Private locations are where you manage your user-managed checkpoints once you decided to use those for monitoring inside your firewall.
A private location is used to group your checkpoints. The grouping could be done based on a physical location (e.g. city, country, continent), a specific purpose, or any grouping that makes sense to your operation.
The private locations can be accessed by going to
in the menu.Add private location
To add a new location:
- Go to in the menu.
- Click the Add location button.
- Provide the name of the location from which you want to monitor.
- Choose a monitor group with permission to create monitors. The health monitors for the location will be created in this group. Monitor groups with the permissions needed will be listed in the drop-down menu.
- Click the button.
The new location is created and added to the list of private locations. Two unconfigured and uninstalled checkpoints are added by default. See the FAQs for an explanation why two checkpoints are added (and not just one).
To rename a private location:
Click the edit button behind the name and enter a new name.
Add checkpoint
Note that a new private location comes with two checkpoints added to it automatically. You can start by installing those or add (now or later) more checkpoints.
To add a checkpoint:
- Go to in the menu.
- Click the Add checkpoint button in the location where you want to add a checkpoint.
- Choose a monitor group with permission to create monitors. The health monitor for the checkpoint will be created in this group.
- Click the button.
To rename a checkpoint:
Click on the checkpoint to open its page and click the edit button behind the name and enter a new name.
Preparing the checkpoint installation
Once you have added a checkpoint, this checkpoint exists as a digital representation in the Uptrends app. However, the checkpoint itself, that will carry out monitoring checks, still has to be installed to become a functioning checkpoint.
To install a checkpoint:
- Make sure to have the requirements in place before starting the installation.
- Go to .
- Locate the checkpoint you want to install.
- Download the installation file by clicking the name of the checkpoint, then choose the operating system (of the platform where you are hosting the checkpoint) and click the Download compose file button.
Important: The downloaded file is dedicated to the checkpoint that it was downloaded for. It is named UptrendsCheckpoints<name>.zip, where <name> is the name of your checkpoint. Use the download only for this checkpoint and download files for other checkpoints individually.
- Follow the steps (starting after the download) in the knowledge base article Install a Docker checkpoint.
The checkpoint is now available for use meaning that it will appear on a monitor’s Checkpoints tab and in the list of monitors when running a quick test directly from the monitor using the Test now button.
All articles in this category
-
Checkpoint healthGet an overview of how your private location checkpoints are doing. Are they operating well or do they need attention?
-
How to use private locations checkpointsGet an overview of how to set up monitoring and maintain your private location and private checkpoints after installing.
-
Install a Docker checkpointImplement a Docker host and checkpoint containers for internal monitoring of your network infrastructure.
-
Private checkpoints FAQFrequently Asked Questions about Uptrends' private checkpoints
-
Private location data protectionWhat are the data protection safeguards for private locations?
-
Private location requirementsWhat are the technical requirements for private locations?
-
Private locations and securityWhat should be considered to ensure secure operations of checkpoints in private locations?
-
Private locations troubleshootingTroubleshooting guidelines and examples for troubleshooting your private locations.
-
Updating a Docker containerHow does updating a private locations' checkpoint Docker container work?
-
User-managed checkpoints (Docker containers)What is a user-managed checkpoint and how do you implement Uptrends monitoring behind your company’s firewall in Docker containers.