LogInsight - agents in Group and manage configs agent by group

LogInsight currently offers an option of configuration of the agent push: "Administration > Agents > Agent Configuration.

It would be good to have the ability to group the agents and then apply different configurations, by agent group.

Thank you

ildus

Hey Ildus,.

Also remember to open a request to feature on https://loginsight.vmware.com! and mark it as answered

Tags: VMware

Similar Questions

  • Agent and Manager of JVMD

    I read the Setup Guide Basic OEM Cloud Control on JVMD Manager and Agent. I'm looking to see if I need to put in place or not. Also, I understand the basics.

    We have an Application of Siebel CRM using Oracle BI statement. According to our administrator Siebel, cause install JDK installation. It said that Siebel uses Java to make calls to Oracle BI. The JVM Diagnostics would capture these calls and determine when you have latency or is he there is a problem in calls and where the problem may be. Is this correct?

    (There are two) 1 JVMD Manager and Agent JVMD 2 pieces).

    JVMD Manager
    JVMD Manager is deployed on Weblogic Server that is part of the OEM Cloud Control field. Oracle recommends that you do not deploy other applications on the managed server on which Manager JVMD is deployed. Does this mean that its ok to deploy JVMD Manager on the same host as the WHO as long as we do not host another application? I think it's against the 12 c oem licenses, unless you pay for the Weblogic Server licenses separately.

    Agent JVMD
    Agent can only be deployed with the managed server. Is this average target managed? It includes 12 c Clould Contol system OEM. How can I configure to control the system where Siebel/Oracle BI/JDK is installed?

    Thank you.

    No, we need a management suite/pack which includes the JVM Diagnostics to take advantage of the feature against your license targets. It is certainly a key element, especially for use against the containers that you mentioned. Analysis of visibility and lots of deep thread can easily identify issues that would otherwise be very difficult to detect and diagnose in a production environment. Basically, this will be useful for any application that runs in a Java (or even a standalone JVM) container with regard to production-level diagnostics.

    For OBIEE, I highly recommend using the first OBIEE management functionality as it was designed specifically to monitor and manage OBIEE who needs specific surveillance platform even context. However, this does not however mean that other packs such as WLS Management Pack EA will perhaps not as provide extra visibility on the environment.

  • Field unique unique host 1 Admin and managed 2 weblogic cluster

    Hello

    I am configuring the Manager node for automation of graceful start and stop of admin and the managed server.

    weblogic cluster configured on a single host machine. Configure an admin and 2 managed server. It contains an area of application.

    Admin urt is http://hostname:9001 / Agile

    Management 1 http://hostname:7001 / Agile

    Run 2 http://hostname:8001 / Agile

    Manager node that is configured outside of the folder of weblogic

    Created nodemanager properties file and file field path to the node of file field.

    In addition, added startup script, set the script to start true and assigned to the strartup for the admin server script.

    Path of the application domain registered with all the admin domain Manager node

    In the Console, have set up one machine and mapped all three server on the machine.

    active crashrecovery true

    Later I started the management nodes. He has not started the administration server.

    began to admin server manually,

    A mapped admin nodemanader in Server Manager class path, so that I can start the managed server.

    My JMX managed server setting is

    DCOM. Sun.Management.jmxremote - Dcom.sun.management.jmxremote.port = 9896 - Dcom.sun.management.jmxremote.authenticate = false - Dcom.sun.management.jmxremote.ssl = false

    My JMX managed service setting is

    -Dcom.sun.management.jmxremote - Dcom.sun.management.jmxremote.port = 9899 - Dcom.sun.management.jmxremote.authenticate = false - Dcom.sun.management.jmxremote.ssl = false

    I am getting below error

    *********************************************************************************************************************************************************************************

