Application Performance Management
Application Performance Management
All results for "
" in this service
All results for "
" in this service
What's New
Service Overview(2.0)
What Is APM
Functions
Application Scenarios
Basic Concepts
Edition Differences
Permissions Management
Metric Overview
Exception
Basic Monitoring
GC Monitoring
JavaMethod
JVM Monitoring
JVMInfo
Netty Memory
Threads
Databases
C3P0 Connection Pool Monitoring
Cassandra Monitoring
ClickHouse Database
DBCP Connection Pool Monitoring
Druid Connection Pool Monitoring
EsRestClient Monitoring
GaussDB Database
HBase Monitoring
Hikari Connection Pool Monitoring
Jetcd Monitoring
MongoDB Monitoring
MySQL Database
ObsClient Monitoring
Oracle Database
PostgreSQL Database
URLs
CSEProvider Cluster Monitoring
DubboProvider Monitoring
FunctionGraph Monitoring
URL Monitoring
External Calls
ApacheHttpAsyncClient Connection Pool
ApacheHttpClient Connection Pool
CSEConsumer Cluster Monitoring
DubboConsumer Monitoring
HttpClient Monitoring
Cache
Redis Method Call
Jedis Monitoring
Lettuce Client
Agent Monitoring
Tomcat Monitoring
Message Queues
KafkaConsumer Monitoring
KafkaProducer Monitoring
RabbitMqCommon Monitoring
RabbitMqConsumer Monitoring
RabbitMqProducer Monitoring
RocketMqConsumer Monitoring
RocketMqProducer Monitoring
RPC
GRPCClient Monitoring
GRPCServer Monitoring
IoT
CoapClient Monitoring
CoapServer Monitoring
MoquetteBroker Monitoring
PahoPublisher Monitoring
PahoSubscriber Monitoring
Communication Protocol
Privacy and Sensitive Information Protection Statement
Data Collection
Usage Restrictions
Java
Billing
JavaAgent Updates
Billing(2.0)
Billing Overview
Billing Modes
Overview
Preferential Package
Pay-per-Use Billing
Billing Items
Bills
Arrears
Billing Termination
Billing FAQs
What Is the Billing Policy of APM?
Getting Started(2.0)
Enabling APM 2.0
Monitoring Java Applications
Connecting Agents
Manually Installing Agents for Java Applications
Installing Agents for the Java Applications Deployed in CCE Containers
Installing Agents on Applications Deployed Using CodeArts Deploy
Installing Agents on Docker Applications
Getting Started with Common Practices
Change History
JavaAgent Download Addresses
Access Addresses
User Guide(2.0)
Before You Start
Application List
CMDB Management
Creating an Application
Creating a Sub-application
Configuring an Application and Sub-application
Application Metric Monitoring
Overview
Application Monitoring Details
Topology
URL
JVM
Exception
Call
SQL
Web Container
Application Monitoring Configuration
Configuration Details
Configuring the MySQL Monitoring Item
Configuring the HttpClient Monitoring Item
Configuring the URL Monitoring Item
Configuring the JavaMethod Monitoring Item
Configuring the Druid Monitoring Item
Configuring the ApacheHttpAsyncClient Monitoring Item
Configuring the Redis Monitoring Item
Configuring the Jedis Monitoring Item
Configuring the HBase Monitoring Item
Configuring the ApacheHttpClient Monitoring Item
Configuring the Tomcat Monitoring Item
Configuring the EsRestClient Monitoring Item
Configuring the WebSocket Monitoring Item
Configuring the KafkaProducer Monitoring Item
Configuring the Hikari Monitoring Item
Configuring the Exception Monitoring Item
Configuring the Thread Monitoring Item
Configuring the GC Monitoring Item
Configuring the JVMInfo Monitoring Item
Configuring the JVMMonitor Monitoring Item
Configuring ProbeInfo Monitoring Item
Monitoring Item Views
Tracing
Application Topology
URL Tracing
Resource Tag Management
Managing Tags
Alarm Management
Alarm List
Alarm Policies
Creating an Alarm Template
Creating a Custom Alarm Policy
Recommended Alarm Templates
Alarm Notification
Agent Management
Operating Agents
Upgrading Agents
Configuration Management
Collection Center
Data Masking
System Management
Access Keys
General Configuration
Agent Count
Permissions Management
Authorizing Users and User Groups Using Enterprise Projects
Creating a User and Granting Permissions
Change History
API Reference(2.0)
Before You Start
Overview
API Calling
Endpoints
Constraints
Concepts
API Overview
Calling APIs
Making an API Request
Authentication
Response
Examples
Example 1: Querying Applications
APIs
APM
Querying the application list.
