Chat now with support
与支持团队交流

Foglight for Infrastructure 5.9.5 - Infrastructure Utilities User Guide

Monitoring Web transactions Monitoring network devices

Monitoring Web transactions

Foglight Web Monitor allows you to monitor Web site response times and to investigate service levels that show the signs of potential performance problems, when monitored from specific points in your environment.

When you deploy Foglight Web Monitor, a set of predefined dashboards enables you to view the performance of the monitored Web sites. They allow you to ensure consistent Web server performance by reviewing the performance statistics. Better management of your Web sites can be achieved when you are alerted of potential problems before end users are affected.

Foglight Web Monitor relies on the Web Monitor Agent to collect data. The agent collects transaction information from specified URLs. Given a collection of URLs and a pre-defined collection schedule, the Web Monitor Agent attempts to connect to these Web sites, gathering response time data and sending it back to the Management Server on each data collection attempt.

Start by installing Foglight Web Monitor on the Management Server, deploying the Web Monitor Agent package, and creating agent instances on one or more hosts. For installation instructions, see the Foglight Infrastructure Utilities Release Notes.

If you are planning to monitor transactions from any Web sites that require user authentication, you need to configure appropriate user credentials. For more information, see Configuring credentials for Web sites requiring user or proxy authentication.

At this point you have an option of providing to the agent the list of URLs that you want to monitor, or you can do that later using the Transaction Management dashboard. In addition to managing the collection of monitored Web sites, this dashboard allows you to drill down on individual Web site transaction details, edit the settings that control alarm generation, and provide authentication details, when needed. For more information, see Exploring your collection of monitored Web sites.

Next, navigate to the Performance Browser. This dashboard displays the state of your system performance, providing a visual representation of the status of the monitored transactions and locations. Using this dashboard on a daily basis you can obtain an in-depth understanding of the state of your monitored environment. Monitoring the same collection of Web sites from different agent locations allows you to rule out any issues that may be related to host connectivity rather than Web site response issues. For more information, see Investigating the performance of Web transactions and monitoring locations.

The Web Monitor Agent is equipped with a set of properties that affect its running state. You can make changes to them, as required. For more information about the Web Monitor Agent properties, see Configuring Web Monitor agent properties.

For additional information, see the following topics:

Configuring credentials for Web sites requiring user or proxy authentication

Monitoring Web sites that require user or proxy authentication requires some additional configuration. To successfully access these sites with the Web Monitoring Agent and collect response time metrics, you must provide the credentials these pages need to access them. A valid credential contains a user name and password that enables the Web Monitoring Agent to access the monitored Web site. You can create credentials using the Manage Credentials dashboard.

2
On the navigation panel, under Dashboards, click Administration > Credentials.
3

For complete information about credentials, see the Administration and Configuration Help.

For more information, see the following topics:

Configuring credentials to access Web sites requiring user authentication

Web Monitor Agent instances that monitor Web sites requiring user authentication need to have credentials that supply this information. A valid credential needed to access a password-protected page requires all of the following information, all encapsulated in a single credential:

To get started, create a new credential of the User Name and Password type containing a resource mapping with the Web Monitor Authentication usage. Next, provide the URL address that requires these credentials, and save changes to the credential.

