- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Using IAM to Grant Access to AOM
-
Connecting to AOM
- Connecting to AOM
- Managing Collector Base UniAgent
- Connecting Businesses to AOM
- Connecting Applications to AOM
-
Connecting Middleware and Custom Plug-ins to AOM
- Overview About Middleware and Custom Plug-in Connection to AOM
-
Connecting Middleware to AOM
- Ingesting MySQL Metrics to AOM
- Ingesting Redis Metrics to AOM
- Ingesting Kafka Metrics to AOM
- Ingesting Nginx Metrics to AOM
- Ingesting MongoDB Metrics to AOM
- Ingesting Consul Metrics to AOM
- Ingesting HAProxy Metrics to AOM
- Ingesting PostgreSQL Metrics to AOM
- Ingesting Elasticsearch Metrics to AOM
- Ingesting RabbitMQ Metrics to AOM
- Ingesting Other Middleware Metrics to AOM
- Connecting Custom Plug-ins to AOM
- Managing Middleware and Custom Plug-in Collection Tasks
- Connecting Running Environments to AOM
- Connecting Cloud Services to AOM
- Connecting Open-Source System to AOM
- Managing Log Ingestion
-
(New) Connecting to AOM
- AOM Access Overview
- Managing Collector Base UniAgent
- Connecting Businesses to AOM
- Connecting Components to AOM
-
Connecting Middleware to AOM
- Overview About Middleware Connection to AOM
- Ingesting MySQL Metrics to AOM
- Ingesting Redis Metrics to AOM
- Ingesting Kafka Metrics to AOM
- Ingesting Nginx Metrics to AOM
- Ingesting MongoDB Metrics to AOM
- Ingesting Consul Metrics to AOM
- Ingesting HAProxy Metrics to AOM
- Ingesting PostgreSQL Metrics to AOM
- Ingesting Elasticsearch Metrics to AOM
- Ingesting RabbitMQ Metrics to AOM
- Managing Middleware Collection Tasks
- Connecting Running Environments to AOM
- Connecting Cloud Services to AOM
- Ingesting Data to AOM Using Open-Source APIs and Protocols
- Managing Metric and Log Ingestion
- Observability Metric Browsing
- Dashboard Monitoring
- Alarm Monitoring
- (New) Log Management
- Log Management (Old)
-
Prometheus Monitoring
- Prometheus Monitoring Overview
- Managing Prometheus Instances
- Managing Prometheus Instance Metrics
- Using Prometheus Monitoring to Monitor CCE Cluster Metrics
- Configuring Multi-Account Aggregation for Unified Monitoring
- Configuring Metric Collection Rules for CCE Clusters
- Configuring Recording Rules to Improve Metric Query Efficiency
- Configuring Data Multi-Write to Dump Metrics to Self-Built Prometheus Instances
- Setting Metric Storage Duration
- Monitoring Prometheus Instance Metrics Through Dashboards
- Configuring the Remote Read Address to Enable Self-built Prometheus to Read Data from AOM
- Configuring the Remote Write Address to Report Self-Built Prometheus Data to AOM
- Checking Prometheus Instance Data Through Grafana
- Checking the Number of Metric Samples Reported by Prometheus Instances
- Infrastructure Monitoring
- Application Insights
- O&M Management
- Global Settings
- Querying AOM Traces
- Migrating Data from AOM 1.0 to AOM 2.0
-
Best Practices
- AOM Best Practices
- Building a Comprehensive Metric System
- Alarm Noise Reduction
- Unified Metric Monitoring
- Customizing OS Images to Automatically Connect UniAgent
- Connecting Self-Built Middleware in the CCE Container Scenario
- Interconnecting Third-Party/IDC/Huawei Cloud Cross-Region Self-Built Prometheus with AOM Prometheus Instances
-
API Reference
- Before You Start
- API Overview
- Calling APIs
-
APIs
-
Alarm
- Querying the Event Alarm Rule List
- Adding an Event Alarm Rule
- Modifying an Event Alarm Rule
- Deleting an Event Alarm Rule
- Querying Events and Alarms
- Counting Events and Alarms
- Reporting Events and Alarms
- Obtaining the Alarm Sending Result
- Deleting a Silence Rule
- Adding a Silence Rule
- Modifying a Silence Rule
- Obtaining the Silence Rule List
- Querying an Alarm Action Rule Based on Rule Name
- Adding an Alarm Action Rule
- Deleting an Alarm Action Rule
- Modifying an Alarm Action Rule
- Querying the Alarm Action Rule List