    CLASSPATH=/ag3/app/Oracle/Middleware/patch_wls1211/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/ag3/app/Oracle/Middleware/patch_ocp371/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/ag3/app/jdk1.7.0_55/lib/tools.jar:/ag3/app/Oracle/Middleware/wlserver_12.1/server/lib/weblogic_sp.jar:/ag3/app/Oracle/Middleware/wlserver_12.1/server/lib/weblogic.jar:/ag3/app/Oracle/Middleware/modules/features/weblogic.server.modules_12.1.1.0.jar:/ag3/app/Oracle/Middleware/wlserver_12.1/server/lib/webservices.jar:/ag3/app/Oracle/Middleware/modules/org.apache.ant_1.7.1/lib/ant-all.jar:/ag3/ app/Oracle/Middleware/modules/net.sf.antcontrib_1.1.0.0_1-0b2/lib/ant-contrib.jar:/ag3/app/Oracle/Middleware/patch_wls1211/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/ag3/app/Oracle/Middleware/patch_ocp371/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/ag3/app/jdk1.7.0_55/lib/tools.jar:/ag3/app/Oracle/Middleware/wlserver_12.1/server/lib/weblogic_sp.jar:/ag3/app/Oracle/Middleware/wlserver_12.1/server/lib/weblogic.jar:/ag3/app/Oracle/Middleware/modules/features/weblogic.server.modules_12.1.1.0.jar:/ag3/app/Oracle/Middleware/wlserver_12.1/server/lib/webservices.jar:/ag3/app/ Oracle/Middleware/modules/org.apache.ant_1.7.1/lib/ant-all.jar:/ag3/app/Oracle/Middleware/modules/net.sf.antcontrib_1.1.0.0_1-0b2/lib/ant-contrib.jar::/ag3/app/Oracle/Middleware

    PATH=/ag3/app/Oracle/Middleware/wlserver_12.1/server/bin:/ag3/app/Oracle/Middleware/modules/org.apache.ant_1.7.1/bin:/ag3/app/jdk1.7.0_55/jre/bin:/ag3/app/jdk1.7.0_55/bin:/ag3/app/Oracle/Middleware/wlserver_12.1/server/bin:/ag3/app/Oracle/Middleware/modules/org.apache.ant_1.7.1/bin:/ag3/app/jdk1.7.0_55/jre/bin:/ag3/app/jdk1.7.0_55/bin:/usr/local/bin:/bin:/usr/bin:/usr/local/sbin:/usr/sbin:/sbin:/ag3/app/jdk1.7.0_55/bin/

    Your environment has been defined.

    Error: Exception thrown by the agent: java.rmi.server.ExportException: Port already used: 9899; nested exception is:

    exception java.net.BindException: address already in use

    < 16 October 2015 01:38:12 > < FINEST > < NodeManager > < waiting for the process to die: 22611 >

    < 16 October 2015 01:38:12 > < INFO > < NodeManager > < server failed during startup, so won't be restarted >

    < 16 October 2015 01:38:12 > < FINEST > < NodeManager > < returned runMonitor, finished setting = true and notification servers >

    *********************************************************************************************************************************************************************************


    Is it possible that I can start my server managed by Admin? If Yes, what are the steps I have to do to make it viable.

    In addition, which is just how to configure the node Manager autostart administrator and Manager on the same host and server with the single domain.

    NodeManager cannot start Admin and the managed server automatically when you gracefully stop the managed server.

    Recovery setting enabled the crash work in case of a sudden collapse of the host itself. This does not mean that NodeManager servers will automatically start every time. Crash Recovery also works for servers that are started by using Nodemanager only.

    For:

    Error: Exception thrown by the agent: java.rmi.server.ExportException: Port already used: 9899; nested exception is:

    exception java.net.BindException: address already in use

    As says error itself port is already in use. Be sure to use the single port and also check if a process taking into this port.

    See you soon,.

    Naveen

  • How to segragate VM of each other AND Management &amp; iSCSI network traffic?

    I want to test how I can keep VM isolated from each other AND the segments of iSCSI network and management... It's just a proof of concept, so I not be using redundant paths.  I want to know how I can keep all my shelter of the attackers 'would '?  that is if one of the virtual machines becomes "compromise" How could I isolate all "would be attackers" to travel to other virtual machines or networks of management/iSCSI?   Is there a way to create each virtual machine in a VIRTUAL LAN on the ESX host? Or is there a better way?

