Database Reference
In-Depth Information
To configure the account with which you monitor a target, select Monitoring Configuration. The actual details
supplied vary by target type. Figure 4-61 shows the screen for a database target. As you can see, you are required to enter
the monitoring account details (in the case of a database, Username, Password, Port, Role, and SID/Service_Name).
Figure 4-61. Required database monitoring details
Similarly, for other targets you will likely need names, passwords, and ports for the monitoring of the individual
target-monitoring infrastructure.
Customization
The first indication that you will have that Cloud Control is designed to be customized to the requirements of the
individual administrator comes at the very first login. After logging in, you will be presented with a page that offers you
the chance to choose a home page based on one of a number of predefined job roles. Most readers of this topic will
probably want to choose one of two of the choices. If you primarily work as a database administrator or developer, you
will likely choose the Databases page. If you work in operations or support, you may want to start from the Incidents
page, which is focused for staff managing operational incidents in the enterprise.
You don't have to choose any home page at this stage, and we recommend that you don't. Instead, review all of
the available pages for an appropriate starting point for your role. You can then tailor your home page more specifically at
a later point.
Note
 
 
Search WWH ::




Custom Search