Skip Headers
Oracle® Real User Experience Insight Installation Guide
Release 6.5.0 for Linux x86-64

Part Number E17370-02
Go to Documentation Home
Go to Book List
Book List
Go to Table of Contents
Go to Index
Go to Feedback page
Contact Us

Go to previous page
Go to next page
View PDF

6 Configuring RUEI

This chapter describes the procedure for initially configuring RUEI. This task is performed by the individual within your organization who has been assigned the role of RUEI Super Administrator (this is, the admin user). For more information about roles, see the Oracle Real User Experience User's Guide.


It is strongly recommended that a network engineer within your organization validates collected network traffic after configuring RUEI. The procedure to do this is described in Appendix C, "Verifying Monitored Network Traffic".


In order to get RUEI up and running, you will need to have prepared the server systems for RUEI, and installed the RUEI software. This is described in Chapter 4, "Installing the RUEI Software". After that, you are required to specify the installation type and mail setup (described in Performing Initial RUEI Configuration), and then perform some post-installation configuration (described in Performing Post-Installation Configuration). This is necessary in order to start reporting. It includes deciding how pages and users will be identified, and specifying the scope of monitoring in your network environment. Finally, you will need to define the system's initial users, as described in Authorizing Initial Users. Note that if you are installing a split-server configuration, you will need to configure each Collector system. This is described in Configuring a Collector System.


The configuration of RUEI should be discussed with someone with a detailed knowledge of your organization's network topology.

Performing Initial RUEI Configuration

In order for RUEI to start data monitoring and reporting, it must be configured with some information about your network infrastructure. Once completed, user traffic reporting is available. Note that this initial configuration can be changed later, as necessary. It is only intended to provide RUEI with sufficient information to start real-user monitoring and reporting.

To perform the initial RUEI configuration, do the following:

  1. Start the Initial setup wizard by pointing your browser at https://Reporter/ruei. The dialog shown in Figure 6-1 appears:

    Figure 6-1 Logon Dialog Box

    Description of Figure 6-1 follows
    Description of "Figure 6-1 Logon Dialog Box"

    Specify the admin user, and the password defined with the set-admin-password script (defined in Installation of the Reporter Software). When ready, click Login. The dialog shown in Figure 6-2 appears.


    The first time a user logs on, they receive a warning that the Web server was unable to verify the identify of the site's certificate. Depending on your security policies, you can either choose to accept this certificate permanently, temporarily for this session, or reject the certificate. Alternatively, you can purchase a certificate from a Certificate Authority (CA). You can also create an SSL certificate. For more information, visit

    Figure 6-2 Initial Setup Wizard Dialog

    Description of Figure 6-2 follows
    Description of "Figure 6-2 Initial Setup Wizard Dialog"

  2. Click Next to proceed with configuration. The dialog shown in Figure 6-3 appears:

    Figure 6-3 Mail Setup Dialog

    Description of Figure 6-3 follows
    Description of "Figure 6-3 Mail Setup Dialog"

  3. Specify the requested information. The e-mail information is used to configure RUEI's interface to your internal network, and will be used for reporting problems. When you have entered the required information, click Next. The dialog shown in Figure 6-4 appears.

    Figure 6-4 Settings Overview Dialog

    Description of Figure 6-4 follows
    Description of "Figure 6-4 Settings Overview Dialog"

  4. Check that the information specified in the settings overview is correct. You can use Back and Next to move between dialogs as necessary. When ready, click Next. The dialog shown in Figure 6-5 appears.

    Figure 6-5 Applying Settings Dialog

    Description of Figure 6-5 follows
    Description of "Figure 6-5 Applying Settings Dialog"

  5. This dialog indicates how far the system has got in applying your specified settings. Typically, this process takes a maximum of 15 minutes. When finished, click Finish to close the dialog.

Configuring a Collector System

To register a Collector to a Reporter system, do the following:

  1. Within the Reporter system, select System, then Maintenance, and then Network data collectors. The Network data collectors window appears.

  2. Select Configuration, and then Register remote Collector. The Register Collector dialog shown in Figure 6-6 appears.

    Figure 6-6 Register Collector Dialog

    Description of Figure 6-6 follows
    Description of "Figure 6-6 Register Collector Dialog"

  3. Enter the IP address of the Collector. Optionally, you can also specify a brief description of the attached Collector. When ready, click Register. On return to the Network data collectors window, the new Collector should be listed.

Resetting a Collector System

If for any reason you need to register a Collector system with a different Reporter system than earlier configured, do the following:

  1. Logon to the Collector system as the moniforce user, and remove the Collector's currently defined Reporter assignment by issuing the following commands:

    su - moniforce
    appsensor delete wg
  2. Follow the procedure described in Configuring a Collector System to register the Collector with the required Reporter.

