{"id":11740,"date":"2018-11-02T15:30:42","date_gmt":"2018-11-02T14:30:42","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/"},"modified":"2018-11-02T15:30:42","modified_gmt":"2018-11-02T14:30:42","slug":"foglight-monitoring-solution-for-databases-part-02","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/","title":{"rendered":"Foglight: Monitoring solution for databases [Part 02]"},"content":{"rendered":"<p>Foglight is a powerful and all in one monitoring solution to monitor various IT infrastructure assets like databases, servers, applications and so on. Whenever you need to monitor a special assets like an Oracle database, a Windows server, a Tomcat server or any other component you can do so by adding a Cartridges. A Cartridges is like a plugin for a specific technology. As we already seen how to install Foglight in a previous article here, in this one we are going to test the monitoring implementation of an Oracle database.<\/p>\n<h3>Configuration<\/h3>\n<p>The configuration is done in the web console, so we need first to login: https:\/\/192.168.56.100:8443<br \/>\nMy user\/password is the default foglight\/foglight and here I am:<\/p>\n<p><a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/Capture-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/Capture-1.png\" alt=\"Capture\" width=\"1024\" height=\"386\" class=\"alignnone size-large wp-image-28150\" \/><\/a><\/p>\n<h4>Email for notifications<\/h4>\n<p>Dashboards &gt; Administration &gt; Setup &gt; Email Configuration<\/p>\n<p><a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen2.png\" alt=\"screen2\" width=\"1024\" height=\"485\" class=\"alignnone size-large wp-image-28178\" \/><\/a><\/p>\n<h4>Users and external authentication<\/h4>\n<p><a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen3.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen3.png\" alt=\"screen3\" width=\"1024\" height=\"719\" class=\"alignnone size-large wp-image-28188\" \/><\/a><\/p>\n<p>It is possible to use an external authentication method by configuring one the following providers:<\/p>\n<ul>\n<li>Microsoft\u00ae Active Directory\u00ae<\/li>\n<li>Oracle\u00ae Directory Server Enterprise Edition<\/li>\n<li>OpenLDAP\u00ae<\/li>\n<li>Novell\u00ae eDirectory&#x2122;<\/li>\n<\/ul>\n<p>More information <a href=\"https:\/\/support.quest.com\/technical-documents\/foglight\/5.9.3\/administration-and-configuration-guide\/2#TOPIC-978605\">here<\/a>. <\/p>\n<h4>Installing and Upgrading Cartridges<\/h4>\n<p>Each Foglight cartridge contains extensions for monitoring a specific environment, such as applications, operating systems, or database management systems. Cartridges are installed on the server. A cartridge can contain one or more agents that are used to collect data from monitored environments. To manage them we need to go to the Cartridges area:<\/p>\n<p><a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen1.png\" alt=\"screen1\" width=\"1024\" height=\"368\" class=\"alignnone size-large wp-image-28158\" \/><\/a><\/p>\n<p>Many cartridges for databases are available here: https:\/\/support.quest.com\/foglight-for-databases\/5.9.2\/download-new-releases<\/p>\n<h4>Deploying an agent<\/h4>\n<ul>\n<li>Agents collect data from monitored environments and send it to the Management Server\n<li>Each agent type can monitor a specific part of your environment, such as an operating system, application, or server\n<li>Foglight cartridges that you install on the server include one or more agent types\n<li>A server installation includes an embedded Foglight Agent Manager and it starts up and stops with the Foglight Management Server<\/li>\n<li>Agents can be install in silent mode <a href=\"https:\/\/support.quest.com\/technical-documents\/foglight-agent-manager\/5.9.2\/foglight-agent-manager-guide\/4#TOPIC-874421\">here<\/a><\/li>\n<\/ul>\n<p>To deploy an agent we need to go use the Agent Manager in <strong>Dashboards &gt; Administration &gt; Agents &gt; Agent Managers<\/strong>:<\/p>\n<p><a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen4.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen4.png\" alt=\"screen4\" width=\"1024\" height=\"523\" class=\"alignnone size-large wp-image-28191\" \/><\/a><\/p>\n<p>After the agent installation, login into the target server to be monitored and install the agent:<\/p>\n<p><code><br \/>\n[root@oracle-server ~]# mkdir \/opt\/foglight<br \/>\n[root@oracle-server ~]# chown foglight. \/opt\/foglight<br \/>\n[root@oracle-server ~]# mv FglAM-5_9_2-linux-x86_64.bin \/opt\/foglight\/<br \/>\n[root@oracle-server ~]# chown foglight. \/opt\/foglight\/FglAM-5_9_2-linux-x86_64.bin<br \/>\n[root@oracle-server ~]# su - foglight<br \/>\nLast login: Tue Oct  2 00:13:43 CEST 2018 on pts\/0<br \/>\n[foglight@oracle-server ~]$ cd \/opt\/foglight\/<br \/>\n[foglight@oracle-server foglight]$ .