Best-Practice Data Monitoring Policies & Templates

Gain Instant Visibility • Adopt New Technologies Faster • Automate & Simplify Administration

Get instant visibility across all IT today, maintain full visibility when new technologies are introduced in future, and spend less time administering your IT environment.

  • Monitor thousands of resources in minutes by automatically applying best practice monitoring policies appropriate to each element
  • Accelerate adoption of new technologies with pre-configured monitoring policies that help you get started right away and easily extend to support your unique needs
  • Significantly simplify administration by configuring once, then automatically applying consistent policies and behavior for very specific or broad groups of technology elements, and organizations

Modern Technology Demands Deep Discovery

Learn why you need complete discovery to meet modern service delivery demands

Pre-Configured, Best Practice Monitoring Policies

Monitoring policies define what data to collect, how to synthesize and evaluate any combination of data to generate smart events, what actions to trigger when those events occur, and how to present the data and events within role-specific dashboards and reports.

Monitoring policies enable automated administration

Collection Policies

Automatically collect and track configuration, asset (licensing, serial numbers, etc.), status, and performance metrics for elements and services

  • Collect any data from any element or service using a variety of data collection techniques
  • Use a combination of synchronous and asynchronous collection methods
  • Automatically select the best methods and metrics to collect common KPIs like CPU, memory, network latency and storage capacity using any supported protocol or collection method 
  • Automatically derive metrics from collected data to ensure consistent meaning across vendors and products. For example, since different vendors collect and store the metric “jitter” differently, default policies normalize these discrepancies on your behalf; point-and-click normalization rules can also be leveraged to support policies for new vendors and products.
  • Easily tune out-of-the-box collection policies to meet specific needs, such as turn collection on or off for certain metrics and add additional custom or derived metrics
Collection policies

Assessment Policies

Eliminate the event noise that plagues event managers/operators by generating essential KPIs and smart events that drive automated actions

  • Assess availability, health, risk, and other KPIs for elements and services
  • Easily tune or create new assessment policies for availability, health, risk or a single KPI and apply them to every single affected element
  • Automatically set dynamic thresholds and assessment policies based on defined conditions. For example, define health, risk or any other aggregate calculation for a service to factor in times of day, week, etc.
  • New elements inherit assessment policies automatically to ensure consistency
  • Easily tune or define when events are triggered off of any combination of availability, health, risk or any other metric meeting some criteria, and the actions to trigger off those events
  • Easily suppress events based upon point-and-click rules. For example, do not alert the team if a developer reboots a lab system, but if the lab system’s power supply fails, follow the normal operational remote memory access protocol.
  • Easily tune event severity based upon business importance. For example, do not send alerts if most network interfaces go down, but invoke automated workflows and notifications if a WAN uplink fails.
Learn more about event management
Assessment policies

Action Policies

Automate remediation steps tuned to your specific needs

  • Use a point and click UI to easily configure automated actions, such as create a ticket, restart services, notify someone, or escalate to a higher tier after some period of time
  • Easily extend to automate more complex actions or remediation workflows
  • Built-in event and ticket escalation procedures can be configured to ensure issues are addressed quickly and comply with any SLAs. For example, if a notification event occurs, and after 15 minutes is not acknowledged or resolved, it can be automatically escalated to a major event, which could trigger additional notifications to the responsible stakeholders.
Learn more about automation
Policies can be configured easily

Visualization

Present the right information to the right users with minimal administrative effort

  • Automatically present the right information to the right users based on each user’s role and assigned permissions
  • Build a dashboard one time and the information is presented to users based on each users’ defined role and inherited permissions. For example, one user may see all of the network, storage and compute resources within a dashboard and another user may see only a subset of the resources in the same dashboard.
  • Summary drill-downs can be specific to each technology and user role
Learn more about dashboard analytics
Present the right information to each user

Customer Testimonial

CBTS

“Using a variety of auto-discovery techniques and [monitoring] templates and some automation with runbook we are able to do 95% of onboarding of customers automatically. We don't have to go in and adjust thresholds. We don’t have to go in and manually add/remove.”

Chris Pierce, EM7 Administrator, Cincinnati Bell Technology Solutions
Watch the video

Examples

  • Show different IT services being delivered to each line of business (LOB) at a high level, and allow the technical teams within each LOB to drill into the details.
  • Tune the pre-configured policies for Microsoft Exchange to adjust the message count and storage thresholds, and apply the updated policies to all exchange servers to ensure consistent behavior
  • You have hundreds of AWS instances for production, development, and QA. Tune the pre-configured AWS instance policies to adjust the utilization and alarm thresholds for any instances tagged for development or QA, and apply the standard AWS policies to any instances tagged for production. When new instances spin up, the appropriate policies are assigned automatically.

The ScienceLogic Hybrid IT Monitoring Platform

Discover our platform

You need visibility across all of your IT services to see how well your IT organization is delivering value to the business.