Guance
Aug 19, 2024
Pipelines, click Create to create a new Pipeline file. It supports a variety of
script functions, and it can directly view their syntax format through the list of script
functions provided by Guance, and supports one-click collection of samples for
analysis rule testing, adding multiple sample analysis tests and setting default Pipeline
scripts.
Pipeline Official Library
Guance provides Pipeline official script library with built-in log parsing Pipeline. In
the Guance workspace Log > Pipelines, click Pipelines Official Library to view the
built-in standard pipeline official website file library, including nginx, apache, redis,
elasticsearch, mysql and so on. You can choose to open any pipeline file, and create a
new pipeline file by cloning, which supports testing parsing rules through sample
examples provided by Guance.
Note: The official pipeline library file does not support modification.
49Generate Metrics
Guance supports configuring aggregation rules based on log data to generate new
metric data, which is convenient for deeper data analysis.
Index
Guance supports setting multiple log indexes, filtering qualified logs, and saving them
in different log indexes. This helps users save log data storage costs by selecting
different data storage policies for log indexes.
50Guance supports binding external index data, including the index data of SLS
Logstore, Elasticsearch and OpenSearch. After successful binding, you can query and
analyze the external index data in the Guance workspace.
Blacklist
Guance supports blacklist function, and reduces unnecessary log data reporting by
adding log filtering rules.
Backup Log
Guance supports configuring backup rules to backup and store the whole log that
meets the rules and performing rule verification and backup every 5 minutes. That is,
the backed log data can be viewed after configuring backup rules for up to 5 minutes.
51Application Performance Monitoring
Guance supports the analysis and management of link data, tracks the time taken by
all services to process requests and the status of requests, and can be used to monitor
the performance of applications. It supports related real user monitoring, log
monitoring, reduce application performance data collection through sampling, and
save storage space. It also supports the generation of new metric data based on the
existing data in the current space, which is convenient for designing and
implementing new technical metrics according to requirements.
Services
The Service in APM displays the list of all link services in the workspace, and can
view the tracking metrics of all services: "average number of requests per second",
"average response time", "P75 response time", "P95 response time" and "number of
errors", which are sorted in descending order according to "number of errors" by
default. It supports clicking the name of key performance metrics to adjust the sorting
display and searching, multi-label filtering and quick filtering and setting service list.
52Service Topology
Link service supports switching list to topology diagram mode to view the call
relationship between various services. When you hover the mouse over the service
node, you can view the "number of requests", "P50 response time", "P75 response
time", "P99 response time" and "number of errors" of the service. It supports
screening and displaying through different performance metrics, and customizing the
color interval of link service performance metrics. It also supports adjusting the
distribution map by highlighting, node size, filling items, thumbnails, etc.
53Service List
Service inventory supports real-time viewing of ownership, dependency, performance,
associated instrumentation and association analysis of different services, quickly
discovers and solves service performance problems, and helps teams efficiently build
and manage large-scale end-to-end distributed applications. Click the action button on
the right side of the service to set up the service list.
54After the setting is completed, click on the service to view the list of services
corresponding to the setting, as well as information such as performance and call
topology.
Overview
In the Overview of application performance monitoring, it is supported to view the
statistics of online service quantity, P90 service response time, service maximum
impact time, service error number and service error rate. At the same time, it is also
possible to view the Top10 ranking of P90 service, resource and operation response
55time, as well as the Top10 ranking of service error rate, resource 5xx error rate and
resource 4xx error rate.
Link
In the Links for which performance monitoring is applied, it is supported to count the
"Span number", "Request number", "Error Span number", "Error request number" and
"Response time" of links within the selected time range, and display a list of all links
served. Guance provides three link filtering viewing lists, namely "All Spans",
"Service Top Spans" and "All Traces". It supports link data search, multi-label
filtering, quick filtering, data export, adding display columns and other operations,
and also supports saving the current display content, time range and filtering
conditions to snapshots and viewing historical snapshots.
56Link Details
Click on the link list to view the details of the link, including all relevant "attribute
labels", "flame statistics", "span list", "service call relationship" and data such as hosts,
logs, networks and code hotspots associated with the link. It supports keyword search
and multi-label filtering in associated logs. Click log content to jump directly to log
details page, which can combine log details to analyze link performance, and support
binding built-in views for association analysis.
1)Flame
Used to clearly show the flow and execution time of each span in the whole link. At
the same time, the corresponding service list and response time are displayed.
