EncartaLabs

HP Real User Monitor

( Duration: 3 Days )

The HP Real User Monitor training course offers technical personnel who are new to Real User Monitor (RUM) the opportunity to develop hands-on experience in applying the fundamental concepts, principles, and methodologies for managing the administration and configuration aspects of this enterprise software performance monitoring and service management solution.

This course is recommended for individuals who are responsible for providing operational visibility into the performance and availability aspects of mission-critical applications.

By attending this HP Real User Monitor workshop, Participants will learn to:

  • Describe the architecture of a RUM implementation
  • Install and configure the RUM Windows Probe
  • Install and configure the RUM Engine
  • Configure RUM monitoring of a three-tier application (web, application, and database server) from BSM
  • Explain RUM reporting data
  • Size and tune RUM
  • Configure RUM monitoring for secure web applications that use SSL Java Key Store (JKS)
  • Troubleshoot RUM issues using the RUM logs

Working knowledge of the following:

  • Application monitoring fundamentals
  • BSM software
  • HTTP(S), including managing certificates and keystores
  • Systems, network, and database administration
  • IT Infrastructure Library (ITIL) concepts and terminology
  • Industry-standard operating systems
  • Network, system, and application monitoring principles and practices

New users of Real User Monitor (RUM), including:

  • Database Administrators
  • System Administrators
  • Network Administrators
  • Operations Managers
  • Operations Managers

COURSE AGENDA

1

Course Overview

  • Describe the architecture of a RUM implementation
  • Install and configure the RUM Windows Probe
  • Install and configure the RUM Engine
  • Configure RUM monitoring of a three-tier application (web, application, and database server) from BSM
  • Explain RUM reporting data
  • Size and tune RUM
  • Configure RUM monitoring for secure web applications that use SSL Java Key Store (JKS)
  • Troubleshoot RUM issues using the RUM logs
2

Introducing Real User Monitoring

  • Define the need, features, and value proposition of RUM
  • Describe RUM as part of Application Performance Management (APM)
  • Describe use cases
  • Describe RUM architecture
  • Identify key monitoring concepts
  • Deploy RUM
3

Installing the RUM Probe

  • List the hardware and OS requirements for the RUM Probe
  • Connect the Probe
4

Installing the RUM Engine

  • List the hardware, software, OS, and system requirements for RUM Engine installation
  • Install the RUM Engine
  • Connect the RUM Engine to the BSM Gateway server
  • Connect the RUM Engine to the RUM Probe
  • Verify that the RUM Probe is running
5

Session ID and Traffic Discovery

  • Define sessionizing
  • Explain the steps to configure a session-aware application
  • Run traffic discovery
  • Run session ID detection
  • Configure RUM application session IDs
  • Verify session IDs configurations
6

Monitoring HTTP Applications

  • Define and use RUM applications
  • Define and use actions/pages
  • Define and use transactions
  • Define and use events
7

Monitoring End-User Groups

  • Define end-user groups
  • Use RUM end-user groups and location reports
8

Monitoring Non-HTTP Applications

  • Defining non-HTTP applications
  • Report on non-HTTP applications
9

Monitoring Multi-Tier Applications

  • Define tiers for HTTP application
  • Use RUM multi-tier reports
  • Define Transaction Management
10

Monitoring TCP Applications

  • Define generic TCP applications
  • Define UDP applications
  • Use RUM TCP reports
11

Using Production Analysis and Business Process Recognition (BPR) Reports

12

Consuming RUM Data in BSM Business Applications

  • Work with HP UCMDB
  • Identify RTSM features
  • Identify RTSM architecture
  • Identify RTSM CI types and topologies
  • Use RTSM views
  • Work with Service Health HIs/KPIs
  • Use MyBSM pages/components
  • Identify SLM components
13

Configuring RUM Alerts

14

Monitoring SSL Traffic

  • Define the Secure Sockets Layer (SSL)
  • Manage SSL keys
  • Define common Java Keytool and keystore commands
  • Monitor SSL traffic
15

Monitoring RUM Transaction Flow

  • Define RUM transaction monitoring
  • Define ATT-TV-Diagnostics discovery backend
  • Perform transaction monitoring with RUM
  • Identify transaction monitoring reports
  • Understand transaction management
  • Implement transaction management configuration
  • Identify transaction management application/reports
16

Using the RUM Engine Web Console

  • Navigate the RUM Engine web console
  • List the various tools and menu options in the RUM Engine web console
17

Securing and Hardening RUM

  • List common RUM security objections
  • Mask sensitive data in RUM
  • Define application-sensitive data settings
  • Harden RUM
18

Sizing and Tuning RUM

  • Identify sizing considerations for the RUM Engine, Probe, and database
  • Define Engine, database, and Probe sizing
  • Use the RUM sizing calculator
  • Configure RUM to optimally process information
19

Troubleshooting RUM

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 4,000 Modules on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting http://encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top