Querying the Master Address
Obtaining the AK/SK
Searching for Components, Environments, and Agents in a Region
Saving a Monitoring Item
Querying the Monitoring Item List
Querying All Agents of an Application
Enabling or Disabling Collection for an Instance
Deleting an Agent
REGION
Querying the Regions Where APM Is Enabled
Querying All Supported Regions
CMDB
Obtaining an Application Tree
Querying Environment Tags
Obtaining the Component List
Obtaining the Environment List of a Component
Deleting a Component Based on the Component ID
Querying the Details About an Application
Querying the Details About a Sub-application
VIEW
Querying Monitoring Item Configurations
Querying the Trace Topology
Querying Event Details
Querying Span Data
Obtaining All Data of a Trace
Obtaining the Trend Graph
Obtaining Summary Table Data
Obtaining the Raw Data Table
Obtaining Raw Data Details
Obtaining the Instance Information
Obtaining the Monitoring Item Information
AKSK
Creating an AK/SK
Querying the AK/SK of a Tenant
Deleting an AK/SK
ALARM
Querying the Alarm List
Querying the Alarm Message List
TOPOLOGY
Querying the Global Topology of an Application
Querying the Topology of a Component Environment
TRANSACTION
Querying the URL Tracing Configuration List
Querying a Region's Environments on Which URLs Are Added for Tracing
Querying the URL Tracing View List
Querying the Details About a URL Tracing View
Permissions Policies and Supported Actions
Appendix
Error Codes
Obtaining a Project ID
Obtaining an Account ID
Obtaining API Parameters
Change History
Best Practices(2.0)
Locating the Causes of Request Errors
Searching for Span Information
Connecting On-premises Services to APM
Associating Traces with Logs
FAQs(2.0)
Are APM Agents Compatible with Other Agents Such as Pinpoint?
What Is APM's Metric Data Sampling Policy?
Why Does Metric Data Collection Fail?
Why Is There No Monitoring Data Displayed on APM After the JavaAgent Is Enabled on CCE?
Why Is an AOM Trace Not Displayed on the APM Console?
Service Overview(1.0)
Overview
Functions
Application Scenarios
Basic Concepts
Edition Differences
Permissions Management
Privacy and Sensitive Information Protection Statement
Data Collection
Usage Restrictions
Billing
Pricing Details
Change History
Getting Started(1.0)
Subscribing to APM and Buying a Package
Monitoring Java Applications
VM Applications
Connecting an ECS Application to APM
Containerized Applications
Connecting a Huawei Cloud Containerized Application to APM
Connecting a Native Docker Application to APM
Connecting a Deployment Application to APM
Best Practices(1.0)
Managing an E-Commerce Application
Locating Application Problems Based on Transactions
Locating Problems Based on Topologies
Embedding the APM Topology Page to a Customer's Self-Built System
User Guide
Before You Start
Permissions Management
Creating a User and Granting Permissions
Creating a Custom Policy
Application Overview
Dashboard
Inventory
Topology
Tracing
Call Chain
Method Tracing
Transactions
SQL Analysis
JVM Monitoring
ICAgent Installation and Configuration
Agent Management
Installing the ICAgent (Linux)
Upgrading the ICAgent (Linux)
Uninstalling the ICAgent (Linux)
Collection Configuration
Configuration Center
Alarm Center
Viewing Alarms
Viewing Events
Setting Alarm Notification
Auditing
Operations Logged by CTS
Viewing Audit Logs
API Reference
API Overview
Using APIs
Calling APIs
Token-based Authentication
Constructing Requests
Initiating Requests
Parsing Responses
Example
APIs
Querying the Application List
Querying the Service List
Querying the Service Instance List
Querying the Service Transaction List
Querying Tracing Data
Querying Tracing Details
Permissions Policies and Supported Actions
Introduction
Actions
Appendix
Status Code
Error Code
Obtaining a Project ID
Obtaining an Account ID
Common Request Headers
Common Response Headers
Change History
SDK Reference
SDK Overview
FAQs
General FAQs
Consultation FAQs
What Is the Billing Policy of APM?