2
On the navigation panel, under Dashboards, click Administration > Credentials.
The Select the Type of Credential to Add list appears.
5
In the Select the Type of Credential to Add list, click the credential appropriate for your authentication type.
User Name and Password for Basic authentication.
The Add A New Credential wizard appears with the Credential Properties page open.
6
On the Credential Properties page, type the required properties, and click Next.
The Credential Name and Lockbox page appears.
7
On the Credential Name and Lockbox page, select the lockbox in which you want to store the Web Monitor credential, and optionally change the credential name.
Click Next.
The Resource Mapping page appears.
a
On the Resource Mapping page, click Add.
The New Resource Mapping Condition dialog box appears.
b
In the New Resource Mapping Condition dialog box, click Usage, and select Web Monitor Authentication from the popup that appears.
The popup closes and the Access Resources Using setting is automatically set to Web Monitoring URL, indicating that the credential is used when accessing the URL address you are about to specify.
c
Ensure that equals and Evaluate This Condition are selected.
d
Click Add a New String and type the URL into the highlighted cell appearing in the String column.
e
Click Add.
f
The New Resource Mapping Condition dialog box closes and the Resource Mapping page refreshes, showing the newly specified resource mapping.
g
Optional—At this point you can refine your credential settings to specify, for example, the time during which the credential is valid, the number of failed attempts after which the credential is locked, the number of times the credential can be used, or the period of time during which the credential data is cached on the server. For complete information, see the Administration and Configuration Help.
h
Click Finish.
The Add A New “User Name and Password” Credential wizard closes and the Manage Credentials dashboard refreshes, showing the newly added Web Monitor credential in the list.

Configuring credentials for accessing Web sites through proxy servers

Web Monitor Agent instances that monitor Web sites through a proxy server need to have credentials supplying that information. A valid credential needed to access a URL page through a proxy server requires the host name or the IP address of the proxy server along with the port number it uses to listen for incoming requests.

To get started, create a new credential of the User Name and Password type containing a resource mapping with the Web Monitor Proxy Authentication usage. Next, specify the host name or IP address of the proxy server and the port number, and save your changes.

2
On the navigation panel, under Dashboards, click Administration > Credentials.
The Select the Type of Credential to Add list appears.
5
In the Select the Type of Credential to Add list, click the credential appropriate for your authentication type.
User Name and Password for Basic authentication.
The Add A New Credential wizard appears with the Credential Properties page open.
6
On the Credential Properties page, type the required properties, and click Next.
The Credential Name and Lockbox page appears.
7
On the Credential Name and Lockbox page, select the lockbox in which you want to store the Web Monitor credential, and optionally change the credential name.
Click Next.
The Resource Mapping page appears.
a
On the Resource Mapping page, click Add.
The New Resource Mapping Condition dialog box appears.
b
In the New Resource Mapping Condition dialog box, click Usage, and select Web Monitor Proxy Authentication from the popup that appears.
c
Specify the host name or IP address of the proxy server. Click Access Resources Using, and in the popup that appears, select one of the following options, as required:
d
Ensure that equals and Evaluate This Condition are selected.
Click Matching Type, and in the popup that appears, select one of the following options:
Domain Name: Select this option if you want to use a literal expression to specify the host name or IP address.
Regular Expression: Select this option if you want to use a regular expression to specify the host name or IP address.
g
Click Add.
h
The New Resource Mapping Condition dialog box closes and the Resource Mapping page refreshes, showing the newly specified proxy server.
The New Resource Mapping Condition dialog box appears.
b
Specify the port number the proxy server uses to listen for incoming requests. Click Access Resources Using in the New Resource Mapping Condition dialog box, and in the popup that appears, select Target Port.
c
Ensure that equals and Evaluate This Condition are selected.
Click Matching Type, and in the popup that appears, select one of the following options:
Exact Match (Case Sensitive): Select this option if you want to use a literal expression to specify the port number.
Regular Expression: Select this option if you want to use a regular expression to specify the port number.
f
Click Add.
g
The New Resource Mapping Condition dialog box closes and the Resource Mapping page refreshes, showing the newly specified port number.
h
Optional—At this point you can refine your credential settings to specify, for example, the time during which the credential is valid, the number of failed attempts after which the credential is locked, the number of times the credential can be used, or the period of time during which the credential data is cached on the server. For complete information, see the Administration and Configuration Help.
i
Click Finish.
The Add A New “User Name and Password” Credential wizard closes and the Manage Credential dashboard refreshes, showing the newly added Web Monitor credential in the list.
自助服务工具
知识库
通知和警报
产品支持
下载软件
技术说明文件
用户论坛
视频教程
联系我们
获得许可 帮助
技术支持
查看全部
相关文档