572)Span List
Show a list of all the spans in the link, including "service name", "span name", "span
number", "execution time" and "execution time percentage". Click Span Name to
view the corresponding span details.
3)Service Invocation Chart
Used to view the invocation relationship between various services.
58Error Tracking
In the application of Error Tracking of performance monitoring, it supports a quick
view of the historical trend and distribution of similar errors in the link, and helps to
quickly locate performance problems. The error tracking explorer includes two lists:
All Errors and Clustering Analysis:
• All Errors: Used to view all link errors that occur in the project application as a whole.
• Clustering analysis: Used to quickly view the most frequent link errors that need to be
resolved.
Click on any error link to view error details.
• Error profile: Based on error information error_message and error type error_type, the error
links with high approximation are aggregated and counted, and according to the time range
selected by the error explorer, the corresponding time interval is automatically selected to
59show the distribution trend of errors, which helps you intuitively view the time points or time
ranges where frequent errors occur and quickly locate link problems.
• View Link: You can locate link problems by looking at the upstream and downstream Spans
of the flame diagram of the wrong link.
Profile
Profile supports collecting dynamic performance data of applications running in
different language environments such as Java/Python, and helps users to view
performance problems of CPU, memory and IO. In the Profile explorer, it supports
operations such as searching Profile data, multi-label filtering, quick filtering, data
export, adding display columns, etc. It supports saving the current display content,
time range and filter conditions to snapshots and viewing historical snapshots.
60Profile Details
Click on the Profile list to view the corresponding performance details, including
property tags, performance flames, and operational information. Through the
performance flame diagram, we can analyze the usage of CPU, memory or IO at the
level of different types of code methods, and intuitively understand the execution
performance and call of methods. At the same time, Profile provides analysis and
view of execution data based on methods, libraries, threads and other dimensions,
which shows some methods with large execution more intuitively and locates
performance problems faster.
61Generate Metrcis
Guance supports generating new metric data based on link data configuration
aggregation rules, which is convenient for deeper data analysis.
Real User Monitoring
Guance supports the collection of user access data for web, Android/iOS apps, and
applets. It provides scenario analysis such as explorer, overview, performance
analysis, resource analysis, and error analysis to help you quickly monitor user
behavior and identify problems.
Sampling is supported to reduce data collection for user access and save storage space. The
generation of new metric data based on existing data in the current space is convenient for
designing and implementing new technical metrics according to requirements.
When creating applications, custom application IDs can be used as the unique identification
of the current workspace, and different workspaces can use the same application ID for
uploading and matching SDK collection data.
Access session playback is supported, which generates video records by capturing clicks,
mouse movements, and page scrolling. This helps to deeply understand the user''s operation
experience and locate errors, reproduce, and solve problems in combination with user access
performance data.
Implementation of "browser plug-in" is also supported, using a browser to record user access
behavior and create codeless end-to-end tests.
62Explorer
Guance user access explorer supports searching, multi-label filtering, quick filtering,
and export viewing analysis of user access data in applications. Custom
addition/deletion of display columns is supported. Clicking on session or page data
will display details. Snapshotting is supported to save current display content, time
range, and filter criteria to view historical snapshots.
Guance user access monitoring explorer includes session, view, resource, action,
long_task and error.
Session Explorer
Select Session Explorer in the upper left corner to query and analyze the session data
when the user accesses. This includes the session duration when the user accesses
(that is, the time from opening an application to closing), session type, number of
page visits, number of operations, number of errors, initial page visits, and last page
browsing by the user. The Play button can be clicked to view the session replay of the
changed session.
63View Explorer
Select Session Explorer in the upper left corner to query and analyze the session data
when the user accesses. This includes the session duration when the user accesses
(that is, the time from opening an application to closing), session type, number of
page visits, number of operations, number of errors, initial page visits, and last page
browsing by the user. The Play button can be clicked to view the session replay of the
changed session.。
Resource Explorer
Select Resource Explorer in the upper left corner to query and analyze resource
loading performance when the user accesses. This includes the resource address,
status code, request mode, resource loading time, and so on.
64Action Explorer
Select Action Explorer in the upper left corner to query and analyze the operation
behavior when the user accesses. This includes the operation type, operation content,
and operation time when the user accesses.
Long_task Explorer
Select Long_task Explorer in the upper left corner to query and analyze the resource
loading performance when the user accesses. This includes the resource address,
status code, request mode, and resource loading time when the user accesses.
