Chat now with support
Chat with Support

Foglight Experience Monitor 5.8.1 - User Guide

Installing and configuring Multi-appliance clusters Configuring the appliance Specifying monitored web traffic Transforming monitored URLs Managing applications Foglight components and the appliance Using the console program Troubleshooting the appliance Appendix: Third party software Monitoring the user experience Customizing reports The alarm system Integrating the appliance SOAP-based web services

SNMP

SNMP provides the ability to send traps (notifications) to advise an administrator whenever an alarm is triggered. A trap is a network message that is used to report alerts about a managed subsystem.

In the SNMP Server boxes, enter the IP addresses of up to three SNMP (Simple Network Management Protocol - version 2c) servers on your network. After you have configured at least one SNMP server you will be able to send SNMP traps whenever an alarm is triggered. For more information, see “Issuing SNMP traps” in the Foglight Experience Monitor User Guide.

You must also enter the community identifier that the system uses to send SNMP traps. The two links, at the bottom of the page, give you access to the SNMP (Version 2) Structure of Management Information file and the Management Information Base (MIB) file.

Other

This section contains additional network configuration settings.

In the Syslog server IP box, type the IP of a server running syslog that receives all of the configuration log messages that are generated on the appliance whenever a change is made to configuration. This facility allows you to monitor configuration changes that are made on the appliance to detect possible violations of your site's security or administrative policies.

Traceroutes can be assigned as actions that occur when an alarm is triggered. For more information, see “Perform traceroutes” in the Foglight Experience Monitor User Guide.

You can choose either UDP (User Datagram Protocol—the default) or ICMP (Internet Message Protocol). To determine which protocol your network supports for traceroutes, contact your network administrator.

User accounts

The User Accounts page enables you to manage user accounts and user account options. You can access this page by clicking Configure > Appliance > User Accounts.

The appliance provides personal user accounts for each individual who needs access to it through the web console, terminal, remote database, or secure shell (SSH). These accounts specify the login name and password for each user, as well as the granted privileges. Each user account also has its own package of report sets that users may customize to fit their requirements.

For Foglight users who want the ability to view reports in the appliance, you must set up a user account that matches the login name used in Foglight. To complete the integration process, you must also setup the Foglight server IP and port on the Configure > Appliance > Network Settings page. For more information, see Foglight Management Server.

For more information, see these topics:

User account management

In order to connect to the Foglight Experience Monitor console to view Report Sets, create alarms, and view metric data, users require accounts. These are managed on the User Accounts page, accessed by clicking Configure > Appliance > User Accounts. Each user account offers a private workspace in which the user can manage and customize a personalized group of report sets and snapshots.

The SSH Access and DB Access columns provide a quick way to determine whether any users have SSH or database access enabled, in which case SSH port (22) or SQL database port (3306) are currently open on the appliance.

It is strongly recommended that you create individual user accounts rather than reusing the default admin account. If more than one user logs into the admin account, conflicts may arise.

A valid login name must adhere to the following guidelines:

2
In the Login box, type the login name. For more information, see Defining login names.
3
In the Password and Confirm Password boxes, type the password assigned to the user.
TIP: A message appears to the right of the Password box, providing information about the strength level of the password you enter.
The password creation rules you must follow depend on whether the Enforce strong passwords option is enabled on the main User Accounts page. For a description of the strong and standard policy, see Global user account options.

Administrative

Unlimited access. Assign this role only to users who are responsible configuring, maintaining, and updating the appliance, the database, the appliance software, and user accounts. Only Administrative users can have terminal and SSH access enabled.

Power User

Power Users have access to all features except those related to configuring, maintaining, and updating the appliance, the database, the appliance software, and user accounts. In the web console, the Configure > Appliance menu (which contains the restricted tasks) is removed.

Secured Power User

Similar to the Power User role except that Secured Power Users cannot run auto-discovery functions that can expose sensitive customer data. This includes session identifier auto-discovery, login variable auto-discovery, and variable rule auto-discovery.

General

Assign this role to users who need to do the following tasks only:

Guest

Assign this role to users who need to do the following tasks only:

5
10
12
Click OK to save the new user profile.

When adding new appliances to your network environment, you can export your user accounts from an existing appliance and then import them into the new appliance. For more information,.

1
Click Configure > Appliance > User Accounts.

When adding new appliances to your network environment, you can export your user accounts from an existing appliance and then import them into the new appliance. For more information,.

1
Click Configure > Appliance > User Accounts.
3
Click Browse. Navigate to and select the ZIP file you exported from the other appliance.
4
Click Import.

Existing user accounts can only be removed by a user whose own account is of type Administrative.

3
Click Delete.

Existing user accounts can only be edited by a user whose own account is of type Administrative.

1
On the User Accounts page, click the Edit link beside the account name, in the Settings column.
2
In the Login box, type the login name. For more information, see Defining login names.
3
Select an option from the Type list. For more information, see User account management.
4
9
10
Click OK to save the edits made to the user’s profile.

A user account becomes locked if the user fails to login six consecutive times. The lockout duration is 30 minutes. Only a user with administrative privileges can unlock the account for you before the lockout period ends.

1
On the User Accounts page, click Edit beside the account that has been locked, in the Settings column.
2
Click Unlock Account.
3
Click OK to save the edits made to the user’s profile.

Existing user account passwords can only be edited by a user whose own account is of type Administrative.

1
On the User Accounts page, click the Edit link beside the account name, in the Password column.
2
In the Password and Confirm Password boxes, type the new password assigned to this user account.
3
Related Documents