Discussed below are the prerequisites for managing the various monitors:
Note:IPv6 support is available for all monitors.
While monitoring Glassfish application servers, make the following changes in the domain.xml file and then restart it:
The configuration line should look like this:
<jmx-connector accept-all="true" address="0.0.0.0" auth-realm-name="admin-realm" enabled="true" name="system" port="8686" protocol="rmi_jrmp" security-enabled="false"/>
The prerequisites for managing the various versions of JBoss server are:
To monitor JBoss, the http-invoker.sar should be deployed in the JBoss Server. The application (http-invoker.sar) is by default deployed in the JBoss server.
If the http port of the JBoss server is changed then the port number in the attribute InvokerURLSuffix should also be modified in <JBOSS_HOME>/server/default/deploy/http-invoker.sar/META-INF/jboss-service.xml file.
To monitor JBoss 5.x version, jbossagent.sar should be deployed in JBoss server. To deploy, follow the steps below:
Note: JBOSS 6 EAP should be added as JBoss 7
To monitor JBoss 6.x version, jbossagent.sar should be deployed in JBoss server. To deploy, follow the steps below:
Example:
<bean class="org.jboss.services.binding.ServiceBindingMetadata">
<property name="serviceName">
jboss.remoting:service=JMXConnectorServer,protocol=rmi
</property>
<property name="port">1090</property>
<property name="description">RMI/JRMP socket for connecting to the JMX MBeanServer</property>
</bean>
JBoss Version 7.x and above (EAP version 6 and above)
Standalone Mode:
EAP Setup:
Applications Manager uses the Dynamic Monitoring Service (DMS) provided by Oracle Application Server to monitor the same. For this reason, the DMS Servlet has to be made accessible to the system where the Applications Manager is running.
To enable the access, please follow the instructions provided below
[The instructions are referred from the Oracle website: http://docs.oracle.com/cd/B14099_19/core.1012/b14001/monitor.htm]
By default, the dms0/AggreSpy URL is redirected and the redirect location is protected, allowing only the localhost (127.0.0.1) to access the AggreSpy Servlet.
To view metrics from a system other than the localhost you need to change the DMS configuration for the system that is running the Oracle Application Server that you want to monitor by modifying the file $ORACLE_HOME/Apache/Apache/conf/dms.conf on UNIX, or%ORACLE_HOME%\Apache\Apache\conf\dms.conf on Windows systems.
The following example shows a sample default configuration from dms.conf. This configuration limits AggreSpy to access metrics on the localhost (127.0.0.1). The port shown, 7200, may differ on your installation.
Example: Sample dms.conf File for localhost Access for DMS Metrics
# proxy to DMS AggreSpy
Redirect /dms0/AggreSpy http://localhost:7200/dmsoc4j/AggreSpy
#DMS VirtualHost for access and logging control
Listen 127.0.0.1:7200
OpmnHostPort http://localhost:7200
<VirtualHost 127.0.0.1:7200>
ServerName 127.0.0.1
By changing the dms.conf configuration to specify the host that provides, or serves DMS metrics, you can allow users on systems other than the localhost to access the DMS metrics from the location http://host:port/dms0/AggreSpy.
Caution: Modifying dms.conf has security implications. Only modify this file if you understand the security implications for your site. By exposing metrics to systems other than the localhost, you allow other sites to potentially view critical Oracle Application Server internal status and runtime information.
To view metrics from a system other than the localhost (127.0.0.1), do the following:
Find below a sample updated dms.conf that allows access from a system other than the localhost (127.0.0.1)
Example: Sample dms.conf File for Remote Host Access for DMS Metrics:
# proxy to DMS AggreSpy
Redirect /dms0/AggreSpy http://tv.us.oracle.com:7200/dmsoc4j/AggreSpy
#DMS VirtualHost for access and logging control
Listen tv.us.oracle.com:7200
OpmnHostPort http://tv.us.oracle.com:7200
<VirtualHost tv.us.oracle.com:7200>
ServerName tv.us.oracle.com
Restart, or stop and start the Oracle HTTP Server using Application Server Control Console or using the Oracle Process Manager and Notification Server opmnctl command.
For example,
%opmnctl restartproc process-type=HTTP_Server
or
%opmnctl stopproc process-type=HTTP_Server
%opmnctl startproc process-type=HTTP_Server
After performing the above steps, please ensure that you are able to access the URL http://<host>:7200/dmsoc4j/AggreSpy from the Applications Manager system.
To check if a user has select privilege:
We suggest you to execute the below query directly in your Oracle machine and check if a connected user has select privilege or not :
select TABLE_NAME,PRIVILEGE from user_tab_privs_recd where table_name in ('ALL_SCHEDULER_JOB_RUN_DETAILS','V_$RMAN_BACKUP_JOB_DETAILS','ALL_SCHEDULER_JOBS','ALL_SCHEDULER_RUNNING_JOBS');
If there is no row selected or privilege column does not have select value for the above table_name columns, then the user doesn't have privilege to access the table.
To grant Privilege:
Use the following query:
grant select on <tablename> to <username>;
Example:grant select on V_$RMAN_BACKUP_JOB_DETAILS to monitoruser;
Note: As above, you have to give grant permission on all the tables mentioned in the above query.
Browse through the following links to monitor Tomcat server for respective versions:
To monitor Tomcat 7.x and above, an application named Manager must be running in it for Applications Manager to monitor the Tomcat server. By default, this application will be running in the server. If you have customized the Manager application (Eg. \qamanager), then you can use the option "Tomcat Manager Application URI" in the client, for Applications Manager to monitor the Tomcat server.
To allow requests from specific client addresses in the Tomcat server, add the IP address of the host machine where Applications Manager is installed to the allow attribute in the context.xml file. This file is located in the CATALINA_HOME/webapps/manager/META-INF/ directory. By default, the Tomcat server allows requests from all client addresses.
Default:
<Valve className="org.apache.catalina.valves.RemoteAddrValve" allow=".*" />
To allow a specific client address:
<Valve className="org.apache.catalina.valves.RemoteAddrValve" allow="192\.168\.1\.100" />
To allow multiple client addresses:
<Valve className="org.apache.catalina.valves.RemoteAddrValve" allow="192\.168\.1\.100|192\.168\.1\.101|10\.0\.0\.1" />
To allow multiple client addresses and deny specific client addresses:
<Valve className="org.apache.catalina.valves.RemoteAddrValve" deny="192\.168\.1\.100" />
Example:
Default configurations in tomcat-users.xml in Tomcat Server:
<tomcat-users><role rolename="tomcat" /><role rolename="role1" /><user username="tomcat" password="tomcat" roles="tomcat" /><user username="role1" password="tomcat" roles="role1" /><user username="both" password="tomcat" roles="tomcat,role1" /></tomcat-users>
After adding the roles for the "tomcat" user, the modified entries will be as follows:
<tomcat-users> <role rolename="tomcat" /><role rolename="role1" /><role rolename="manager" /><user username="tomcat" password="tomcat" roles="tomcat,manager-gui,manager-jmx" /> <user username="role1" password="tomcat" roles="role1" /> <user username="both" password="tomcat" roles="tomcat,role1" /> </tomcat-users>
On making the configuration changes, restart the Tomcat server.
Now, while adding a new Tomcat monitor, specify both the username and password as tomcat when discovering the Tomcat server.
<Valve className="org.apache.catalina.valves.RemoteAddrValve"allow=".*" />
Note:
1) After adding the Manager role in tomcat-users.xml, you should be able to access the endpoints <Host>:<PORT>/manager/status and <Host>:<PORT>/manager/jmxproxy from the Applications Manager installed machine (Provide manager user credentials).
2) If the application is not accessible, add the following entry in server.xml, under 'Engine' context:
<Realm className="org.apache.catalina.realm.MemoryRealm" />
3) Restart the server and try to access manager application.
4) By default, GZip compression is disabled for Tomcat. To learn how to enable GZip in Tomcat, refer here.
To monitor Tomcat 5.x and 6.x, an application named Manager must be running in it for Applications Manager to monitor the Tomcat server. By default, this application will be running in the server. If you have customized the Manager application (Eg. \qamanager), then you can use the option "Tomcat Manager Application URI" in the client, for Applications Manager to monitor the Tomcat server.
To monitor Tomcat server,
Example:
Default configurations in tomcat-users.xml in Tomcat Server:
<tomcat-users><role rolename="tomcat" /><role rolename="role1" /><user username="tomcat" password="tomcat" roles="tomcat" /><user username="role1" password="tomcat" roles="role1" /><user username="both" password="tomcat" roles="tomcat,role1" /></tomcat-users>
After adding the roles for the "tomcat" user, the modified entries will be as follows:
<tomcat-users> <role rolename="tomcat" /><role rolename="role1" /><role rolename="manager" /><user username="tomcat" password="tomcat" roles="tomcat,manager" /> <user username="role1" password="tomcat" roles="role1" /> <user username="both" password="tomcat" roles="tomcat,role1" /> </tomcat-users>
On making the configuration changes, restart the Tomcat server.
Now, while adding a new Tomcat monitor, specify both the username and password as tomcat when discovering the Tomcat server.
Note:
1) After adding the Manager role in tomcat-users.xml, you should be able to access the endpoints <Host>:<PORT>/manager/status and <Host>:<PORT>/manager/jmxproxy from the Applications Manager installed machine (Provide manager user credentials).
2) If the application is not accessible, add the following entry in server.xml, under 'Engine' context:
<Realm className="org.apache.catalina.realm.MemoryRealm" />
3) Restart the server and try to access manager application.
4) By default, GZip compression is disabled for Tomcat. To learn how to enable GZip in Tomcat, refer here.
Applications Manager agent has to be deployed in Tomcat Servers 3.x and 4.x to monitor them. Moreover, Tomcat 3.x and 4.x needs no user name and password.
To deploy the agent for Tomcat Server 3.x
To deploy the agent for Tomcat Server 4.x
To deploy the agent for Tomcat Server 4.x and Apache server combined
TongWeb data collection is performed using JMX mode. To enable this, ensure that JMX is activated on the TongWeb Server. Include the following JVM arguments in the TongWeb Server startup configuration and restart the server to apply the changes:
-Dcom.sun.management.jmxremote-Dcom.sun.management.jmxremote.port=1099-Dcom.sun.management.jmxremote.ssl=false-Dcom.sun.management.jmxremote.authenticate=false
Click on the following topics to know more about the prerequisites for various versions of WebLogic server.
Follow the steps given below:
You should set the weblogic.disableMBeanAuthorization and weblogic.management.anonymousAdminLookupEnabled variables to true for enabling data collection. Follow the steps given below:
-Dweblogic.disableMBeanAuthorization=true-Dweblogic.management.anonymousAdminLookupEnabled=trueClick here for Sample startWLS.cmd/shYou should set the weblogic.disableMBeanAuthorization and weblogic.management.anonymousAdminLookupEnabled variables to true for enabling data collection. Follow the steps given below:
-Dweblogic.disableMBeanAuthorization=true-Dweblogic.management.anonymousAdminLookupEnabled=true Click here for Sample startWLS.cmd/shIn the remote WebLogic server, navigate to <Weblogic Home>/weblogic92/server/lib directory. From there, copy Weblogic.jar to <Applications Manager Home>\working\classes\weblogic\version9 directory in the machine where Applications Manager is running.
In the remote WebLogic server, navigate to <Weblogic Home>/wlserver/server/lib directory. From there, copy wlclient.jar and wljmxclient.jar to <AppManager Home>\working\classes\weblogic\version12 directory in the machine where Applications Manager is running.
Note:
WebLogic certificate has to be imported to <Applications Manager Home>/working/jre/lib/security/cacerts file. This certificate can be imported through <Applications Manager Home>/bin/WeblogicCertificate.bat/sh files.
Syntax:
WeblogicCertificate.bat [import] [Full path of weblogic server certificate] [alias name]
Example:
C:\Program Files\ManageEngine\AppManager\bin> WeblogicCertificate.bat import "C:\Oracle\Middleware\Oracle_Home\user_projects\domains\MyDomain\root.cer" mykey
Note:
* If customer is monitoring all three versions of weblogic (10.x, 11g, 12C), then get the jars from latest version of WebLogic (Version 12c).
* SSL option is enabled in the UI only for version 9 and above.
The ports that need to be opened when the Weblogic Monitor is behind the firewall: Two-way communication between WebLogic listening port (default : 7001) and Applications Manager web server port (default : 9090).
"%JAVA_HOME%\bin\java" %JAVA_VM% %MEM_ARGS% %JAVA_OPTIONS% -classpath "%CLASSPATH%" -Dweblogic.Name=%SERVER_NAME% -Dbea.home="C:\WebLogic\WL7.0" -Dweblogic.disableMBeanAuthorization=true -Dweblogic.management.anonymousAdminLookupEnabled=true -Dweblogic.management.username=%WLS_USER% -Dweblogic.management.password=%WLS_PW% -Dweblogic.management.server=%ADMIN_URL% -Dweblogic.ProductionModeEnabled=%STARTMODE% -Djava.security.policy="%WL_HOME%\server\lib\weblogic.policy" weblogic.Servergoto finish:runAdmin@echo on"%JAVA_HOME%\bin\java" %JAVA_VM% %MEM_ARGS% %JAVA_OPTIONS% -classpath "%CLASSPATH%" -Dweblogic.Name=%SERVER_NAME% -Dbea.home="C:\WebLogic\WL7.0" -Dweblogic.disableMBeanAuthorization=true -Dweblogic.management.anonymousAdminLookupEnabled=true -Dweblogic.management.username=%WLS_USER% -Dweblogic.management.password=%WLS_PW% -Dweblogic.ProductionModeEnabled=%STARTMODE% -Djava.security.policy="%WL_HOME%\server\lib\weblogic.policy" weblogic.Server
For base deployment:
You have to modify the Performance Monitor Interface (PMI) Specification Level from "None" to "Standard". Then deploy the perfServletApp.ear file, which uses the PMI infrastructure to retrieve the performance information from WebSphere Application Server, in the WebSphere. Restart WebSphere Application Server.
For Network deployment:
You have to modify the PMI Specification Level from "None"to "Standard" in all the WebSphere Servers in Network Deployment. Then deploy theperfServletApp.ear file, which uses the PMI infrastructure to retrieve the performance information from WebSphere Application Server, in any one of the WebSphere Servers in the Network Deployment. Restart WebSphere Application Server.
Note: Steps to check whether WebSphere monitor has been correctly set
To modify PMI specification level:
To deploy perfServletApp.ear:
Make sure that a WebSphere Admin User is added to the monitor group of the perfservletApp, if global security is enabled in Websphere. To do so, go to WebSphere Admin console → Applications → Installed Applications → Choose perfservletapp → Security role to user group mapping → Choose Monitor Role → Associate the admin user → Save directly to the master configuration.
To check the perf servlet output, open the following url from your browser:
http://localhost:<PORT>/wasPerfTool/servlet/perfservlet?connector=SOAP&port=8880 <PORT> - 9080 (Default)
Steps to Check whether Websphere monitor has been correctly set
For Base Deployment:
To ensure whether the PMI & perfServletApp are configured properly in WebSphere, invoke the below URL & check whether the data is returned in XML format.
http://<Host>:<Port>/wasPerfTool/servlet/perfservlet?connector=SOAP&port=<SOAP-PORT>
where
For Network Deployment:
To ensure whether the PMI & perfServletApp are configured properly in WebSphere, invoke the below URL & check whether the data is returned in XML format.
http://<Host>:<Port>/wasPerfTool/servlet/perfservlet?connector=SOAP&port=<NetworkDeployerSOAP-PORT>&HOST=<NetworkDeployerHost>
where
Note: Also check whether WebSphere admin user is added to the monitor group of the perfservletApp.
How to locate SOAP Port?
1. Login to Admin console
2. Expand the server link on left side tree. Click on Application Servers
3. In Base mode, various WebSpheres will be listed down. Click on the WebSphere's name- > Under Additional Properties, click on End Points link -> click on SOAP connector address. You can get the SOAP port from there.
4. In Network Deployment mode, Click DMGR - > Under Additional Properties, click on End Points link -> click on SOAP connector address - You can get the SOAP port from there.
How to find the HTTP Transport port?
1. Login to Admin console
2. Expand the Server link on left side tree, Click on Application Servers
3. Various WebSpheres will be listed down. Click on the WebSphere's name- > Under Additional Properties, click on Web Containerlink -> click on HTTP Transports link. You can get the HTTP port from there.
For Base mode:
For Network deployment mode:
To enable Global security:
JMX MBeans are used to monitor Resin Application server's activity. To enable JMX, open Resin.XML and add the below JVM arguments or start Resin.exe with the below JVM arguments
-Dcom.sun.management.jmxremote.port=1099 -Dcom.sun.management.jmxremote.ssl=false
-Dcom.sun.management.jmxremote.authenticate=false
Replace 1099 with the actual port number of the JMX agent
JMX MBeans are used to monitor Jetty server's performance. To enable JMX,
To monitor Apache Geronimo Server, add the following java runtime options to the startup file of your application:
-Dcom.sun.management.jmxremote-Dcom.sun.management.jmxremote.port=1999-Dcom.sun.management.jmxremote.ssl=false-Dcom.sun.management.jmxremote.authenticate=false
Replace 1999 with the any free port available.
You can find the startup file here : <Geronimo-Installation-Directory>/bin