65Error Explorer
Select Error Explorer in the upper left corner to query and analyze the code errors
when users visit. This includes the page address, code error type, and error content
when users visit.
User Access Details
In the explorer, clicking on the data list will provide details of the user''s access. This
includes session replay, performance, extended fields, Fetch/XHR, errors and logs.
Session replay: View the whole session process of the user, including the visited pages,
operation records, and error data. Click to play the user''s operation process.
Performance: View the front-end page performance when the user accesses the specified
application, including page loading time, content drawing time, interaction time, input delay,
and so on.
66 Extended Fields: Support for quick filter viewing by selecting extended fields, including
Filter Field Values, Reverse Filter Field Values, Add to Display Columns, and Copy.
Fetch/XHR: View every request made to the backend application when the user accesses,
including the occurrence time, the link of the request, and the duration. Click Request to
jump to the details page of the corresponding link.
Errors: View the error data information, the type of error, and when the error occurred at this
user access. Click on the error message to jump to the details page of the corresponding error.
The function of Sourcemap is supported to restore confused code, which is convenient to
debug and locate code problems in source code when troubleshooting errors.
Log: Associated logs can be viewed based on current user access. Support keyword search
and multi-label filtering of logs. Click Logs to jump to the corresponding log page.
Tracing
Guance supports users to create new tracking tasks through RUM and monitor the
customized link tracking trajectory in real time. By preset link tracking trajectory, link
data can be screened centrally, user access experience can be queried accurately, and
loopholes, anomalies and risks can be found in time.
67Automatic Call Tracing
Guance supports the implementation of Browser Plug-in, using a browser to record
user access behavior and create codeless end-to-end tests.
Generate Metrics
Guance supports configuring aggregation rules based on user access data to generate
new index data, which is convenient for deeper data analysis.
68Synthetic Tests
Guance provides an out-of-the-box availability monitoring solution, which uses a
global monitoring network to comprehensively monitor the network performance,
network quality, and network data transmission stability of different regions and
operators to various services by creating dialing tasks based on different protocols
such as HTTP, TCP, ICMP, and WEBSOCKET. Through real-time monitoring and
statistics of the availability of dialing and testing tasks, dialing and testing task logs,
and real-time alarms are provided to help you quickly find network problems and
improve network access quality.
Synthetic Tests Management
In Synthetic Tests, click Create to add a new dialing test task. After creating a
completed dialing task, you can analyze the response time and availability of the
current dialing task from both the geography and trend dimensions on the overview
page.
创建完成拨测任务后,可以在概览页面从地理和趋势两个维度分析当前拨测任务
的响应时间和可用率。
69Synthetic Tests Explorer supports such operations as viewing, searching, multi-label
filtering, shortcut filtering, data export, and adding display columns. It supports the
statistics of dialing test data according to the selected time range through stacked
histogram, save the current display content, time range, and filter conditions to
snapshot and view the historical snapshot, and click the list data to view the details of
dialing test results.
Self-built Node Management
Guance supports self-building of new dialing and testing nodes on a global scale.
After creating the self-built nodes, the configuration information of the designated
nodes is obtained through "Get Configuration" and configured in DataKit. After the
configuration is completed, you can choose to use it in dialing and testing.
70Security Check
Guance supports timely monitoring, inquiring, and associating all inspection events
through Security Check. It helps improve inspection quality, problem analysis, and
problem handling ability while finding loopholes, anomalies, and risks in time. And it
supports the generation of new index data based on the existing data in the current
space, which is convenient for designing and implementing new technical metrics
according to requirements.
Overview
In Security Check > Overview, you can view the overview of security check events
in different hosts by screening hosts, security check levels, and security check
categories, including the number of security check events in different levels and
visual chart analysis, and the ranking list of security check events in different
categories and rules.
Explorer
In Security Check > Overview, it supports viewing, searching, multi-label filtering,
quick filtering, data export, and adding display columns to reported security check
events. Support the statistics of security check data according to the selected time
range through stacked histogram, save the current display content, time range, and
filter conditions to snapshot and view the historical snapshot, and click the list data to
view the details of security check.
71Security Check Details
Click on the inspection event you want to view, and in the underlined details page,
you can view the handling suggestions for this security check event, including the
theoretical basis, risk items, audit methods and remedial measures, and at the same
time, you can view the related inspection events and hosts, etc.
