Search all the documentation for "logs"
Sensitive Action Logging is an Enterprise feature that helps administrators detect suspicious user activity actions and investigate suspec
/monitor/sensitive-action-logging-enterprise-feature-293797915.html
If Redgate Monitor is configured to authenticate users with Active Directory or OpenID Connect and you're unable to log in, check that:
/monitor/can-t-log-in-to-redgate-monitor-with-active-directory-or-openid-connect-239668901.html
Log files collect information about Redgate Monitor while you are using it. These files are useful if you have a problem. To view the log
/monitor/viewing-component-information-and-log-files-239668682.html
- Enterprise Feature
. These metrics represent key stages in the replication process. For more information about a particular metric, click the metric name.
/update sudo touch /var/log/redgate_update_check.log 4. Test manually sudo /home/redgate/update.sh Check the output and log: tail -50 /v
connected to the server process Username Name of the user logged in to the backend by this server process Address, Port IP address or
/monitor/user-processes-error-log-and-databases-239668464.html
to identify the queries which need most attention. It is calculated from a combination of metrics as follows: QueryImpact = log((TotalC
https://forms.office.com/Pages/ResponsePage.aspx?id=PCsO473TL0i84iM4oQ4dpOX0_5dMQIBNl9w71bRZErNUNzhaUElIQjBLQ1ZZODFHVllTS1VSV1k1QS4u to c
the following permissions: The account should have Log on as service rights. For information on how to assign these permissions, see A
/monitor/permissions-required-for-the-redgate-monitor-service-accounts-239667406.html
environment. Configure extensions, logging, and other settings (steps 1-3) If you are unsure how to change the following configuration
on the target instance. Database instance error log entry Raised by: SQL Server, PostgreSQL, Oracle, MySQL, MongoDB. Ra
The Agent is stateless, except for: A certificate stored in the user certificate store (used for mutual TLS with our SaaS endpoint).
servers Set maintenance windows Suspend monitoring Can't: Add servers to monitor Edit credentials Remove servers Show logs S
to identify optimization opportunities Database activity via instance metrics tracking connections, operations, and cache efficiency Sy
For non admin users, after their first log in to the platform, admins will be able to manage the servers the users can view from the “M
/monitor/managing-users-on-redgate-monitor-saas-331352386.html
specific choices which are suitable based on your own assessment of your particular environment's needs. Configure extensions, logging
/monitor/guidance-for-postgresql-configuration-choices-259621636.html
Redgate does not have access to any of the information stored in your self hosted Redgate Monitor repository unless you explicitly grant u
, and as such checks that shared memory and named pipes are both disabled. The benchmark recommends only logging failed login attempts vi
/monitor/cis-microsoft-sql-server-2022-benchmark-266141714.html
Data Repository we recommend you set fixed autogrowth and transaction log size relative to your database size. For more information, see:
/monitor/redgate-monitor-database-requirements-239667402.html
will will be redirected to the Redgate website and prompted to log in with an email address and password. If you don't have a RedGate ID
container monitoring System stability through error logs and session monitoring Regular monitoring of these metrics helps maintain opt
stability through error logs and query error monitoring Regular monitoring of these metrics helps maintain optimal MySQL performance, p
queries that access various statistical counters. It also uses extensions such as log_fdw or file_fdw to access instance log files. Next
/monitor/how-redgate-monitor-connects-to-monitored-servers-239667617.html
to ensure port 7399 is open in the firewall. It is important to get a robust hardware and software installation because you will not be