Management zones comprise one or more rules that define and limit the entities or dimensional data (such as logs and metrics) that can be accessed within the management zone.
When you select a management zone in Settings > Preferences > Management zones, all configured rules are displayed. You can Disable/Enable individual rules.
Read more about:
Management zones offer UI-based rule definition for:
You can select the type of rule, and then create rule conditions based on entity/data properties, operators, and values where relevant.
When creating rules for some entities, you can propagate access to related topological entities without creating an extra rule. See How management-zone rules are applied below.
For UI-based rules for dimensional log and metric data, you can define conditions based on the log file name, metric keys and dimension keys and values. Built-in, calculated, and ingested metrics are supported.
Use the powerful metric selector of the Metrics API v2 for metric and dimension keys and values:
Note that users automatically get access to logs and metrics associated with entities that are included within their assigned management zones.
Text-based rules leverage the powerful entity selector for v2 Environment APIs to define entities. Text-based rules enable you to define entity access based on all the entity types, properties, values, and relationships exposed by the Monitored entities API v2.
There are several advantages of text-based rules.
Per monitoring environment, you can add:
Check our documentation on how to optimize management-zone rule performance at scale.
See Examples for different rule types and implementations.
Select/create a management zone and then select Add a new rule.
Select Monitored entity as the Rule type. (See also information on rules for dimensional data and text-based rule definition via the Entity selector.)
Select the entity type to which the rule should apply (Rule applies to), for example, Web applications.
Each entity can be defined and limited by several different conditions. Select Add condition.
Choose the condition Property, Operator, and Value (where relevant). For example, you can specify that the Web application name begins with a specified string. You can enter up to 80 characters; wildcard characters are not allowed; regular expressions are allowed in the contains regex and does not contain regex condition operators.
If you enter a text string, specify whether it is Case sensitive.
For some entities, you can propagate access to related topological entities without creating an extra rule. For example, turn on the appropriate toggles to include underlying hosts and process groups when defining a management-zone rule for Services.
Select Add condition to add another condition (or Remove condition to remove a condition) as required.
AND
logic—all conditions need to be met for the rule to apply to an entity.Select Preview to see entities matching the rule that were active and online in the last 72 hours. Of course, when you actually apply the management zone, all entities matching the rules for the given timeframe will be displayed. Note that Preview is only available for entity-based rules.
Save changes.
See Examples for different rule types and implementations.
Select/create a management zone and then select Add a new rule.
Select Dimensional data for Rule type. (See also information on rules for entities and text-based rule definition via the Entity selector.)
Select the data Type to which the rule should apply.
For a UI-based rule for a built-in, calculated, or ingested metric, select METRIC.
For a UI-based rule for logs, select LOG.
Each rule can be defined and limited by several different conditions. Select Add condition.
Choose the condition Type, Key (where appropriate), Operator, and Value. You can enter up to 80 characters in any text field; wildcard characters are not allowed.
Condition types are:
For a log attribute or metric dimension, DIMENSION.
For a log filename, LOG_FILE_NAME. The log filename should match the attribute log.source
.
For a metric key, METRIC_KEY.
For a combined log or metric condition, ANY.
Allowed operators are begins with and equals.
Select Add condition to add another condition (or Remove condition to remove a condition) as required.
AND
logic—all conditions need to be met for the rule to apply to an entity.Save changes.
Select/create a management zone and then select Add a new rule.
In Rule type, select Entity selector.
To fill out the Entity Selector text string, you might need to run Monitored entities API v2 calls to fetch entity types, properties, values, and relationships. Consult entity selector documentation for details on how to construct an entity definition. See Examples for different rule types and implementations.
Important parts of the entity selector string
type(<entityType>)
defines the type of entity that is subject to the rule. For example, the entity type for hosts is host
and for process groups is process_group
. The entity type is not case sensitive. You can only provide a single entry in <entityType>
.
Run the GET all entity types API call for a list of all entity types in your environment (including custom entities) and their properties.
Alternatively, you can specify multiple individual entity IDs with the entityId
criterion. You can run the GET entities list API call for a list of actual entities in your environment and their properties.
Entity properties and values filter the entity list that your rule applies to. For example:
entityName.startsWith("Book")
filters for entities whose name starts with Book
.serviceType(WEB_REQUEST_SERVICE)
filters for web request services.You can run the GET entity type API call for any entity type (for example, service
) to get a list of all its properties (for example, serviceType
). You can also run the GET entities list API call for a list of actual entities in your environment with their property values (for example, WEB_REQUEST_SERVICE
).
Relationships further refine entity selection by defining an entity in terms of its relationship to another. Relationships are of two kinds.
fromRelationship
implies that the direction of the relationship is from the given entity (that is, the entity being queried) to a related entity. When you query all the services that service A calls, this is a relationship “from (service A)” to other services.toRelationship
implies that the direction of the relationship is from a related entity to the given entity (that is, the entity being queried). When you query all the services that call service A, this relationship is “to (service A).”You can run the GET entity type API call on any entity type to get a list of the entity's from/to relationships and the related entity types. You can also run the GET entities list API call to get a list of the actual entities in your environment along with their relationship values (for example, a service
entity type can have a calls
"from relationship" to another service
).
Select Preview to see entities matching the rule that were active and online in the last 72 hours. (Of course, when you actually apply the management zone, all entities matching the rules for the given timeframe will be displayed.)