\/FglAM-5_9_2-linux-x86_64.bin ## --allow-unsecured<br \/>\n2018-10-02 15:45:19.000 INFO  [native] Extracting to a temporary directory<br \/>\n2018-10-02 15:45:20.000 INFO  [native] Foglight Agent Manager version 5.9.2 (build 5.9.2-201712050154-RELEASE-101) starting ...<br \/>\n2018-10-02 15:45:23.000 INFO  [native] Extraction complete, configuring<br \/>\n[0\/2]: -Dinstaller.executable.name=FglAM-5_9_2-linux-x86_64.bin<br \/>\n[1\/2]: -Dinstaller.executable.path=\/opt\/foglight<br \/>\n2018-10-02 15:45:24.278 INFO  Foglight Agent Manager: 5.9.2 (build 5.9.2-201712<br \/>\n  050154-RELEASE-101)<\/p>\n<p>License Agreement<br \/>\n===============================================================================<br \/>\nYou must accept the following license agreement to install and use Foglight Agent Manager.<\/p>\n<p>Do you accept the terms of the license agreement? [Y\/N]:  Y<\/p>\n<p>Choose Install Location<br \/>\n===============================================================================<br \/>\nWhere would you like to install the Foglight Agent Manager application?<\/p>\n<p>Install directory (default: \/opt\/quest\/foglightagentmanager):<br \/>\n\/opt\/foglight\/agent<\/p>\n<p>The directory \"\/opt\/foglight\/agent\" does not exist.  Would you like to create it?  [Y\/N] (default: Y):<\/p>\n<p>Host Display Name<br \/>\n===============================================================================<br \/>\nFoglight Agent Manager identifies itself using the detected host name for the<br \/>\ncomputer it has been installed on. This can be overridden below to provide an<br \/>\nalternate name if the hostname is not stable or is already in use by another<br \/>\ncomputer.<\/p>\n<p>Detected Host Name:  [default: oracle-server]:<\/p>\n<p>Log a warning if the detected host name changes?  [Y\/N] (default: Y):<\/p>\n<p>Server URLs<br \/>\n===============================================================================<br \/>\nConfigure the URLs that the Foglight Agent Manager process will use to communicate with the management server.<br \/>\nFor fail-over purposes you can configure multiple URLs.<\/p>\n<p>You have the following options:<br \/>\n  1)  Add a new management server URL<br \/>\n  2)  Add a new SSL Certificate CA<br \/>\n  3)  Test connectivity<br \/>\n  4)  Search for additional HA servers<br \/>\n  5)  List configured management server URLs<br \/>\n  6)  List SSL Certificate CAs<br \/>\n  7)  Delete a configured management server URL<br \/>\n  8)  Delete an SSL Certificate CA<br \/>\n  0)  Continue with the next step<\/p>\n<p>What would you like to do?  1<\/p>\n<p>Enter the URL data to add.  The management server URL parameters are specified as comma separated name=value pairs.  For example:<br \/>\nurl=https:\/\/localhost:8443,address=127.0.0.1,proxy=http:\/\/proxy.server,ssl-allow-self-signed=false,ssl-cert-common-name=name.com<\/p>\n<p>Available parameters are:<br \/>\nurl:                    Required.  The URL that Foglight Agent Manager will connect to.<br \/>\nproxy:                  Optional.  The URL of the proxy to use when connecting.<br \/>\nproxy-user:             Optional.  The username sent to the proxy.<br \/>\nproxy-pass:             Optional.  The password sent to the proxy.<br \/>\nproxy-ntlm-domain:      Optional.  The NTLM domain sent to the proxy.<br \/>\naddress:                Optional.  The local network address from which connections to the management server will be made.<br \/>\nssl-allow-self-signed:  Optional.  True to allow self-signed certificates to be accepted; false (default) otherwise.<br \/>\nssl-cert-common-name:   Optional.  The common name contained in the management servers certificate.<br \/>\ncompressed:             Optional.  True (default) to use GZIP compression when sending and receiving data.<\/p>\n<p>URL: https:\/\/192.168.56.100:8443,ssl-allow-self-signed=true<br \/>\nThe URL has been added.<\/p>\n<p>You have the following options:<br \/>\n  1)  Add a new management server URL<br \/>\n  2)  Add a new SSL Certificate CA<br \/>\n  3)  Test connectivity<br \/>\n  4)  Search for additional HA servers<br \/>\n  5)  List configured management server URLs<br \/>\n  6)  List SSL Certificate CAs<br \/>\n  7)  Delete a configured management server URL<br \/>\n  8)  Delete an SSL Certificate CA<br \/>\n  0)  Continue with the next step<\/p>\n<p>What would you like to do?  3<br \/>\nTesting connectivity...<br \/>\n0%... 