    For the installation of the physical hardware - sounds?

    http://www.gliffy.com/pubdoc/1608095/L.jpg

    TahoeTech wrote:

    "So, to make sure that I understand...". I'll install VMware ESX on

    the physical host machine and then create 3 vSwitches which will be

    related to 1 physical NETWORK card by vSwitch? "

    Since I only need to the DMZ network available to VMS - must - I still 3 vSwitches?

    Yes, one for virtual machines, one for management and one for iSCSI. You may combine up to vSwitches (2) combining management and iSCSI, but it is not recommended.

    The host machine does the iSCSI storage to virtual machines as a "disk"?

    More or less, Yes. When you create a virtual machine, you need to configure the disks for this virtual machine. You will be asked which data source to use, and you choose the iSCSI data store, that you create when you set up the data store and iSCSI.

    The host uses the vSwitches? I thought that the host machine could use physical NETWORK cards... i.e. Teddy 1 would be management and Teddy 2 would be iSCSI, Teddy 3 would be linked to a vSWITCH for virtual machines?

    Yes the host use the vSwitch, after all the console, etc. is a virtual machine its self

    Virtual machines will never see a teddy bear. You want to assign a vNIC to the virtual machine when you create the virtual machine. The vNIC is connected to a group of ports, which in turn is connected to a vSwitch, which in turn is connected to a teddy bear.

    The virtual machines do NOT need access to the networks of management or iSCSI (I don't think)?

    Fix.

    The management network connects to ESX physical HOST (Teddy 1) in order to control the accurate virtual machines?

    The management of the network give you access to control everything via vCenter or the VI client or the command line.

    And the iSCSI network connects to the physical ESX HOST (Teddy 2) where the ESX host will present data warehouses to virtual machines as 'physical' disks correct?

    Yes, it will look like just a physical disk to the VM operating system.

    I guess what I'm trying to understand, or how I see it is that the host ESX is the only machine that has 'see' the iSCSI network?

    The VMKernel manages iSCSI seamlessly. Guests don't need to know anything iSCSI.

    Virtual machines see drives that presents the ESX host? For the virtual machines do not need is access to the iSCSI network (unless I need to install additional storage or drive shared etc...)

    Fix.

    any idea when VI4 is scheduled to be released?

    Rumor is soon. But unless there is there a feature that radically changes your design I wouldn't get too worried about it.

  • DTD for data-management-config. XML

    Is due to the structure of data-management - config.xml file somewhere? I wonder why this file (as well as all other FDS config files) is not validated against a DTD or XML schema?
    I am trying to configure several parameters for a method of destination server, so far without success. Subsequent attempts have failed

    < Server >
    < fill method - >
    < name > getFolderContent < / name >
    java.lang.String; boolean < params > < / params >
    < / fill method >
    < / Server >

    < Server >
    < fill method - >
    < name > getFolderContent < / name >
    < params > java.lang.String, boolean < / params >
    < / fill method >
    < / Server >

    < Server >
    < fill method - >
    < name > getFolderContent < / name >
    java.lang.String < params > < / params >
    < params > Boolean < / params >
    < / fill method >
    < / Server >

    I want to pass a Java string and a Boolean (primitive). What is the correct syntax? Thank you.

    I think you need something like this: java.lang.Boolean, java.lang.String

  • How can I locate and manage my files?  I downloaded a file manager application, but I can not understand how to get my pad, s files appears.

    I have an OS9-iPad 9.3.1-, mem 64g

    I'm used to be able to locate my files, that are currently using the command or modify.

    However, I can't do in the iPad.

    I downloaded a few applications Manager file, thinking that one of them would be

    help me to locate and manage my files, but none of them can locate files on my iPad.

    I have files PDF and Kindle, for example - but I can not only locate raise them in some readers.

    However... Can I use a file manager application to show me my files and allows me to use or modify them?