Generate Metrics
Guance supports configuring aggregation rules based on security check data to
generate new metric data, so as to facilitate deeper data analysis.。
72CI Visibility
Guance supports visualization of CI processes and results built into Gitlab/Jenkins.
You can directly view CI results in Gitlab/Jenkins through the CI Visibility feature of
Guance. The process of CI is continuous integration. If developers encounter
problems when pushing code, they can check the pipeline of all CI and its success rate,
failure reasons, and specific failure links in Guance to help you provide code update
guarantee.
Overview
In CI Visibility > Overview, you can switch to the overview view of Pipeline and
Job in Gitlab/Jenkins, including the number of executions, success rate, execution
time, and the number of execution failures.
73Explorer
In CI Visibility > Explorer, It supports for switching the entire process of viewing
and analyzing Gitlab/Jenkins Pipeline and Job, support for search, multi-label filtering,
shortcut filtering, data export, and adding display columns. It also supports stacking
histogram to count CI process according to selected time range, saving current display
content, time range, and filtering conditions to snapshot and viewing historical
snapshot.
74CI Details
Click on the CI Visibility process you want to view, and in the underlined details page,
you can view the CI process and results through the flame diagram and Job list,
including the duration of Pipeline, all Jobs, and their duration, etc. At the same time,
you can view the associated logs, hosts, etc.
75Monitors
Guance has powerful anomaly monitoring capability, it supports custom monitors and
provides more than 20 kinds of monitoring templates, including Docker, Elasticsearch,
Host, etc. With alarm notification and related events, it can help users quickly find
problems, locate problems, and solve problems. At the same time, Guance provides
intelligent inspection function based on intelligent algorithms to help users foresee
potential problems of infrastructure and applications in advance. In addition, Guance
supports SLO (Service Level Objective) monitoring to accurately control service
levels and targets.
Monitors
In the Guance Monitors, it supports creating a new custom monitor, creating a new
monitor from a template, viewing and restoring the historical configuration of the
monitor, and managing the monitor, including filtering alarm policies, searching,
importing/exporting, enabling/disabling, editing, deleting, manually triggering
monitor detection, viewing related events, setting alarm policies, and other operations.
76Monitor Template
A variety of monitor templates are built into Guance, which can be used out of the
box, including dozens of templates such as host, Docker, Elasticsearch, Redis,
Alibaba Cloud RDS, Alibaba Cloud SLB, and Flink monitoring. After successfully
creating a new template, the corresponding monitor will be automatically added to the
current workspace.
Custom Monitor
Guance supports a variety of custom monitors, allowing users to customize and
configure detection metrics and trigger conditions and receive alarm notifications at
the first time by setting alarms. In Monitors, click Create to customize and add a
new monitor.
Detection Rules Descriptions
Threshold Detection Threshold detection performs anomaly detection on metric
data based on the set threshold.
Log Detection Log detection is used to monitor all log data generated
based on log collectors in the workspace.
Anomaly Detection Anomaly detection is to detect the sudden abnormal
performance of metrics based on historical data, which is
mostly suitable for business data and short time window
scenarios.
Change Detection Change detection is to detect the abnormal data points of
the metrics based on the dynamic threshold range, which is
suitable for the trend stabilization timeline.
Outlier Detection Outlier detection can detect whether there is outlier
deviation in the metric/statistical data of the detected object
under a specific grouping by the algorithm.
Security Check Security check is a series of checks on systems, software
77and logs through a new type of safety script, which
supports discovering facility defects and potential safety
hazards and taking effective measures in time.
APM Metric Based on application performance monitoring data, APM
Detection metric detection sets threshold rules and detects abnormal
situations.
RUM Metric Based on application performance monitoring data, RUM
Detection metric detection sets threshold rules and detects abnormal
situations.
Process Anomaly Based on infrastructure object data, process anomaly
Detection detection is used to detect process data regularly and
understand process anomaly.
Infrastructure Active Infrastructure survival detection sets survival conditions
Detection and monitors the stability of infrastructure.
Testing Anomaly Based on the availability monitoring data, testing anomaly
Detection detection sets threshold rules and detects abnormal
conditions.
Network Anomaly Network data detection is based on network data, setting
Detection threshold rules to detect the stability of network
performance.
