Skip to content

Commit 3fa19df

Browse files
committed
Changes from demo session info
1 parent 0edecc5 commit 3fa19df

File tree

5 files changed

+11
-9
lines changed

5 files changed

+11
-9
lines changed

advocacy_docs/supported-open-source/warehousepg/wem/get-started.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,12 +45,12 @@ Use the following guide to locate specific tools and their corresponding documen
4545
| Logs | [Auditing system logs](monitoring/logs/) |
4646
| Monitoring | [Validating database responsiveness](monitoring/monitoring/) |
4747
| Alerts | [Managing alerts](monitoring/alerts/) |
48-
| User Management | [Provisioning user accounts](system-access/user-management/)
48+
| Management | [Provisioning user accounts](system-access/management/)
4949

5050

5151
## Understanding user roles and permissions
5252

53-
WEM utilizes Role-Based Access Control (RBAC). After the initial bootstrap, all user management and password updates are handled exclusively via the User Management panel in the UI. A user's assigned role determines which panels and actions are visible.
53+
WEM utilizes Role-Based Access Control (RBAC). After the initial bootstrap, all user management and password updates are handled exclusively via the **Management** panel in the UI. A user's assigned role determines which panels and actions are visible.
5454

5555
| Role | Description | Access scope |
5656
| :--- | :--- | :--- |
@@ -94,7 +94,7 @@ Once you have installed WEM, you can fine-tune how WEM connects to your cluster
9494
1. **Method 1: Use the WEM settings tab**
9595

9696
Administrators can modify most operational parameters directly through the browser:
97-
1. Navigate to **User Management** > **Settings**.
97+
1. Navigate to **Management** > **Settings**.
9898
1. Update fields such as **Prometheus URL** or **Backup History Database Path**.
9999
1. Save to apply changes immediately.
100100

advocacy_docs/supported-open-source/warehousepg/wem/monitoring/monitoring.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ The **Monitoring** panel on the left sidebar provides proactive verification of
99

1010
### Performing proactive health checks: Canary checks
1111

12-
Canary checks are recurring, automated scripts that simulate real-world operations to verify the end-to-end integrity of the system. You can configure these tests on the [User Management panel](../system-access/user-management).
12+
Canary checks are recurring, automated scripts that simulate real-world operations to verify the end-to-end integrity of the system. You can configure these tests on the [Management panel](../system-access/management).
1313

1414
Use the **Canary Checks** tab to verify that the database can successfully execute core operations.
1515
- **Assess overall probe health:** Review the header metrics to get an instant snapshot of system integrity. Compare the **Successful** count against the **Total Checks** count to identify if a specific subset of your monitoring is failing.
1616
- **Verify scheduler activity:** Check the status of the scheduler to ensure it is running. This confirms that the WarehousePG Enterprise Manager (WEM) engine is actively triggering your background probes. If the scheduler is stopped, your health data will become stale and you will lose proactive visibility.
17-
- **Run health checks on demand:** Trigger an immediate execution of any check in the list to verify a fix or test real-time connectivity. While you must go to the [User Management panel](../system-access/user-management) to create or edit a check, the **Monitoring** panel allows you to run and stop them at any time to get an instant status update.
17+
- **Run health checks on demand:** Trigger an immediate execution of any check in the list to verify a fix or test real-time connectivity. While you must go to the [Management panel](../system-access/management) to create or edit a check, the **Monitoring** panel allows you to run and stop them at any time to get an instant status update.
1818
- **Benchmark execution speed:** Monitor the **Average Duration** metric to establish a baseline for expected responsiveness. A sudden spike in this metric, even if checks are still successful, serves as an early warning of resource saturation or network latency.
1919
- **Investigate specific check failures:** Audit the **Health Checks** table to isolate the root cause of a failure. By checking which specific probe is non-passing, you can determine if the issue is a total service outage or a localized subsystem failure.
2020

advocacy_docs/supported-open-source/warehousepg/wem/overview/known_issues.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,14 @@ These are the currently known issues and limitations identified in the Warehouse
88

99
### Deployment & infrastructure
1010

11+
- Each WEM deployment is designed to manage and monitor only one WarehousePG (WHPG) cluster. Managing multiple clusters requires separate, dedicated WEM installations for each.
1112
- WEM cannot be installed on Red Hat Enterprise Linux 7. Note that this restriction applies only to the host running the WEM application; WEM is fully capable of monitoring WHPG clusters running on RHEL 7 nodes.
1213
[PTT-703]: #
1314
- Running WHPG and WEM on the same host using the same database is not supported. WEM writes its application state into the `observability` database; sharing this environment can lead to configuration conflicts and upgrade complexity.
1415
[PTT-714]: #
1516
- The maximum Postgres connection pool size is currently hardcoded to 5. There is currently no mechanism to scale or configure this limit via environment variables.
1617

18+
1719
### Backup management
1820

1921
[PTT-723]: #

advocacy_docs/supported-open-source/warehousepg/wem/system-access/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: Managing system access
33
navTitle: Managing system access
44
description: Use WarehousePG Enterprise Manager to establish safety protocols, manage user credentials, and enforce role-based access controls.
55
navigation:
6-
- user-management
6+
- management
77
- access-management
88
---
99

1010
Establish safety protocols and manage access to sensitive data to protect the integrity of the cluster.
1111

1212

13-
- [Provisioning user accounts:](user-management) The **User Management** panel allows you to create database roles and manage credentials through a centralized interface.
13+
- [Provisioning user accounts:](management) The **Management** panel allows you to create database roles and manage credentials through a centralized interface.
1414

1515
- [Defining access policies:](access-management) Use the **Access Management** panel to enforce role-based permissions and security controls at the schema and table level.

advocacy_docs/supported-open-source/warehousepg/wem/system-access/user-management.mdx renamed to advocacy_docs/supported-open-source/warehousepg/wem/system-access/management.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Provisioning user accounts
33
navTitle: Provisioning user accounts
4-
description: Use the User Management panel to manage user accounts, define role-based access controls, and configure system-wide settings for WarehousePG Enterprise Manager.
4+
description: Use the Management panel to manage user accounts, define role-based access controls, and configure system-wide settings for WarehousePG Enterprise Manager.
55
deepToC: true
66
---
77

8-
The **User Management** panel on the left sidebar is the central administrative hub for WarehousePG Enterprise Manager (WEM). Use these actions to oversee account security, define permission tiers, and configure system-wide integration settings.
8+
The **Management** panel on the left sidebar is the central administrative hub for WarehousePG Enterprise Manager (WEM). Use these actions to oversee account security, define permission tiers, and configure system-wide integration settings.
99

1010
!!! Important
1111
Access to this panel is restricted to users with the **Admin** role privilege.

0 commit comments

Comments
 (0)