100% finished<\/p>\n<p>You have the following options:<br \/>\n  1)  Add a new management server URL<br \/>\n  2)  Add a new SSL Certificate CA<br \/>\n  3)  Test connectivity<br \/>\n  4)  Search for additional HA servers<br \/>\n  5)  List configured management server URLs<br \/>\n  6)  List SSL Certificate CAs<br \/>\n  7)  Delete a configured management server URL<br \/>\n  8)  Delete an SSL Certificate CA<br \/>\n  0)  Continue with the next step<\/p>\n<p>What would you like to do?  0<\/p>\n<p>You have some untested\/broken management server URLs configured. Are you sure you want to continue? [Y\/N] (default: Y):<\/p>\n<p>Downstream Connection Configuration<br \/>\n===============================================================================<br \/>\nFoglight Agent Manager can accept incoming connections and be configured as a concentrator that acts as an intermediary connection that aggregates multiple downstream Foglight Agent Manager clients. A concentrator configuration can provide a single connection through either a firewall or proxy for all downstream clients, or as an aggregated connection directly to the server.<\/p>\n<p>Enabling this install as a concentrator will pre-configure queue and heap sizes to support accepting and transferring data from one or more downstream connections.<\/p>\n<p>Enable Concentrator support? [Y\/N] (default: N):<\/p>\n<p>Secure Launcher<br \/>\n===============================================================================<br \/>\nSome agents require elevated permissions in order to gather the required system<br \/>\nmetrics.  These agents are launched using an external loader to give them the required access.<\/p>\n<p>Please see the Foglight Agent Manager documentation for more information on agent security settings.<\/p>\n<p>Secure launcher (default: \/bin\/sudo):<\/p>\n<p>UNIX init.d Script<br \/>\n===============================================================================<br \/>\nFoglight Agent Manager will be configured to start when this host is rebooted by adding an init.d-style script.<\/p>\n<p>Would you like to customize the start-up script? [Y\/N] (default: N):<\/p>\n<p>Summary<br \/>\n===============================================================================<br \/>\nFoglight Agent Manager has been configured and will be copied into its final location.<\/p>\n<p>Press  to continue.<\/p>\n<p>Beginning work ...<br \/>\n===============================================================================<br \/>\nCalculating install size...<br \/>\n0%... 100% finished<\/p>\n<p>Copying files...<br \/>\n0%... 10%... 20%... 30%... 40%... 50%... 60%... 70%... 80%... 90%... 100% finished<\/p>\n<p>Created init.d installer script:<\/p>\n<p>\/opt\/foglight\/agent\/state\/default\/fglam-init-script-installer.sh<\/p>\n<p>Since this installation is not being performed by a user<br \/>\nwith root privileges, the init.d script will not be installed.<br \/>\nA copy of the script and the script installer have been saved<br \/>\nin the state directory for later use.<\/p>\n<p>The Foglight Agent Manager process will be started once this configuration process exits.<br \/>\n<\/code><\/p>\n<p>Then we can see that the agent is running:<\/p>\n<p><code>[foglight@oracle-server foglight]$ \/opt\/foglight\/agent\/bin\/fglam --status<br \/>\n0<br \/>\n#0: Process running normally<br \/>\n#1: Process not running, but PID file exists<br \/>\n#3: Process not running<br \/>\n#4: Process status unknown<br \/>\n<\/code><\/p>\n<p>I hope this helps and please do not hesitate to contact us should you need more details.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Foglight is a powerful and all in one monitoring solution to monitor various IT infrastructure assets like databases, servers, applications and so on. Whenever you need to monitor a special assets like an Oracle database, a Windows server, a Tomcat server or any other component you can do so by adding a Cartridges. A Cartridges [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":11743,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[229],"tags":[],"type_dbi":[],"class_list":["post-11740","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-database-administration-monitoring"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Foglight: Monitoring solution for databases [Part 02] - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Foglight: Monitoring solution for databases [Part 02]\" \/>\n<meta property=\"og:description\" content=\"Foglight is a powerful and all in one monitoring solution to monitor various IT infrastructure assets like databases, servers, applications and so on. Whenever you need to monitor a special assets like an Oracle database, a Windows server, a Tomcat server or any other component