    I have to do everything on your laptop, then download in my pad?

    .. can where I get an application to the list of my files for me?

    Apple has blocked 'file manager apps' access directly at the beginning of iOS with iOS 8.3 file system.

    The only way that some files are accessible through these types of applications is if the files are marked for sharing files (accessible via iTunes on Mac/PC) by the developer of the app. Actually, you don't need a ' file manager app "since the sharing of files in iTunes already allows to access files directly via iTunes in the first place.

  • the function of the navigation bar AutoComplete works at all, I tried to go through the "privacy settings" and "" subject: config. ' "

    I've just updated to the latest version and I have a mac osx 10.4. Since this update the navigation bar does with a history, bookmarks or anything at all. All the settings in privacy and about: config was already enabled for AutoComplete work...

    See http://kb.mozillazine.org/Locked_or_damaged_places.sqlite

  • I have to often go into users and manage my network passwords to delete the stored credentials. is there a way to stop the ability to save my password?

    I have several users on xp sp3 with ie8 using a single connection, which is non-negotiable. I have to often go into users and manage my network passwords to delete the stored credentials. y at - it a way to stop the possibility of using save it my password box? It is on an intranet and internet content settings explore have no effect.

    Hello fyrman24RRW,

    Thanks for the return of the response.  Here is a link that I hope will help.  If this is how you handle this please let us know. Please let us know status.

    http://support.Microsoft.com/kb/306541

    Thank you

  • Every 15 minutes, I wonder: register for your PC to optimize your experience of ownership and management.

    Every 15 minutes, I wonder: register for your PC to optimize your experience of ownership and management.

    I'm already registered. I re-recorded if it helped, but I'm still getting messages.

    Google returns an exchange of views, but none of it is significant. I tried these tips and they do not work.

    This is on a HP Pavilion dv9260us running Windows Vista Ultimate 64-bit.

    How can I get rid of the annoying popup to recording?

    Hello

    The pop up is usually run as a scheduled task, so open windows control panel, open administrative tools, and open Task Scheduler.  Click once on the Task Scheduler Library to highlight and look for an entry called "Webreg".  Left-click this time to highlight it, then right click and select Disable.  Restart the Pc for the change to take effect.

    Kind regards

    DP - K

  • What is the best, safest and easiest way to store and manage passwords electronically?

    I know there are a lot of programs rated password and management services on the market for Windows users, but I hesitated using an any of them because I don't know how security, they are really - it seems as if a sneaky programmer could easily include a hidden back door hack that would allow them to fly without the knowledge of the user. Unfortunately, these days, data breaches continuing in societies and in the sites of the Government, demonstrated with some certainty that there is no really safe, more.

    Keep a written list of password is a little awkward; He takes each password to manually write down, then looked up and typed to the computer, and if you lose the paper list, you're RUINED. Keep an email list of password in a document, it's easy and simple.  But the document must surely stay offline, not on the hard drive of the computer.

    For lack of a better idea, I'm currently a USB key where I keep a document containing all of my passwords for accounts website and in some cases, for applications.  I plug briefly when I need a password: with preview pane of Explorer turned on, the text content of the file password is visible in the preview for a quick search, and copy/paste pane. Then I immediately remove and unplug the USB.

    Somehow it makes feel me a little safer, but it's probably a crazy illusion: after all, any time he connected and mounted, it is probably subject to be hacked. And even after I disassemble and remove the USB, I wonder... do the contents of the file that was posted in the Preview Panel, persist as a latent image in my paging file in Microsoft Office or elsewhere on my computer, where a potential hacker could access?

    Also, I realize that the password itself, which I copied to the Clipboard, is potentially at risk, as well.

    And, of course, there is the question of whether and how the USB itself must be encrypted and password protected... but also firmly backed up to somewhere else, because ultimately any USB drive can and probably will fail.

    Is there a really secure way, not involving not third-party software, Web sites, or "cloud services", to keep a list of password accessible electronically, which is absolutely free of breach of security, the password protected or encrypted and safely backed up and always stored where I personally in my immediate fix possession?  What Miss me?

