ITRS named a Visionary in the 2024 Gartner® Magic Quadrant™ for Digital Experience Monitoring

  1. Support
  2. Knowledge base
  3. Synthetic Monitoring
  4. Checkpoints
  5. Private locations

Private locations

Private locations are where you manage your user-managed checkpoints once you decided to use those for monitoring inside your firewall.

A private location is used to group your checkpoints. The grouping could be done based on a physical location (e.g. city, country, continent), a specific purpose, or any grouping that makes sense to your operation.

The private locations can be accessed by going to Private locations in the menu.

screenshot of private locations

Add private location

To add a new location:

  1. Go to Private locations in the menu.
  2. Click the Add location button.
  3. Provide the name of the location from which you want to monitor.
  4. Choose a monitor group with permission to create monitors. The health monitors for the location will be created in this group. Monitor groups with the permissions needed will be listed in the drop-down menu.
  5. Click the Add private location button.

The new location is created and added to the list of private locations. Two unconfigured and uninstalled checkpoints are added by default. See the FAQs for an explanation why two checkpoints are added (and not just one).

To rename a private location:

Click the edit button behind the name and enter a new name.

Add checkpoint

Note that a new private location comes with two checkpoints added to it automatically. You can start by installing those or add (now or later) more checkpoints.

To add a checkpoint:

  1. Go to Private locations in the menu.
  2. Click the Add checkpoint button in the location where you want to add a checkpoint.
  3. Choose a monitor group with permission to create monitors. The health monitor for the checkpoint will be created in this group.
  4. Click the Add checkpoint button.

To rename a checkpoint:

Click on the checkpoint to open its page and click the edit button behind the name and enter a new name.

Preparing the checkpoint installation

Once you have added a checkpoint, this checkpoint exists as a digital representation in the Uptrends app. However, the checkpoint itself, that will carry out monitoring checks, still has to be installed to become a functioning checkpoint.

To install a checkpoint:

  1. Make sure to have the requirements in place before starting the installation.
  2. Go to Private locations.
  3. Locate the checkpoint you want to install.
  4. Download the installation file by clicking the name of the checkpoint, then choose the operating system (of the platform where you are hosting the checkpoint) and click the Download compose file button.
    Important: The downloaded file is dedicated to the checkpoint that it was downloaded for. It is named UptrendsCheckpoints<name>.zip, where <name> is the name of your checkpoint. Use the download only for this checkpoint and download files for other checkpoints individually.
  5. Follow the steps (starting after the download) in the knowledge base article Install a Docker checkpoint.

The checkpoint is now available for use meaning that it will appear on a monitor’s Checkpoints tab and in the list of monitors when running a quick test directly from the monitor using the Test now button.

All articles in this category

By using the Uptrends website, you consent to the use of cookies in accordance with our Cookie Policy.