Alarm Configuration
Guance allows for setting alarm notifications for monitors. The supported
notifications are:
- Space Member
- Mail Group
- Dingtalk Robot
- WeCom Robot
- Lark Robot
78- Webhook Customization
- SMS
To set alarm notifications, click on the alarm setting icon of the monitor. You can
then select the event notification level, alarm notification object, and alarm mute.
Associated Event
Guance supports viewing related events based on the monitor. Click the View
Related Events icon of the monitor to view related events.
79Intelligent Check
Intelligent Check is based on the intelligent detection algorithm of Guance. It supports
automatic detection of infrastructure and application problems. This helps users find
problems occurring during the operation of IT systems and quickly locate the causes
of abnormal problems through root cause analysis. Through the intelligent prediction
algorithm of Guance, users can foresee the potential problems of infrastructure and
applications in advance. They can also evaluate the impact level of problems on
system operation, better determine the priority of troubleshooting work, and reduce
the uncertainty of the troubleshooting process.
Intelligent Check supports customizing inspection functions in DataFlux Func by
using the script package of "Guance Self-built Inspection Core Package" in the script
market. These functions include memory leak inspection, application performance
inspection, cloud account bill inspection, front-end application log error inspection,
Alibaba Cloud asset inspection, MySQL performance inspection, server application
error inspection, and other types of inspections.
SLO
Guance SLO monitoring tests whether the availability of system services meets the
target needs around various metrics of DevOps. It can help users monitor the service
quality provided by service providers and protect service providers from SLA
violations. Export dashboards and view associated events.
80SLOManagement
In Monitor SLO > Create SLO, you can customize the task of creating a new SLO.
Note that once the SLO configuration is saved, the SLO name, target, and detection
period cannot be changed.
Note: Once the SLO configuration is saved, the SLO name, target and detection
period cannot be changed.
Field Description
Name SLO task name. Support up to 64 character input.
81Percentage of SLO goals (0-100%), supporting the selection of two goals,
including "goal" and "minimum goal":
Goals: An unhealthy SLA is considered when the SLO percentage is < the
Goals
target percentage and > = the minimum target percentage
The minimum target: When the SLO percentage is less than the minimum
target percentage, it is considered as a substandard.
An metric to measure the stability of a system. Support user-defined addition of
SLI
one or more monitors as metrics.
Abnormal Alarm notification object, support workspace members, mail groups, enterprise
Notification WeChat robots, DingTalk robots, Lark robots, SMS and other notification
Object methods.
Notification is not sent for the same alarm within the mute time range. If the same
event is not very urgent, but the alarm notification frequency is high, the
Mute notification frequency can be reduced by setting the notification mute. Note:
Notification Events will continue to be generated after notification mute is set, but
notifications will not be sent again, and generated events will be stored in
event management.
SLO detection frequency, that is, to monitor whether abnormal events occur in the
Detection
monitor of SLO task with a certain time range as a period. At present, it supports
Frequency
two detection frequencies: 5 minutes and 10 minutes.
Description Descriptive information, up to 256 characters.
Mute Management
Mute management is used to manage all mute rules in the current space. You can
quickly view the type, mute range, label, mute time, and operator of mute rules. You
can also search, edit, delete, disable/enable mute rules.
Note: the Mute Rules Management list only displays silent rules that have not expired.
To configure Mute Rules, click Create Mute Rule, and fill in the Mute Range, Label,
Mute Time, Mute Notification Object, Notification Content, Notification Time, etc.
82Note: muteness will only take effect if the conditions of Mute Range and Label are
met at the same time.
Alarm Policy Management
Guance supports the alarm policy management of the detection results of the monitor.
By sending alarm notification emails or group message notifications, you can know
the abnormal data monitored in time, find problems, and solve problems. After
configuring the alarm policy, you can perform a quick filter view in the monitor.
Note:
each monitor must select an alarm policy when it is created, and "Default" is
selected by default;
When an alarm policy is deleted, the monitor under the alarm policy will be
automatically classified under "default".
83Notification Object Management
Guance allows for setting alarm notifications for notification targets. The supported
notifications are:
- Space Member
- Mail Group
- Dingtalk Robot
- WeCom Robot
- Lark Robot
- Webhook Customization
- SMS
Enter the required information on the corresponding page, and click Confirm.
84Workspace Management
Workspace management is the setting, management, and operation of the current
workspace. After joining the workspace and being assigned permissions, you can
change the basic information, members and permissions of the workspace through
Management.
