|Oracle® Real User Experience Insight User's Guide
12c Release 1 for Linux x86-64
Part Number E26360-03
|PDF · Mobi · ePub|
Oracle Real User Experience Insight (RUEI) provides you with powerful analysis of your network and business infrastructure. You can monitor the real-user experience, set Key Performance Indicators (KPIs) and Service Level Agreements (SLAs), and trigger alert notifications for incidents that violate them.
This guide is intended for all users of RUEI. These can be Administrators, Security Officers, and Business and IT users. These roles are explained in Section 14.2, "Understanding User Roles and Permissions".
This guide is directly relevant to the following users:
Administrators responsible for maintaining the RUEI installation. This includes monitoring the system's health status, performing configuration backups, and for defining the scope of network operations that will be monitored. They are also responsible for creating and maintaining user authorizations.
The Security Officer responsible for managing security-related issues. These include defining which sensitive information (such as credit card details) are omitted from logging, and the installation and management of SSL keys to monitor encrypted data.
All other system users. These can be defined as business or IT users (or both), and their assigned privileges determine the access available to them.
Although no specific technical knowledge is required, some familiarity with network and Web technology is assumed. However, some organizational knowledge is required. In particular:
Administrators should have a firm understanding of network topology, and a good operational knowledge of their organization's network and application environment. In addition, individuals assigned to this role should have a good understanding of RUEI.
Security Officers should possess a firm understanding of security-related issues. Moreover, they should be able to accurately assess the impact of network organizational changes.
As explained earlier, different levels of business and IT users can be defined. Their assigned permissions determine both the level of data to which they have access, and the configuration tasks they can perform. This could include identifying the monitored Web pages, and specifying how visitors to the Web site are identified. Additional activities could include configuring RUEI to reflect the monitored Web site's functional architecture, the definition of Key Performance Indicators (KPIs), and the creation of custom reports. In all cases, the permissions assigned to users should reflect both the appropriate access they require, and their organizational knowledge.
This guide is organized as follows:
Chapter 1, "Getting Started" introduces you to RUEI. It explains the roles and permissions used within RUEI, the appearance of the RUEI interface, and how you can customize it. It should be read by all users.
Chapter 2, "Working With Reports" describes the standard report library provided with RUEI, as well as describing how you can create and modify your own reports. It should be read by all users who work with reports.
Chapter 3, "Working With the Data Browser" describes the use of the Data Browser. It is directly relevant to both business and IT users authorized to access it.
Chapter 4, "Working With the Diagnostics Facility" describes the use of the diagnostics facility to perform root-cause analysis.
Chapter 5, "Working With Dashboards" describes the creation of customized dashboards.
Chapter 6, "Working with KPI Overviews and Alert Lists" describes the use of KPI overviews and alert lists.
Chapter 7, "Setting Up Performance Monitoring" describes how to set up KPIs and SLAs, and how to define alert schedules and notifications for them.
Chapter 8, "Identifying and Reporting Web Pages" describes how to define the pages that will be monitored.
Chapter 9, "Working With User Flows" describes the role of user flows in monitoring network traffic. This includes an explanation of the components that comprise user flows (such as steps, conditions, and events), and their reporting within RUEI.
Chapter 10, "Working With Suites and Web Services" explains the use of suites for the enhanced monitoring of certain Oracle Enterprise architectures. The monitoring of Web services is also described.
Chapter 11, "Monitoring OAM and SSO-Based Traffic" describes how user activity can be monitored within OAM-based traffic. The monitoring of Web traffic where user access control is managed through a SSO mechanism is also explained.
Chapter 12, "Controlling the Reporting of Monitored Traffic" describes how the reporting of monitored traffic can be fine optimized to meet your information requirements.
Chapter 13, "Managing Security-Related Information" describes how to configure and manage the security-related settings used by RUEI. It is directly relevant to Security Officers.
Chapter 14, "Managing Users and Permissions" explains the roles and permissions assigned to users within RUEI, as well as the creation and management of user accounts. The configuration of external user authentication mechanisms (such as LDAP and SSO), and the use of the password settings facility to enforce your organization's security policies, is also described.
