1/44
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Updated Terminology
Conventions
1
Getting Started
1.1
What is RUEI?
1.2
Browser Requirements for RUEI
1.3
Before You Start Using RUEI
1.4
Starting RUEI
1.5
Customizing Your Environment
1.6
Ending Your Session
2
Working With Reports
2.1
Introducing the Report Library
2.2
Customizing the Report Library
2.3
Using the Mailing Facility
2.4
Using the Favorites Facility
2.5
Managing Report Mailings
2.6
Using the Calendar
2.7
Using Report Filters
2.8
Understanding Report Components
2.9
Interpreting Reported Values
2.10
Working With Print Layout Mode
2.10.1
Customizing a Report using Print Layout Mode
2.10.2
Working With Value Lists
2.10.3
Limiting Value Lists
2.10.4
Working in Compare Mode
2.11
Creating New Reports
2.12
Exporting Reports to PDF
2.13
Exporting Report Data
2.13.1
Creating Dynamically Refreshing Dashboards
3
Working With the Data Browser
3.1
Introducing the Data Browser
3.2
Understanding the Data Structure
3.2.1
Real-Time and Session-Based Data
3.2.2
Problem Analysis Groups
3.2.3
Page Delivery Dimension
3.2.4
URL Diagnostics for Problem Analysis
3.2.5
Suite URL Diagnostics for Problem Analysis
3.3
Access to Data Browser Groups
3.4
Working With Value Lists
3.5
Searching in the Data Browser
3.6
Hierarchy View
3.7
Sorting Data
3.8
Moving Backwards and Forwards Within the Data Browser
3.9
Working With Filters
3.9.1
Defining Filters
3.9.2
Working With Multiple Filters
3.9.3
Using Report Filters
3.9.4
Using Advanced Filters
3.10
Comparing Data Across Different Periods
3.11
Exporting Data
3.11.1
Modifying the Exported Data
3.11.2
Selecting the Export Format
3.12
Working With Custom Dimensions
3.12.1
Removing Custom Dimensions
3.13
Customizing Browser Views
4
Working With the Session Diagnostics Feature
4.1
Introduction to Session Diagnostics
4.2
Replaying User Sessions
4.3
Exporting Session Pages to Microsoft Excel
4.4
Exporting Full Session Information
4.5
Controlling Dimension Listing Within Session Diagnostics
4.6
Configuring Clickouts to External Tools
4.7
Monitoring Business Applications
5
Working With Dashboards
5.1
Introduction to Dashboards
5.2
Creating New Dashboards
5.3
Modifying a Dashboard's Contents
5.4
Using Data Access Filters
5.5
Adding a Data Browser or KPI View to a Dashboard
5.6
Creating Public Templates
5.7
Modifying a Template's Properties and Contents
5.8
Creating Templates Based on User Dashboards
5.9
Publishing Templates
5.10
Publishing Template Items
6
Working with KPI Overviews and Alert Lists
6.1
KPI Overviews
6.1.1
Viewing KPI Overviews
6.1.2
Presentation Style
6.1.3
Zooming In and Out
6.1.4
KPIs and Targets
6.1.5
Working with Incomplete Data
6.1.6
Drilling-Down Through Overviews
6.1.7
Working with Alert Logs
6.2
Comparing KPI Behavior
6.3
Working With Alert Lists
6.3.1
Filtering Alerts
6.3.2
Viewing Alerts
7
Identifying and Reporting Web Pages
7.1
Naming Pages
7.2
Tag Based Applications
7.3
Defining Applications
7.3.1
Defining Browser JS Library Settings
7.3.2
Applying Page Naming Translations
7.3.3
Applying Action Translations
7.3.4
Using Advanced Settings to Control the Handling of Pages and Objects
7.3.5
Using the Ruling Facility
7.3.6
Reporting Unclassified Pages
7.3.7
Reporting Service Test Beacon Traffic
7.3.8
Obtaining the Client IP Address
7.3.9
Automatic Page Naming Assignment
7.3.10
Refining Your Application Definitions
7.3.11
Specifying Page Loading Satisfaction
7.3.12
Defining Logout Events
7.3.13
Trapping Application Content Messages
7.3.14
Defining User Identification
7.3.15