- Querying Metric or Event Alarm Rules
- Adding or Modifying Metric or Event Alarm Rules
- Deleting Metric or Event Alarm Rules
-
Monitoring
- Querying Time Series Objects
- Querying Time Series Data
- Querying Metrics
- Querying Monitoring Data
- Adding Monitoring Data
- Adding or Modifying One or More Service Discovery Rules
- Deleting a Service Discovery Rule
- Querying Existing Service Discovery Rules
- Adding a Threshold Rule
- Querying the Threshold Rule List
- Modifying a Threshold Rule
- Deleting a Threshold Rule
- Querying a Threshold Rule
- Deleting Threshold Rules in Batches
-
Prometheus Monitoring
- Querying Expression Calculation Results in a Specified Period Using the GET Method
- (Recommended) Querying Expression Calculation Results in a Specified Period Using the POST Method
- Querying the Expression Calculation Result at a Specified Time Point Using the GET Method
- (Recommended) Querying Expression Calculation Results at a Specified Time Point Using the POST Method
- Querying Tag Values
- Obtaining the Tag Name List Using the GET Method
- (Recommended) Obtaining the Tag Name List Using the POST Method
- Querying Metadata
- Log
- Prometheus Instance
- Configuration Management
-
CMDB (AOM 2.0)
- Creating an Application
- Deleting an Application
- Querying the Details of an Application
- Modifying an Application
- Adding a Component
- Deleting a Component
- Querying the Details of a Component
- Modifying a Component
- Creating an Environment
- Deleting an Environment
- Querying the Details of an Environment
- Modifying an Environment
- Querying the Resource List of a Node
- Querying the Details of an Application Based on the Application Name
- Querying the Details of an Environment Based on the Environment Name
- Querying the Details of a Component Based on the Component Name
- Adding a Sub-application
- Deleting a Sub-application
- Modifying a Sub-application
-
Automation (AOM 2.0)
- Creating a Task
- Updating a Task
- Operating a Paused Task
- Obtaining the Execution Details of a Workflow
- Terminating a Task
- Querying a Script
- Querying the Script Version
- Performing Fuzzy Search on the Job Management Page
- Querying Execution Plans (Custom Templates) Based on Job ID
- Querying the Details of an Execution Plan
- Querying Tasks
- Querying the Execution History of a Task
- Executing a Workflow
-
Alarm
- Historical APIs
- Examples
- Permissions Policies and Supported Actions
- Appendix
- SDK Reference
-
FAQs
- Dashboard
- Alarm Management
- Log Analysis
- Prometheus Monitoring
- Infrastructure Monitoring
- Application Monitoring
-
Collection Management
- Are ICAgent and UniAgent the Same?
- What Can I Do If an ICAgent Is Offline?
- Why Is an Installed ICAgent Displayed as "Abnormal" on the UniAgent Installation and Configuration Page?
- Why Can't I View the ICAgent Status After It Is Installed?
- Why Can't AOM Monitor CPU and Memory Usage After ICAgent Is Installed?
- How Do I Obtain an AK/SK?
- FAQs About UniAgent and ICAgent Installation
- How Do I Enable the Nginx stub_status Module?
- Why Does APM Metric Collection Fail?
- Why Cannot the Installation Script Be Downloaded When I Try to Install UniAgent on an ECS?
- CMDB (Unavailable Soon)
-
O&M Management (Unavailable Soon)
- How Can I Obtain the OBS Permission for Installing Packages?
- Why Can't Scheduled Tasks Be Triggered?
- Can I Specify Script Parameters and Hosts During Job Execution?
- Why Is a Parameter Error Displayed When I Create a Scheduled Task Using a Cron Expression?
- How Can I Set a Review for an Execution Plan?
- Why Is "delete success:{}" Displayed (Files Cannot Be Deleted) During Disk Clearance?
- What Can I Do If the Execution Plan Is Not Updated After I Modify the Job?
- What Can I Do If "agent not found" Is Displayed?
- Why Are the Hosts Listed in Execution Logs Inconsistent with Those I Configured for a Task?
