HOW TO
For monitoring of system counters in Amazon Web Services cloud (AWS), Esri recommends using the Amazon counter type instead of the system counter type and enable monitoring on all instances. All instances can be tracked with the data provided by Amazon CloudWatch. Using this method, the security access is handled through Amazon. If you are unable to follow the above recommendation, and still want to configure a system counter to monitor a hostname in AWS, additional configuration steps described in this article are needed to allow traffic between instances in the security zone.
In this article, we assume that ArcGIS Monitor in the AWS cloud is already installed on a dedicated instance alongside the target deployment you want to monitor before performing these steps.
ArcGIS Monitor and target deployment within the same security zone
It is likely that there is a security zone defined around the target deployment. If the ArcGIS Monitor Administrator is within in that security zone, communication is likely allowed between instances.
Configure Firewall
The security zone must be configured to allow traffic between instances in the security zone. We assume that Windows firewall is installed and enabled on each instance.
Access to WMI through the Windows Firewall must be enabled to allow ArcGIS Monitor Administrator to connect to the target instances. Since the security zone provides a shielded boundary around the cloud deployment, both outbound and inbound rules from the instance hosting ArcGIS Monitor Administrator must be considered.
Required are the Group Policy Management Tools on Windows 7, Windows 8, Windows 10, Windows Server 2008, 2012, and 2016. These are part of the Remote Server Administration Tools (RSAT) available from the Microsoft web site.
Instructions
To enable access to WMI on computers using the Windows Firewall with Advanced Security (Windows 7, Windows 8, Windows 10, Windows Server 2008, 2012, and 2016) please follow these steps.
Get help from ArcGIS experts
Download the Esri Support App