To monitor Microsoft .NET Framework, the user must have Administrator privileges. To monitor the Microsoft .NET framework, follow the below given steps:
Install/enable .NET Framework 3.5 on Applications Manager installed machine: (This needs to be done even if you have installed the latest version. To know more click here.)
Note: The .NET Framework 3.5 prerequisite applies only to Applications Manager versions up to 173100.
Note: If you want to monitor as a non-admin user, follow the steps mentioned in this link.
For monitoring Cassandra database server, the given prerequisites should be followed:
To perform effective monitoring of DamengDB in Applications Manager, the monitor user must be granted the Data Viewer privilege. Refer here to know more about how to grant this privilege to the newly created user.
A DB2 user with SYSMON instance level authority is required for monitoring DB2 server.
To monitor 'Long Running Queries', the user must have the following authorization:
To monitor 'Session details', the user must have any one of the following authorizations:
Minimum User Privileges:
Granting a privilege to user:
Login to DB2 command line processor and execute below statement:
GRANT <authority> ON DATABASE TO USER <user-name>
where, <authority> can be any one of the following: CONNECT, LOAD
To learn how to grant a privilege to a user, refer here.
JDBC Driver:
To monitor IBM Informix DB, make sure that the ifxjdbc.jar file is present in the location:<ProductHome>\working\classes directory. The jar file can be copied from the IBM Informix installation location, <IBM Informix Home>\jdbc\lib\jar. Restart Applications Manager after copying the file.
User Privileges:
To add an Informix DB monitor, a user requires Connect database-level privileges and he should be able to access sysmaster database.
If Kingbase database is installed in remote server, it should allow connections from Applications Manager installed server. For this follow the steps given below:
User privileges required: Applications Manager uses Kingbase database's subsystem statistics collector & some built-in views such as pg_class, pg_database, pg_indexes, pg_locks, pg_namespace, pg_proc, pg_replication_slots, sys_stat_statements, pg_tables, pg_trigger, pg_user to monitor Kingbase database server activity. The user provided for monitoring should have at least read-only access to statistics collector and above mentioned views.
For Kingbase version below 10,
For Kingbase version above 10,
Extensions to be enabled in Kingbase Database server:
For monitoring a Microsoft SQL database server, the SQL user account used for monitoring should have access to MASTER, MSDB and DISTRIBUTION databases. Users should have the following roles:
sysadmin server role : Go to SQL Server Management Studio → Go to Logins → Choose the respective user and open properties → Go to 'Server roles' and select sysadmin role → Save the option and proceed with adding the SQL monitor in Applications Manager.
(OR)
1. Provide VIEW SERVER STATE permission on the server to the respective SQL user. To grant VIEW SERVER STATE, you can use any of the following methods :
(i) Execute the following query:
GRANT VIEW SERVER STATE TO username;
(ii) In SQL Management Studio for user Choose Properties → Securables → Click Add ( under Securables ) → Choose 'All objects of the Types...' → Choose Servers → Choose Grant for 'View server state' permission.
2. To monitor Database metrics, we need to provide either one of the following permissions.
(or)
3. Provide the following DB roles:
4. To monitor AlwaysOn Availability Groups in Applications Manager, the admin must provide view any definition permission on the server to the respective SQL user. To do so, you can use any of the following methods:
(i) Execute the following query:
GRANT VIEW ANY DEFINITION TO username;
(ii) In SQL Management Studio, for user, choose Properties → Securables → click Add ( under Securables ) → choose 'All objects of the Types...' → Choose Servers → Choose Grant for 'view any definition' permission.
5. To monitor Cluster details, use the username and password of the Cluster Domain Administrator. The account should have permission to execute WMI queries on the root/mscluster namespace on cluster server nodes. Enable Firewall access for monitoring. The following are the ports required for monitoring:
Supported Versions: MongoDB 4.x, 5.x, 6.x, 7.x, and 8.x. We support mongod and mongos services.
If the MongoDB instance is authenticated, the User should have 'clusterMonitor' role to fetch performance metrics of MongoDB.
The password entered in Applications Manager DOES NOT need to be 'percent encoded' like a typical MongoDB connection string. Refer to know more.
Note: MongoDB versions 3.4 & above are not supported in 32-bit Windows and Linux OS.
Supported Versions: MySQL version 5.0.15 and above, MariaDB 10.4 and above.
Customers using Applications Manager version 170400 and above have MariaDB Connector/J JDBC Driver for MySQL and MariaDB monitoring by default.
For customers using versions below 170400 or who wish to utilize the MySQL Connector/J JDBC Driver for MySQL monitoring, the following prerequisites apply:
Note:
To set up a MySQL/MariaDB monitor in Applications Manager successfully, ensure that the following preconditions are met:
To enable these privileges, execute the following queries in the remote MySQL Server:
Note: Before proceeding with the queries, kindly note the following:
MySQL version 8.0 and above:
CREATE USER '<user>'@'<host>' IDENTIFIED BY '<password>';
MySQL version 5.7:
CREATE USER <user>@'%' IDENTIFIED BY '<password>';
MySQL version below 5.7:
INSERT INTO user (Host,User) VALUES('<host>','<user>');
Execute the following to grant the privileges required for a DB-user to monitor a MySQL DB-sever:
For more information, please refer to the MySQL documentation.
Prerequisites for MySQL SSL server monitoring:
Execute the following to enable the tls_option for the user account:
ALTER USER '<user>'@'<host>' REQUIRE <tls_option>;
Note: Possible <tls_option> values include (SSL | X509 | CIPHER 'cipher' | ISSUER 'issuer' | SUBJECT 'subject')
For MariaDB:
To monitor replication and database details, the monitoring user should have privileges to the REPLICATION SLAVE, REPLICATIONCLIENT, SELECT, and SHOWDATABASES commands. Permissions can be granted by executing the following command:
Note:
Prerequisites for Neo4j versions 4 and 5:
A user with CONNECT and SELECT_CATALOG_ROLE roles are required for Oracle monitoring in Applications Manager. Configure a user with these permissions and use the credentials in Applications Manager
Login as SYS user and run the following queries:
Note:
Login as SYS user and run the following queries:
SYS or SYSTEM or Common user with the CONNECT and SELECT_CATALOG_ROLE roles is required to monitor Oracle PDBs. To do so, execute the following commands:
CREATE USER C##APPMON IDENTIFIED BY **PASSWORD** CONTAINER=ALL;
GRANT CONNECT TO C##APPMON CONTAINER=ALL;
GRANT SELECT_CATALOG_ROLE TO C##APPMON CONTAINER=ALL;
To monitor Oracle DB in Oracle RAC cluster, a user with CONNECT and SELECT_CATALOG_ROLE roles are required. Configure a user with these permissions and use the credentials in Applications Manager
To monitor Oracle Pluggable Databases (PDBs) in Oracle RAC cluster, SYS or SYSTEM or COMMON user with CONNECT and SELECT_CATALOG_ROLE roles are required. If COMMON user is chosen for monitoring, then the below privilege has to be provided by connecting to the CDB container with SYS user:
If PostgreSQL is in remote server, it should allow connections from Applications Manager server. For this follow the steps given below:
Check value of configuration parameter listen_addresses.If it is using the default value localhost, it must be changed to TCP/IP address(es) on which the PostgreSQL has to listen for connections from Applications Manager. You can change it to *(corresponds to all available IP interfaces) like below:
listen_addresses = '*'
Click here for more details on configuring postgresql.conf file.
Add the following new line to allow all PostgreSQL user remote connections from Applications Manager server:
host all all 0.0.0.0/0 md5
host all all ::0/0 md5
Click here for more details on configuring pg_hba.conf file.
Applications Manager uses PostgreSQL's subsystem statistics collector & some built-in views such as pg_class, pg_database, pg_indexes, pg_locks, pg_namespace, pg_proc, pg_replication_slots, pg_stat_statements, pg_tables, pg_trigger, pg_user to monitor PostgreSQL server activity. The user provided for monitoring should have at least read-only access to statistics collector and above mentioned views.
Create a user with following privileges:
CREATE USER <user-name> WITH PASSWORD '<PASSWORD>';
GRANT SELECT ON pg_stat_database TO <user-name>
To monitor replication metrics, the database user is required to have Replication privilege (if replication is configured). Execute the below query to update the DB user with Replicationprivilege:
ALTER USER <user-name> WITH Replication;
To list out configuration-related metrics & WAL file count, the database user is required to have Superuser privilege. Execute the below query to update the DB user with Superuserprivilege: (optional)
ALTER USER <user-name> WITH Superuser;
To monitor all the metrics, execute the following query:
Extensions to be enabled in PostgreSQL server:
To monitor top queries by CPU, include the below lines in postgresql.conf file:
shared_preload_libraries = 'pg_stat_statements'
pg_stat_statements.track = all
Then execute the below query in PostgreSQL:
CREATE EXTENSION pg_stat_statements;
After implementing the above steps, restart the PostgreSQL server.
Note: After implementing the above steps, a restart of the PostgreSQL server is required for the changes to take effect.
Limitations in PostgreSQL Replication monitoring:
Supported Versions: Redis version 2.4 to 7.0.
To monitor a Redis server, the user must have permission to execute the INFO and PING commands. These permissions can be granted by executing the following commands:
Supported Versions: Applications Manager supports monitoring of SAP ASE 12.5.3 and above.
To monitor a SAP ASE database monitor, the minimum privileges required by the user are as follows:
To provide the privileges mentioned above, use the following commands in the SAP ASE database:
Provide the below privileges for SAP HANA DB User.
To grant the above privileges, execute the below statements in the SAP HANA SQL console. (Replace USER_NAME with the actual HANA DB Username)
Note:
The following are the prerequisites to be implemented to monitor SAP MaxDB in Applications Manager:
Applications Manager supports the monitoring of SQL Anywhere from version 17. We use system procedures for monitoring the SQL Anywhere server.
To monitor SQL Anywhere server, the DB user must have the following privileges:
To know more about system privileges, click here.
List of ports to be opened for communicating with Microsoft Azure
Microsoft Azure monitor can be added using 3 methods,
1. Create Microsoft Entra (Previously Azure Active Directory) Application:
2. Getting Tenant ID, Client ID and Client Secret (Application Key):
3. Assign a role to the application:
To know more about assigning a role to the application, refer here.
4. Provide the Tenant ID, Client ID and Application Key (Client Secret) in the Azure new monitor page of Applications Manager.
Follow the steps 1, 2 and 3 mentioned in AD Application & Service Principal.
4. Grant App Registration Permissions
For Applications Manager Versions from 16320, user should follow the details as mentioned below:
Note: Azure China accounts are supported from Applications Manager v173000.
Note: Remaining fields should remain as default.
1. Installing the Powershell module on Applications Manager server:
For Applications Manager versions 15170 onwards, you must install the Az Powershell module.
To install the Az Powershell module, follow the below steps:
Open Powershell prompt with Administrator privileges. Run the following commands:
# Install the Az module from the PowerShell Gallery
Install-Module -Name Az -RequiredVersion 6.2.1
To check if the modules are installed successfully:
Open Powershell prompt with Administrator privileges. Run the following command,
Connect-AzAccount
If this opens a pop-up asking for Azure credentials, this means the required modules are installed successfully.
Note:
If you already have the AzureRM Powershell installed, you will have to uninstall it before you install the Az Powershell module using the below command:
Uninstall-AzureRm
For Applications Manager versions till 15160, you must install the AzureRM Powershell module.
To install the AzureRM Powershell module, follow the below steps:
Open Powershell prompt with Administrator privileges. Run the following commands:
# Install the Azure Resource Manager modules from the PowerShell Gallery
Install-Module AzureRM
In case if you get the following error upon executing the above command, then install the downloader from http://aka.ms/webpi-azps
To check if the modules are installed successfully:
Open Powershell prompt with Administrator privileges. Run the following command,
Login-AzureRmAccount
If this opens a pop-up asking for Azure credentials, this means the required modules are installed successfully.
2. Get Subscription ID
3. Create an Organizational account using Microsoft Azure administrator permissions