- Why Did a Task Fail to Execute?
- Other FAQs
- Videos
-
AOM 1.0 Documentation
-
Service Overview (1.0)
- What Is AOM?
- Product Architecture
- Functions
- Application Scenarios
- Edition Differences
-
Metric Overview
- Introduction
- Network Metrics and Dimensions
- Disk Metrics and Dimensions
- Disk Partition Metrics
- File System Metrics and Dimensions
- Host Metrics and Dimensions
- Cluster Metrics and Dimensions
- Container Metrics and Dimensions
- VM Metrics and Dimensions
- Instance Metrics and Dimensions
- Service Metrics and Dimensions
- Security
- Restrictions
- Privacy and Sensitive Information Protection Statement
- Relationships Between AOM and Other Services
- Basic Concepts
- Permissions
- Billing
- Change History
- Getting Started (1.0)
-
User Guide (1.0)
- Overview
- Subscribing to AOM
- Permissions Management
- Connecting Resources to AOM
- Monitoring Overview
- Alarm Management
- Resource Monitoring
- Log Management
- Configuration Management
- Resource Groups
- Auditing
- Upgrading to AOM 2.0
- Best Practices (1.0)
-
FAQs (1.0)
- User FAQs
-
Consultation FAQs
- What Is the Billing Policy of AOM?
- What Are the Usage Restrictions of AOM?
- What Are the Differences Between AOM and APM?
- How Do I Distinguish Alarms from Events?
- What Is the Relationship Between the Time Range and Statistical Cycle?
- Does AOM Display Logs in Real Time?
- Will Container Logs Be Deleted After They Are Dumped?
- How Can I Do If I Cannot Receive Any Email Notification After Configuring a Threshold Rule?
- Why Are Connection Channels Required?
-
Usage FAQs
- What Can I Do If I Do Not Have the Permission to Access SMN?
- What Can I Do If Resources Are Not Running Properly?
- How Do I Set the Full-Screen Online Duration?
- What Can I Do If the Log Usage Reaches 90% or Is Full?
- How Do I Obtain an AK/SK?
- How Can I Check Whether a Service Is Available?
- Why Is the Status of an Alarm Rule Displayed as "Insufficient"?
- Why the Status of a Workload that Runs Normally Is Displayed as "Abnormal" on the AOM Page?
- How Do I Create the apm_admin_trust Agency?
- How Do I Obtain the AK/SK by Creating an Agency?
- What Is the Billing Policy of Logs?
- Why Can't I See Any Logs on the Console?
- What Can I Do If an ICAgent Is Offline?
- Why Can't the Host Be Monitored After ICAgent Is Installed?
- Why Is "no crontab for root" Displayed During ICAgent Installation?
- Why Can't I Select an OBS Bucket When Configuring Log Dumping on AOM?
- Why Can't Grafana Display Content?
-
Service Overview (1.0)
-
More Documents
-
User Guide (1.0) (Kuala Lumpur Region)
-
Service Overview
- What Is AOM?
- Product Architecture
- Functions
- Application Scenarios
-
Metric Overview
- Introduction
- Network Metrics and Dimensions
- Disk Metrics and Dimensions
- Disk Partition Metrics
- File System Metrics and Dimensions
- Host Metrics and Dimensions
- Cluster Metrics and Dimensions
- Container Metrics and Dimensions
- VM Metrics and Dimensions
- Instance Metrics and Dimensions
- Service Metrics and Dimensions
- Restrictions
- Privacy and Sensitive Information Protection Statement
- Relationships Between AOM and Other Services
- Basic Concepts
- Permissions
- Getting Started
- Permissions Management
- Connecting Resources to AOM
- Monitoring Overview
- Alarm Management
- Resource Monitoring
- Log Management
- Configuration Management
- Auditing
- Upgrading to AOM 2.0
-
FAQs
- User FAQs
-
Consultation FAQs
- What Are the Usage Restrictions of AOM?
- What Are the Differences Between AOM and APM?
- How Do I Distinguish Alarms from Events?
- What Is the Relationship Between the Time Range and Statistical Cycle?
- Does AOM Display Logs in Real Time?
- How Can I Do If I Cannot Receive Any Email Notification After Configuring a Threshold Rule?
- Why Are Connection Channels Required?