    "Userland",

    I don't think that you are missing something.  I don't think that it is possible to get a definitive answer to your question.  The best policy is impossible to establish when it comes to the protection of password that hackers are as unpredictable as the burglars.  I offer you the results of my investigation into the matter simply as material for thought.

    I do the same as you except that I log out * of the internet before connecting the USB to open the password file [just in case I'm on a Web page that was set up to allow an overview of the open documents capture].  This USB never lets me and his backup copy lives behind the radiator.

    * That I am connected through WiFi just turn it off without leaving the Web page that I want, connect the USB cable, copy the password to the Clipboard, unplug the USB, turn on WiFi, paste the password in and then copy from the boring text in the Clipboard to replace the password it.

    I studied the effectiveness of passwords for MS Office 2007, a couple of years ago because I used a file protected by password to store all of my passwords.  I reached decisions for Excel files & password-protected but, I stopped using Access I could find nothing to refute the claims that small Access databases can be broken by other than force attacks attacks online.

    password length 18 non-dictionnaire-strings with letters [both upper & lower case], numbers and common punctuation, at least 2 symbols

    password length 19 non-dictionnaire-strings with [both upper & lower case] letters, numbers, punctuation ordinary, without any symbol

    21 password length with letters [both upper & lower case] non-dictionnaire-strings, numbers, without punctuation, without any symbol

    These password types-lengths would have less chance of being 1/1,000,00 brute force cracked [combined with the attack by dictionary] in years thirty systems sophisticated such as those described in password online decoding & services security guidance documents I discovered.

    The assumptions in my analysis are-

    1 they don't judge me a value of more than 100 hours of dedicated effort that offer some of these services to password decoding standard service.

    2 current hacker boasts of its capabilities is accurate

    3 they have control of the power of calculation 1 000 000-2 000 000 equivalent-PC [a very large botnet, a network of data centers,...]

    4 my analysis assumes that you are using MS Office 2007, but improvements to the password in the 2013 office security mechanisms mean that my analysis is looking for the side dark security if I ever upgrade.  Frustrating, I was not able to quantify the degree of improvement.

    5-speed of calculation will continue to double each year for the next thirty years-

    "Moore's law" is the observation that, in the history of computer hardware, the number of transistors on integrated circuits double about every two years.  Intel Executive David House predicted then 18 months for a doubling of the CPU performance (being a combination of the effect of several transistors and them being faster). I assumed a double each year 1 purely for simplicity of calculation, so my results apply in fact to a period of more than 30 years given hypothesis "right" of a Moore.

  • Adding and managing printing in ePrint Center applications

    Here is a video on add and manage applications print using ePrint Center (EPC).   He lead one through the process of access to the EPC, adding apps and how to remove an unwanted application. It will also show a way to learn more about an app before you add the application to the printer. The video will also show you how to rearrange the order of the applications on the screen of the printer.

    I hope that the community find this video useful.

  • Creative cloud Office do not show App impossible to view and manage the app via the desktop, the wheel is idling

    Unable to view and manage the app via the desktop, the wheel is idling. Mac os 10.11.1

    Hello

    Please check the help below document:

    Does not open App | Wheels of progress turn continuously

    You can also view the nets below where this issue has been addressed:

    Adobe Creative Cloud / Desktop App / Home Screen: constant spinning wheel

    Creative Cloud Desktop App taped blue spinning wheel after update.

  • How to get the behavior as vCenter Orchastrator: Global discovers with layout road, summary and manage tab.


    Hello

    I want to build the user interface that will work exactly as vCenter Orchastrator. When I click on my plugin icon on the overall vision, it must open the tabs like: Getting Started, summary and manage.

    Application VCO please check you will get them all the required information, how to build the custom etc. extension point...

  • Creative issues cloud Installer and Manager of applications, more troubleshooting ideas?

    More troubleshooting ideas?

