Solved

Microsoft System Center Ops Manager 2007 - IIS monitoring

Posted on 2010-11-23
8
1,015 Views
Last Modified: 2013-11-21
I am currently running MS SCOM Ops Mgr 2007 R2. I need to know how to collect HTTP hit data on a particular website/webserver. I am only interested in HTTP hits on the site, not just general connections or HTTPS or any other ports. I am looking through the current rules and options for the collections rules and I am not seeing anything predefined for IIS monitoring. Any help is greatly apprecaited.

So, to summarize - I need to be able to look back and tell how many http hits a particular website in IIS gets at a certain time, or over a certain time period. Such as in a line graph.
Thank you.
0
Comment
Question by:munisee
  • 3
  • 3
  • 2
8 Comments
 
LVL 4

Accepted Solution

by:
fr0nk earned 500 total points
ID: 34208904
Hi,
create a new Rule and map it to the windows performance counter "Get Requests/s" for the instance of your particular web site.

You can visualize the rule almost in real time when you create a custom view with: Data from _YOUR_ rule.
Inside the custom view, you can specify a time period and the graphing option (dots, connected line, etc).

Hope that helps.
0
 
LVL 15

Expert Comment

by:wwwally
ID: 34216395
Have a look at this to create a performance rule:
http://www.youtube.com/watch?v=6yH-b9AgVfM
Regards,
Walter
0
 

Author Comment

by:munisee
ID: 34230173
I will try to build this rule now. Is there any way to create the rule based on just port 80 traffic? And then perhaps just SSL traffic? Thank you for your response.
0
Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

 
LVL 15

Expert Comment

by:wwwally
ID: 34232935
I guess that would be the wrong approach.
Just lookup the perfmon counter so you can create the performance rule based on that counter.
Regards,
Walter
0
 
LVL 4

Expert Comment

by:fr0nk
ID: 34232977
@Walter: Thanks for the input, but can you please elaborate?
This is exactly what I told him to do :)
Afterwards, he can create a view to display data generated by that rule.
0
 

Author Comment

by:munisee
ID: 34238788
Fr0nk,

Yes you are correct. That is what I did and it worked great. My ignorance to IIS has to make me as the question  --- When I look at this view and see my Get Request counter, are these 'all' connections or just port 80 connections?

Thank you and thank you Walter for the input.

0
 
LVL 4

Expert Comment

by:fr0nk
ID: 34238864
All requests, since the performance counter doesn't distinguish between a get request that has been fired to the portbinding 80 or 443.
0
 

Author Comment

by:munisee
ID: 34248288
Understood. Thanks !
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
heat agent push through GPO 2 56
Local Webcam passing through windows 2008R2 or 2012R2 Remote Desktop 4 51
shadow copies 7 76
sccm importing drivers 4 24
Scenerio: You have a server running Server 2003 and have applied a retail pack of Terminal Server Licenses.  You want to change servers or your server has crashed and you need to reapply the Terminal Server Licenses. When you enter the 16-digit lic…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question