|Oracle® Real User Experience Insight User's Guide
Release 6.5.1 for Linux x86-64
Part Number E18053-01
Oracle Real User Experience Insight (RUEI) provides you with powerful analysis of your network and business infrastructure. You can monitor the real-user experience, set Key Performance Indicators (KPIs) and Service Level Agreements (SLAs), and trigger alert notifications for incidents that violate them.
This guide is intended for all users of RUEI. These can be Administrators, Security Officers, and Business and IT users. These roles are explained in Section 1.4, "Understanding User Roles and Permissions".
This guide is directly relevant to the following users:
Administrators responsible for maintaining the RUEI installation. This includes monitoring the system's health status, performing configuration backups, and for defining the scope of network operations that will be monitored. They are also responsible for creating and maintaining user authorizations.
The Security Officer responsible for managing security-related issues. These include defining which sensitive information (such as credit card details) are omitted from logging, and the installation and management of SSL keys to monitor encrypted data.
All other system users. These can be defined as business or IT users (or both), and their assigned privileges determine the access available to them. This is fully explained in Section 1.4, "Understanding User Roles and Permissions".
Although no specific technical knowledge is required, some familiarity with network and Web technology is assumed. However, some organizational knowledge is required. In particular:
Administrators should have a firm understanding of network topology, and a good operational knowledge of their organization's network and application environment. In addition, individuals assigned to this role should have a good understanding of RUEI.
Security Officers should possess a firm understanding of security-related issues. Moreover, they should be able to accurately assess the impact of network organizational changes.
As explained earlier, different levels of business and IT users can be defined. Their assigned permissions determine both the level of data to which they have access, and the configuration tasks they can perform. This could include identifying the monitored Web pages, and specifying how visitors to the Web site are identified. Additional activities could include configuring RUEI to reflect the monitored Web site's functional architecture, the definition of Key Performance Indicators (KPIs), and the creation of custom reports. In all cases, the permissions assigned to users should reflect both the appropriate access they require, and their organizational knowledge.
This guide is organized as follows:
Chapter 1, "Getting Started" introduces you to RUEI. It explains the roles and permissions used within RUEI, the appearance of the RUEI interface, and how you can customize it. It should be read by all users.
Chapter 2, "Working With Reports" describes the standard report library provided with RUEI, as well as describing how you can create and modify your own reports. It should be read by all users who work with reports.
Chapter 3, "Working With the Data Browser" describes the use of the data browser. It is directly relevant to both business and IT users authorized to access it.
Chapter 4, "Working with KPI Overviews and Alert Lists" describes the use of KPI overviews and alert lists.
Chapter 5, "Setting Up Performance Monitoring" describes how to set up KPIs and SLAs, and how to define alert schedules and notifications for them.
Chapter 6, "Defining Pages and User Flows" describes how to define the pages that will be monitored, how to define the Web pages for which you want additional information to be available, the logical sequence of pages in user flows to be monitored, and those pages that should be monitored for the occurrence of specific text strings.
Chapter 7, "Defining the Web Site Configuration" describes how to manage the basic Web site configuration used for monitoring. This includes the required Web sites, the page naming to be used, and the page content and site error checks to be implemented.
Chapter 8, "Managing Security-Related Information" describes how to configure and manage the security-related settings used by RUEI. It is directly relevant to Security Officers.
Chapter 9, "Monitoring and Maintaining the System" describes how to monitor the status of the system, perform backups and upgrades, issue messages to system users, manage users, and export data from RUEI. This chapter is directly relevant to Administrators.
Appendix A, "Tagging Conventions" provides a detailed description of the page and service tagging schemes supported for use with RUEI.
Appendix B, "Cookie Structures" provides an overview of the cookie technologies that RUEI supports.
Appendix C, "Troubleshooting" highlights the most common problems encountered when using RUEI, and offers solutions to quickly locate and correct them.
Appendix D, "Summary of Data Items" presents a brief explanation of the dimension labels used in RUEI.