    Questions cloud Installer and Manager of creative applications


    CONTEXT:

    • I have a creative cloud membership.* Update

    • I need to update 2014 CC Photoshop and Adobe Photoshop CC (also for Illustrator)

    • I don't have a Manager of Application CC any longer.  My application files show the former CC app and the uninstall application alias only.   Their removal has not helped

    PROBLEM:
    What is going on?  Using a new Installer of creative cloud to get a new Application CC Manager the blue download bar starts, but breaks away. I got the download from 51 percent bar once, but now it breaks to the top immediately.

    Photo below shows the top bar of the screen of the computer with a menu drop-down empty where the creative cloud should display a list of Adobe applications.

    Screen Shot 2015-08-23 at 3.08.08 PM.png

    What's not?

    The talk page has suggested something that still works.

    All I can call at Adobe?  Frustrating!

    * August 2015, renewed.

    Hello

    Please, try these steps and see if it helps:

    1 force quit Adobe all processes in the activity monitor (for example, CC, Core sync, the broker CC library, Office, Adobe, Adobe CPI, demon Adobe Crash etc..)

    2-go to: Finder > Applications > utilities > Adobe installer > uninstall Adobe Creative cloud (if problems uninstall Trash)

    3-go to: Finder > Applications > utilities > (delete these two folders - creative cloud Adobe and Adobe Application Manager )

    4 - right click on the Finder icon, then select the "Go - To" folder. You will get a text box, type in the following command and then press the 'return '. ("Not to be missed ~ symbol")

    ~/Library (It will open the folder of the user's library.)

    5. browse to the Application Support > Adobe > trash folder OOBE and AAM Updater folder so

    6. new > right-click on the icon in the Finder and select "go to" folder option. > you will get a text box, type in the following command and then press the 'return '.

    / library (It will open the library system folder.)

    7. browse to the Application Support > Adobe > trash folder OOBE and Adobe Application Manager / after that, rename the SL-STORE like SL-STORE_OLD

    8 - go to the Apple icon > System Preferences > privacy and security > firewall > OFF (to do this, you will need to click on the padlock in the lower left of this machine and then enter your mac password)

    9 - go to the Apple icon > System Preferences > Security and privacy > General > allow applications downloaded on should be put on ANYWHERE

    10 - Make sure of course there is no other program security Internet enabled - if it is then go ahead and launch CC app and login and check (check your extensions as well id browser it disable any toolbar security or advertising, blocking of extensions you installed them)

    Adobe 11 - run cleanup tool. > If so, select "Adobe Application Manager for Mac OS X 10.6 ' and then click on"Clean up selected. "

    http://download.Macromedia.com/SupportTools/cleaner/Mac/AdobeCreativeCloudCleanerTool.dmg

    12 - Click on the link below and download Creative Cloud Installer file and use them to install the creative Cloud Desktop application.

    https://ccmdls.Adobe.com/AdobeProducts/KCCC/1/OSX10/CreativeCloudInstaller.dmg

    Let us know if that helps.

    Kind regards

    BANI

  • Portfolios - what is the difference between the password, certificate of security and management of the lifecycle of the rights Adobe?

    I would like to use Acrobat DC Pro to create secure portfolios. These will be used to store payable files that should not be considered by most employees. What is the difference between the password, certificate of security and management of the lifecycle of the rights Adobe?

    Password encryption methods, certificate of security and Adobe lifecycle management of the rights for the portfolios are the same as for a single PDF file. If you are a novice to the encryption Acrobat Adobe Acrobat X Pro * choosing a method of security will help. You can have the portfolio itself unencrypted and encrypt some or all files with whatever method you choose, or encrypt the portfolio himself and, still encrypt or not encrypt files that you place in the portfolio. Each encrypted file can use the same or different encryption with the same or different credentials method. You can encrypt portfolio encrypt attachments only. In this case the portfolio itself is not encrypted, but all the files in the portfolio are encrypted with the same method/diploma. When a user opens this portfolio list of files appears. When the user clicks on a file in the list Acrobat checks credentials (in the case of password security, he asks the password) before opening the file.

Maybe you are looking for