Defining Localization Sources
7.3.16
Viewing the Application Page Structure
7.3.17
Locating Page Details
7.3.18
Tracking Page Usage
7.3.19
Specifying Page Content Checks
7.3.20
Manually Identifying Pages
7.3.21
Controlling Reporting Within the Problem Analysis Group
7.3.22
Controlling JavaScript Replay Execution
7.3.23
Defining Action-Naming Schemes
7.3.24
Using Enriched Data Exchange
7.4
Defining Single Sign-On (SSO) Profiles
7.4.1
Understanding How SSO-Enabled Traffic is Monitored
7.4.2
Creating SSO Profiles
7.4.3
Modifying SSO Profiles
7.4.4
Verifying Your SSO Configurations
7.5
Verifying Your Application and Session Tracking Definitions
7.6
Reporting Service Test Traffic
7.6.1
Configuring Service Test Monitoring Within RUEI
8
Setting Up Performance Monitoring
8.1
Introduction to Performance Monitoring
8.2
Defining KPIs and SLAs
8.2.1
Applying a Condition to a KPI
8.2.2
Applying Target Values to a KPI
8.2.3
Applying a Prerequisite to a KPI
8.2.4
Applying a Service Level Agreement to a KPI
8.2.5
Applying an Alert Schedule to a KPI
8.3
Modifying Existing KPIs
8.3.1
Copying Existing KPIs
8.3.2
Understanding KPI Calculation Ranges
8.3.3
Automatic and Fixed Targets
8.4
Defining Service Level Schedules
8.5
Defining Alert Schedules
8.5.1
Defining Alert Profiles
8.5.2
Defining Escalation Procedures
8.5.3
Measuring and Notification Intervals
8.5.4
Testing Alert Messages
8.5.5
Using Mail Notifications
8.5.6
Using SNMP Notifications
8.5.7
Using Text Message Notifications
9
Working With User Flows
9.1
Understanding User Flows
9.2
Defining User Flows
9.3
Modifying User Flows
9.4
Copying User Flows
9.5
Specifying the Default Step Idle Time
9.6
Assigning Monetary Values to User Flows
9.7
Understanding how User Flows are Reported
9.8
Converting Service Test Sessions into User Flows
10
Working With Suites and Web Services
10.1
Working With Suites
10.1.1
Creating Suite Definitions
10.1.2
Uploading Configuration Files
10.1.3
Modifying Suite Definitions
10.1.4
Verifying and Evaluating Your Suite Definitions
10.2
Refining Application Definitions Through Framework Exceptions
10.2.1
URL Pattern Evaluation Order
10.2.2
Moving Framework Exceptions Between Environments
10.3
Defining Web Services
10.3.1
Reporting Unclassified Function Calls
10.3.2
Specifying Function Loading Satisfaction
10.3.3
Trapping Function Call Errors
11
Monitoring OAM and SSO-Based Traffic
11.1
Monitoring OAM 10g-Based Traffic
11.2
Monitoring OAM 11g-Based Traffic
11.3
Defining Single Sign-On (SSO) Profiles
11.3.1
Understanding How SSO-Enabled Traffic is Monitored
11.3.2
Creating SSO Profiles
11.3.3
Modifying SSO Profiles
11.3.4
Verifying Your SSO Configurations
12
Controlling the Reporting of Monitored Traffic
12.1
Viewing a Traffic Summary
12.2
Specifying the Session Tracking Mechanism
12.2.1
Implementing JavaScript Cookie Generation
12.2.2
Specifying the Fallback Session Tracking Mechanism
12.3
Defining Named Web Server Groups
12.3.1
Defining Named Server Identification Sources
12.3.2
Defining the Server Identification Fallback Scheme
12.4
Defining Named Client Groups
12.4.1
Uploading a List of Named Clients
12.4.2
Viewing Named Client Group Information
12.5
Controlling Slow URL and Function Call Reporting
12.6
Ignoring Failed URL Hits
12.7
Filtering Arguments in the Page URL Dimension
12.8
Controlling Session Reporting
12.9
Controlling Rule Ordering Within RUEI
12.10
Specifying Data Retention Policies
12.10.1
Defining Reporter Retention Policies
12.11
Controlling the Reporting of the Current Period
12.12
Specifying KPI and SLA Reporting Precision
