Depending upon their roles and permissions, administrators (super admin and app admin roles) generally configure the product so that IT operators (troubleshooter role) and application specialists (app admin role) can use the product to perform various activities related to the use cases.
The information in this section can help you perform various administration tasks related to managing and maintaining the TrueSight IT Data Analytics product. In addition, this section covers information about setting up data collection, setting up notifications, and managing user access control.
|Setting up Collection Agents||Set up Collection Agents after you install the TrueSight IT Data Analytics|
|Managing users and access control||Manage user authorization into the product based on roles and user authentication options.|
|Setting up data collection||Understand various aspects related to data collection and learn how to create and manage data collectors, data patterns, collection profiles, hosts, and credentials (to store usernames and passwords of hosts). Also, learn how to set up Collection Agents and use them for collecting data.|
|Setting up notifications to create alerts or reports|
Learn how to create notifications to alert problems or abnormalities by sending email notifications or by logging events intosuch as ProactiveNet and TrueSight Infrastructure Management.
|Setting up emails||Set up emails to enable sending email notifications for user creation or retrieving forgotten passwords, and notifications alerts.|
|Managing and maintaining the product||Perform various activities such as backing up and restoring data, modifying the configuration files, starting and stopping services, using content packs, changing system settings, and viewing status of the product components.|
|Managing the product from the command line interface|
Learn how to use CLI commands to perform various activities related to managing and maintaining the product.
|Configuring a secured connection||Enable security for certain data-flow channels and user inputs specified on the product interface.|
|Configuring access URLs.||Configure the system to specify the rules by which URLs can bypass the cross-site request forgery (CSRF) checks|
|Perform configuration changes that might be required before scaling up your deployment.|