Put to use some of the built-in facilities of Foglight to make your monitoring even more effective and valuable: registry variables, schedules, services, and the security model.
Find More Time for Innovation and Helping Your Business: Invoke Variables for More Nimble Monitoring
This webcast covered:
- Important but often overlooked variables for core Foglight functions
- Describe the difference between registry variables, rule variables and severity-level variables
- Uses of variables for email notifications
- Scoping registry variable values for common use cases
Gaining a Different Perspective on IT Assets Using the Service Builder
This webcast covered:
- Gain a different perspective on IT assets such as SLA’s, alarms on the service, components affected
- Setup emails to alert on issues impacting the overall Service
- Utilize the Service in the Databases/Virtualization environment (grouping)
- Use the Service in a simple custom dashboard to show its status
Calendar Driven Monitoring Using Schedules
This webcast covered:
- Locate useful existing schedules
- Create new schedules
- Confirm that schedules function as expected
- Apply schedules to common Foglight monitoring use cases
Valuable Information I Learned about Foglight Services and Service Builder in 2018
This webcast covered:
- Putting MySQL, Postgres, etc. agents into a dynamic managed service
- Defining email actions via Service Builder for MySQL and other agents
- Adding a selection of SQL Server agent jobs to a service
- Introduction to UI Queries
- Adding UI query result to a service
- Creating a simple "Status" Dashboard with those services and UI query results
Exploring the Foglight Security Model
This webcast covered:
- Walkthrough the role-based security model
- How users can be grouped together for simple administration
- Providing users visibility to a subset of the Foglight deployment
- Granting users access to a small subset of custom dashboards
- Providing public access to dashboards