12.13
Defining KPI Threshold Profiles
12.14
Setting System-Wide Preferences
12.15
Modifying Client Location Reporting
12.15.1
Uploading a List of Named Locations
12.16
Controlling the Reporting of Objects as Pages
12.17
Controlling the Reporting of Robot Traffic
12.18
Excluding Client Traffic From Data Collection
12.19
Optimizing Page Download and Browser Time Reporting
13
Managing Security-Related Information
13.1
Managing Collector Profiles
13.1.1
Creating Collector Profiles
13.1.2
Modifying Collector Profile Configurations
13.1.3
Assigning Collectors to Different Profiles
13.1.4
Assigning Collectors to Interfaces
13.1.5
Attaching New Collectors
13.1.6
Restarting Collectors
13.1.7
Disabling and Unregistering Collectors
13.2
Managing Processing Engines
13.3
Managing the Scope of Network Based Monitoring
13.4
Defining Network Filters
13.4.1
Defining Server IP Address Filters
13.4.2
Defining VLAN Filters
13.4.3
Limiting Overall Traffic
13.4.4
Verifying Your Load Balancing and Traffic Sampling Definitions
13.5
Managing SSL Keys
13.5.1
Removing SSL Keys
13.5.2
Monitoring Key Expiration
13.6
Masking User Information
13.7
Masking FSR Page Content
13.8
Masking SSL Client Certificates
13.9
Defining Collector Data Retention Policies
13.10
Controlling Replay Policies
13.11
Controlling the Monitoring of Jumbo Frames
13.12
Controlling RUEI User Session Idle Time
14
Managing Users and Permissions
14.1
Introduction to Users and Permissions
14.2
Understanding User Account Roles and Permissions
14.2.1
User Account Roles
14.2.2
User Account Access Level Permissions
14.2.3
System Account Roles Permissions
14.3
Adding New Users
14.4
Modifying Existing Users
14.5
Modifying a User's Settings
14.6
Enforcing Password Security Policies
14.7
Managing the Scope of Authorized Data Within Modules
14.8
Configuring LDAP Server User Authentication
14.9
Configuring Oracle Single Sign-On (SSO) User Authentication
15
Monitoring and Maintaining the System
15.1
Monitoring the Status of the System
15.1.1
Temporary Delays and Alerts
15.2
Viewing the Status of the Collectors
15.3
Configuring System Failure Alerts
15.4
Configuring Database and Disk Space Limits and Alerts
15.5
Viewing a Traffic Summary
15.6
Creating and Restoring Configuration Backups
15.7
Working with the Event Log
15.8
Configuring Text Message Providers
15.9
Creating Helpdesk Reports
15.10
Working in Session Debug Mode
15.11
Managing the E-Mail Configuration
15.12
Resetting the System
15.13
Customizing Data Translations
A
Tagging Conventions
A.1
Page Tagging Conventions
A.2
Service Tagging Conventions
B
Cookie Structures
B.1
Session Tracking Using URL Arguments
C
Troubleshooting
C.1
Oracle Web Sites
C.2
Contacting Customer Support
C.3
General (Non-specific) Problems
C.4
Starting Problems
C.5
Delays in Reported Data
C.6
SNMP Alert Issues
C.7
Text Message Alert Issues
C.8
Time Zone Issues
C.9
Data Monitoring Appears To Have Stopped
C.10
Collector Crashes Do Not Generate Core Dumps
C.11
Deliberately Forced Core Dumps Reported in Event Log
C.12
Memory Allocation Error
C.13
Multiple User Sessions Receiving the Same Cookie Value
C.14
Recovery of Objects After a Database Crash
D
Explanation of Failure Codes
D.1
Failure web site-error
D.1.1
Failure web site-error http-bad-request (400)
D.1.2
Failure web site-error http-unauthorized (401)
D.1.3
Failure web site-error http-payment-req (402)
D.1.4
Failure web site-error http-forbidden (403)
D.1.5
Failure web site-error http-not-found (404)
D.1.6
Failure web site-error http-method-not-allowed (405)
