You can change the display name and command processing time.
By default, the server IP address is assigned as the server.
3 |
4 |
Every server listed on the Servers page has a Command Processing Time metric value associated with it. You can alter the threshold that determines the value of this metric following the steps defined below. For more information about this metric, see “Command Processing Time” in the Foglight Experience Monitor Metric Reference Guide.
1 |
Click the corresponding Edit link in the Settings column for the server for which you want to set the service level threshold. |
1 |
On the Servers page, click Server Options. |
2 |
In the Server IP Identification Tag box, type the name of HTTP header tag that the appliance will use to identify servers. |
3 |
In the Traffic Filtering list, select a filtering type. |
Use PCAP1 Filter |
|
This option is less efficient than the Use PCAP filter option, but may be needed at sites where more than 300 server IPs need to be monitored. | |
NOTE: In Foglight Experience Monitor versions 5.6.2 (or earlier), this option was known as No filtering. When upgrading your system to version 5.6.3 (or later), the old No filtering option automatically becomes Use minimal filtering. The new No filtering option is now defined as specified below. | |
4 |
In the Maximum Frame Size box type the value for the largest jumbo frame size expected to be present in the monitored traffic. This setting must be at least 9,038 bytes but no more than 64,000 bytes. If the setting is too low, some traffic may be missed. Use caution when increasing the size, as this has an impact on system memory consumption. Generally, Quest Technical Support can advise you when this setting needs to be increased. |
5 |
To enable the hardware timestamping functionality, select the Hardware Timestamping check box. For details about this feature, see Foglight Experience Monitor and Ixia Net Tool Optimizers. |
Consider the following conditions:
This issue can be resolved by configuring each web server to insert an HTTP header tag that contains the server’s unique IP address (for example, header name: SERVER-ID, header value: “192.168.1.89”).
If you configure the appliance to recognize the tag as the Server IP Identification Tag (in this case, SERVER-ID), it can identify unique servers behind the load balancer. Actual server IP addresses can then be viewed in the web console (in this case, 192.168.1.89) instead of the load balancer’s virtual IP. These real server IPs appear when you auto-discover servers. For more information, see Automatically discovering servers.
1 |
On the web server, navigate to Start > Programs > Administrative Tools > Internet Information Server (IIS) Manager. |
4 |
5 |
Select the HTTP Headers tab. |
6 |
Click Add. |
9 |
Click OK. |
The key file and password can be uploaded to the appliance and stored locally in files that are hidden and encrypted. The secure key file needs to be in the PEM (Privacy Enhanced Mail), DER (Distinguished Encoding Rules) or PKCS12 format. For more information about SSL certificates and keys, see Exporting a Certificate to the Appliance:.
These files typically resemble the following sample:
• |
• |
• |
• |
• |
The following bulk encryption algorithms are supported:
• |
• |
• |
• |
• |
• |
• |
1 |
In the Secure HTTP column, click the Configure link that corresponds with the server whose private keys are to be uploaded to the appliance. |
2 |
Click Add SSL Key to display a window in which you can locate the file containing the private key. |
3 |
Click Browse to open a dialog and locate the key. |
6 |
Click OK to upload the key, thereby enabling HTTPS monitoring for the specified port on this server. |
1 |
2 |
Type mmc to open the Microsoft Management Console. |
3 |
From the File menu of the Microsoft Management Console, click Add/Remove Snap-in and then click Add. |
4 |
5 |
From the Certificate Snap-in dialog box, select Computer account. |
6 |
Click Next. |
7 |
Select Local computer. |
8 |
Click Finish. |
9 |
Click OK in the Add/Remove Snap-in dialog box. |
1 |
Expand the certificates list and navigate to Certificate > Personal > Certificates. |
2 |
Right-click a certificate and select Select All Tasks > Export. |
3 |
Click Next. |
4 |
5 |
Ensure that Include all certificates in the certification path if possible and Enable strong protection are not selected. |
6 |
Click Next. |
8 |
Click Next. |
10 |
Click Next. |
11 |
Review the export settings and click Finish to export the certificate. |
© 2023 Quest Software Inc. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center