Scenario | Specific Demand |
Daily monitoring and inspection | By observing the trends and distribution of various data metrics of acceleration domain names/L4 proxy instances, continuously monitor whether EdgeOne has high latency or failures. |
Troubleshooting analysis | By analyzing access logs, understand the path and content of the user's access to locate and troubleshoot issues. |
Business data insight | By analyzing and mining client data, understand user profiles. |
Data analysis function | Function introduction |
Provides aggregated metric data on the traffic, bandwidth, number of requests, etc., and supports viewing the access region distribution, cache hit ratio, security protection status, and status codes, to help you understand the operational status of various businesses that have accessed EdgeOne. | |
Analyzes the access logs that match the Web security rules, to obtain the attack surface data related to your business, including attack sources and attack methods. This helps you better understand the attack situation and formulate more effective security policies. You can also directly view the sample logs to understand the attack request context. |
Was this page helpful?