This section is about configuring the Agent Manager after the installation.
This section covers the following key areas:
The Management Server includes a credential management system that enables you to create, store, and manage credentials through the Foglight browser interface. Different cartridges support different types of credentials. Some cartridges, for example, support the use of Windows and UNIX credentials, while others can only authenticate local users. The credential type determines which parts of the monitored system are used to connect to a resource, such as host names or IP addresses. Credentials are encrypted and stored in lockboxes. Lockboxes are released to credential clients, such as the Agent Manager. Agents, in turn, request credentials from the Agent Manager.
Foglight agents need access to credentials when monitoring systems that require credential verification. Credential information consists of a name, type, policies, and resource mappings. You can create and manage credentials through the Management Server browser interface. Foglight supports the following commonly used credential types:
When specifying a domain name in this credential type, a fully qualified domain name is required. Failing to use a fully qualified domain name may prevent the Agent Manager from establishing a connection to a remote monitored resource. For example, if the full domain name is prod.example.com, use prod.example.com as the domain name instead of just prod, when configuring the credential.
Each credential can have one or more authentication policies, based on the desired usage count, failure rate, the time range during which the credential can be used, and the amount of time during which the credential information is cached locally. Credentials can apply to specific parts of the monitored environment, such as hosts and ports. Resource mappings identify secured resources. The mappings typically contain a combination of literal expressions, regular expressions, or an IP address range.
A lockbox can be password-protected, and contains a collection of credential keys used for encryption and decryption. A lockbox can encrypt one or more credentials. All lockboxes, except the System lockbox, are password-protected. You can create, edit, and manage lockboxes, change their passwords, and release them to credential clients (such as the Agent Manager) using the Manage Lockboxes dashboard in the Management Server browser interface.
Each lockbox in the Management Server contains a set of credentials and keys for their encryption and decryption. Credentials are released to the Agent Manager unencrypted. When a lockbox is released to the Agent Manager, the Agent Manager passes the credential information to its agents. The agents use this information to establish connection with target resources.
When you start the Agent Manager without having first released a lockbox to it from the Management Server, the following message appears in the startup log:
INFO The Credential Manager has not been assigned any lockboxes. Lockboxes are used to decrypt credentials received as a result of an Agent Credential Query. Without any lockbox assignments, credentials received within a credential query result-set will be discarded. You can grant lockboxes to this Agent Manager through the Credential Administrator on the Server.
The lockbox you release to the Agent Manager must contain the credentials necessary for the agents to access the monitored resources.
Any agents that have access to an Agent Manager with a released lockbox can potentially query and obtain credential information stored within that lockbox.
To release a lockbox to the Agent Manager:
The System lockbox that is included by default with the Management Server is not password-protected. Its contents are accessible to all clients in your system.
This functionality consumes server resources. It can be significant depending on the size of your client list.
Anti-virus software may negatively impact the CPU and system performance of machines running Foglight. To reduce resource consumption, it is highly recommended to exclude the relevant directory, processes, and executables from being scanned by the anti-virus software.
The amount of memory needed for proper operation of an agent manager is determined by the amount and type of the agents it will be used to monitor. For more information about hardware requirements, refer to Typical Resource Requirements.
To set the Agent Manager memory usage limits:
Locate the agent manager configuration file:
For Linux:
For Windows:
Edit the file to configure sizing parameters by uncommenting the lines vmparameter.0 and vmparameter.1, and entering the desired memory requirements as shown in the example below:
vmparameter.0 = “-Xms128m”;
vmparameter.1 = “-Xms128m”;
Restart the agent manager to apply the new settings.