4. Assign the Global administrator role to your organizational account
The Global administrator role will be assigned to the required user.
After performing all the above steps,
Provide this Subscription ID, Email ID, and Password to respective fields in the New monitor page while using the mode ‘Azure Organizational Account (PowerShell) of Applications Manager.
Users can choose their preferred mode of data collection by performing the following prerequisites:
Note:
Follow the steps given below to configure the Azure Monitor Agent in Windows and Linux VMs:
Steps to enable Azure Monitor Agent in the Azure Portal:
In the Collect and Delivertab, click on 'Add Data Source' and select the data source type as Performance Counters.

Under Performance Counters, all the listed categories of 'Basic' are chosen by default, and the metrics monitored in Applications Manager are included. If the user wants to enable the agent only for APM monitored metrics, switch to 'Custom' and select the metrics listed in the Windows Metrics Table or Linux Metrics Table below, based on the OS type.
Windows Metrics Table
| Metric Name in Azure Portal | Metric Name in Applications Manager |
|---|---|
| \Processor Information(_Total)\% Privileged Time | Privileged Time |
| \Processor Information(_Total)\% User Time | User Time |
| \Processor Information(_Total)\Processor Frequency | Processor Frequency |
| \Memory\Committed Bytes | Committed Bytes |
| \Memory\Available Bytes | Available Bytes |
| \Memory\% Committed Bytes In Use | Committed Bytes In Use |
| \Memory\Pool Paged Bytes | Pool Paged Bytes |
| \Memory\Pool Nonpaged Bytes | Pool Nonpaged Bytes |
| \Memory\Page Faults/sec | Page Faults/sec |
| \Process(_Total)\Thread Count | Thread Count |
| \System\Context Switches/sec | Context switches/sec |
| \System\Processes | Process Count |
| \Process(_Total)\Handle Count | Handle Count |
Linux Metrics Table
| Metric Name in Data Collection Rule | Metric Name in Azure Monitor Metrics | Metric Name in Applications Manager |
|---|---|---|
| Processor(*)\% IO Wait Time | cpu/usage_iowait | IO Wait Time (%) |
| Processor(*)\% Idle Time | cpu/usage_idle | Idle Time (%) |
| Processor(*)\% Processor Time | cpu/usage_active | Processor Time(Linux) (%) |
| Memory(*)\% Used Memory | mem/used_percent | Memory Utilization |
| Memory(*)\Available MBytes Memory | mem/available | Available Memory |
| Memory(*)\Used Memory MBytes | mem/used | Used Memory |
| Memory(*)\% Available Memory | mem/available_percent | Available Memory % |
| Memory(*)\% Used Swap Space | swap/used_percent | Used Swap Memory % |
Note: The Memory Utilization metric for Linux is supported from Applications Manager v171900.
In the Destination tab, click on Add Destination and specify the destination type as Azure Monitor Metrics (preview). Next, click on 'Add Data Source'.

Ensure the status is 'Provisioning succeeded' for AzureMonitorWindowsAgent or AzureMonitorLinuxAgent, based on the OS type of the VM. If agent status is not in succeeded state, please check the troubleshooting steps.

Verify if all the Applications Manager supported metrics are mentioned under the 'Metric' list.