-
Usage FAQs
- What Can I Do If I Do Not Have the Permission to Access SMN?
- What Can I Do If Resources Are Not Running Properly?
- How Do I Set the Full-Screen Online Duration?
- How Do I Obtain an AK/SK?
- How Can I Check Whether a Service Is Available?
- Why Is the Status of an Alarm Rule Displayed as "Insufficient"?
- Why the Status of a Workload that Runs Normally Is Displayed as "Abnormal" on the AOM Page?
- How Do I Create the apm_admin_trust Agency?
- What Can I Do If an ICAgent Is Offline?
- Why Is "no crontab for root" Displayed During ICAgent Installation?
- Change History
-
Service Overview
-
User Guide (2.0) (Kuala Lumpur Region)
- Service Overview
- Getting Started
- Introduction
- Access Center
- Dashboard
- Alarm Management
-
Metric Analysis
- Metric Browsing
- Prometheus Monitoring
- Resource Usage Statistics
- Log Analysis (Beta)
- Container Insights
- Infrastructure Monitoring
- Process Monitoring
- Collection Management
- Configuration Management
- Remarks
- Permissions Management
- Auditing
- Upgrading to AOM 2.0
-
FAQs
- Overview
- Dashboard
- Alarm Management
- Log Analysis
- Prometheus Monitoring
- Container Insights
- Application Monitoring
-
Collection Management
- Are ICAgent and UniAgent the Same?
- What Can I Do If an ICAgent Is Offline?
- Why Is an Installed ICAgent Displayed as "Abnormal" on the Agent Management Page?
- Why Can't I View the ICAgent Status After It Is Installed?
- Why Can't AOM Monitor CPU and Memory Usage After ICAgent Is Installed?
- How Do I Obtain an AK/SK?
- FAQs About ICAgent Installation
- Other FAQs
- Change History
-
API Reference (Kuala Lumpur Region)
- Before You Start
- API Overview
- Calling APIs
-
APIs
-
Alarm
- Querying the Event Alarm Rule List
- Adding an Event Alarm Rule
- Modifying an Event Alarm Rule
- Deleting an Event Alarm Rule
- Obtaining the Alarm Sending Result
- Deleting a Silence Rule
- Adding a Silence Rule
- Modifying a Silence Rule
- Obtaining the Silence Rule List
- Querying an Alarm Action Rule Based on Rule Name
- Adding an Alarm Action Rule
- Deleting an Alarm Action Rule
- Modifying an Alarm Action Rule
- Querying the Alarm Action Rule List
- Querying Events and Alarms
- Counting Events and Alarms
- Reporting Events and Alarms
-
Monitoring
- Querying Time Series Objects
- Querying Time Series Data
- Querying Metrics
- Querying Monitoring Data
- Adding Monitoring Data
- Adding or Modifying One or More Service Discovery Rules
- Deleting a Service Discovery Rule
- Querying Existing Service Discovery Rules
- Adding a Threshold Rule
- Querying the Threshold Rule List
- Modifying a Threshold Rule
- Deleting a Threshold Rule
- Querying a Threshold Rule
- Deleting Threshold Rules in Batches
- Log
-
Alarm
- Examples
- Permissions Policies and Supported Actions
- Appendix
- Change History
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Getting Started
- User Guide
-
FAQs
- What Can I Do If an ICAgent Is Offline?
- Obtaining an AK/SK
- What Is the Relationship Between the Time Range and Statistical Cycle?
- What Can I Do If Resources Are Not Running Properly?
- How Can I Do If I Do Not Have the Permission to Access SMN?
- How Do I Distinguish Alarms and Events?
- Does AOM Display Logs in Real Time?
- How Can I Check Whether a Service Is Available?
- Why Is the Status of an Alarm Rule Displayed as "Insufficient"?
- Why the Status of a Workload that Runs Normally Is Abnormal on the AOM Page?
-
API Reference(ME-Abu Dhabi Region)
- Before You Start
- API Overview
- Calling APIs
-
APIs
-
Monitoring (v1)
- Querying Metrics
- Querying Monitoring Data
- Adding Monitoring Data
- Adding a Threshold Rule
- Modifying a Threshold Rule
- Querying the Threshold Rule List
- Querying a Threshold Rule
- Deleting a Threshold Rule
- Adding or Modifying One or More Application Discovery Rules
- Deleting an Application Discovery Rule
- Querying Application Discovery Rules
- Auto Scaling
- Log
-
Monitoring (v1)
- Permissions Policies and Supported Actions
- Appendix
-
User Guide (Ankara Region)
- Service Overview
- Getting Started
- User Guide
-
FAQs
- What Can I Do If an ICAgent Is Offline?