you can do so by adding a Cartridges. A Cartridges [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-02T14:30:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1908\" \/>\n\t<meta property=\"og:image:height\" content=\"685\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Oracle Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oracle Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/\"},\"author\":{\"name\":\"Oracle Team\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/66ab87129f2d357f09971bc7936a77ee\"},\"headline\":\"Foglight: Monitoring solution for databases [Part 02]\",\"datePublished\":\"2018-11-02T14:30:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/\"},\"wordCount\":380,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/04\\\/screen1.png\",\"articleSection\":[\"Database Administration &amp; Monitoring\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/\",\"name\":\"Foglight: Monitoring solution for databases [Part 02] - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/04\\\/screen1.png\",\"datePublished\":\"2018-11-02T14:30:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/66ab87129f2d357f09971bc7936a77ee\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/04\\\/screen1.png\",\"contentUrl\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/04\\\/screen1.png\",\"width\":1908,\"height\":685},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/foglight-monitoring-solution-for-databases-part-02\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Foglight: Monitoring solution for databases [Part 02]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/66ab87129f2d357f09971bc7936a77ee\",\"name\":\"Oracle Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"caption\":\"Oracle Team\"},\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/author\\\/oracle-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Foglight: Monitoring solution for databases [Part 02] - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/","og_locale":"en_US","og_type":"article","og_title":"Foglight: Monitoring solution for databases [Part 02]","og_description":"Foglight is a powerful and all in one monitoring solution to monitor various IT infrastructure assets like databases, servers, applications and so on. Whenever you need to monitor a special assets like an Oracle database, a Windows server, a Tomcat server or any other component you can do so by adding a Cartridges. A Cartridges [&hellip;]","og_url":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/","og_site_name":"dbi Blog","article_published_time":"2018-11-02T14:30:42+00:00","og_image":[{"width":1908,"height":685,"url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen1.png","type":"image\/png"}],"author":"Oracle Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Oracle Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/"},"author":{"name":"Oracle Team","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee"},"headline":"Foglight: Monitoring solution for databases [Part 02]","datePublished":"2018-11-02T14:30:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/"},"wordCount":380,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen1.png","articleSection":["Database Administration &amp; Monitoring"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/","url":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/","name":"Foglight: Monitoring solution for databases [Part 02] - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen1.png","datePublished":"2018-11-02T14:30:42+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen1.png","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/screen1.png","width":1908,"height":685},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/foglight-monitoring-solution-for-databases-part-02\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Foglight: Monitoring solution for databases [Part 02]"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee","name":"Oracle Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","caption":"Oracle Team"},"url":"https:\/\/www.dbi-services.com\/blog\/author\/oracle-team\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/11740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=11740"}],"version-history":[{"count":0,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/11740\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media\/11743"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=11740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=11740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=11740"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=11740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}