D.1.7
Failure web site-error http-not-acceptable (406)
D.1.8
Failure web site-error http-proxy-authentication (407)
D.1.9
Failure web site-error http-request-timeout (408)
D.1.10
Failure web site-error http-conflict (409)
D.1.11
Failure web site-error http-gone (410)
D.1.12
Failure web site-error http-length-required (411)
D.1.13
Failure web site-error http-precondition-failed (412)
D.1.14
Failure web site-error http-entity-too-large (413)
D.1.15
Failure web site-error http-URI-too-long (414)
D.1.16
Failure web site-error http-media-not-supp (415)
D.1.17
Failure web site-error http-invalid-range (416)
D.1.18
Failure web site-error http-expect-failed (417)
D.2
Failure server-error
D.2.1
Failure server-error internal-error (500)
D.2.2
Failure server-error not-implemented (501)
D.2.3
Failure server-error dispatch-error (502)
D.2.4
Failure server-error service-unavailable (503)
D.2.5
Failure server-error dispatch-timeout (504)
D.2.6
Failure server-error version-not-supported (505)
D.3
Failure no-server-response
D.4
Failure network-error
E
Summary of Data Items
E.1
Data Terms
E.2
KPI Metrics
E.3
Dimensions
E.4
Data Collection
E.4.1
Dynamic and Static Content
E.4.2
Page and Hit Correlation
E.4.3
End-to-end, Server, and Network Times
E.4.4
Page Load Time and End-to-End Time
E.4.5
Browser Loading and Page Reading Times
E.4.6
Reported Page Views
E.4.7
Dimension Level Values
E.4.8
Network Traffic Compression
E.5
Aggregating Data
F
Working with XPath Queries
F.1
Introduction to XPath
F.2
Namespace Support
F.3
Understanding Namespaces Prefixes and URLs
F.4
Using Third-Party XPath Tools
F.5
Optimizing XPath Scanning
F.6
XPath on JSON Content
F.7
Testing XPath Expressions Using xpathtester Utility
G
Working with National Language Support
G.1
Introduction
G.2
Implementation Considerations
G.3
Specifying Content Checks
G.4
Specifying the URL Argument/Collector Encoding
H
WebLogic Portal (WLP) Support
H.1
Introduction
H.2
Creating WLP Suite Definitions
H.3
Synchronizing RUEI with your WLP Environment
H.4
Specifying the Cookie Technology
H.5
Configuring User Authentication
H.6
Suite Definition Mappings
H.7
Data Items
H.8
Known Limitations
I
Oracle ADF Support
I.1
Introduction to ADF
I.2
Creating Oracle ADF Suite Definitions
I.3
Enabling Monitoring of ADF Applications
I.4
Specifying the Cookie Technology
I.5
ADF Reporting
I.6
ADF Pages and Session Diagnostics
I.7
Data Items
J
WebCenter
J.1
Creating WebCenter Suite Definitions
J.2
Ensuring the Reporting of All WebCenter Sites Dimensions
J.3
Enabling Monitoring of WebCenter Portal Applications
J.4
Specifying the Cookie Technology
J.5
Data Items
K
PeopleSoft Support
K.1
Introduction to PeopleSoft
K.2
Verifying the Scope of Monitoring
K.3
Creating PeopleSoft Suite Definitions
K.4
Running the create_PSFT_info.sh Script
K.5
Verifying the Cookie Technology
K.6
Hostnames and URL Prefixes
K.7
Database Tables
K.8
Data Items
K.9
Resources
K.10
Known Limitations
L
Siebel Support
L.1
Introduction to Siebel
L.2
Creating Siebel Suite Definitions
L.3
Verifying the Cookie Technology
L.4
Obtaining the User Logon
L.5
Hostnames and URL Prefixes
L.6
Sessions
L.7
Actions and Pages
L.8
Functional Error Recognition
L.9
Data Items
L.10
Interpreting Siebel Login Data
L.11
Known Limitations
M
Oracle FLEXCUBE Support
M.1
Introduction to Oracle FLEXCUBE
M.2
Verifying the Scope of Monitoring
M.3
Creating Oracle FLEXCUBE Suite Definitions
M.4
Running the create_FCUB_info.sh and create_FCDB_info.sh Scripts
M.5
Verifying the Cookie Technology
M.6
FCDB Portal Recognition
M.7
