Policy management

Policies enable administrators to deploy configurations on PATROL Agents and monitoring solutions (also known as Knowledge Modules) in an automated way.

Learning resources

Overview of policy management

PATROL Agents collect performance data and generate events for availability metrics. A monitoring solution is a set of instructions that the PATROL Agent uses to monitor objects in your environment.

For a PATROL Agent to monitor a system, it needs instructions and information about what to monitor, how and when to generate an alert or event, and where to send the data and events. Solution administrators and tenant administrators configure these instructions and information in policies. A policy is applied to the PATROL Agents based on conditions such as Agent name, Agent port, Agent version, Agent tag, and so on. If an Agent matches the conditions defined in multiple policies, then the configuration across the policies are applied to the Agent.

The following types of policies can be created:

  • Monitoring policy: To define and configure monitoring criteria and apply them to selected PATROL Agents. Some examples of monitoring criteria are configuring monitoring solutions on PATROL Agents, creating thresholds on Infrastructure Management servers, and copying baselines between similar instances of Infrastructure Management servers. 
  • Blackout policy: To stop a PATROL Agent from performing certain actions such as stopping data collection, event generation, or recovery actions. This policy applies to PATROL Agents and the related data collection, events, and recovery actions. It does not apply to the behavior of the Infrastructure Management server. Before defining this policy, you must define the time frame for which you want the policy to be applicable.
  • Staging policy: To configure a PATROL Agent to communicate with the Infrastructure Management server by using a specified Integration Service. When a package is deployed and installed, the PATROL Agent checks in through the staging Integration Service. When the PATROL Agent checks in, the Presentation Server evaluates the Agent selection criteria in a staging policy and uses that data to automatically assign a data collection Integration Service (or Integration Service cluster) to the PATROL Agent. For more information, see Staging Integration Service host deployment and policy management for development, test, and production best practices Open link

For more information about working with policies, see Managing policies.

When new PATROL Agents check into the environment, because of the configured policies, the Agents automatically receive the appropriate configuration and begin monitoring according to it. As administrators, you need not take any additional steps to apply policies. When an existing policy is modified, the changes are automatically applied to the respective Agents without having to manually initiate the application of these changes. These capabilities significantly speed up and simplify the administration process assuming all policy configurations have been created appropriately.

Role-based access to policies

Authorization profiles enable role-based access (RBAC) to policy management. Each authorization profile is associated with one or more Remedy Single Sign-On realms and comprises user groups, roles and permissions, and objects. For more information, see Role-based access Open link

By default, Solution Administrators have full access to all policies in all realms (tenants). Tenant Administrators have full access to all policies in their realm (tenant).

Where to go from here

Managing policies


Was this page helpful? Yes No Submitting... Thank you