Save changes.
Conditions are applied using the AND
logic—all conditions within a rule need to be met for the rule to apply to an entity.
Rules are applied using the OR
logic—any rule must apply for an entity to be included in a management zone.
When creating rules for some entities, you can propagate access to related topological entities without creating an extra rule. For example, when creating a rule for services, you can opt to add underlying hosts and process groups. See Add a UI-based rule above.
In other cases, the propagation of access to related topological entities is implicit. For example, when you grant access to a host in a management zone, any custom metrics ingested via that host are also accessible within the management zone. Note that this does not automatically include all measurements of those custom metrics but only those measurements that were sent in for your host.
In cases where such propagation isn't available, you need to explicitly create rules for the entities you wish to add to a management zone. For example, a management-zone rule that applies to Host groups does not automatically grant access to the hosts within those groups; you need to explicitly add rules for the Hosts you wish to include in the management zone, as shown in Examples below.
When you add an entity using tags to a management zone as part of entity creation via API, there might be a delay in management-zone assignment depending on the number and complexity of your tagging rules. See Best practices for scaling tagging and management-zone rules for best practices to speed up the time taken to assign tags and management zones within your monitoring environments.
You cannot define management-zone rules where the entity selector for one management zone filters by another management zone. Management zone predicates such as mzID
or mzName
are not allowed in entity selector strings. This means, for example, that you cannot define management zone A as containing hosts belonging to management zone B. Management-zone rules based on other management zones increase the number of runs made by the conditional decision engine and can greatly delay management-zone assignment. See also Best practices for scaling tagging and management-zone rules for related information.
As a workaround, use the same entity selector string in both management zones. For example, consider that:
type(SERVICE),entityName.startsWith("myService"),tag("my:tag")
.type(SERVICE),fromRelationships.calls(type(SERVICE),entityName.startsWith("myService"),tag("my:tag"))
.Set up a rule for hosts.
Select Monitored entity as the Rule type.
Select Hosts as the entity that the Rule applies to.
Add a condition.
Select Host group as the Property.
Select or search for a host group in the Value field.
Preview the list of matching entities.
Save changes.
Add a rule in this way for each set of hosts per host group.
Set up a rule for host groups.
In order for users to have visibility into host groups containing the hosts in the management zone, you need to set up host group rules—one per host group you wish to include. This ensures that users can filter by the host groups on the Hosts page.
Select Monitored entity as the Rule type.
Choose Host groups as the entity that the Rule applies to.
Add a condition.
Select Host group name as the Property.
Define the condition for the host group name, for example, a text string contained in the host group's name.
Preview the list of matching host groups.
Save changes.
Add a rule in this way for each host group you wish to include in the management zone. Host group names are shown in the filter on the Hosts page only if a corresponding management-zone rule is defined for them. Generally, you would grant access to the same host groups that the hosts in your management zone belong to.
When the management zone is applied, the user can see only the assigned hosts and can filter the Hosts page by Host group. The host groups are those defined in your management-zone rules.
Management-zone rules can be defined for three types of synthetic entities:
To provide access to all synthetic monitors, you need to define rules to cover all monitors per monitor type.
To set up a rule to cover all Browser monitors, for example:
Specify that the Browser monitor name exists. Preview the rule to see the matching entities.
Additionally, set up similar rules for HTTP and third-party monitors to cover all synthetic monitors in your environment.
If you'd like your user to be able to create or edit synthetic monitors in a management zone, you need to provide the Manage monitoring settings permission at the management-zone or environment level.
You can provide access to an ingested metric, filtered by a dimension value so that only specific measurements of the given metric are accessible within the management zone (for charting and analysis, for example).
Select the Dimensional data entity of type METRIC.
Fill out the condition for the metric name (METRIC_KEY). You can provide access to a specific metric by providing the entire name or a set of metrics by specifying the opening string (for example, business.revenue
).
To filter for specific measurements of the metrics, you need to add a condition for the metric dimension. Select DIMENSION and provide the dimension name (Key) and (Value). For example, to filter your business metrics for the US eastern region, you would specify the dimension name region
and value useast
.
Save changes.
If your management zone already provides access to the host through which a custom metric and its measurements are ingested, you automatically provide access to that custom metric; you don't need to set up an explicit rule for the custom metric. Note that this doesn’t include all measurements of that custom metric but only those measurements that were sent in for your host.
You can provide access to logs filtered by a log attribute value (as an alternative to filtering logs by entities).
begins with
or equals
for the Value entered. For example, to filter your logs for a specific Kubernetes deployment name, specify the k8s.deployment.name
key and begins with
automation-server
as the value.If your management zone already provides access to the host through which logs are ingested, you automatically provide access to those logs. This means that you don't need to set up an explicit dimensional rule for such logs.
In order to filter for services that directly call a service with the name JourneyService
, you can run the GET all entity types API call to check the entity type and relationships for services.
From the information gathered, you can now construct an entity-selector rule for the entity type service
that has a calls
"from relationship" to the entity type service
with the name JourneyService
:
type(SERVICE),fromRelationship.calls(type(SERVICE),entityName(JourneyService))
This can also be written as type(SERVICE),fromRelationship.calls(type(SERVICE) AND entityName.equals(JourneyService))
.