What Are the Apdex and Apdex Threshold?
How Do I Distinguish Between Alarms and Events?
Why Does the Number of GC Times in JVM Monitoring Data Contain Decimals?
Usage FAQs
How Do I Obtain the AK/SK and Project ID?
How Do I Obtain the AK/SK by Creating an Agency?
What Can I Do If No Data Is Found or the Data Is Abnormal?
How Do I Connect APM to Non-Web Programs?
How Are Tracing Time Lines Drawn?
How Does APM Collect Probe Data?
How Does APM Collect Mesh Data?
How Do I Calculate the Number of Used Instances?
How Do I Connect the JBoss Server in Standalone Mode to APM?
What Can I Do If I Cannot Search for Logs Based on Trace IDs?
How Do I Deploy APM Probes in CCE Containers?
What Can I Do If the SSH Tunnel Process Is Abnormal?
How Can I Do If No Topology or Data Is Displayed After the ICAgent and Java Probes Are Installed?
Why Are Tomcat Thread Metrics Not Displayed on the JVM Monitoring Page?
Why Is the Allocated Memory Greater Than the Preset Maximum Memory on the JVM Monitoring Page?
How Do I Determine Whether an ICAgent Has Been Bound in CCE?
More Documents
User Guide (ME-Abu Dhabi Region)
Overview
Basic Concepts
Usage Restrictions
Permissions Management
Billing
Deploying Applications
Dashboard
Alarm Center
Viewing Alarms
Viewing Events
Topology
Inventory
Transactions
Tracing
Call Chain
Method Tracing
SQL Analysis
JVM Monitoring
Collection Management
Agent Management
Installing the ICAgent
Upgrading the ICAgent
Uninstalling the ICAgent
Collection Configuration
Configuration Center
Data Subscription
FAQs
Data Collection
Obtaining the AK/SK
API Reference (ME-Abu Dhabi Region)
Before You Start
Overview
API Calling
Endpoints
Concepts
API Overview
Calling APIs
Making an API Request
Authentication
Response
APIs
Querying an Application List
Querying a Service List
Querying a Service Instance List
Querying a Service Transaction List
Querying Tracing Data
Query Tracing Details
Appendix
Status Code
Error Codes
Obtaining a Project ID
Obtaining the Account ID
Common Request Headers
Common Response Headers
User Guide (2.0) (Kuala Lumpur Region)
Service Overview
What Is APM
Functions
Application Scenarios
Basic Concepts
Edition Differences
Permissions Management
Metric Overview
Metric Overview
Exception
Basic Monitoring
GC Monitoring
JavaMethod
JVM Monitoring
JVMInfo
Netty Memory
Threads
Databases
C3P0 Connection Pool Monitoring
Cassandra Monitoring
ClickHouse Database
DBCP Connection Pool Monitoring
Druid Connection Pool Monitoring
EsRestClient Monitoring
GaussDB Database
HBase Monitoring
Hikari Connection Pool Monitoring
Jetcd Monitoring
MongoDB Monitoring
MySQL Database
ObsClient Monitoring
Oracle Database
PostgreSQL Database
URLs
CSEProvider Cluster Monitoring
DubboProvider Monitoring
FunctionGraph Monitoring
URL Monitoring
External Calls
ApacheHttpAsyncClient Connection Pool
ApacheHttpClient Connection Pool
CSEConsumer Cluster Monitoring
DubboConsumer Monitoring
HttpClient Monitoring
Cache
Redis Method Call
Jedis Monitoring
Lettuce Client
Agent Monitoring
