Monitoring from Private and Public LocationsProvides the steps to monitor synthetics from private and public locations.Leave FeedbackIntroductionIf the environment includes web applications in private and public locations, perform the following to start monitoring:Step 1: Whitelisting IP AddressStep 2: Implementing instrumentation strategyStep 3: Onboarding resources and usersStep 4: Enabling resource management profilesStep 5: Setting up synthetic monitorsMonitoring from Private and Public LocationsSteps to monitor from private and public locationsStep 1: Whitelisting IP AddressWhitelisting IP Address is an important factor to enable access to the added monitors from each location. Refer to the following table to understand the whitelisted IP addresses of OpsRamp public synthetic servers.List of Whitelisted IP AddressesLocationIP AddressAtlanta, US188.8.131.52California, US184.108.40.206Fremont, US220.127.116.11New Jersey, US18.104.22.168Canada Central22.214.171.124London, UK126.96.36.199Frankfurt188.8.131.52Singapore184.108.40.206Japan220.127.116.11Tokyo18.104.22.168Mumbai, India22.214.171.124Step 2: Implementing instrumentation strategyTo monitor any synthetic resources, install Gateway (Version 5.0.0 or above).To understand the supported choices and recommendations to instrument your environment for monitoring, see Instrumentation Choices.Step 3: Onboarding resources and usersOnboarding is the process of setting up OpsRamp to discover and manage your environment. Prior to using the platform, the primary requirement is to create an account to perform the desired tasks for your organization. For more information, see Account Management.Step 4: Enabling resource management profilesUse the Gateway version 5.0.0 or above to enable internet and intranet monitoring of the infrastructure, after enabling Synthetics Agent. Toggle from OFF to ON to enable Synthetics Agent from Setup > Resources > Management Profiles > View Management Profile.Step 5: Setting up synthetic monitorsPrerequisitesAssign a synthetic template to initiate synthetic monitoring via Assign Templates or Device Management Policies.Set permissions for Device Create, Device Edit, Device View, and Device Manage to create, edit, view, and delete the configured synthetic monitors respectively.Verify if the role assigned to you contains access to all resources. Otherwise, you cannot delete a synthetic monitor.Configuring synthetic monitors according to the requirement enhances synthetic security and stabilizes IT operations process flow. For more information, see Creating synthetic monitors.