Steps to enable Azure Monitor Agent in Applications Manager:
By default, the Agent Type will be 'Azure Monitor Agent'. For existing monitors created before version 171400, the Agent Type will be 'Diagnostic Agent'.
Note:
Follow the steps given below to configure the Diagnostic Agent in Windows and Linux VMs:
Note:
Steps to enable Diagnostic Agent in Applications Manager from v171400
Note:
GENERAL BEHAVIOUR
Note: In case if you change the resource group of any Virtual machine in Azure portal, then provide the updated details (Virtual Machine ResourceID and Resource Group Name) in the Edit monitor page of that Virtual machine in Applications Manager for data collection to happen.
Following are the metrics monitored when Guest OS monitoring is enabled:
To enable Guest OS monitoring, go to Edit monitor page of Azure Virtual Machine monitor, click 'Enable Guest OS Monitoring' and provide the username and password of the VM. Enable the 'Use Public IP' option to use public IP to connect to Azure VM via internet and fetch Guest OS metrics. By default, this option will be unchecked and private IP will be used. However, this works only when Applications Manager installed machine and Azure Virtual Machine reside in the same network.
1. Perform the below steps in Azure Portal.
Execute the following command
Enable-AzVMPSRemoting -Name 'vm-hostname' -ResourceGroupName 'vm-resourcegroupname' -Protocol https -OsType Windows
Where you need to replace 'vm-hostname' and 'vm-resourcegroupname' with the Name and Resource group name of the VM for which the Guest OS metrics need to be monitored.
This enables PowerShell remoting for the respective VM with HTTPS protocol. To know more, click here.
Note: This command opens port 5986 on the virtual machine's firewall, allowing anyone to connect. To limit access, you can edit the firewall rule and specify the IP address of the allowed source (such as the Applications Manager machine).
2. Run Applications Manager with administrator privilege.
3. Perform the below steps in Applications Manager Server to enable Powershell Remoting (To collect metrics by remoting into Azure VMs).
Execute the following commands:
Set-ExecutionPolicy Unrestricted
If the above cmdlet produces an Error as below,you can configure Powershell Script Execution via Group Policy Editor:

#To configure Windows PowerShell for remoting, type the following command:
Enable-PSRemoting -force
#To configure the TrustedHosts setting to ensure that appmanager can trust the connections from other servers :
Set-Item wsman:\localhost\client\trustedhosts *
#To increase the maximum number of concurrent shells that a user can remotely open:
Set-Item WSMan:\localhost\Shell\MaxShellsPerUser -value 25 -WarningAction SilentlyContinue
#To set idle timeout value for sessions : Determines how long the session stays open if the remote computer does not receive any communication from the local computer, including the heartbeat signal. When the interval expires, the session closes:
Set-Item WSMan:\localhost\Shell\IdleTimeout -value 60000 -WarningAction SilentlyContinue
#Restart the WinRM service for changes to take effect:
Restart-Service WinRM
Configure Powershell Script Execution via Group Policy Editor


Here are the prerequisites to monitor Database Query Statistics in the Azure SQL Database monitor:
User Privileges:
To monitor Azure SQL Database Query Statistics, the SQL user account used for monitoring should have either Admin permissions or VIEW SERVER STATE permission. Additionally, the user must be granted permission for both the master database and the Azure SQL database. To create a user and provide access to both databases, follow the steps below:
To create a login from the master database, execute the following command:
CREATE LOGIN <login_name> WITH PASSWORD = '<password>';GO
To grant access to both the master database and the current SQL database, create the user by executing the following command in both the master and Azure SQL database:
CREATE USER <user_name> FOR LOGIN <login_name> WITH DEFAULT_SCHEMA = dbo;
To grant VIEW SERVER STATE PERMISSION, execute the following query in the master database:
ALTER SERVER ROLE ##MS_ServerStateReader##ADD MEMBER <user_name>;GO
Firewall rule configuration in portal:
Refer to this linkto learn how to set up the server firewall.
Allowing outgoing access on port 1433:
Note: Ensure that the below prerequisites are performed using the APM log-on user. If any issues are encountered during setup, refer here.
Install AzureCLI*:
Install the Azure CLI on an Applications Manager-installed machine (Windows or Linux) to configure the cluster with kubectl for monitoring. Learn more.
If kubectl has already been installed on Applications Manager-installed machine, find the version of the kubectl that is using the following command in the command prompt.
kubectl version --client
If the version is incompatible, then install the compatible version.
Install the compatible Kubectl utility executable file (kubectl.exe) by executing the following command in command prompt on the Applications Manager-installed machine:
az aks install-cli --client-version [client-version]
The above command is bundled with both kubectl.exe and kubelogin.exe. Here, [client-version] refers to the compatible client-version to be installed. To find the [client-version], go to Azure portal -> AKS Cluster -> Overview -> Cluster Configuration -> Kubernetes Version.
Note: Choose the supported kubectl version for your AKS cluster by using a minor version that is either an older or newer kubectl relative to your cluster's Kubernetes version (kube-apiserver), consistent with the Kubernetes support policy for kubectl. The Kubernetes version of the cluster can be found in the Azure portal itself.
The default path of kubectl and kubelogin in Windows are:
C:\Users\USERNAME\.azure-kubectl C:\Users\USERNAME\.azure-kubelogin
You may skip this step if you have either already specified your kubectl and kubelogin installed directory in the system path of the environment variable or have installed kubectl and kubelogin under the <Applications Manager Home>\working directory.
Note:
Authentication and Authorization*:


| Authentication and Authorization Mode | Subscription Level Role: Contributor | Subscription Level Role: Reader |
|---|---|---|
| Local Accounts with Kubernetes RBAC | No specific Cluster level role binding is required | Cluster level role:Azure Kubernetes Service Cluster User Role |
| Microsoft Entra ID authentication with Azure RBAC | Cluster level role:Azure Kubernetes Service RBAC Admin role | Cluster level role:Azure Kubernetes Service RBAC Admin role |
| Microsoft Entra ID authentication with Kubernetes RBAC | No specific Cluster level role binding is required | Cluster level role:Azure Kubernetes Service Cluster User Role |

Note:* indicates that the step is mandatory.
Copy Directory (Tenant) ID and Application (Client) IDfrom Overview page of the application.


Go to the Manage tab and click on Certificates & Secrets → New Client secret, provide a Description, select Expires duration (Preferably 24 months) and click Add. Copy the Valueof the Client Secret.

