This section covers the following key areas:
This section describes how to manage agent packages and create agents on Agent Managers. For more information refer to Administering Agent Managers.
This helps you to monitor and manage credentials used to access monitored systems or devices. This feature ensures that Foglight can properly authenticate and maintain communication with the systems it is monitoring.
A lockbox contains a collection of encrypted credentials and the keys used for their encryption and decryption. You create and manage lockboxes. A lockbox can optionally be secured using a password. If a lockbox is password-protected, the password is required to release the lockbox to credential clients, or to change or remove its password.
This displays a list of all credential clients registered with the system. This list may not be complete as it depends on the status of the clients and their implementation.
This helps you to configure the desired integrations based on the requirements of your environment.
The Agents dashboard lists the agents that are available for each host.
This displays the audit logs, blackouts and email configuration.
The Locations dashboard helps you to manage and visualize the geographical distribution of monitored resources.