Put to use some of the built-in facilities of Foglight to make your monitoring even more effective and valuable:  registry variables, schedules, services, and the security model.

 

 

Find More Time for Innovation and Helping Your Business:  Invoke Variables for More Nimble Monitoring

View webcast here

This webcast covered:

  • Important but often overlooked variables for core Foglight functions
  • Describe the difference between registry variables, rule variables and severity-level variables
  • Uses of variables for email notifications
  • Scoping registry variable values for common use cases

 

Gaining a Different Perspective on IT Assets Using the Service Builder

View webcast here

This webcast covered:

  • Gain a different perspective on IT assets such as SLA’s, alarms on the service, components affected
  • Setup emails to alert on issues impacting the overall Service 
  • Utilize the Service in the Databases/Virtualization environment (grouping)
  • Use the Service in a simple custom dashboard to show its status

 

Calendar Driven Monitoring Using Schedules

View webcast here

This webcast covered:

  • Locate useful existing schedules
  • Create new schedules
  • Confirm that schedules function as expected
  • Apply schedules to common Foglight monitoring use cases


Valuable Information I Learned about Foglight Services and Service Builder in 2018

View webcast here

This webcast covered:

  • Putting MySQL, Postgres, etc. agents into a dynamic managed service
  • Defining email actions via Service Builder for MySQL and other agents
  • Adding a selection of SQL Server agent jobs to a service
  • Introduction to UI Queries
  • Adding UI query result to a service
  • Creating a simple “Status” Dashboard with those services and UI query results

Exploring the Foglight Security Model

 View Webcast Here

This webcast covered:

  • Walkthrough the role-based security model
  • How users can be grouped together for simple administration
  • Providing users visibility to a subset of the Foglight deployment
  • Granting users access to a small subset of custom dashboards
  • Providing public access to dashboards

Tim joined Quest over 20 years ago and is currently an information management technologist in Quest’s Information Systems Management business unit. Tim has used his extensive IT experience to help Quest’s customers solve problems and gain better use their data. Working with Foglight since his early days at Quest, he has seen major transitions, with more surely to come.

Identity Security Risk Assessment

Get a free AD security assessment to evaluate your environment and identify the most actionable issues.