Exchange Online PowerShell module:
Install-Module -Name ExchangeOnlineManagement
SharePoint Online Powershell Module:
Install-Module -Name Microsoft.Online.SharePoint.PowerShell -RequiredVersion 16.0.21116.12000
Note:
You need to install the following modules to monitor Microsoft 365. While installing, ensure that you open Powershell with administrator privileges to execute the commands given below:
MSOnline Module for Windows PowerShell * (Refer this KBin case of any error while installing this module):
Install-Module -Name MSOnline
Exchange Online PowerShell module:
Install-Module -Name ExchangeOnlineManagement
SharePoint Online Powershell Module:
Install-Module -Name Microsoft.Online.SharePoint.PowerShell -RequiredVersion 16.0.21116.12000
Open PowerShell window in Admin mode and execute the below command:
Install-Module MicrosoftTeams -RequiredVersion 2.3.1
If error occurs and asks to use -AllowClobber, then execute the below command:
Install-Module MicrosoftTeams -RequiredVersion 2.3.1 -AllowClobber
Once done, execute the below command to install the Preview version:
Install-Module PowerShellGet -Force -AllowClobber
Once done, close the PowerShell window. Then open a new window and execute the below command:
Install-Module MicrosoftTeams -AllowPrerelease -RequiredVersion "1.1.9-preview"
Windows Server 2008 R2 SP1 *
* You need to have the Microsoft .NET Framework 4.5 or higher version installed and Windows Management Framework 5.1 installed. For more information, see Installing the .NET Framework and download the latest version of Windows Management Framework.
You need to install PowerShell version 5.1
To check the PowerShell version installed, open up a PowerShell prompt and execute the below command:
>$PSVersionTable
Check for the PSVersion attribute from the output to find out the version.
Windows PowerShell needs to be configured to run scripts for data collection. To do this, execute the following command in a Windows PowerShell session with administrator privileges.
>Set-ExecutionPolicy Unrestricted
When Modern Authentication is enabled in the SharePoint Online tenant:
Currently, Applications Manager makes use of Basic Authentication. However, if Modern Authentication is enabled in the SharePoint Online tenant, then Applications Manager can connect using non-modern authentication for which LegacyAuthProtocolsEnabled key should be set to True in your SharePoint Online tenant. Follow the steps given below to check if the LegacyAuthProtocolsEnabled key has been enabled and to set it as True:
Open Powershell using administrator privileges in the Applications Manager installed machine and execute the below command:
Import-Module Microsoft.Online.Sharepoint.PowerShell
Now execute the below command by replacing <tenant>with the tenant name and enter the user email and password when prompted:
Connect-SPOService -Url https://<tenant>-admin.sharepoint.com
Once the service has been connected, execute the below command:
Get-SPOTenant
Check the output received and verify the value for the LegacyAuthProtocolsEnabled key is True. If not, then execute the below command to set the value as True:
Set-SPOTenant -LegacyAuthProtocolsEnabled $True
Reference: For more details, search for LegacyAuthProtocolsEnabled in this link.
To enable AWS monitoring in Applications Manager, you will need AWS Access Keys — specifically the Access Key ID and Secret Access Key — for authentication and to retrieve key performance metrics from your AWS environment.
Ensure that the AWS user has the appropriate IAM permissions required to access the necessary AWS services.
Follow these steps to configure AWS monitoring:
Note: This step is not required if you already have a user account to configure permissions for the Applications Manager setup.
Optional: Add Inline Policy for EC2 Actions
Follow the steps given below to perform EC2 actions like start, stop, and reboot from Applications Manager:
Replace the sample policy with the following:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ec2:StartInstances", "ec2:StopInstances", "ec2:RebootInstances" ], "Resource": "*" } ]}
Note:
After attaching the necessary policy to the IAM user:
| Category | APM Monitor Name | Service Name in AWS Portal | List of APIs |
|---|---|---|---|
| Security (Mandatory) | AWS monitor authentication/addition | STS (Security Token Service) | GetCallerIdentity |
| Monitoring (Mandatory) | To collect performance metrics from CloudWatch. | CloudWatch | GetMetricData ListMetrics (Only for AWS EC2 OS level metrics) GetMetricStatistics (Required only for Applications Manager version below v.17.54.00 - Apr, 2025) |
| Data Collection (Recommended) | To ensure data collection runs only in regions subscribed for the account. | EC2 | DescribeRegions (Optional but recommended to prevent unwanted API hits and errors in non-subscribed regions. Supported from v17.76.00 - Sep, 2025) |
| Billing | Billing statistics | Cost Explorer Service | GetCostAndUsage GetCostForecast |
Analytics | Redshift | Amazon Redshift | DescribeClusters ListMetrics |
MSK Cluster | Amazon MSK (Managed Streaming for Apache Kafka) Cluster | ListClustersV2 DescribeClusterV2 | |
Compute | EC2 (Elastic Compute Cloud) | EC2 | DescribeVolumes DescribeInstances DescribeRegions DescribeInstanceAttribute |
EC2 Actions (System log, Start, Stop & Reboot instances) | GetConsoleOutput StartInstances StopInstances RebootInstances | ||
| Elastic Beanstalk | EC2 Auto Scaling | DescribeAutoScalingGroups ListStackResources | |
Elastic Beanstalk | Elastic Beanstalk | DescribeEnvironments DescribeEnvironmentResources DescribeEvents | |
ELB (Elastic Load Balancing) | ELB v2 | DescribeLoadBalancers DescribeLoadBalancerAttributes DescribeTargetGroups DescribeTargetHealth | |
| Lambda | Lambda | ListFunctions GetFunction | |
Containers | ECS (Elastic Container Service) | Elastic Container Service | DescribeClusters DescribeContainerInstances DescribeServices DescribeTasks ListClusters ListContainerInstances ListServices ListTasks |
EKS (Elastic Kubernetes Service) | EKS | ListFargateProfiles DescribeNodegroup ListNodegroups DescribeFargateProfile, DescribeCluster ListClusters | |
| Elastic Container Registry | ECR | DescribeRepositories DescribeImages | |
Database | DynamoDB | DynamoDB | ListTables DescribeTable DescribeLimits DescribeStream |
| RDS (Relational Database Service) | RDS | DescribeDBInstances DescribeDBClusters | |
Integration | ActiveMQ | Amazon MQ | ListBrokers DescribeBroker ListConfigurations DescribeConfiguration |
RabbitMQ | ListBrokers DescribeBroker ListConfigurations DescribeConfiguration | ||
Simple Email Service | Amazon Simple Email Service | DescribeRegions ListIdentities GetSendQuota ListSuppressedDestination | |
Step Function | AWS Step Functions | ListStateMachines DescribeStateMachine ListExecutions | |
| SQS (Simple Queue Service) | SQS | ListQueues GetQueueAttributes | |
| SNS (Simple Notification Service) | SNS | ListTopics ListSubscriptionsByTopic | |
Migration and Transfer | DMS Replication Instance | AWS Database Migration Service | DescribeReplicationInstances DescribeReplicationTasks DescribeEvents DescribeEndpoints |
| DMS Replication Task | |||
File Transfer Family | AWS Transfer Family | ListServers DescribeServer ListUsers | |
Networking | API Gateway | API Gateway | /restapis /restapis/* /apis /apis/* |
| Client VPN | AWS VPN | DescribeClientVpnEndpoints | |
| Site-to-Site VPN | DescribeVpnConnections | ||
Cloudfront | CloudFront | ListDistributions GetDistribution ListInvalidations | |
| Direct Connect | Amazon Direct Connect | DescribeConnections | |
| Direct Connect - Virtual Interface | DescribeVirtualInterfaces | ||
| Elastic IP | AWS Elastic IP | DescribeRegions DescribeAddresses | |
| NAT Gateways | EC2 | DescribeNatGateways | |
| PrivateLink Endpoint | AWS PrivateLink | DescribeVpcEndpoints | |
| PrivateLink Endpoint Service | DescribeVpcEndpointServices | ||
| Route 53 (Health Checks) | Amazon Route 53 | ListHealthChecks GetHealthCheck GetHealthCheckStatus GetHealthCheckLastFailureReason | |
| Route 53 Resolver Endpoint | ListResolverEndpoints GetResolverEndpoint ListResolverEndpointIpAddresses | ||
| Transit Gateway | AWS Transit Gateway | DescribeTransitGateways DescribeTransitGatewayAttachments | |
| VPC Lattice Service | Amazon VPC Lattice | ListServices ListMetrics GetService | |
Security | AWS monitor authentication/addition | STS (Security Token Service) | GetCallerIdentity |
| CloudHSM | AWS CloudHSM | DescribeClusters | |
Key Management Service | AWS Key Management Service | ListKeys DescribeKey ListGrants ListAliases DescribeCustomKeyStores GetKeyRotationStatus | |
| Network Firewall | AWS Network Firewall | DescribeFirewall ListFirewalls | |
| Secrets Manager | AWS Secrets Manager | ListSecrets DescribeSecret | |
| Web Application Firewall | AWS WAF | ListWebACLs GetWebACL | |
Storage | EFS (Elastic File System) | EFS | DescribeMountTargets DescribeFileSystems |
| FSx (File Cache) | FSx | DescribeFileCaches | |
S3 (Simple Storage Service) | S3 | ListAllMyBuckets ListBucket GetBucketLocation | |
| Storage Gateway | AWS Storage Gateway | ListGateways DescribeGatewayInformation | |
Storage Gateway File Share | ListFileShares DescribeSMBFileShares DescribeNFSFileShares | ||
Storage Gateway Volume | ListVolumes DescribeStorediSCSIVolumes DescribeCachediSCSIVolumes |
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from CloudWatch:
The common API calls GetMetricData and ListMetrics are used for all the metrics that we collect from CloudWatch.
To collect operating system-level metrics like Memory and Disk, you must deploy the Cloud-Watch Agent inside EC2 instance. The agent will send your data to Cloud-Watch from where Applications Manager fetches and displays it in the console. Click here to know more about how you can collect metrics from Amazon EC2 instances and on-premises servers with the Cloud-Watch Agent.
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from CloudWatch:
The common API calls GetMetricData, GetMetricStatistics and ListMetrics are used for all the metrics that we collect from CloudWatch.
Note:GetMetricStatistics API permission is not required from the Applications Manager release v17.54.00.
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from CloudWatch:
The common API call GetMetricData is used for all the metrics that we collect from CloudWatch.
To monitor AWS Elastic Container Service (ECS) using Applications Manager, ensure the following prerequisites are met:
By default, AWS accounts with administrative privileges have full access to AWS service APIs. However, if your AWS user account has restricted permissions, ensure that it has access to the following ECS and CloudWatch APIs used for data collection:
ECS APIs used:
To collect enhanced performance metrics for ECS, Container Insights must be enabled on your ECS cluster.
To enable Container Insights on an existing ECS cluster, run the following command in your AWS CLI. Learn more
aws ecs update-cluster-settings --cluster <ClusterName> --settings name=containerInsights,value=disabled
To deploy the CloudWatch agent, run the following AWS CloudFormation command from any server that has the AWS CLI installed:
aws cloudformation create-stack --stack-name CWAgentECS-<CLUSTERNAME>-<REGION> --template-body file://<FILENAME>.json --parameters ParameterKey=ClusterName,ParameterValue=<CLUSTERNAME> ParameterKey=CreateIAMRoles,ParameterValue=True --capabilities CAPABILITY_NAMED_IAM --region <REGION>
Note: Replace <CLUSTERNAME>, <REGION>, and <FILENAME> with your actual ECS cluster name, AWS region, and file path.
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from CloudWatch:
Download and install the AWS CLI (Windows or Linux) on Applications Manager installed machine to configure cluster with kubectl for monitoring. Learn more
Linux: Execute the below commands to unzip the downloaded file, execute the program and complete the installation. Learn more
unzip awscliv2.zipsudo ./aws/installDownload the latest Kubectl utility executable file (Windows or Linux) on Applications Manager installed machine. Learn more
Linux: Execute the following commands (or) add kubectl to the system path.
chmod +x ./kubectlmkdir -p $HOME/bin && cp ./kubectl $HOME/bin/kubectl && export PATH=$PATH:$HOME/binTo fetch metrics from Container Insights, implement the prerequisites for container insights. However, to execute the commands specified in the prerequisites, AWS CLI and kubectl should be configured.
To configure AWS CLI, execute the below command and provide the necessary credentials:aws configureTo configure kubectl, execute the below command:aws eks --region {region} update-kubeconfig --name {cluster_name} --kubeconfig <FILEPATH>.Note: In case you face any issues while monitoring AWS EKS, refer here for detailed troubleshooting steps.
AWS account users are required to use their AWS Access Key and Secret Access Key to add an Amazon MSK Cluster monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect cluster configuration details and performance metrics from Amazon MSK and CloudWatch:
The common API call GetMetricData is used to collect performance and health metrics such as active controllers, offline partitions, disk utilization, client connections, and ZooKeeper/KRaft-related metrics from CloudWatch.
Note: Ensure that the IAM user or role has sufficient permissions for Amazon MSK and CloudWatch APIs in the regions where your MSK clusters are deployed.
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from Private Link:
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from CloudWatch:
The common API call GetMetricData is used for all the metrics that we collect from CloudWatch.
Note: Enable the Measure Latency option to monitor latency-related metrics when creating a Route 53 Health Check.
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from CloudWatch:
The common API call GetMetricData is used for all the metrics that we collect from Cloudwatch.
Note: To monitor S3 Bucket Request metrics, the same should be enabled in AWS console. We recommend using the name EntireBucket for a filter that applies to all objects. For more information, refer here.
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from Transit Gateway:
AWS account users are required to use their AWS Access Key and Secret Access Key to add an AWS monitor in Applications Manager. By default, AWS users have administrator privileges and can access AWS Service APIs. However, if your AWS user account has limited permission, here is the list of APIs used to collect metrics from the respective AWS services and performance metrics from Private Link:
Fill the following as below:
Once created, verify whether both Access token and Refresh token are generated.
To obtain data from Oracle Cloud into Applications Manager, the user must have appropriate policies and permissions assigned by the administrator. Follow the steps below to configure access:
Step 1: Create a Group and Add User
Users: Add the user intended for Applications Manager monitoring
Note: The User OCID of this user will be required while adding the monitor in Applications Manager.
Step 2: Create a Policy
Enable Show Manual Editor in the Policy Builder and paste the following policy statement:ALLOW GROUP <Your Group Name> to use all-resources IN TENANCY
Example: ALLOW GROUP AppManager to use all-resources IN TENANCY
Alternatively, you can use the read role instead of use if only read access is needed:
ALLOW GROUP AppManager to read all-resources IN TENANCY
Note: Using the read role provides view-only access and prevents actions like creating, updating, or deleting resources, including starting/stopping Compute Instances. Refer to the Oracle documentation for more policy options.
Step 3: Add the Oracle Cloud Monitor in Applications Manager
When adding an OCI monitor in Applications Manager, you will need the following details (Tenancy OCID, User OCID, PEM File Path, Fingerprint):
Fingerprint: After adding the API Key, the fingerprint will be displayed in the API Keys list - Copy and Save this value.
⚠️ Important:
To obtain data for TableSpace, Sessions, Processes and Jobs in Applications Manager, you must configure the Oracle Wallet credentials in the Oracle Autonomous DB monitor. To do so, follow the steps given below:
Note: In OpenStack, as per policy defaults, only users with the administrative role can perform all the operations.
Each service in OpenStack has its own role-based access policies to determine which user can access the objects.
These details are defined in the respective service's policy.json / policy.yaml file.
Configuring policies for a user allows you to access the required APIs that will be used by Applications Manager to collect data.
Set aside the values of the following fields to add an Openstack monitor in Applications Manager:
Applications Manager uses the Dynamic Monitoring Service (DMS) to monitor performance and availability of Oracle E-Business Suite. You can access performance metrics using servlets from the following URLs for different versions of EBS from Applications Managers:
For Oracle E-Business Suite Version R11i, the DMS Servlet has to be made accessible to the system where Applications Manager is running. For Versions R12.0 and R12.2.0, the DMS Servlet should be accessible by default. It is recommended that you test to ensure that the Servlet is accessible to the Applications Manager system. [The instructions given below are referred from the Oracle website.]
For Oracle E-Business Suite R11i:
By default, the dms0/AggreSpy URL is protected, allowing only the localhost (127.0.0.1) to access the AggreSpy Servlet. To view metrics from a system other than the localhost, you need to change the DMS configuration for the system running the Oracle EBS that you want to monitor by modifying the trusted.conf file. This can be done as follows:
For Oracle E-Business Suite R12.0:
Ensure that you are able to access the URL http://<host>:<port>/dms0/Spy(Hostname = Hostname with domain name, Port number = OAS listening port) from the Applications Manager system.
For Oracle E-Business Suite R12.1.3:
Applications Manager uses Oracle JDBC connection to monitor it.For monitoring Oracle EBS v12.1.3, the following user privileges will be required:
For Oracle E-Business Suite R12.2.0, R12.2.5 and above:
Ensure that you are able to access the URL http://<host>:<port>/dms/Spy (Hostname = Hostname with domain name, Port number = Weblogic Admin Server listening port) from the Applications Manager system. Users must enter the credentials of their Weblogic Admin server in their Oracle E-Business Suite to access the URL.
Caution: Modifying trusted.conf has security implications. Modify this file only if you understand the security implications for your site. By exposing metrics to systems other than the localhost, you allow other sites to potentially view critical Oracle EBS Server internal status and runtime information.
SAP Gateway Port (Default: 3300) must be open for both inbound and outbound traffic in the firewall. To verify the RFC port, open SAP Management Console → Expand the SAP instance → Select Access Points → Check the port listed for the RFC protocol.

