Updated on 2025-03-27 GMT+08:00

Best Practices

This document summarizes Application Performance Management (APM) best practices and provides solutions and operation guide to help you easily use APM.

Table 1 APM best practices

Best Practice

Description

Locating the Causes of Request Errors

Sudden request increases or load changes may easily cause application performance problems. APM has powerful analysis tools for cloud application diagnosis. It displays application statuses, call processes, and user operations through topologies and tracing, so that you can quickly locate and resolve faults and performance bottlenecks.

Searching for Span Information

In the distributed architecture, the calls between microservices are complex. If it takes much time to respond to external requests or some requests become abnormal, you can specify a trace ID or set other criteria on the Tracing page to check trace details.

Connecting to APM

Connecting On-premises Services to APM

You cannot connect on-premises services to APM using Direct Connect. However, you can do that using a proxy.

Connecting to APM Through a Public Network

Connect to APM through a public network.

Connecting IDE to APM

Connect IDE to APM.

Associating Traces with Logs

Associate trace IDs with logs in Log Tank Service (LTS). If a fault occurs, you can quickly find out the logs based on the associated trace IDs for troubleshooting.

Embedding APM Pages into a Self-built System

APM pages can be embedded into a self-built system. Specifically, create a custom identity broker through the federation proxy mechanism of Identity and Access Management (IAM) and embed a login link into your self-built system. You can then check APM pages on your system without the need to log in to Huawei Cloud.

Encrypting AK/SK for Deploying an APM Agent in a CCE Container

Encrypt the AK/SK when deploying an APM Agent on CCE.

Suggestions on APM Security Configuration

This document provides guidance for enhancing the overall security of APM. You can continuously evaluate the security of APM and combine different security capabilities provided by APM.