Tomcat Monitoring
Message Queues
KafkaConsumer Monitoring
KafkaProducer Monitoring
RabbitMqCommon Monitoring
RabbitMqConsumer Monitoring
RabbitMqProducer Monitoring
RocketMqConsumer Monitoring
RocketMqProducer Monitoring
RPC
GRPCClient Monitoring
GRPCServer Monitoring
IoT
CoapClient Monitoring
CoapServer Monitoring
MoquetteBroker Monitoring
PahoPublisher Monitoring
PahoSubscriber Monitoring
Communication Protocol
Privacy and Sensitive Information Protection Statement
Data Collection
Usage Restrictions
Java
Getting Started
Enabling APM 2.0
Monitoring Java Applications
Connecting Agents
Manually Installing Agents for Java Applications
Installing Agents for the Java Applications Deployed in CCE Containers
Installing Agents on Applications Deployed Using CodeArts Deploy
JavaAgent Download Addresses
Access Addresses
User Guide
Before You Start
Application List
CMDB Management
Introduction
Creating an Application
Creating a Sub-application
Configuring an Application and Sub-application
Application Metric Monitoring
Overview
Application Monitoring Details
Topology
URL
JVM
Exception
Call
SQL
Web Container
Application Monitoring Configuration
Configuration Details
Configuring the MySQL Monitoring Item
Configuring the HttpClient Monitoring Item
Configuring the URL Monitoring Item
Configuring the JavaMethod Monitoring Item
Configuring the Druid Monitoring Item
Configuring the ApacheHttpAsyncClient Monitoring Item
Configuring the Redis Monitoring Item
Configuring the Jedis Monitoring Item
Configuring the HBase Monitoring Item
Configuring the ApacheHttpClient Monitoring Item
Configuring the Tomcat Monitoring Item
Configuring the EsRestClient Monitoring Item
Configuring the WebSocket Monitoring Item
Configuring the KafkaProducer Monitoring Item
Configuring the Hikari Monitoring Item
Configuring the Exception Monitoring Item
Configuring the Thread Monitoring Item
Configuring the GC Monitoring Item
Configuring the JVMInfo Monitoring Item
Configuring the JVMMonitor Monitoring Item
Configuring ProbeInfo Monitoring Item
Monitoring Item Views
Tracing
Application Topology
URL Tracing
Resource Tag Management
Managing Tags
Alarm Management
Alarm List
Alarm Policies
Configuring an Alarm Template
Creating a Custom Alarm Policy
Recommended Alarm Templates
Alarm Notification
Agent Management
Introduction
Operating Agents
Upgrading Agents
Configuration Management
Collection Center
Data Masking
System Management
Access Keys
General Configuration
Agent Count
Permissions Management
Authorizing Users and User Groups Using Enterprise Projects
Creating a User and Granting Permissions
FAQs
Are APM Agents Compatible with Other Agents Such as Pinpoint?
What Is APM's Metric Data Sampling Policy?
Why Does Metric Data Collection Fail?
Why Is There No Monitoring Data Displayed on APM After the JavaAgent Is Enabled on CCE?
Why Is an AOM Trace Not Displayed on the APM Console?
Change History
General Reference
Glossary
Service Level Agreement
White Papers
Endpoints
Permissions