- How Do I Obtain an AK/SK?
- What Can I Do If Resources Are Not Running Properly?
- How Can I Do If I Do Not Have the Permission to Access SMN?
- How Do I Distinguish Alarms from Events?
- Does AOM Display Logs in Real Time?
- Why Is the Application Status Normal but the Component Status Abnormal?
- Best Practices
- Change History
-
API Reference (Ankara Region)
- Before You Start
- API Overview
- Calling APIs
-
APIs
-
Monitoring (v1)
- Querying Metrics
- Querying Monitoring Data
- Adding Monitoring Data
- Adding a Threshold Rule
- Modifying a Threshold Rule
- Querying the Threshold Rule List
- Querying a Threshold Rule
- Deleting a Threshold Rule
- Adding or Modifying One or More Application Discovery Rules
- Deleting an Application Discovery Rule
- Querying Application Discovery Rules
- Monitoring (v2)
- Auto Scaling
- Log
- Events/Alarms
- Agent
- Application Discovery Rules
-
Prometheus Monitoring
- Querying Expression Calculation Results in a Specified Period
- Querying the Expression Calculation Result at a Specified Time Point
- Querying Tag Values
- Obtaining the Tag Name List
- Querying Metadata
- Querying the Calculation Results of a PromQL Expression in a Specified Period Based on Prometheus Instance
- Querying the Calculation Result of a PromQL Expression at a Specified Time Point Based on Prometheus Instance
- Querying the Values of a Tag Based on Prometheus Instance
- Obtaining the Tag Name List Based on Prometheus Instance
- Querying Metadata Based on Prometheus Instance
-
Monitoring (v1)
- Appendix
- Change History
-
User Guide (1.0) (Kuala Lumpur Region)
- General Reference
Copied.
Connecting Applications to AOM
AOM provides a unified entry for observability analysis of Huawei Cloud services. Through the access center, you can ingest the traces of application components to APM for monitoring application or API performance metrics such as average request latency, error calls, and request throughput.
Procedure
- Log in to the AOM 2.0 console.
- In the navigation pane on the left, choose Access > Access Center. (To switch from the new access center to the old one, click Back to Old Version in the upper right corner.)
- In the Application panel on the right, click the target card and perform the operations listed in the following table if needed.
Table 1 Connecting applications to AOM Card
Related Operation
Java
On the Connect Application page, ingest trace metrics related to Java applications. AOM supports quick connection to Agents to monitor Java applications. You can also install Agents for the Java applications deployed in CCE containers for monitoring. For details, see Monitoring Java Applications Through Quick Connection to Agents and Monitoring Java Applications Deployed in CCE Containers by Installing Agents.
Monitoring Java Applications Through Quick Connection to Agents
AOM allows you to monitor Java applications through quick connection to Agents. Java supports enhanced Agents.
- Prerequisites
The network between your host and APM is connected.
You can run the Telnet command to check the network. For example, if you select region CN-Hong Kong and set Access Mode to Enhanced Agent, log in to the host where the application is deployed and run the telnet 100.125.6.106:41333 command to check the network connectivity. For details about access addresses in other regions, see Access Addresses.
- Procedure
- Log in to the AOM 2.0 console.
- In the navigation pane, choose Access > Access Center.
- In the Application panel, click the Java card. (In the new access center, click the Java Component card under the Components panel.)
- In the Basic Info area, select a region and an application.
If no applications meet your requirements, create one. For details, see Table 2.Figure 1 Basic information
Table 2 Parameters for adding an application Parameter
Description
Application Name
Name of an application, which cannot be empty.
Enter 1 to 128 characters and start with a letter. Only digits, letters, underscores (_), and hyphens (-) are allowed.
Application Alias
Application alias. The alias takes precedence over the application name to display.
Enter 1 to 128 characters. Only digits, letters, underscores (_), hyphens (-), brackets, and periods (.) are allowed.
