Preface

Oracle Real User Experience Insight (RUEI) provides you with powerful analysis of your network and business infrastructure. RUEI helps you to monitor real-user experience, set Key Performance Indicators (KPIs) and Service Level Agreements (SLAs), and send alerts when the thresholds are reached.

Audience

This guide is intended for all users of RUEI. These can be Administrators, Security Officers, and Business and IT users. These roles are explained in Understanding User Account Roles and Permissions.

This guide is directly relevant to the following users:

  • Administrators responsible for maintaining the RUEI installation. This includes monitoring the system's health status, performing configuration backups, and for defining the scope of network operations that will be monitored. They are also responsible for creating and maintaining user authorizations.

  • The Security Officer responsible for managing security-related issues. These include defining which sensitive information (such as credit card details) are omitted from logging, and the installation and management of SSL keys to monitor encrypted data.

  • All other system users. These can be defined as business or IT users (or both), and their assigned privileges determine the access available to them.

Prerequisites

Although no specific technical knowledge is required, some familiarity with network and web technology is assumed. However, some organizational knowledge is required. In particular:

  • Administrators should have a firm understanding of network topology, and a good operational knowledge of their organization's network and application environment. In addition, individuals assigned to this role should have a good understanding of RUEI.

  • Security Officers should possess a firm understanding of security-related issues. Moreover, they should be able to accurately assess the impact of network organizational changes.

  • As explained earlier, different levels of business and IT users can be defined. Their assigned permissions determine both the level of data to which they have access, and the configuration tasks they can perform. This could include identifying the monitored web pages, and specifying how visitors to the website are identified. Additional activities could include configuring RUEI to reflect the monitored web site's functional architecture, the definition of Key Performance Indicators (KPIs), and the creation of custom reports. In all cases, the permissions assigned to users should reflect both the appropriate access they require, and their organizational knowledge.

Using This Guide

This guide is organized as follows:

  • Getting Started introduces you to RUEI. It explains the roles and permissions used within RUEI, the appearance of the RUEI interface, and how you can customize it. It should be read by all users.

  • Working With Reports describes the standard report library provided with RUEI, as well as describing how you can create and modify your own reports. It should be read by all users who work with reports.

  • Working With the Data Browser describes the use of the Data Browser. It is directly relevant to both business and IT users authorized to access it.

  • Working With the Session Diagnostics Feature describes the use of session diagnostics to perform root-cause analysis.

  • Working With Dashboards describes the creation of customized dashboards.

  • Working with KPI Overviews and Alert Lists describes the use of KPI overviews and alert lists.

  • Setting Up Performance Monitoring describes how to set up KPIs and SLAs, and how to define alert schedules and notifications for them.

  • Identifying and Reporting Web Pages describes how to define the pages that will be monitored.

  • Working With User Flows describes the role of user flows in monitoring network traffic. This includes an explanation of the components that comprise user flows (such as steps, conditions, and events), and their reporting within RUEI.

  • Working With Suites and Web Services explains the use of suites for the enhanced monitoring of certain Oracle Enterprise architectures. The monitoring of web services is also described.

  • Monitoring OAM and SSO-Based Traffic describes how user activity can be monitored within OAM-based traffic. The monitoring of web traffic where user access control is managed through a SSO mechanism is also explained.

  • Controlling the Reporting of Monitored Traffic describes how the reporting of monitored traffic can be fine optimized to meet your information requirements.

  • Managing Security-Related Information describes how to configure and manage the security-related settings used by RUEI. It is directly relevant to Security Officers.

  • Managing Users and Permissions explains the roles and permissions assigned to users within RUEI, as well as the creation and management of user accounts. The configuration of external user authentication mechanisms (such as LDAP and SSO), and the use of the password settings facility to enforce your organization's security policies, is also described.

  • Monitoring and Maintaining the System describes how to monitor the status of the system, perform backups and upgrades, issue messages to system users, manage users, and export data from RUEI. This chapter is directly relevant to Administrators.

  • Tagging Conventions provides a detailed description of the page and service tagging schemes supported for use with RUEI.

  • Cookie Structures provides an overview of the cookie technologies that RUEI supports.

  • Troubleshooting highlights the most common problems encountered when using RUEI, and offers solutions to quickly locate and correct them.

  • Explanation of Failure Codes provides an extended explanation of the HTTP result codes, generated by the web server, that can be send to visitors as replies to requests.

  • Summary of Data Items presents a brief explanation of the data items and KPI metrics used in RUEI.

  • Working with XPath Queries provides a detailed explanation of the support available within RUEI for the use of XPath queries.

  • Working with National Language Support provides a detailed discussion of the character encoding standards supported by RUEI when monitoring network traffic. Restrictions to the identification of such things as domain names, custom headers, and functional errors are highlighted. The operation of data masking and user ID matching when working with international character sets is also discussed.

  • WebLogic Portal (WLP) Support provides a detailed description of the support available for the accurate monitoring of WebLogic Portal-based applications.

  • Oracle ADF Support provides a detailed description of the support available for the accurate monitoring of Oracle Application Development Framework (ADF)-based applications.

  • PeopleSoft Support provides a detailed description of the support available for the accurate monitoring of PeopleSoft-based applications.

  • Siebel Support provides a detailed description of the support available for the accurate monitoring of Siebel-based applications.

  • Oracle FLEXCUBE Support provides a detailed description of the support available for the accurate monitoring of Oracle FLEXCUBE-based applications.

  • Oracle Forms and Oracle E-Business Suite Support provides a detailed description of the support available for the accurate monitoring of EBS-based applications.

  • JD Edwards Support provides a detailed description of the support available for the accurate monitoring of JD Edwards EnterpriseOne-based applications.

  • Oracle Fusion Applications Support provides a detailed description of the support available for the accurate monitoring of OAF-based applications.

  • Monitoring NATed Traffic provides information about how accurate network traffic reporting can be obtained if the RUEI system is placed in front of a Network Address Translation (NAT) device.

  • Verifying Monitored Network Traffic describes how you can use the TCP diagnostic facility to verify that RUEI "sees" all required network traffic. It is strongly recommended that a network engineer within your organization validates collected network traffic after network changes.

  • Enriched Data Export Facility describes the table structure used by the Enriched data export facility.

  • Configuring HSM Support describes the procedure for configuring RUEI to access private keys stored on HSM devices.

  • Standard Report Library describes the predefined (standard) reports available in the report library.

  • Dimensions Available Within Data Browser Groups provides a detailed listing of the dimensions available within each of the Data Browser groups.

  • Explanation of Event Log Codes explains the messages that are reported in the Event Log.

  • Application Performance Index describes Apdex usage in RUEI.

  • Third-Party Licenses contains licensing information about certain third-party products included with RUEI.

More information

Documentation Accessibility

For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.

Access to Oracle Support

Oracle customers that have purchased support have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Related Documents

For more information, see the following documents in the Oracle Real User Experience Insight (RUEI) documentation set:

  • Oracle Real User Experience Insight Installation Guide.

  • Oracle Real User Experience Insight Administrator's Guide.

  • Oracle Real User Experience Insight Release Notes.

The latest version of this and other RUEI books can be found at the following location:

https://docs.oracle.com/en/enterprise-manager/cloud-control/enterprise-manager-cloud-control/13.4/index.html

RUEI also provides extensive online help. Select the option Help option from the System menu, or click the Help icon within a dialog to display the online help system.

Updated Terminology

In previous versions of RUEI, users flows were known as transactions.

Conventions

The following text conventions are used in this document:

Convention Meaning

boldface

Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.

italic

Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.

monospace

Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.