Performing Post-Installation Configuration

In order to start reporting, the RUEI needs certain information about the monitored network environment. It is important to understand that RUEI is designed to work within a wide range of network environments. Therefore, the configuration choices you make will affect the accuracy and usability of the reported data. It is strongly recommended that you carefully review the settings described in this section.

Specifying the Cookie Technology

Within RUEI, session information is based on cookies. Therefore, RUEI needs to know and understand the cookie technology (or technologies) your organization is using. The procedure to configure this is described in the Oracle Real User Experience Insight User's Guide. The structure of supported cookie technologies is also explained in the Oracle Real User Experience Insight User's Guide.

If cookie information is not available, user tracking is based on visitor IP address. This can lead to unreliable session information. For example, in the case of users behind a proxy server, all users coming from that network would be identified as the same user.

Adding/Uploading HTTPS SSL Keys

Uploading SSL keys to the system is extremely important if most of your HTTP traffic is based on SSL sessions. Without the SSL keys being available to the system, the Collector will not be able to decrypt the SSL session traffic. In these circumstances, further configuration of cookies, user identification, and application pages would make little sense. Ensure that you upload and activate your HTTPS SSL keys as early on as possible in the configuration process. The management of SSL keys is fully described in the Oracle Real User Experience Insight User's Guide.

Specifying How Users are Identified

Within RUEI, user identification is first based on the HTTP Authorization field. After that, it is derived from the supplied GET/POST argument within URLs. Therefore, if you are using arguments within URLs, the item within these used for user identification must be specified in order to provide reliable results. This is fully described in the Oracle Real User Experience Insight User's Guide.

Naming Pages

Page identification within RUEI is based on applications. Essentially, an application is a collection of Web pages. This is because pages on a Web site are typically bound to a particular application. For each page that the system detects, it uses the available application definitions to assign a name to it. Note that information about any pages that could not be identified using these definitions is discarded, and, therefore, not available through reports and the data browser. This is fully described in the Oracle Real User Experience User's Guide.

Specifying the Scope of Monitoring

Within RUEI, you control the scope of traffic monitoring by specifying which TCP ports the SYSTEM should monitor. Obviously, no information is available for non-monitored ports. In addition, you can restrict monitoring to specific servers and subnets. This is fully described in the Oracle Real User Experience Insight User's Guide.

Authorizing Initial Users

In order for users to start working with RUEI, you will need to authorize the required users. Only one user, admin, is available after installation. The procedure to set the initial admin user password is described in Installation of the Reporter Software. All other required users must be created and assigned the necessary roles and access permissions through the Reporter GUI. In particular, it is recommended that you create a dedicated Security Officer account to finalize the security-related configuration. User roles, creation and management are fully described in the Oracle Real User Experience Insight User's Guide.

Note that user names and passwords are case sensitive. For ease of entry, it is recommended that you do not include any diacritic characters, such as umlauts, within passwords.

Verifying and Evaluating Your Configuration

To ensure the quality and quantity of data being collected and analyzed by your RUEI system, it is strongly advised that you verify the system's configuration using some core metrics. These are described in the following sections.

Viewing a Traffic Summary

You can open an overview of the monitored network traffic by selecting System, then Status, and then Data processing. This provides you with immediate information about hits, pages, and session processing, as well as the system load. An example is shown in Figure 6-7:

Figure 6-7 Data Processing Dialog

Description of Figure 6-7 follows
Description of "Figure 6-7 Data Processing Dialog"

The precise number of percentage of identified sessions, page views, and hits relies heavily on your exact configuration. If you intend to measure all traffic, it is recommended that at least 80% of sessions, page views, and hits are reported as "identified". It is also recommended that you regularly review the reported numbers and percentages to ensure the quality and quantity of reported data.


After initial configuration of cookies, user identification, and application page structure, the system will take at least 5 - 10 minutes before the Sessions/Hits/Page views tabs are updated with green bars. If, after 20 - 30 minutes after initial configuration, there are no green bars showing on any of the tabs, please review your initial RUEI configuration. If the bars do not indicate any activity at all, please review your system's network card configuration as outlined in Network Requirements

Confirming Data Collection

At this point, RUEI should be collecting data from each of its associated Collectors. You can easily check the status of these Collectors by selecting System, then Status, and then Collector status. This opens the Network data collectors window. This is fully described in the Oracle Real User Experience Insight User's Guide.

It is important to understand that the data being collected by Collector system(s) is offered to the RUEI data processing module for further analysis. If no data is collected, there is no means by which it can be processed.