Required Monitored Host Permissions
Database Agent User Permissions
Database Visibility collects the stats from common commands like vmstat/iostat
or gathering metrics from the file system such as /proc
and as such the user that runs the Database Agent requires no special permissions, just the ability to run those common commands and write to files in the Database Agent directory.
Database Agent Collector Authentication
When monitoring the database host, Database Visibility must log in to the host system to gather system information. There are three ways to authenticate the Database Collector to access the monitored host:
- Specify a username and password in the Collector configuration dialog
- Place a PEM file or an id_rsa file in the
<agent home>/keys
directory - If the Database Agent is running on LINUX, Solaris or AIX, place SSH keys in the
<home>.ssh
directory of the user running the agent. You can create an SSH key using the same procedure as described for the Controller. See Configure a Controller SSH Key.