Can I clone/duplicate an existing configuration rule?
Yes, it is possible to clone/duplicate a rule to create a new one. Being able to duplicate existing ones would potentially save a lot of setup time.
Use Case:
A user is monitoring around 10 servers and has a configuration rule named Windows Template with the following configuration profiles:
Notification Profile - Default Notification
Resource Profile - My Profile
Threshold Profile - Server Thresholds
User Profile - Admin
Services - MySQL, Apache, Tomcat, Kaspersky, Java
Now, the user is planning to add 8 more servers for monitoring.
Problem Statement:
The user wishes to retain the same notification, resource check and threshold profiles, but wants to change the user profile to "Application Team", add services including Netlogon, MailService, DNS, assetexplorer and remove the MySQL service from monitoring. To start from the scratch of setting up a configuration template would be time consuming.
Solution:
Please follow the below steps:
Log in to Site24x7 and go to Admin > Inventory > Configuration Rules.
Hover on the hamburger icon beside the configuration rule that you wish to duplicate. In this case, hover beside the rule Windows Template.
Click on the option Clone.
Provide a new Display Name - "New Windows Template"
Under Add Services, include Netlogon, MailService, DNS, assetexplorer. Click on the "x" icon beside the MySQL service to remove it from monitoring.
Delete the existing User Profile and add one again to choose Application Team.
Save your changes.
Now, a duplicated copy of "Windows Template" will be created with the above changes.
Related Articles:
Related Articles
Setting up a website monitor w.r.t content match and HTTP configuration
Regarding the website defacement (content match) configuration, you can set keyword checks to find the existence and non-existence of keywords in your HTML response. As far as the HTTP configurations are concerned, we support HEAD, GET, and POST ...
Monitor websites that require a HTTP POST to determine availability
You can monitor websites that require HTTP POST to determine availability. You can configure HTTP request methods to be passed (POST/GET/HEAD/POST XML) under the HTTP Configuration while adding a monitor itself. Log in to the Site24x7 client and ...
Validating sender email using DKIM authentication
What is DKIM? DomainKeys Identified Mail (DKIM) is an advanced authentication method used widely by email service providers to verify the email from the point of its origin by validating the email sender. It allows the email senders to authenticate ...
How to configure the NGINX status page for monitoring NGINX performance
The NGINX plugin uses the NGINX status page to pull the performance metrics of the NGINX server. You may encounter the following errors while installing the NGINX plugin integration: Error_code : HTTP Error 404: This error usually indicates that the ...
Meaning of the trouble message - "Content Length Modified"
This alert indicates that the content length of your monitored website has changed compared to the previous check. Even minor textual changes on your website will be reflected as a trouble alert. How it works Under Threshold Configuration, if you ...