SAP user profile must have the S_RFC, S_XMI_LOG and S_XMI_PROD authorization objects, which can be found by executing the transaction code SU56 in SAP logon to view user authorizations.

Note: The user name provided while adding SAP monitor should have sufficient privileges to access CCMS and Background job metrics. To check this, the user can execute RZ20 transaction in the SAP GUI and see if the CCMS monitor sets can be displayed.
For Windows:
Note: Do not copy the sapjco3.dll file neither into the {windows-dir}/system32 nor into the {windows-dir}/SysWOW64 directory. This will break the operability of other JCo versions that are already installed on the same system. Furthermore you would risk that the current installation also would not work anymore, if the sapjco3.dll gets replaced in the respective Windows system directory in the future.
For Linux:
For Windows:
Note: Do not copy the sapjco3.dll file neither into the {windows-dir}/system32 nor into the {windows-dir}/SysWOW64 directory. This will break the operability of other JCo versions that are already installed on the same system. Furthermore you would risk that the current installation also would not work anymore, if the sapjco3.dll gets replaced in the respective Windows system directory in the future.
For Linux:
To monitor a Microsoft Dynamics CRM / 365 application, the user must have Administrator privileges with permission to execute WMI queries on 'root\CIMV2' namespace of the Dynamics CRM / 365 Server. To add an Microsoft Dynamics CRM / 365 application, follow the below given steps:
Install/enable .NET Framework 3.5 on Applications Manager installed machine: (This needs to be done even if you have installed the latest version. To know more click here.)
Note: The .NET Framework 3.5 prerequisite applies only to Applications Manager versions up to 173100.
To use Powershell for data collection, make sure proper steps are followed to enable Powershell remoting.
Note: If you want to monitor as a non-admin user, follow the steps mentioned in this link.
To monitor a Microsoft Dynamics AX application, the user must have Administrator privileges with permission to execute WMI queries on 'root\CIMV2' namespace of the Microsoft Dynamics AX. To add an Microsoft Dynamics AX application, follow the below given steps:
Install/enable .NET Framework 3.5 on Applications Manager installed machine: (This needs to be done even if you have installed the latest version. To know more click here.)
Note: The .NET Framework 3.5 prerequisite applies only to Applications Manager versions up to 173100.
Note: If you want to monitor as a non-admin user, follow the steps mentioned in this link.
Integration Framework should be launched for SAP Business One and should be accessible from Applications Manager Server. To validate the connectivity, please execute the following API request from the 'Applications Manager' server:
Find P4 Port:
50000+100*instance_number+20+n*5+port_index,
where,(n - Cluster elements
port index - Indicates p4 port [4])

The port value is a number over 50000. For each cluster element, the ports begin with 50000+100*instance_number, where instance_number is a two digit number from 00 to 99 specifying the number of central instance and dialog instances.
Applications Manager supports users with both administrator and non-administrator roles for monitoring Windows servers through WMI mode. However, it is recommended to use administrator privilege for Windows server monitoring.
Currently, Windows hardware performance monitoring is supported in SNMP and WMI monitoring mode:
Monitoring Dell hardware status:
Monitoring HP hardware status:
SNMP Mode of monitoring:
Determine if SNMP responds for the OID properly. Below are the correct OID'S for each vendor:
WMI mode of monitoring:
The following conditions must be met before you can proceed troubleshooting WMI nodes:
Note:
If using WMI, execute the below cmdlet from Powershell prompt with Administrator privileges:
Set-ExecutionPolicy Unrestricted
This is to allow execution of powershell scripts, which handle proper process termination during Datacollection
In Windows Server 2008 and later versions, and in Windows Vista and later versions, use the following dynamic port range:
Start port: 49152
End port: 65535
For Windows 2000, Windows XP, and Windows Server 2003 use the following dynamic port range:
Start port: 1025
End port: 5000
If your computer network environment uses Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 8, Windows 7, or Windows Vista together with versions of Windows earlier than Windows Server 2008 and Windows Vista, you must enable connectivity over both the following port ranges:
High port range: 49152 through 65535
Low port range: 1025 through 5000
Note: Unix server monitors can also be added using non-root user account in SSH, provided the following command packages are installed:
Prerequisites for monitoring Linux:
Edit the sudo configuration file using the following command:
sudo visudo
Add the following line to the end of the file:
<USERNAME>ALL= NOPASSWD: /bin/systemctl
Here, <USERNAME> refers to the username of the machine. For example:

Note: The above steps are unnecessary if the setup has been installed with ROOT user privilege. Ensure that the prerequisites are implemented correctly; otherwise, the setup might not start or stop properly.
The Serial number attribute is supported in SSH/Telnet mode for Linux servers. To retrieve the Serial number, use the following command:
dmidecode
If the dmidecode command is not installed on the Linux server, install it before proceeding. The command requires SUDO permissions. To enable these permissions, complete the following steps in the targeted Linux server:
To set read-only permissions for the dmidecode files, use the following commands:
sudo chmod 444 /sys/firmware/dmi/tables/DMI
sudo chmod 444 /sys/firmware/dmi/tables/smbios_entry_point
Note: In some Linux distributions, these files may not be available. If so, use root user account to retrieve the serial number.
Prerequisites for monitoring Cron jobs:
Prerequisites for monitoring NTP Stats:
Edit the sudo configuration file using the following command:
sudo visudo
Add the following line to the end of the file:
<USERNAME>ALL= NOPASSWD: /usr/bin/startsrc, /usr/bin/stopsrc
Here, <USERNAME> refers to the username of the machine. For example:

