Configuring the Embedded Agent Manager Installing External Agent Managers
Understanding How the Agent Manager Communicates with the Management Server Deploying the Agent Manager Cartridge Downloading the Agent Manager Installer Installing the Agent Manager Starting or Stopping the Agent Manager Process Frequently Asked Questions
Configuring the Agent Manager Advanced System Configuration and Troubleshooting
Configuring Windows Management Instrumentation (WMI) Configuring Windows Remote Management (WinRM) UNIX- and Linux-Specific Configuration
Monitoring the Agent Manager Performance Deploying the Agent Manager to Large-Scale Environments

Moving Existing Out-of-Process Agents to the Runtime Resource Negotiation

1
In your cartridge project, open the agent-definition.xml file for editing.
3
Set the out-of-process attribute to false.
4
Locate the <jvm-config> element definition.
<jvm-config ipv6="false">
5
Wrap it into a <runtime> element using the following block of code:
<runtime ipv6="false">
IMPORTANT: There is now a typed element for setting VM memory sizes. Any -Xms or -Xmx values set as <jvm-arg> in the prior schema must be transferred to the new <jvm-memory> element.

Disabling Runtime Resource Negotiation

./fglam --disable-overrides
2
Edit the <FGLAM_STATE>/config/client.config file to include the following block of code:
disable.overrides = true;

Disabling Agent-Specific Changes to the Upstream Queue

The config/fglam-config.xml file contains an attribute that allows you to disable any agent-specific changes to the upstream queue settings at runtime. By default this attribute is set to true. You can use this feature, for example, to prevent individual agents to negotiate allocating large amounts of memory.
allow-runtime-change="false"/>

Configuring Credentials

Different cartridges support different types of credentials. Some cartridges, for example, support the use of Windows® and UNIX® credentials, while others can only authenticate local users. The credential type determines which parts of the monitored system are used to connect to a resource, such as host names or IP addresses. For complete information about cartridge-specific credential types, see your cartridge documentation.
Challenge Response: Uses one or more challenge and response pairs to grant access without requiring any interaction in the browser interface. The answers are sent by the agent as part of the agent configuration.
Domain, User Name, and Password (Windows): Requires a user name and password to access a monitored resource. The domain name is optional.
DSA Key: Uses the Digital Signature Algorithm (DSA) Key for authentication.
RSA Key: Uses the RSA (Rivest, Shamir, and Adleman) Key for authentication.
Use Client’s Login At Connection Time: Uses the currently logged in user’s account to access secured resources. This is not the user currently logged into the Management Server, but the user under which the credential client is running. For example, a credential provided to an Agent Manager instance launched by a user on a remote machine, causes the connection to the secured resource to be made using this user’s identity.
User Name: Requires a user name to access a monitored resource.
User Name and Password: Requires a user name and password to access a monitored resource.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating