Database Agent User Permissions

Database Visibility collects the stats from common commands like vmstat/iostat or gathering metrics from the file system such as /proc and as such the user that runs the Database Agent requires no special permissions, just the ability to run those common commands and write to files in the Database Agent directory.

Database Agent Collector Authentication

When monitoring the database host, Database Visibility must log in to the host system to gather system information. There are three ways to authenticate the Database Collector to access the monitored host:

  • Specify a username and password in the Collector configuration dialog
  • Place a PEM file or an id_rsa file in the <agent home>/keys directory
  • If the Database Agent is running on LINUX, Solaris or AIX, place SSH keys in the <home>.ssh directory of the user running the agent. You can create an SSH key using the same procedure as described for the Controller. See Configure a Controller SSH Key.

Required SSH Permissions

When monitoring the database host, Database Visibility uses SSH on Linux and Windows systems to gather system information. SSH access can be through either an authenticated username/password or a private key.

You can create an SSH key using the same procedure as described for the Controller. See Configure a Controller SSH Key.