Basic Settings
In the workspace Management> Basic Settings, you can view the current Guance
version, workspace name and ID, Token, number of members, security operation
audit, and other information. Support administrators to modify space names, change
Token, configure migration (import/export dashboard, custom viewer, monitor
configuration files), set key metrics of war room, configure function menus, set IP
whitelist, delete measurements, delete custom objects, and other operations. Owners
can change data storage policies.
85Member Management
In Management > Member Management, you can display the information of all
members of the current workspace. It supports the unified management of all
members of the current workspace, including setting role permissions, inviting
members, and setting permissions for members, configuring member groups, and
setting SSO.
Role Management
In Management > Member Management > Role Management, four member roles
are provided by default: owner, administrator, standard member, and read-only
member. You can create new roles for users and give permission scope to roles to
meet the permission needs of different users.
• Owner: The owner of the current workspace has all the operation permissions in the
workspace, including adjusting the role permissions of other members;
• Administrator: Administrator of the current workspace has read and write permissions of the
workspace. The role is able to adjust the permissions of other member roles except Owner.
• Standard: Standard member of the current workspace have read and write permissions to the
workspace.
• Read-only: Read-only member of the current workspace can view the data of the workspace,
and has no write permission.
• Custom Role: You can customize the permission range of a role according to your
requirements.
86Note:
If the current workspace is upgraded to commercial version, upgrading to Administrator
requires the owner to pass the verification in the expense center before it can take effect.
Read-only members do not have permission to view member management lists.
Distinguishing by tags is supported by four SSO members.
SSO Management
Guance supports SSO management based on SAML protocol. It supports enterprises
to manage employee information in local IdP (Identity Provider). Without user
synchronization between Guance and enterprise IdP, enterprise employees can log in
and access Guance through designated roles.
Enable SSO Login
Go to Guance workspace Management > Member Management > SSO
Management > Enable, and set SSO for employees. Note that desensitized data can
only be viewed by Guance workspace administrators and above, and standard and
read-only members cannot view desensitized information.
Metadata document: XML document provided by IdP (identity provider).
Domain name: It is used to verify whether the mailbox suffix entered during single
87sign-on matches the domain name. The matched mailbox can get the single sign-on link
online, and the user can dynamically create Guance member account when logging in for
the first time, without creating it in the workspace in advance.
Roles: Select the role that is granted when a new SSO member logs in for the first time,
and the existing members are not affected, including read-only members and standard
members; When SAML mapping is enabled in a workspace, members are assigned roles
in mapping rules first when they log in.
Login retention time: It is used to set the inactive login session retention time and the
maximum login session retention time of single sign-on members. After setting, the
timeout login session will expire.
Note: Users can customize the description information added for identity providers.
Enable SAML Mapping
In the Guance workspace Management > Member management > SSO
Management > SSO Login, enable SAML Mapping to add role permissions and
mapping fields.
88Field Management
Guance supports unified management of field data in the current workspace, including
system fields and custom fields. You can view field descriptions in scene chart
queries, monitor detection metrics, use the simple query mode of DQL queries, and
analyze metrics, among other features. This helps you quickly understand the
meaning of fields and apply them.
To create a new field, go to Management > Field Management in the workspace
and click Create and enter the field name, field type, and field description in the
pop-up dialog box.
Text Processing (Pipeline)
Text processing (Pipeline) is used for data parsing. By defining parsing rules, various
data types, including logs, metrics, user access monitoring, application performance
89monitoring, basic objects, custom objects, networks, and security check, can be cut
into structured data that meet our requirements.
To automatically generate a Pipeline with the same name according to the field value
corresponding to the selected data type, go to Management > Pipeline in the Guance
workspace and click Create .
Blacklist
Guance supports filtering out different types of qualified data by setting a blacklist.
After configuring the blacklist, qualified data will no longer be reported to the Guance
workspace, which helps you save data storage costs.
To create a new blacklist, go to Management > Blacklist in the Guance workspace,
and select the data type to open the data blacklist filtering rules. Data types include
log, basic object, custom object, network, application performance monitoring, user
access monitoring, security inspection, events, metrics, and profile. You can manually
input a preset blacklist or package data source and field name, and then configure the
data source and field through DataKit and reporting data.
90Data Rights Management
Guance supports desensitization of log sensitive fields and authorized viewing of data
across workspaces. Sensitive field masking and data authorization can be configured
in the workspace Management > Data Authorization Management.