Enterprise Project
Select an enterprise project from the drop-down list. This parameter is displayed only when you use the enterprise edition.
Description
Description of the application. Enter up to 1,000 characters.
- (Default) Set Access Mode to Enhanced Agent.
- Set Data Access to VM access and ingest the data as prompted.
Figure 2 VM access
- Use a remote login tool, such as PuTTY, to log in to the Linux host where the Agent is to be installed and run the copied command as the root user to download and install JavaAgent.
curl -k https://javaagent.***/apm_agent_install2.sh -o apm_agent_install.sh && bash apm_agent_install.sh -ak * -sk * -masteraddress https://**** -obsaddress https://javaagent.***.com -version latest; history -cw; history -r
- APM_AK/APM_SK: AK and SK for installing JavaAgent. For details about how to obtain an AK and SK, see Access Keys. Directly copy the command for installing JavaAgent. Delete {} when entering APM_AK and APM_SK.
- master.address: the access address of an APM Agent. For more information, see Access Addresses.
- Supports dynamic configuration of AK/SK in the JavaAgent installation command and master.address: Assign values to environment variables APM_MASTER_ADDRESS, APM_ACCESS_KEY (apm-ak), and APM_SECRET_KEY (apm-sk).
- After installing the JavaAgent, add JVM parameters to the startup script of your application and then restart it.
Table 3 JVM parameters Parameter
Description
Mandatory
Agent Installation Path
Path for installing the Agent.
Yes
appName
Component name, which must start with a character. Each component name must be unique under an application. A component can contain multiple environments. If there are duplicate names, use instanceName to distinguish them.
Yes
env
Name of an environment, where an application is deployed. A program can be deployed in different environments (such as the test or live network environment). Each environment is deployed in one region and has a unique region attribute. If this parameter is blank, the default environment will be used.
No
envTag
Environment tag for filtering environments. Different environments may share the same tag. This parameter can be left blank.
No
business
Name of an application (a global concept). Create an application before specifying this parameter. If this parameter is left blank, the default application (which is automatically created when you enable APM) will be used.
No
subBusiness
Name of a sub-application (a global concept). It is a folder under the application. This parameter can be left blank. If it is left blank, resources will be mounted to the root application. Up to three layers of sub-applications are supported. For example, for a/b/c, each represents one layer.
No
User Application
Name of a user application.
Yes
- Use a remote login tool, such as PuTTY, to log in to the Linux host where the Agent is to be installed and run the copied command as the root user to download and install JavaAgent.
Monitoring Java Applications Deployed in CCE Containers by Installing Agents
AOM allows you to install APM Agents for Java applications deployed in CCE containers for monitoring. It enables precise problem analysis and locating, accelerate troubleshooting.
- Prerequisites
- The network between your host and APM is connected.
You can run the Telnet command to check the network. For example, if you select region CN-Hong Kong and set Access Mode to Enhanced Agent, log in to the host where the application is deployed and run the telnet 100.125.6.106:41333 command to check the network connectivity. For details about access addresses in other regions, see Access Addresses.
- The endpoint of the target region has been obtained. For details, see Regions and Endpoints.
- The AK/SK required for installing JavaAgent has been obtained. To do so, go to the AOM 2.0 console and choose APM Settings > Access Keys in the navigation pane.
- The network between your host and APM is connected.
- Instructions
You can configure performance management for Java workloads when and after the workloads are created. Agents can only be installed for Java applications deployed in CCE containers. For details, see Configuring APM. You are advised to install self-developed probes for applications deployed in CCE containers.
Table 4 describes the parameters.
Table 4 Parameters for configuring APM Parameter
Description
Probe
Select a target probe. Options: Disable/APM 2.0.
Probe Version
Version of the probe. You are advised to select a probe version based on the CPU architecture of the node where the workload is located.
Probe Upgrade Policy
Policy for the probe upgrade. The default value is Auto upgrade upon restart.
- Auto upgrade upon restart: The system downloads the probe image each time the pod is restarted.
- Manual upgrade upon restart: If a local image is available, it will be used. If no local image is available, the system downloads the probe image.
APM Environment
Enter an APM environment name. This parameter is optional.
APM App
Select an existing APM application.
Sub-app
Enter an APM sub-application. This parameter is optional.
Access Key
The key of APM is automatically obtained. For details, see Prerequisites.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot