Documents Product Categories Guance

Guance

Aug 19, 2024
Pipelines, click Create to create a new Pipeline file. It supports a variety of script functions, and it can directly view their syntax format through the list of script functions provided by Guance, and supports one-click collection of samples for analysis rule testing, adding multiple sample analysis tests and setting default Pipeline scripts. Pipeline Official Library Guance provides Pipeline official script library with built-in log parsing Pipeline. In the Guance workspace Log > Pipelines, click Pipelines Official Library to view the built-in standard pipeline official website file library, including nginx, apache, redis, elasticsearch, mysql and so on. You can choose to open any pipeline file, and create a new pipeline file by cloning, which supports testing parsing rules through sample examples provided by Guance. Note: The official pipeline library file does not support modification. 49Generate Metrics Guance supports configuring aggregation rules based on log data to generate new metric data, which is convenient for deeper data analysis. Index Guance supports setting multiple log indexes, filtering qualified logs, and saving them in different log indexes. This helps users save log data storage costs by selecting different data storage policies for log indexes. 50Guance supports binding external index data, including the index data of SLS Logstore, Elasticsearch and OpenSearch. After successful binding, you can query and analyze the external index data in the Guance workspace. Blacklist Guance supports blacklist function, and reduces unnecessary log data reporting by adding log filtering rules. Backup Log Guance supports configuring backup rules to backup and store the whole log that meets the rules and performing rule verification and backup every 5 minutes. That is, the backed log data can be viewed after configuring backup rules for up to 5 minutes. 51Application Performance Monitoring Guance supports the analysis and management of link data, tracks the time taken by all services to process requests and the status of requests, and can be used to monitor the performance of applications. It supports related real user monitoring, log monitoring, reduce application performance data collection through sampling, and save storage space. It also supports the generation of new metric data based on the existing data in the current space, which is convenient for designing and implementing new technical metrics according to requirements. Services The Service in APM displays the list of all link services in the workspace, and can view the tracking metrics of all services: "average number of requests per second", "average response time", "P75 response time", "P95 response time" and "number of errors", which are sorted in descending order according to "number of errors" by default. It supports clicking the name of key performance metrics to adjust the sorting display and searching, multi-label filtering and quick filtering and setting service list. 52Service Topology Link service supports switching list to topology diagram mode to view the call relationship between various services. When you hover the mouse over the service node, you can view the "number of requests", "P50 response time", "P75 response time", "P99 response time" and "number of errors" of the service. It supports screening and displaying through different performance metrics, and customizing the color interval of link service performance metrics. It also supports adjusting the distribution map by highlighting, node size, filling items, thumbnails, etc. 53Service List Service inventory supports real-time viewing of ownership, dependency, performance, associated instrumentation and association analysis of different services, quickly discovers and solves service performance problems, and helps teams efficiently build and manage large-scale end-to-end distributed applications. Click the action button on the right side of the service to set up the service list. 54After the setting is completed, click on the service to view the list of services corresponding to the setting, as well as information such as performance and call topology. Overview In the Overview of application performance monitoring, it is supported to view the statistics of online service quantity, P90 service response time, service maximum impact time, service error number and service error rate. At the same time, it is also possible to view the Top10 ranking of P90 service, resource and operation response 55time, as well as the Top10 ranking of service error rate, resource 5xx error rate and resource 4xx error rate. Link In the Links for which performance monitoring is applied, it is supported to count the "Span number", "Request number", "Error Span number", "Error request number" and "Response time" of links within the selected time range, and display a list of all links served. Guance provides three link filtering viewing lists, namely "All Spans", "Service Top Spans" and "All Traces". It supports link data search, multi-label filtering, quick filtering, data export, adding display columns and other operations, and also supports saving the current display content, time range and filtering conditions to snapshots and viewing historical snapshots. 56Link Details Click on the link list to view the details of the link, including all relevant "attribute labels", "flame statistics", "span list", "service call relationship" and data such as hosts, logs, networks and code hotspots associated with the link. It supports keyword search and multi-label filtering in associated logs. Click log content to jump directly to log details page, which can combine log details to analyze link performance, and support binding built-in views for association analysis. 1)Flame Used to clearly show the flow and execution time of each span in the whole link. At the same time, the corresponding service list and response time are displayed. 572)Span List Show a list of all the spans in the link, including "service name", "span name", "span number", "execution time" and "execution time percentage". Click Span Name to view the corresponding span details. 3)Service Invocation Chart Used to view the invocation relationship between various services. 58Error Tracking In the application of Error Tracking of performance monitoring, it supports a quick view of the historical trend and distribution of similar errors in the link, and helps to quickly locate performance problems. The error tracking explorer includes two lists: All Errors and Clustering Analysis: • All Errors: Used to view all link errors that occur in the project application as a whole. • Clustering analysis: Used to quickly view the most frequent link errors that need to be resolved. Click on any error link to view error details. • Error profile: Based on error information error_message and error type error_type, the error links with high approximation are aggregated and counted, and according to the time range selected by the error explorer, the corresponding time interval is automatically selected to 59show the distribution trend of errors, which helps you intuitively view the time points or time ranges where frequent errors occur and quickly locate link problems. • View Link: You can locate link problems by looking at the upstream and downstream Spans of the flame diagram of the wrong link. Profile Profile supports collecting dynamic performance data of applications running in different language environments such as Java/Python, and helps users to view performance problems of CPU, memory and IO. In the Profile explorer, it supports operations such as searching Profile data, multi-label filtering, quick filtering, data export, adding display columns, etc. It supports saving the current display content, time range and filter conditions to snapshots and viewing historical snapshots. 60Profile Details Click on the Profile list to view the corresponding performance details, including property tags, performance flames, and operational information. Through the performance flame diagram, we can analyze the usage of CPU, memory or IO at the level of different types of code methods, and intuitively understand the execution performance and call of methods. At the same time, Profile provides analysis and view of execution data based on methods, libraries, threads and other dimensions, which shows some methods with large execution more intuitively and locates performance problems faster. 61Generate Metrcis Guance supports generating new metric data based on link data configuration aggregation rules, which is convenient for deeper data analysis. Real User Monitoring Guance supports the collection of user access data for web, Android/iOS apps, and applets. It provides scenario analysis such as explorer, overview, performance analysis, resource analysis, and error analysis to help you quickly monitor user behavior and identify problems.  Sampling is supported to reduce data collection for user access and save storage space. The generation of new metric data based on existing data in the current space is convenient for designing and implementing new technical metrics according to requirements.  When creating applications, custom application IDs can be used as the unique identification of the current workspace, and different workspaces can use the same application ID for uploading and matching SDK collection data.  Access session playback is supported, which generates video records by capturing clicks, mouse movements, and page scrolling. This helps to deeply understand the user''s operation experience and locate errors, reproduce, and solve problems in combination with user access performance data.  Implementation of "browser plug-in" is also supported, using a browser to record user access behavior and create codeless end-to-end tests. 62Explorer Guance user access explorer supports searching, multi-label filtering, quick filtering, and export viewing analysis of user access data in applications. Custom addition/deletion of display columns is supported. Clicking on session or page data will display details. Snapshotting is supported to save current display content, time range, and filter criteria to view historical snapshots. Guance user access monitoring explorer includes session, view, resource, action, long_task and error. Session Explorer Select Session Explorer in the upper left corner to query and analyze the session data when the user accesses. This includes the session duration when the user accesses (that is, the time from opening an application to closing), session type, number of page visits, number of operations, number of errors, initial page visits, and last page browsing by the user. The Play button can be clicked to view the session replay of the changed session. 63View Explorer Select Session Explorer in the upper left corner to query and analyze the session data when the user accesses. This includes the session duration when the user accesses (that is, the time from opening an application to closing), session type, number of page visits, number of operations, number of errors, initial page visits, and last page browsing by the user. The Play button can be clicked to view the session replay of the changed session.。 Resource Explorer Select Resource Explorer in the upper left corner to query and analyze resource loading performance when the user accesses. This includes the resource address, status code, request mode, resource loading time, and so on. 64Action Explorer Select Action Explorer in the upper left corner to query and analyze the operation behavior when the user accesses. This includes the operation type, operation content, and operation time when the user accesses. Long_task Explorer Select Long_task Explorer in the upper left corner to query and analyze the resource loading performance when the user accesses. This includes the resource address, status code, request mode, and resource loading time when the user accesses. 65Error Explorer Select Error Explorer in the upper left corner to query and analyze the code errors when users visit. This includes the page address, code error type, and error content when users visit. User Access Details In the explorer, clicking on the data list will provide details of the user''s access. This includes session replay, performance, extended fields, Fetch/XHR, errors and logs.  Session replay: View the whole session process of the user, including the visited pages, operation records, and error data. Click to play the user''s operation process.  Performance: View the front-end page performance when the user accesses the specified application, including page loading time, content drawing time, interaction time, input delay, and so on. 66 Extended Fields: Support for quick filter viewing by selecting extended fields, including Filter Field Values, Reverse Filter Field Values, Add to Display Columns, and Copy.  Fetch/XHR: View every request made to the backend application when the user accesses, including the occurrence time, the link of the request, and the duration. Click Request to jump to the details page of the corresponding link.  Errors: View the error data information, the type of error, and when the error occurred at this user access. Click on the error message to jump to the details page of the corresponding error. The function of Sourcemap is supported to restore confused code, which is convenient to debug and locate code problems in source code when troubleshooting errors.  Log: Associated logs can be viewed based on current user access. Support keyword search and multi-label filtering of logs. Click Logs to jump to the corresponding log page. Tracing Guance supports users to create new tracking tasks through RUM and monitor the customized link tracking trajectory in real time. By preset link tracking trajectory, link data can be screened centrally, user access experience can be queried accurately, and loopholes, anomalies and risks can be found in time. 67Automatic Call Tracing Guance supports the implementation of Browser Plug-in, using a browser to record user access behavior and create codeless end-to-end tests. Generate Metrics Guance supports configuring aggregation rules based on user access data to generate new index data, which is convenient for deeper data analysis. 68Synthetic Tests Guance provides an out-of-the-box availability monitoring solution, which uses a global monitoring network to comprehensively monitor the network performance, network quality, and network data transmission stability of different regions and operators to various services by creating dialing tasks based on different protocols such as HTTP, TCP, ICMP, and WEBSOCKET. Through real-time monitoring and statistics of the availability of dialing and testing tasks, dialing and testing task logs, and real-time alarms are provided to help you quickly find network problems and improve network access quality. Synthetic Tests Management In Synthetic Tests, click Create to add a new dialing test task. After creating a completed dialing task, you can analyze the response time and availability of the current dialing task from both the geography and trend dimensions on the overview page. 创建完成拨测任务后,可以在概览页面从地理和趋势两个维度分析当前拨测任务 的响应时间和可用率。 69Synthetic Tests Explorer supports such operations as viewing, searching, multi-label filtering, shortcut filtering, data export, and adding display columns. It supports the statistics of dialing test data according to the selected time range through stacked histogram, save the current display content, time range, and filter conditions to snapshot and view the historical snapshot, and click the list data to view the details of dialing test results. Self-built Node Management Guance supports self-building of new dialing and testing nodes on a global scale. After creating the self-built nodes, the configuration information of the designated nodes is obtained through "Get Configuration" and configured in DataKit. After the configuration is completed, you can choose to use it in dialing and testing. 70Security Check Guance supports timely monitoring, inquiring, and associating all inspection events through Security Check. It helps improve inspection quality, problem analysis, and problem handling ability while finding loopholes, anomalies, and risks in time. And it supports the generation of new index data based on the existing data in the current space, which is convenient for designing and implementing new technical metrics according to requirements. Overview In Security Check > Overview, you can view the overview of security check events in different hosts by screening hosts, security check levels, and security check categories, including the number of security check events in different levels and visual chart analysis, and the ranking list of security check events in different categories and rules. Explorer In Security Check > Overview, it supports viewing, searching, multi-label filtering, quick filtering, data export, and adding display columns to reported security check events. Support the statistics of security check data according to the selected time range through stacked histogram, save the current display content, time range, and filter conditions to snapshot and view the historical snapshot, and click the list data to view the details of security check. 71Security Check Details Click on the inspection event you want to view, and in the underlined details page, you can view the handling suggestions for this security check event, including the theoretical basis, risk items, audit methods and remedial measures, and at the same time, you can view the related inspection events and hosts, etc. Generate Metrics Guance supports configuring aggregation rules based on security check data to generate new metric data, so as to facilitate deeper data analysis.。 72CI Visibility Guance supports visualization of CI processes and results built into Gitlab/Jenkins. You can directly view CI results in Gitlab/Jenkins through the CI Visibility feature of Guance. The process of CI is continuous integration. If developers encounter problems when pushing code, they can check the pipeline of all CI and its success rate, failure reasons, and specific failure links in Guance to help you provide code update guarantee. Overview In CI Visibility > Overview, you can switch to the overview view of Pipeline and Job in Gitlab/Jenkins, including the number of executions, success rate, execution time, and the number of execution failures. 73Explorer In CI Visibility > Explorer, It supports for switching the entire process of viewing and analyzing Gitlab/Jenkins Pipeline and Job, support for search, multi-label filtering, shortcut filtering, data export, and adding display columns. It also supports stacking histogram to count CI process according to selected time range, saving current display content, time range, and filtering conditions to snapshot and viewing historical snapshot. 74CI Details Click on the CI Visibility process you want to view, and in the underlined details page, you can view the CI process and results through the flame diagram and Job list, including the duration of Pipeline, all Jobs, and their duration, etc. At the same time, you can view the associated logs, hosts, etc. 75Monitors Guance has powerful anomaly monitoring capability, it supports custom monitors and provides more than 20 kinds of monitoring templates, including Docker, Elasticsearch, Host, etc. With alarm notification and related events, it can help users quickly find problems, locate problems, and solve problems. At the same time, Guance provides intelligent inspection function based on intelligent algorithms to help users foresee potential problems of infrastructure and applications in advance. In addition, Guance supports SLO (Service Level Objective) monitoring to accurately control service levels and targets. Monitors In the Guance Monitors, it supports creating a new custom monitor, creating a new monitor from a template, viewing and restoring the historical configuration of the monitor, and managing the monitor, including filtering alarm policies, searching, importing/exporting, enabling/disabling, editing, deleting, manually triggering monitor detection, viewing related events, setting alarm policies, and other operations. 76Monitor Template A variety of monitor templates are built into Guance, which can be used out of the box, including dozens of templates such as host, Docker, Elasticsearch, Redis, Alibaba Cloud RDS, Alibaba Cloud SLB, and Flink monitoring. After successfully creating a new template, the corresponding monitor will be automatically added to the current workspace. Custom Monitor Guance supports a variety of custom monitors, allowing users to customize and configure detection metrics and trigger conditions and receive alarm notifications at the first time by setting alarms. In Monitors, click Create to customize and add a new monitor. Detection Rules Descriptions Threshold Detection Threshold detection performs anomaly detection on metric data based on the set threshold. Log Detection Log detection is used to monitor all log data generated based on log collectors in the workspace. Anomaly Detection Anomaly detection is to detect the sudden abnormal performance of metrics based on historical data, which is mostly suitable for business data and short time window scenarios. Change Detection Change detection is to detect the abnormal data points of the metrics based on the dynamic threshold range, which is suitable for the trend stabilization timeline. Outlier Detection Outlier detection can detect whether there is outlier deviation in the metric/statistical data of the detected object under a specific grouping by the algorithm. Security Check Security check is a series of checks on systems, software 77and logs through a new type of safety script, which supports discovering facility defects and potential safety hazards and taking effective measures in time. APM Metric Based on application performance monitoring data, APM Detection metric detection sets threshold rules and detects abnormal situations. RUM Metric Based on application performance monitoring data, RUM Detection metric detection sets threshold rules and detects abnormal situations. Process Anomaly Based on infrastructure object data, process anomaly Detection detection is used to detect process data regularly and understand process anomaly. Infrastructure Active Infrastructure survival detection sets survival conditions Detection and monitors the stability of infrastructure. Testing Anomaly Based on the availability monitoring data, testing anomaly Detection detection sets threshold rules and detects abnormal conditions. Network Anomaly Network data detection is based on network data, setting Detection threshold rules to detect the stability of network performance. Alarm Configuration Guance allows for setting alarm notifications for monitors. The supported notifications are: - Space Member - Mail Group - Dingtalk Robot - WeCom Robot - Lark Robot 78- Webhook Customization - SMS To set alarm notifications, click on the alarm setting icon of the monitor. You can then select the event notification level, alarm notification object, and alarm mute. Associated Event Guance supports viewing related events based on the monitor. Click the View Related Events icon of the monitor to view related events. 79Intelligent Check Intelligent Check is based on the intelligent detection algorithm of Guance. It supports automatic detection of infrastructure and application problems. This helps users find problems occurring during the operation of IT systems and quickly locate the causes of abnormal problems through root cause analysis. Through the intelligent prediction algorithm of Guance, users can foresee the potential problems of infrastructure and applications in advance. They can also evaluate the impact level of problems on system operation, better determine the priority of troubleshooting work, and reduce the uncertainty of the troubleshooting process. Intelligent Check supports customizing inspection functions in DataFlux Func by using the script package of "Guance Self-built Inspection Core Package" in the script market. These functions include memory leak inspection, application performance inspection, cloud account bill inspection, front-end application log error inspection, Alibaba Cloud asset inspection, MySQL performance inspection, server application error inspection, and other types of inspections. SLO Guance SLO monitoring tests whether the availability of system services meets the target needs around various metrics of DevOps. It can help users monitor the service quality provided by service providers and protect service providers from SLA violations. Export dashboards and view associated events. 80SLOManagement In Monitor SLO > Create SLO, you can customize the task of creating a new SLO. Note that once the SLO configuration is saved, the SLO name, target, and detection period cannot be changed. Note: Once the SLO configuration is saved, the SLO name, target and detection period cannot be changed. Field Description Name SLO task name. Support up to 64 character input. 81Percentage of SLO goals (0-100%), supporting the selection of two goals, including "goal" and "minimum goal":  Goals: An unhealthy SLA is considered when the SLO percentage is < the Goals target percentage and > = the minimum target percentage  The minimum target: When the SLO percentage is less than the minimum target percentage, it is considered as a substandard. An metric to measure the stability of a system. Support user-defined addition of SLI one or more monitors as metrics. Abnormal Alarm notification object, support workspace members, mail groups, enterprise Notification WeChat robots, DingTalk robots, Lark robots, SMS and other notification Object methods. Notification is not sent for the same alarm within the mute time range. If the same event is not very urgent, but the alarm notification frequency is high, the Mute notification frequency can be reduced by setting the notification mute. Note: Notification Events will continue to be generated after notification mute is set, but notifications will not be sent again, and generated events will be stored in event management. SLO detection frequency, that is, to monitor whether abnormal events occur in the Detection monitor of SLO task with a certain time range as a period. At present, it supports Frequency two detection frequencies: 5 minutes and 10 minutes. Description Descriptive information, up to 256 characters. Mute Management Mute management is used to manage all mute rules in the current space. You can quickly view the type, mute range, label, mute time, and operator of mute rules. You can also search, edit, delete, disable/enable mute rules. Note: the Mute Rules Management list only displays silent rules that have not expired. To configure Mute Rules, click Create Mute Rule, and fill in the Mute Range, Label, Mute Time, Mute Notification Object, Notification Content, Notification Time, etc. 82Note: muteness will only take effect if the conditions of Mute Range and Label are met at the same time. Alarm Policy Management Guance supports the alarm policy management of the detection results of the monitor. By sending alarm notification emails or group message notifications, you can know the abnormal data monitored in time, find problems, and solve problems. After configuring the alarm policy, you can perform a quick filter view in the monitor. Note:  each monitor must select an alarm policy when it is created, and "Default" is selected by default;  When an alarm policy is deleted, the monitor under the alarm policy will be automatically classified under "default". 83Notification Object Management Guance allows for setting alarm notifications for notification targets. The supported notifications are: - Space Member - Mail Group - Dingtalk Robot - WeCom Robot - Lark Robot - Webhook Customization - SMS Enter the required information on the corresponding page, and click Confirm. 84Workspace Management Workspace management is the setting, management, and operation of the current workspace. After joining the workspace and being assigned permissions, you can change the basic information, members and permissions of the workspace through Management. Basic Settings In the workspace Management> Basic Settings, you can view the current Guance version, workspace name and ID, Token, number of members, security operation audit, and other information. Support administrators to modify space names, change Token, configure migration (import/export dashboard, custom viewer, monitor configuration files), set key metrics of war room, configure function menus, set IP whitelist, delete measurements, delete custom objects, and other operations. Owners can change data storage policies. 85Member Management In Management > Member Management, you can display the information of all members of the current workspace. It supports the unified management of all members of the current workspace, including setting role permissions, inviting members, and setting permissions for members, configuring member groups, and setting SSO. Role Management In Management > Member Management > Role Management, four member roles are provided by default: owner, administrator, standard member, and read-only member. You can create new roles for users and give permission scope to roles to meet the permission needs of different users. • Owner: The owner of the current workspace has all the operation permissions in the workspace, including adjusting the role permissions of other members; • Administrator: Administrator of the current workspace has read and write permissions of the workspace. The role is able to adjust the permissions of other member roles except Owner. • Standard: Standard member of the current workspace have read and write permissions to the workspace. • Read-only: Read-only member of the current workspace can view the data of the workspace, and has no write permission. • Custom Role: You can customize the permission range of a role according to your requirements. 86Note:  If the current workspace is upgraded to commercial version, upgrading to Administrator requires the owner to pass the verification in the expense center before it can take effect.  Read-only members do not have permission to view member management lists.  Distinguishing by tags is supported by four SSO members. SSO Management Guance supports SSO management based on SAML protocol. It supports enterprises to manage employee information in local IdP (Identity Provider). Without user synchronization between Guance and enterprise IdP, enterprise employees can log in and access Guance through designated roles. Enable SSO Login Go to Guance workspace Management > Member Management > SSO Management > Enable, and set SSO for employees. Note that desensitized data can only be viewed by Guance workspace administrators and above, and standard and read-only members cannot view desensitized information.  Metadata document: XML document provided by IdP (identity provider).  Domain name: It is used to verify whether the mailbox suffix entered during single 87sign-on matches the domain name. The matched mailbox can get the single sign-on link online, and the user can dynamically create Guance member account when logging in for the first time, without creating it in the workspace in advance.  Roles: Select the role that is granted when a new SSO member logs in for the first time, and the existing members are not affected, including read-only members and standard members; When SAML mapping is enabled in a workspace, members are assigned roles in mapping rules first when they log in.  Login retention time: It is used to set the inactive login session retention time and the maximum login session retention time of single sign-on members. After setting, the timeout login session will expire.  Note: Users can customize the description information added for identity providers. Enable SAML Mapping In the Guance workspace Management > Member management > SSO Management > SSO Login, enable SAML Mapping to add role permissions and mapping fields. 88Field Management Guance supports unified management of field data in the current workspace, including system fields and custom fields. You can view field descriptions in scene chart queries, monitor detection metrics, use the simple query mode of DQL queries, and analyze metrics, among other features. This helps you quickly understand the meaning of fields and apply them. To create a new field, go to Management > Field Management in the workspace and click Create and enter the field name, field type, and field description in the pop-up dialog box. Text Processing (Pipeline) Text processing (Pipeline) is used for data parsing. By defining parsing rules, various data types, including logs, metrics, user access monitoring, application performance 89monitoring, basic objects, custom objects, networks, and security check, can be cut into structured data that meet our requirements. To automatically generate a Pipeline with the same name according to the field value corresponding to the selected data type, go to Management > Pipeline in the Guance workspace and click Create . Blacklist Guance supports filtering out different types of qualified data by setting a blacklist. After configuring the blacklist, qualified data will no longer be reported to the Guance workspace, which helps you save data storage costs. To create a new blacklist, go to Management > Blacklist in the Guance workspace, and select the data type to open the data blacklist filtering rules. Data types include log, basic object, custom object, network, application performance monitoring, user access monitoring, security inspection, events, metrics, and profile. You can manually input a preset blacklist or package data source and field name, and then configure the data source and field through DataKit and reporting data. 90Data Rights Management Guance supports desensitization of log sensitive fields and authorized viewing of data across workspaces. Sensitive field masking and data authorization can be configured in the workspace Management > Data Authorization Management. Note:  Desensitized data can only be viewed by Guance workspace administrators and above. Standard and read-only members cannot view desensitized information.  