Note:
Desensitized data can only be viewed by Guance workspace administrators and above.
Standard and read-only members cannot view desensitized information.
Data authorization supports multiple workspaces in one site to authorize viewing of data.
Accounts and data between different sites are independent of each other, so it is impossible to
use data authorization to view data in workspaces of different sites.
API Key Management
Guance supports obtaining and updating the data of the Guance workspace by calling
the Open API interface. Before calling the API interface, you need to create an API
Key as an authentication method.
91To create an API Key, go to Management > API Key Management in the Guance
workspace, and click Create in the upper right corner. Enter the Key name to create
it.
Note: Only administrators and owners can edit the API Key.
Sharing
Guance allows current space administrators and standard members to share and
manage charts. Chart sharing can be used to insert charts into platform code outside
Guance for visual data presentation and analysis.
1)Chart Sharing
To share charts, edit the dashboard in Scene. After sharing, you can view the chart
sharing list in the current space through Management > Sharing Management -
Chart Sharing. You can view shared charts, embedded codes, and cancel sharing.
922)Snapshot Sharing
After saving a snapshot in the viewer such as Scenes and Logs, you can share it in
Snapshot. After sharing, you can view the snapshot sharing list through
Management > Sharing Management > Snapshot Sharing. The list includes the
snapshot name, sharing method, sharer, expiration date, time range, view snapshot,
and view sharing link.
Billing
On the Billing page, you can view the current usage plan of the workspace and the
usage of each item. Guance is divided into the experience plan, commercial version,
93and private deployment version. Experience plan users can upgrade to the commercial
plan online, but cannot retreat after upgrading. After upgrading to the commercial
plan, you can view the bill list, and the workspace owner can enter the expense center,
change the bound account, recharge, and perform other operations.
Pay as you go
Guance supports the billing method of purchasing on demand and paying according to
quantity. Prices are calculated according to multiple dimensions, such as the number
of DataKits, timeline numbers, log data numbers, backup log data numbers, task
scheduling numbers, user access PV numbers, application performance Trace
numbers, API dialing test numbers, and SMS sending numbers, etc.
DataKit: Count the number of DataKits that have historically survived for 12 hours or more
in the workspace and still survived on the same day, and the survival time is calculated from
the start of DataKit.
Timeline: Count the number of timelines generated by all metric data in the workspace.
Network (host): Count the number of hosts reported with network data in the workspace on
that day.
Log Data: Count the amount of log data reported on the same day in the workspace.
94 Backup Log Capacity: Count the storage capacity of backup logs in the workspace.
Application Performance Trace: Count the number of Trace_ids with unique application
performance reported on the same day in the workspace.
Application Performance Profile: Count the number of application performance profiles
currently reported in the workspace.
User Access PV: Count the number of page views reported by users in the workspace on the
same day.
Availability Dialing Test: Count the number of dialing test data reported on the same day in
the workspace (only counts the data returned by dialing test nodes provided by Guance).
Task Scheduling Times: Count the number of task calls generated in the workspace on the
same day.
Number of SMS Messages Sent: Count the number of SMS messages sent in the workspace
on the same day.
Guance billing items are divided into full statistics and incremental statistics.
The two charging items, timeline and backup log data, are charged according to the full
amount (that is, all the data/quantity within the scope of the statistical data preservation
strategy in the current workspace.)
DataKit, Network (Host), Log Data, Application Performance Trace, Application
Performance Profile, User Access PV, Availability Dial Test, Task Scheduling, and SMS are
charged in increments (i.e., under the current workspace, count the data/quantity generated in
one day.)
Billing Price
The charging price of Guance is divided into two charging modes: one is the basic
charging mode based on data statistics, and the other is the gradient charging mode
based on data statistics and data storage policy. Log data, application performance
Trace and application performance Profile, user access PV these charging items adopt
gradient charging mode, other charging items adopt basic charging mode.
95Basic Billing Mode
Guance provides two basic billing modes, which can be switched and selected in the
cost center. One is a charging mode that counts the number of "DataKit + Timeline",
and the other is a charging mode that only counts the number of "Timeline". Other
charging items, such as network (host), backup log data quantity, availability dialing
test times, task scheduling times, and short message sending times, are general
charging items.
Gradient Charging Mode
Guance provides gradient charging mode based on data statistics and data storage
strategy, including log data, application performance Trace and application
performance Profile, and user access PV.
96">