立即与支持人员聊天
与支持团队交流

Foglight for Infrastructure 7.1.0 - Foglight for Web Monitor User and Reference Guide

Monitoring Web transactions Exploring your collection of monitored Web sites Investigating the performance of Web transactions and monitoring locations Exploring Web Monitor services Generating reports Configuring Web Monitor agent properties View reference
Web Monitor Performance Browser views Web Monitor Transaction Management views Web Monitor Service Operation Console and Foglight for APM Transactions views

To start monitoring a Web site:

The Add Transactions dialog box appears.
The Add Transactions dialog box shows a list of the Web sites whose transactions you want to monitor, a list of all Web Monitor Agent locations in your environment, and links to additional configuration settings.
2
In the Add Transactions dialog box, provide information about the Web site whose transactions you want to start monitoring.
URL: The URL of the Web site that you want to monitor.
Transaction Name: The name you want to associate with the transactions with this Web site.
Get Page Header Only: Indicates whether you want to collect the page header only.
Expected Content: If content validation is enabled for the agent instance that you want to monitor this URL, and the expected content type is HTML-based, type html in this column. Also, a text string could be used such as “laptop” and type laptop into this column. In case the monitoring agent detects binary content or the text string at this address, the validation fails and the agent logs an error message.
Content validation can be enabled using the URL List secondary agent properties. For more information, see Settings.
Unexpected Content: If unexpected content validation is enabled for the agent instance that you want to monitor this URL, and the unexpected content type is HTML-based, type html in this column. Also, a text string could be used such as “laptop” and type laptop into this column. In case the monitoring agent detects binary content or the text string at this address, the validation fails and the agent logs an error message. If this column is empty, that means the agent is not required to perform unexpected content validation.
Unexpected Content validation can be enabled using the URL List secondary agent properties. For more information, see Settings.
3
To add more URLs to the list, click Add, and populate the row that appears. To remove a row from the list, click .
4
In the Deploy to Locations area, select one or more Web Monitor Agent locations that you want to use to monitor the transactions with the newly specified Web sites.
If the host from which you want to configure transaction monitoring does not appear on the list, that is because it does not have a running instance of the Web Monitor Agent. To create a Web Monitor Agent instance on that host, click Set up Agents and configure the agent instance on that host. For more information about installing and configuring agent instances, see the Administration and Configuration Help.
5
Optional—Specify thresholds for alarm generation, authentication, and proxy settings. If the URL requires user authentication, you need to supply credentials for accessing that URL.
a
Click Optional Advanced Settings.
The Advanced Settings dialog box appears.
b
In the Advanced Settings dialog box, in the Response time alarm firing conditions area, review the thresholds for alarm generation, and edit them, if required.
c
In the Authentication and proxy settings area, specify the following information, as required.
URL authentication required: Select this check box only if the URL requires user authentication. If that is the case, you need to ensure that you have proper credentials in place to enable the Web Monitor Agent to access it. Click Manage Credentials to review the existing credentials, or to create new ones, as required. For more information, see Configuring credentials to access Web sites requiring user authentication.
Use proxy for URL connection: Select this check box only if the Web Monitor needs to use a proxy to access the specified URL. Click Manage Credentials to review the existing credentials, and create new ones, as required. For more information, see Configuring credentials to access Web sites requiring user authentication.
Server: If you need to configure proxy access, type the name of the proxy server followed by the port number.
Proxy authentication required: Select this check box if the proxy requires authentication.
Click Save.
The Advanced Settings dialog box closes.
6
In the Add Transactions dialog box, click Save.
The Operation(s) Complete message box appears.
Click OK to close it.

Removing Web sites from the existing collection

The Transaction Management dashboard allows you to remove URLs from the existing collection of monitored sites. Removing a URL from the list causes the Web Monitor Agent to stop collecting Web site transaction information about that URL. The data collected from a removed URL is kept in the Foglight database in accordance with the existing persistence settings. For more information, refer to the Administration and Configuration Help.

To stop monitoring a Web site:

The Confirm message box appears.
2
Click Yes to confirm the removal and close the message box.
The Operation(s) Complete message box appears.
Click OK to close it.

Moving multiple transactions as a group

Moving multiple transactions in a single operation may be accomplished via the Transaction Management dashboard.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级