Data authorization supports multiple workspaces in one site to authorize viewing of data. Accounts and data between different sites are independent of each other, so it is impossible to use data authorization to view data in workspaces of different sites. API Key Management Guance supports obtaining and updating the data of the Guance workspace by calling the Open API interface. Before calling the API interface, you need to create an API Key as an authentication method. 91To create an API Key, go to Management > API Key Management in the Guance workspace, and click Create in the upper right corner. Enter the Key name to create it. Note: Only administrators and owners can edit the API Key. Sharing Guance allows current space administrators and standard members to share and manage charts. Chart sharing can be used to insert charts into platform code outside Guance for visual data presentation and analysis. 1)Chart Sharing To share charts, edit the dashboard in Scene. After sharing, you can view the chart sharing list in the current space through Management > Sharing Management - Chart Sharing. You can view shared charts, embedded codes, and cancel sharing. 922)Snapshot Sharing After saving a snapshot in the viewer such as Scenes and Logs, you can share it in Snapshot. After sharing, you can view the snapshot sharing list through Management > Sharing Management > Snapshot Sharing. The list includes the snapshot name, sharing method, sharer, expiration date, time range, view snapshot, and view sharing link. Billing On the Billing page, you can view the current usage plan of the workspace and the usage of each item. Guance is divided into the experience plan, commercial version, 93and private deployment version. Experience plan users can upgrade to the commercial plan online, but cannot retreat after upgrading. After upgrading to the commercial plan, you can view the bill list, and the workspace owner can enter the expense center, change the bound account, recharge, and perform other operations. Pay as you go Guance supports the billing method of purchasing on demand and paying according to quantity. Prices are calculated according to multiple dimensions, such as the number of DataKits, timeline numbers, log data numbers, backup log data numbers, task scheduling numbers, user access PV numbers, application performance Trace numbers, API dialing test numbers, and SMS sending numbers, etc.  DataKit: Count the number of DataKits that have historically survived for 12 hours or more in the workspace and still survived on the same day, and the survival time is calculated from the start of DataKit.  Timeline: Count the number of timelines generated by all metric data in the workspace.  Network (host): Count the number of hosts reported with network data in the workspace on that day.  Log Data: Count the amount of log data reported on the same day in the workspace. 94 Backup Log Capacity: Count the storage capacity of backup logs in the workspace.  Application Performance Trace: Count the number of Trace_ids with unique application performance reported on the same day in the workspace.  Application Performance Profile: Count the number of application performance profiles currently reported in the workspace.  User Access PV: Count the number of page views reported by users in the workspace on the same day.  Availability Dialing Test: Count the number of dialing test data reported on the same day in the workspace (only counts the data returned by dialing test nodes provided by Guance).  Task Scheduling Times: Count the number of task calls generated in the workspace on the same day.  Number of SMS Messages Sent: Count the number of SMS messages sent in the workspace on the same day. Guance billing items are divided into full statistics and incremental statistics.  The two charging items, timeline and backup log data, are charged according to the full amount (that is, all the data/quantity within the scope of the statistical data preservation strategy in the current workspace.)  DataKit, Network (Host), Log Data, Application Performance Trace, Application Performance Profile, User Access PV, Availability Dial Test, Task Scheduling, and SMS are charged in increments (i.e., under the current workspace, count the data/quantity generated in one day.) Billing Price The charging price of Guance is divided into two charging modes: one is the basic charging mode based on data statistics, and the other is the gradient charging mode based on data statistics and data storage policy. Log data, application performance Trace and application performance Profile, user access PV these charging items adopt gradient charging mode, other charging items adopt basic charging mode. 95Basic Billing Mode Guance provides two basic billing modes, which can be switched and selected in the cost center. One is a charging mode that counts the number of "DataKit + Timeline", and the other is a charging mode that only counts the number of "Timeline". Other charging items, such as network (host), backup log data quantity, availability dialing test times, task scheduling times, and short message sending times, are general charging items. Gradient Charging Mode Guance provides gradient charging mode based on data statistics and data storage strategy, including log data, application performance Trace and application performance Profile, and user access PV. 96">
To view the full page, please visit: Guance Product Userguide

Guance

Guance is a system observable product that meets cloud, cloud native, application and business monitoring requirements. Based on a data acquisition engine (DataKit), a query language (DQL), and a work platform (Guance), the overall observability of the system is realized.
Buy now