Hostnames and URL Prefixes
M.8
Database Tables
M.8.1
FCDB Customizations
M.8.2
FCUB Customizations
M.9
Data Items
M.10
Known Limitations
N
Oracle Forms and Oracle E-Business Suite Support
N.1
Introduction
N.2
Working Within a Forms-Only Environment
N.3
Verifying the Scope of Monitoring
N.4
Creating EBS Suite Definitions
N.5
Specifying the Tracking Technology
N.5.1
Configuring Custom Cookies
N.5.2
Verifying the Cookie Configuration from EBS
N.5.3
Verifying the Cookie Configuration from RUEI
N.5.4
Session Tracking, Correlation Variable, and Session URL argument
N.6
Specifying the Forms Server Mode Timeout
N.7
Synchronizing RUEI With the EBS Production Environment
N.8
Checking Socket and Servlet Mode
N.9
Hostnames and URL Prefixes
N.10
Database Tables
N.11
Actions, Pages, and Objects
N.12
Functional Errors
N.13
Forms Name Reporting
N.14
Additional Message Reporting
N.15
OA Framework Page Name Deduction
N.16
Page Context
N.16.1
Request and Page Boundaries
N.17
Data Items
N.18
Resources
N.19
Known Limitations
N.20
Troubleshooting EBS Applications
N.20.1
Network Traffic Does Not Appear to be Measured
N.20.2
A Large Number of Unidentified Actions are Reported
N.20.3
Configuring user-id Recognition in a Forms Only Environment
N.20.4
Create_EBS_info.pl Script Reports FRM-91500 Error
N.20.5
Perl Zip Functionality is not Available
N.20.6
The frmcmp_batch Script Fails
N.20.7
create_EBS_info.pl Script Generates Warnings/Errors
O
JD Edwards Support
O.1
Introduction to JD Edwards
O.2
Verifying the Scope of Monitoring
O.3
Creating JD Edwards Suite Definitions
O.4
Running the create_JDE_info.sh Script
O.4.1
Creating the Info Files Manually
O.5
Verifying the Cookie Technology
O.6
Hostnames and URL Prefixes
O.7
Data Items
O.8
Known Limitations
P
Oracle Fusion Applications Support
P.1
Introduction
P.2
Creating Oracle Fusion Applications Suite Definitions
P.3
Running the create_FUS_info.pl Script
P.4
Functional Errors
P.5
Data Items
P.6
Known Limitations
Q
Monitoring NATed Traffic
Q.1
Placement Before NAT Devices
Q.2
Obtaining the End-User IP Address
Q.3
Obtaining the IP Address of the Replying Web Server
R
Verifying Monitored Network Traffic
R.1
Introduction
R.2
Creating Traffic Snapshots
R.3
Analyzing Traffic Information
S
Enriched Data Export Facility
S.1
Exporting Enriched Data
S.2
Enriched Data Exchange Database Table Structures
S.2.1
Country and Region Reporting
S.3
KPI Data Exchange Database Table Structures
T
Configuring HSM Support
T.1
Introduction
T.2
Installing and Configuring the HSM Vendor Software
T.3
Configuring the Collector Systems
T.4
Configuring HSM Keys
T.5
Verifying Correct Monitoring of HSM-Based Traffic
U
Standard Report Library
U.1
Report Categories
U.2
Suite-Specific Reports
U.3
Transaction Category
V
Dimensions Available Within Data Browser Groups
V.1
All Pages, All Sessions, Key Pages, and Service Tests Groups
V.2
User Flow
V.3
All Functions, Failed Functions, and Slow Functions Groups
V.4
Failed Pages
V.5
Failed URLs and Slow URLs
V.6
URL Diagnostics
V.7
E-Business Suite and Siebel
V.8
ADF Frameworks and Fusion Applications
V.9
PeopleSoft Applications
V.10
FLEXCUBE Banking Applications
V.11
JD Edwards EnterpriseOne Applications
V.12
WebLogic Portals
V.13
WebCenter Applications
W
Explanation of Event Log Codes
X
Application Performance Index
Y
Third-Party Licenses
Y.1
Apache Software License, Version 2.0
Y.2
OpenSSL
Y.3
PHP
Y.4
Java Runtime Environment
Y.5
The MIT License (MIT)
Index
Scripting on this page enhances content navigation, but does not change the content in any way.