Chapter 15, "Monitoring and Maintaining the System" describes how to monitor the status of the system, perform backups and upgrades, issue messages to system users, manage users, and export data from RUEI. This chapter is directly relevant to Administrators.
Appendix A, "Tagging Conventions" provides a detailed description of the page and service tagging schemes supported for use with RUEI.
Appendix B, "Cookie Structures" provides an overview of the cookie technologies that RUEI supports.
Appendix C, "Troubleshooting" highlights the most common problems encountered when using RUEI, and offers solutions to quickly locate and correct them.
Appendix D, "Summary of Data Items" presents a brief explanation of the dimension labels used in RUEI.
Appendix E, "Explanation of Failure Codes" provides an extended explanation of the HTTP result codes, generated by the Web server, that can be send to visitors as replies to requests.
Appendix F, "Working with XPath Queries" provides a detailed explanation of the support available within RUEI for the use of XPath queries.
Appendix G, "Working With National Language Support" provides a detailed discussion of the character encoding standards supported by RUEI when monitoring network traffic. Restrictions to the identification of such things as domain names, custom headers, and functional errors are highlighted. The operation of data masking and user ID matching when working with international character sets is also discussed.
Appendix H, "WebLogic Portal (WLP) Support" provides a detailed description of the support available for the accurate monitoring of WebLogic Portal-based applications.
Appendix I, "Oracle ADF Support" provides a detailed description of the support available for the accurate monitoring of Oracle Application Development Framework (ADF)-based applications.
Appendix J, "PeopleSoft Support" provides a detailed description of the support available for the accurate monitoring of PeopleSoft-based applications.
Appendix K, "Siebel Support" provides a detailed description of the support available for the accurate monitoring of Siebel-based applications.
Appendix L, "Oracle FLEXCUBE Support" provides a detailed description of the support available for the accurate monitoring of Oracle FLEXCUBE-based applications.
Appendix M, "Oracle E-Business Suite (EBS) Support" provides a detailed description of the support available for the accurate monitoring of EBS-based applications.
Appendix N, "JD Edwards Support" provides a detailed description of the support available for the accurate monitoring of JD Edwards EnterpriseOne-based applications.
Section O, "Oracle Fusion Applications Support" provides a detailed description of the support available for the accurate monitoring of OAF-based applications.
Appendix P, "Monitoring NATed Traffic" provides information about how accurate network traffic reporting can be obtained if the RUEI system is placed in front of a Network Address Translation (NAT) device.
Appendix Q, "Verifying Monitored Network Traffic" describes how you can use the TCP diagnostic facility to verify that RUEI "sees" all required network traffic. It is strongly recommended that a network engineer within your organization validates collected network traffic after network changes.
Section R, "GUI Performance Enhancements" describes how you can improve response times within the Reporter interface by increasing the configured Degree of Parallelism (DOP).
Appendix S, "Enriched Data Export Facility" describes the table structure used by the Enriched data export facility.
Appendix T, "Configuring HSM Support" describes the procedure for configuring RUEI to access private keys stored on HSM devices.
Appendix U, "Analyzing User Events" describes how you can analysis user events.
Appendix V, "Standard Report Library" describes the predefined (standard) reports available in the report library.
Appendix W, "Dimensions Available Within Data Browser Groups" provides a detailed listing of the dimensions available within each of the Data Browser groups.
Appendix X, "Third-Party Licenses" contains licensing information about certain third-party products included with RUEI.
Information on Oracle Enterprise Manager is available at the following location:
Detailed technical information is available from My Oracle Support:
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at
Oracle customers have access to electronic support through My Oracle Support. For information, visit
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
For more information, see the following documents in the Oracle Real User Experience Insight (RUEI) documentation set:
Oracle Real User Experience Insight Installation Guide.
Oracle Real User Experience Insight Release Notes.
The latest version of this and other RUEI books can be found at the following location:
RUEI also provides extensive online help. Select the option Help option from the System menu, or click the Help icon within a dialog to display the online help system.
In previous versions of RUEI, users flows were known as transactions.
The following text conventions are used in this document:
|boldface||Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.|
|italic||Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.|
||Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.|