Administering

Depending upon their roles and permissions, administrators (super admin and app admin roles) generally configure the product so that IT operators (troubleshooter role) and application specialists (app admin role) can use the product to perform various activities related to the use cases.

The information in this section can help you perform various administration tasks related to managing and maintaining the TrueSight IT Data Analytics product. In addition, this section covers information about setting up data collection, setting up notifications, and managing user access control.

TaskDescription
Setting up Collection AgentsSet up Collection Agents after you install the TrueSight IT Data Analytics
Managing users and access controlManage user authorization into the product based on roles and user authentication options.
Setting up data collectionUnderstand various aspects related to data collection and learn how to create and manage data collectors, data patterns, collection profiles, hosts, and credentials (to store usernames and passwords of hosts). Also, learn how to set up Collection Agents and use them for collecting data.
Setting up notifications to create alerts or reports

Learn how to create notifications to alert problems or abnormalities by sending email notifications or by logging events into integrated external systems such as ProactiveNet and TrueSight Infrastructure Management.

Setting up emailsSet up emails to enable sending email notifications for user creation or retrieving forgotten passwords, and notifications alerts.
Managing and maintaining the productPerform various activities such as backing up and restoring data, modifying the configuration files, starting and stopping services, using content packs, changing system settings, and viewing status of the product components.
Managing the product from the command line interface

Learn how to use CLI commands to perform various activities related to managing and maintaining the product.

Configuring a secured connectionEnable security for certain data-flow channels and user inputs specified on the product interface.
Configuring access URLs.Configure the system to specify the rules by which URLs can bypass the cross-site request forgery (CSRF) checks

Configurations required before scaling up

Perform configuration changes that might be required before scaling up your deployment.
Was this page helpful? Yes No Submitting... Thank you

Comments