Note: The above steps are unnecessary if the setup has been installed with ROOT user privilege. Ensure that the prerequisites are implemented correctly; otherwise, the setup might not start or stop properly.
To monitor a Windows Cluster, use the Cluster Domain Administrator username and password, for which the user account should have the permission to execute WMI queries on root\mscluster namespace in cluster server nodes.
Firewall access for monitoring:
Following are the ports required for monitoring via WMI:
To monitor a JMX Applications, the following java runtime options are to be added to your application
Replace 1099 with the actual port number of the agent
Example:
Refer Oracle documentation in this regard: http://docs.oracle.com/javase/1.5.0/docs/guide/management/agent.html#remote
Note: Refer to know more about monitoring a JMX Application if your application is behind a firewall. Also please note that the ping/telnet/nslookup should be working for the remote JMX:
telnet hostname port
ping hostname
ping IPAddress
nslookup hostname
nslookup IPAddress
Ceph status command is used to collect performance stats of Ceph Storage Monitor. The user given, should have read privileage to ceph.keyring file. Ensure the ceph.keyring file has appropriate permissions set (e.g., chmod 644) on your client machine.
1. To monitor Hadoop via REST API:
2. To monitor Hadoop via JMX:
Prerequisites for monitoring Apache Zookeeper:
Note:
To monitor a JDK1.5 JVM and above, add the following JVM arguments to your application:
-Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=1099 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Djava.rmi.server.hostname=<IP Address>
To monitor IBM JDK1.5 JVM and above, add the following JVM arguments to your application:
-Djavax.management.builder.initial= -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=1099 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Djava.rmi.server.hostname=<IP Address>
Note: Port number '1099' can be replaced with the actual port number of the JMX agent.
Additionally, import the server certificate to "<Applications Manager Home>\working\jre\lib\security\cacerts" file and restart the server.
Syntax:
keytool -import -alias <certificat_aliasname> -file <target Application server Certificate> -keystore "<Applications Manager Home>\working\jre\lib\security\cacerts" -storepass changeit -noprompt
Example:
keytool -import -alias jmxcert -file "E:\APMBuilds\certificates\ssloverjmx.cer" -keystore "C:\Program Files (x86)\AppManager14\working\jre\lib\security\cacerts" -storepass changeit -noprompt
In the Tomcat Environment:
Make sure the catalina-jmx-remote.jar file is present in the $TOMCAT_HOME/lib location. This jar file can be downloaded for your version of Tomcat from the Apache website from the extras section (sample link: http://archive.apache.org/dist/tomcat/tomcat-7/v7.0.55/bin/extras/catalina-jmx-remote.jar).
Enable JMX in WebLogic
Prerequisites for monitoring Active Directory metrics
To monitor an Active Directory Service, the user must have "Administrator" privileges. To add an Active Directory Service, follow the below given steps:
Install/enable .NET Framework 3.5 on Applications Manager installed machine: (This needs to be done even if you have installed the latest version. To know more click here.)
Note: The .NET Framework 3.5 prerequisite applies only to Applications Manager versions up to 173100.
Note:
- It is also possible for a non-admin user to monitor Active Directory, except that some of the data may not be available for monitoring (Some Diagnostic Tests fetched using dcdiag command which involve querying Active Directory objects, replication status, security descriptors, and reading/writing system logs require administrator priviledges).
- If you want to monitor as a non-admin user, follow the steps mentioned in this link.
Using CredSSP Authentication for Active Directory monitoring
To monitor Network Policy Server (Radius Server), the user must have "Administrator" privileges. To add an Network Policy Server (Radius Server), follow the below given steps:
Install/enable .NET Framework 3.5 on Applications Manager installed machine: (This needs to be done even if you have installed the latest version. To know more, click here.)
Note: The .NET Framework 3.5 prerequisite applies only to Applications Manager versions up to 173100.
Note: If you want to monitor as a non-admin user, follow the steps mentioned in this link.
Following are the list of LDAP-specific fields that need to be entered while adding the LDAP monitor:
UserName and Password:UserName will the DN of the LDAP server. A Distinguished Name (DN) uniquely identifies an entry and describes its position in the Directory Information Tree (DIT). DN and password can be collected form the LDAP administrator.
Example DN:cn=Manager,dc=example,dc=com
Note: Username and password are needed only if the authentication is enabled.
The Apache Spark host and port should be accessible from the machine where Applications Manager server is running. Make sure that the required credentials are provided while adding the monitor.
Monitoring of Exchange Server is possible only if Applications Manager is running in a Windows System. Exchange Monitoring supports two Modes of Monitoring.
Ports required for monitoring:
Note: It is also possible for a non-admin user to monitor Exchange Server, except that some of the data may not be available for monitoring. If you want to monitor as a non-admin user, follow the steps mentioned in this link.
User Account Used for Monitoring:
The User Account used to add the monitor should be a member of View-Only Organization Management group. Make sure that the group has the following Roles assigned - Mailbox Search & Monitoring.
For Exchange View-Only Administrators:
This role allows read access only to Exchange organization container and containers with Exchange recipients in AD. They can verify settings, but can not change or add any settings. Only Powershell "Get-<cmdlet>" can be executed.
Adding Users to the View-Only Organization Management group and assigning roles in:
To check if the user is already under View-Only Organization Management role group:
Get-RoleGroupMember "View-Only Organization Management" | where-object {$_.Name -eq "<Username>"}
If the user is not under the specified role group, execute the below cmdlet to add the user:
Add-RoleGroupMember "View-Only Organization Management" -Member <Username>
Next, add the two roles for View-Only Organization Management role group:
New-ManagementRoleAssignment -SecurityGroup "View-Only Organization Management" -Role "Monitoring"
New-ManagementRoleAssignment -SecurityGroup "View-Only Organization Management" -Role "Mailbox Search"
Execute the following cmdlet:
Add-ExchangeAdministrator —Identity <Username> —Role ViewOnlyAdmin
The ConnectionURI is used to establish a connection to a remote computer using the URI address of the related HTTP or HTTPS endpoint. These connections are made over TCP port 80 for HTTP and TCP port 443 for HTTPS. By default, the connection URI is of the form http://<Hostname/IPaddress>/powershell and uses Kerberos authentication.
Note: If you decide to use Basic Authentication, HTTPS should be used as the mode of connection for ConnectionURI. If the ConnectionURI should be customized, it can be done by clicking the "Customize ConnectionURI" option in the new monitor page. To provide a different port for the ConnectionURI, use the format:
<https://<hostname>/Powershell:<portnumber> (or) <http://<hostname>/Powershell:<portnumber>
For Example:http://win-exchange13/Powershell:4444
To monitor IBM Websphere MQ Series, the following jar files must be added to the respective locations:
| For IBM Websphere MQ Series version | Jar files to be added | Location in Websphere MQ | Location in Applications Manager |
| Version 8 and above |
(OR)
| All the jar files can be found under <Websphere MQ Home Directory>\Java\lib directory. |
|
| Version 7 |
| All the jar files can be found under <Websphere MQ Home Directory>\Java\lib directory. |
|
| Version 5.x/6.x |
| The jar files can be found under <Websphere MQ Home Directory>\Java\lib directory. |
|
Note: The username & password length should be less than or equal to 12.
To monitor Queue statistics, make sure MONQ value is set to MEDIUM or HIGH for all queues. You can check the current MONQ status using
DISPLAY QSTATUS(Q1)
To modify,
ALTER QL(Q1) MONQ(MEDIUM)
where Q1 is the queue.
To monitor Channel statistics, make sure MONCHL value is set to MEDIUM or HIGH for all channels. You can check the current MONCHL status using
DISPLAY CHANNEL(QM1.TO.QM2)
To modify,
ALTER CHL(QM1.TO.QM2) CHLTYPE(SDR) MONCHL(MEDIUM)
where QM1.TO.QM2 is the channel name and SDR is its type.
To discover Message Broker, the following jars are required:
Copy the two jar files to <AppManager Installation>\working\jre\lib\ext directory.
Note: Copy these jar files to <JavaHome>\jre\lib\ext directory if external JDK is configured for AppManager. Restart Applications Manager and try adding the monitor.
Note: Copy these jar files to <JavaHome>\jre\lib\ext directory if external JDK is configured for AppManager. Restart Applications Manager and try adding the monitor.
Note: WebLogic Integration Server needs some additional configuration and conditions to be followed for monitoring.
To monitor MS Office SharePoint Server, the user must have Administrator privileges. Monitoring can be performed using either WMI mode or PowerShell mode, based on your SharePoint environment.
Using WMI mode, SharePoint Standalone Server can be monitored. To use WMI mode for data collection, refer to the WMI Prerequisites page.
Note:Non-admin users can monitor the SharePoint server with limited access. For configuration steps, refer to this link.
Using PowerShell mode, SharePoint Standalone Servers can be monitored, and SharePoint Servers in a Farm can be discovered and monitored. To use PowerShell mode for data collection, ensure PowerShell remoting is properly configured.
If the SharePoint Standalone Server is part of a Farm or if you want to discover SharePoint Servers in a Farm, follow the steps given below:
Enable CredSSP Authentication:
CredSSP Authentication might be required to fetch data from multiple servers in the SharePoint Farm. Enable the Use CredSSP Authentication option and follow the CredSSP configuration prerequisites.
Open the SharePoint Management Shell as Administrator and execute:
winrm set winrm/config/winrs '@{MaxShellsPerUser="25"}'winrm set winrm/config/winrs '@{MaxMemoryPerShellMB="600"}'Get-SPShellAdminGet-SPDatabase | Add-SPShellAdmin DOMAIN\UserNameGet-SPShellAdminSet-PSSessionConfiguration -Name Microsoft.PowerShell32 —ShowSecurityDescriptorUITo verify the prerequisites, open PowerShell as Administrator in the Applications Manager installed server and run the following commands (Enter the credentials when prompted).
$cred = Get-Credential$s = New-PSSession "SharePointServerName" -Authentication CredSSP -Credential $credInvoke-Command -Session $s -ScriptBlock {Add-PSSnapin Microsoft.SharePoint.PowerShell;}Invoke-Command -Session $s -ScriptBlock {Get-SPContentDatabase}Invoke-Command -Session $s -ScriptBlock {Get-SPServiceInstance}Enter-PSSession -Session $sExit-PSSessionIf permission errors occur while running the above commands, troubleshoot accordingly.
Note: For issues related to Add-SPShellAdmin, refer to this link.
Below are the prerequisites for monitoring MSMQ server in Applications Manager:
To monitor Microsoft Message Queue (MSMQ) Server, the user must have Administrator privileges. To monitor the Microsoft Message Queue (MSMQ) Server, follow the below given steps:
Install/enable .NET Framework 3.5 on Applications Manager installed machine: (This needs to be done even if you have installed the latest version. To know more click here.)
Note: The .NET Framework 3.5 prerequisite applies only to Applications Manager versions up to 173100.
To use Powershell for data collection, make sure the proper steps have been followed to enable Powershell remoting.
Note: If you want to monitor as a non-admin user, follow the steps mentioned in this link.
To monitor a Microsoft BizTalk Server, the user must have Administrator privileges. To monitor the Microsoft Message Queue (MSMQ) Server, follow the below given steps:
Install/enable .NET Framework 3.5 on Applications Manager installed machine: (This needs to be done even if you have installed the latest version. To know more click here.)
Note: The .NET Framework 3.5 prerequisite applies only to Applications Manager versions up to 173100.
Note: It is also possible for a non-admin user to monitor Microsoft Biztalk server, except that some of the data may not be available for monitoring. If you want to monitor as a non-admin user, follow the steps mentioned in this link.
To use Powershell for data collection, make sure the proper steps have been followed to enable Powershell remoting.
If the Biztalk Management Database is on a different server from that where Applications Manager is running, the credentials of the Biztalk Server should be delegated for data collection to happen (Delegation is disabled by default). Refer to know more about Enabling CredSSP Authentication.
To monitor a Microsoft Skype for Business Server, the user must have Administrator privileges. To monitor the Microsoft Skype for Business Server, follow the below given steps:
Install/enable .NET Framework 3.5 on Applications Manager installed machine: (This needs to be done even if you have installed the latest version. To know more click here.)
Note: The .NET Framework 3.5 prerequisite applies only to Applications Manager versions up to 173100.
Note: If you want to monitor as a non-admin user, follow the steps mentioned in this link.
To add an Azure Service Bus Namespace in Applications Manager, a .pfx file (which contains the cryptographic information of private keys) of the certificate uploaded in Azure Management certificates is required.
In the console, execute the script <APM_HOME>/bin/exportCertificateToAppManager.sh/bat file to export the managed certificate of your account to Applications Manager.
To know more about creating certificates and uploading in Windows Azure portal, click here.
Example: <APM_HOME>/bin/exportCertificateToAppManager.bat [testCertificate.pfx] [password]
Apache ActiveMQ has extensive support for JMX to allow you to monitor and control the behavior of the broker via the JMX MBeans.
You can enable/disable Remote JMX support as follows:
For Windows
In Service Mode: Add the following entries in wrapper.conf file.
<ActiveMQHome>/bin/win64/wrapper.conf (if 64-bit)
<ActiveMQHome>/bin/win32/wrapper.conf (if 32-bit)
wrapper.java.additional.13=-Dcom.sun.management.jmxremotewrapper.java.additional.14=-Dcom.sun.management.jmxremote.port=1099wrapper.java.additional.15=-Dcom.sun.management.jmxremote.authenticate=falsewrapper.java.additional.16=-Dcom.sun.management.jmxremote.ssl=falsewrapper.java.additional.17=-Djava.rmi.server.hostname=<HOSTNAME>
In Non-Service Mode: Add the following lines in apachemq.bat file (located under <ActiveMQHome>/bin/ directory) before ACTIVEMQ_CLASSPATHis set.
set ACTIVEMQ_SUNJMX_START=-Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=1099 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Djava.rmi.server.hostname=<HOSTNAME>
Replace <HOSTNAME> with hostname/IP of ActiveMQ-installed machine.
For Linux
Add the following lines in apachemq.sh file (located under <ActiveMQHome>/bin/ directory) under invoke_start() function:
ACTIVEMQ_SUNJMX_START="-Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=1099 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Djava.rmi.server.hostname=<HOSTNAME>"
Replace <HOSTNAME> with hostname/IP of ActiveMQ-installed machine.
Using JMX to monitor Apache Kafka
To enable JMX monitoring, set the JMX_PORT environment variable in the kafka-run-class.sh/kafka-run-class.bat file or use the standard Java system properties. Alternatively, you can set the KAFKA_JMX_OPTS environment variable in the kafka-run-class.sh/kafka-run-class.bat file to enable JMX monitoring in Applications Manager. The default JMX port is 9999.
For more information on configuring JMX, click here.
To monitor RabbitMQ in Applications Manager, the Management plugin has to be enabled in the RabbitMQ server. Kindly execute the following command under <RABBITMQ_HOME>/sbin to enable the Management plugin in the target RabbitMQ server:
rabbitmq-plugins enable rabbitmq_management
After enabling the Management plugin, check if the following URL is accessible from Applications Manager installed machine:
http://<Hostname>:<port>
where,
For more information on the Management plugin, kindly refer to this link.
Since Docker and Docker Container metrics are collected via their REST APIs, it is necessary to enable Docker's REST API to add a Docker Monitor. To enable Docker's remote API on Docker host, follow the steps mentioned in this link.
Following are the prerequisites for monitoring VMware ESXi servers / vCenter Virtual Infrastructure:
Note: In order to add VMWare ESX/ESXi servers for monitoring, we recommend to use the root account. However, in case you are unable to use the root account, you can use a view-onlyprofile to add the servers. This profile has enough rights to be used for monitoring. The user you create must be:
Applications Manager makes use of WMI mode to monitor Hyper-V servers. Following are the prerequisites for monitoring Hyper-V servers:
WinRM: Refer to this page to understand the prerequisites to WinRM mode of monitoring.
Note: WinRM mode is only supported in Applications Manager versions 16820 and above.
User must have the permission to execute WMI queries on 'root\CIMV2' namespace of the IIS Server.
For Applications Manager versions till 15110, user must have the permission to access 'root\MicrosoftIISv2' and 'root\WebAdministration' WMI namespaces.
From Applications Manager versions 15120 onwards, user must have permission to access 'root\WebAdministration' WMI namespace alone.
Note: User account with Administrator permissions is mandatory for monitoring Application Pool Statistics.
Troubleshooting: In case you encounter with issues in IIS server monitoring, refer here.
Place the phpstats.php file in the webserver's document root. The phpstats.php can be found in <Applications Manager Home>/working/resources directory.
Enabling the Server status and the Extended-status will give additional information for the Apache server.
To enable the Server Status, follow the steps given below:
To enable the Extended-status, follow the steps given below:
Note: Making the above changes will open the /server-status handler with no restrictions. To restrict access to the Applications Manager, make the following changes to the configuration file:
<Location /server-status>
SetHandler server-status
Required host <hostname_of_apm_installed_machine>
Required ip <ip_of_apm_installed_machine>
</Location>
To enable metrics collection, add the following content at the bottom of the file /etc/haproxy/haproxy.cfg:
For HAProxy version 1.9 and below
For HAProxy version 2.0 and above
Note:
The default configuration exposes the stats page without restrictions. To restrict access only to the Applications Manager server, use the configuration below:
Open <IBM_HOME>HTTPServer/conf/httpd.conf and uncomment the following line to enable the mod_status.co module in the target IBM HTTP server:
LoadModule status_module modules/mod_status.so
To add/modify the access handler for the /server-status page add the following lines to the configuration file, and if already present modify it to following context:
<Location /server-status>SetHandler server-statusRequire all granted</Location>
Note: Making the above changes will open the /server-status handler with no restrictions. To restrict access to the Applications Manager, make the following changes to the configuration file:
<Location /server-status>
SetHandler server-status
Required host <hostname_of_apm_installed_machine>
Required ip <ip_of_apm_installed_machine>
</Location>
Restart the target IBM HTTP server after performing the above-mentioned steps and check if the URL given below is accessible from the Applications Manager installed machine,
http://<hostname>:<port>/server-status
Open <ORACLE_HOME>/user_projects/domains/<domain_name>/config/fmwconfig/components/OHS/<server_component_name>/httpd.conf and uncomment the following line to enable the mod_status.co module in the target Oracle HTTP server:
LoadModule status_module "${PRODUCT_HOME}/modules/mod_status.so"
To add/modify the access handler for the /server-status page add the following lines to the configuration file, and if already present modify it according to the following context:
<Location /server-status>SetHandler server-statusRequire all granted</Location>
Note: Making the above changes will open the /server-status handler with no restrictions. To restrict access to the Applications Manager, make the following changes to the configuration file:
<Location /server-status>
SetHandler server-status
Required host <hostname_of_apm_installed_machine>
Required ip <ip_of_apm_installed_machine>
</Location>
Restart the target Oracle HTTP server after performing the above-mentioned steps and check if the URL given below is accessible from the Applications Manager installed machine.
http://<hostname>:<port>/server-status
To enable the Nginx Server status, follow the steps below:
Note: Making the above changes will open the /nginx_status handler with no restrictions. To restrict access only to the Applications Manager, make the following changes to the configuration:
location /nginx_status {
stub_status on;
access_logs off;
allow <ip_of_apm_installed_machine>;
deny all;
}
Make sure that the location is defined with the ngx_http_api_module configured for your Nginx Plus server. Learn how to configure the API
RBM requires network connectivity between the End User Monitoring (EUM) agent and the Applications Manager server. This network connectivity can be ensured with the help of the VPN or NAT or by assigning an direct IP Address to the Applications Manager server. In the case where an agent is deployed within the local network and another one in a remote site, a dual NIC or any one of the above means would be required to ensure this connectivity.
Note:
For any further support please contact appmanager-support@manageengine.com. You can visit Troubleshooting details.
Following the steps to be done for setting up Webpage Analyzer monitor :