Appendix E, "Explanation of Failure Codes" provides an extended explanation of the HTTP result codes, generated by the Web server, that can be send to visitors as replies to requests.
Appendix F, "Working with XPath Queries" provides a detailed explanation of the support available within RUEI for the use of XPath queries.
Appendix G, "Working With National Language Support" provides a detailed discussion of the character encoding standards supported by RUEI when monitoring network traffic. Restrictions to the identification of such things as domain names, custom headers, and functional errors are highlighted. The operation of data masking and user ID matching when working with international character sets is also discussed.
Appendix H, "WebLogic Portal (WLP) Support" provides a detailed discussion of the support available for the accurate monitoring of WebLogic Portal-based applications.
Appendix I, "Oracle ADF Support" provides a detailed discussion of the support available for the accurate monitoring of Oracle Application Development Framework (ADF)-based applications.
Appendix J, "PeopleSoft Support" provides a detailed discussion of the support available for the accurate monitoring of PeopleSoft-based applications.
Appendix K, "Siebel Support" provides a detailed discussion of the support available for the accurate monitoring of Siebel-based applications.
Appendix L, "Oracle FLEXCUBE Support" provides a detailed discussion of the support available for the accurate monitoring of Oracle FLEXCUBE-based applications.
Appendix M, "Oracle E-Business Suite (EBS) Support" provides a detailed discussion of the support available for the accurate monitoring of EBS-based applications.
Appendix N, "JD Edwards Support" provides a detailed discussion of the support available for the accurate monitoring of JD Edwards EnterpriseOne-based applications.
Appendix O, "Monitoring NATed Traffic" provides information about how accurate network traffic reporting can be obtained if the RUEI system is placed in front of a Network Address Translation (NAT) device.
Appendix P, "Verifying Monitored Network Traffic" describes how you can use the TCP diagnostic facility to verify that RUEI "sees" all required network traffic. It is strongly recommended that a network engineer within your organization validates collected network traffic after network changes.
Section Q, "GUI Performance Enhancements" describes how you can improve response times within the Reporter interface by increasing the configured Degree of Parallelism (DOP).
Appendix R, "Third-Party Licenses" contains licensing information about certain third-party products included with RUEI.
Information on a wide variety of topics is available via the Oracle Web site (
http://www.oracle.com/enterprise_manager/user-experience-management.html). It is recommended that you visit it regularly for support announcements.
In addition, detailed technical information is available via the Support Web site (
https://metalink.oracle.com). This includes FAQs, training material, tips and tricks, and the latest version of the product documentation. A valid user name and password is required to access this Web site.
Our goal is to make Oracle products, services, and supporting documentation accessible to all users, including users that are disabled. To that end, our documentation includes features that make information available to users of assistive technology. This documentation is available in HTML format, and contains markup to facilitate access by the disabled community. Accessibility standards will continue to evolve over time, and Oracle is actively engaged with other market-leading technology vendors to address technical obstacles so that our documentation can be accessible to all of our customers. For more information, visit the Oracle Accessibility Program Web site at
Screen readers may not always correctly read the code examples in this document. The conventions for writing code require that closing braces should appear on an otherwise empty line; however, some screen readers may not always read a line of text that consists solely of a bracket or brace.
This documentation may contain links to Web sites of other companies or organizations that Oracle does not own or control. Oracle neither evaluates nor makes any representations regarding the accessibility of these Web sites.
Oracle customers have access to electronic support through My Oracle Support. For information, visit
http://www.oracle.com/support/contact.html or visit
http://www.oracle.com/accessibility/support.html if you are hearing impaired.
For more information, see the following documents in the Oracle Real User Experience Insight (RUEI) documentation set:
Oracle Real User Experience Insight Installation Guide.
The latest version of this and other RUEI books can be found at:
RUEI also provides extensive online help. Select the option Help option from the System menu, or click the Help icon within a dialog to display the online help system.
In previous versions of RUEI, users flows were known as transactions.
The following text conventions are used in this document:
|boldface||Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.|
|italic||Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.|
||Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.|