| Number of Webpage Analyzer Monitors | OS | Processor | Memory | Hard Disk |
|---|---|---|---|---|
| 1 to 10 | Windows / Linux | 4 Core / 2.4 GHz and above | 8 GB | 40 GB & above |
| 11 to 30 | Windows / Linux | 8 Core / 2.4 GHz and above | 16 GB RAM | 75 GB & above |
| Number of Webpage Analyzer Monitors | Processor | Hard Disk | AWS recommended instance type | Azure recommended instance size |
|---|---|---|---|---|
| 1 to 10 | 4 Core / 2.4 GHz and above | 40 GB & above | Type: m4.xlarge vCPU: 4 Memory: 16 GB Processor: 2.4 GHZ | Size: D4s_v3 vCPU: 4 Memory: 16 GB Processor: 2.4 GHZ |
| 11 to 30 | 8 Core / 2.4 GHz and above | 75 GB & above | Type: m4.2xlarge vCPU: 8 Memory: 32 GB Processor: 2.4 GHZ | Size: D8s_v3 vCPU: 8 Memory: 32 GB Processor: 2.4 GHZ |
Following are the components that can be found in the ZIP file of the plugin, which are required for data collection in Webpage Analyzer:
Note:
To learn how to set up Real User Monitoring in Applications Manager, refer here.
Applications Manager supports monitoring SSL/TLS certificates using the following protocol versions and are used to establish secure communication between the monitored domain and Applications Manager while retrieving certificate details.
Applications Manager disables certain weak TLS ciphers and algorithms by default for security reasons. If required, you can enable them by navigating to Settings → Product Settings → Global Settings → Enable weaker ciphers and algorithms checkbox. Once enabled, Applications Manager allows the use of the following ciphers and algorithms that are otherwise disabled by default:
Note: Enabling weaker ciphers and algorithms may reduce the overall security of the connection. It is recommended to enable this option only when required for compatibility with legacy systems.
The WSDL URL and endpoint URL should be accessible from the machine where Applications Manager server is running. Make sure that the required credentials are provided for reading the WSDL and endpoint URL response while adding the monitor.
Before configuring URL monitoring in Applications Manager, ensure the following requirements are met:
Note: URL monitoring may not work for websites that depend on browser session-based authentication, dynamic login sessions, or multiple redirection URLs, since these mechanisms require browser interaction to establish and maintain the session.
The URL should be accessible from the machine where Applications Manager server is running. Make sure that the required credentials are provided for reading the URL response while adding the monitor.
The WebSocket endpoint must be accessible from the machine where the Applications Manager server is running. Ensure that the required credentials are provided to read the WebSocket response when adding the monitor.
The API should be accessible from the machine where Applications Manager server is running. Make sure that the required credentials are provided for reading the API response while adding the monitor.
To monitor the brand reputation of a website, check whether the Google's Web Risk API is reachable from the Applications Manager server so that the monitor can perform data collection.
Mode of Monitoring: Remote JMX
Security/Firewall Requirements:
User Privilege: To monitor PostgreSQL DB of ADManager Plus, the user provided for monitoring should have at least read-only access to statistics collector.
1. Add below entries in wrapper.conf (D:\ManageEngine Products\ADManager Plus\conf\wrapper.conf) or run.bat (D:\ManageEngine Products\ADManager Plus\bin\run.bat) file:
#Enable Remote JMXwrapper.java.additional.16=-Dcom.sun.management.jmxremotewrapper.java.additional.17=-Dcom.sun.management.jmxremote.port=1999wrapper.java.additional.18=-Dcom.sun.management.jmxremote.ssl=falsewrapper.java.additional.19=-Dcom.sun.management.jmxremote.authenticate=false
2. To monitor PostgreSQL DB, implement the following changes:
D:\ManageEngine Products\ADManager Plus\pgsql\data\pg_hba.conf
# IPv4 local connections:
#host all all 127.0.0.1/32 trust
host all all 0.0.0.0/0 trust
For PostgreSQL/MS SQL database, statistics will be collected by connecting to the database.
Security/Firewall Requirements:
User Privilege:
To monitor PostgreSQL DB, implement the following changes:
C:\ManageEngine\ServiceDesk\pgsql\data\pg_hba.conf
# IPv4 local connections:
#host all all 127.0.0.1/32 trust
host all all 0.0.0.0/0 trust
The below given step should be followed for SDP versions below 9400:
Whereas, for SDP versions 9400 and above, the step to be followed is:
Mode of Monitoring: Remote JMX
Prerequisites for monitoring ManageEngine OpManager:
1. Add below entries in wrapper.conf file.
C:\ManageEngine\OpManager\conf\wrapper.conf
# Enable Remote JMX wrapper.java.additional.16=-Dcom.sun.management.jmxremote wrapper.java.additional.17=-Dcom.sun.management.jmxremote.port=1999 wrapper.java.additional.18=-Dcom.sun.management.jmxremote.ssl=false wrapper.java.additional.19=-Dcom.sun.management.jmxremote.authenticate=false wrapper.java.additional.20=-Dcom.sun.management.jmxremote.rmi.port=1999 wrapper.java.additional.21=-Djava.rmi.server.hostname=<Hostname/IP address of OpManager>
2. After adding the above entries, save the file and restart OpManager.
Append the following parameters to JAVA_OPTS:
set JAVA_OPTS= %JAVA_OPTS% -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=1999 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.rmi.port=1999-Djava.rmi.server.hostname=<Hostname/IP address of OpManager>
Add the following entry in run.sh:
JAVA_OPTS="$JAVA_OPTS-Dcom.sun.management.jmxremote-Dcom.sun.management.jmxremote.port=1999-Dcom.sun.management.jmxremote.authenticate=false-Dcom.sun.management.jmxremote.ssl=false-Dcom.sun.management.jmxremote.rmi.port=1999-Djava.rmi.server.hostname=<Hostname/IP address of OpManager>"
2. To monitor PostgreSQL DB, do the following changes:
Security/Firewall Requirements:
Minimum User privilege:
Ensure that your environment meets the following prerequisites and configurations for smooth installation and monitoring of the agent.
Version: Ensure the environment has Java version 8 or above.
Note: For Java versions below 8, use Java Agent v5.5, available here.
Note: Please note that it is necessary to restart your application server to start monitoring after the agent installation.
Note: After installing the agent, it is essential to restart your application server for monitoring to begin. For IIS sites, execute the IISRESET command; for Windows services and desktop applications, perform a manual restart of the respective services or apps.
Cisco UCS Manager should be installed and running in the Cisco UCS device while adding the monitor.
Configuring Cisco UCS Manager:
Refer to the following links to learn more about configuring Cisco UCS Manager.
For MSSQL, to run a specific query on a particular database, the database should be provided with "db_datareader" role or "db owner role" or "connect any database" at server level permission for the SQL user account.
To add a file/directory monitor, ensure that the file or directory has Read permission.
To monitor a Windows Performance Counter, use the Cluster Domain Administrator username and password, for which the user account should have the permission to execute WMI queries on root\mscluster namespace in cluster server nodes.
Firewall access for monitoring:
Following are the ports required for monitoring via WMI:
Thank you for your feedback!
It allows us to track crucial metrics such as response times, resource utilization, error rates, and transaction performance. The real-time monitoring alerts promptly notify us of any issues or anomalies, enabling us to take immediate action.
Reviewer Role: Research and Development