-
Product Advantages
-
Product Functions
-
Application scenarios
-
solution
-
Product Advantages
- Non-intrusive monitoring
Bypass detection is used for monitoring and analysis to ensure the security and reliability of business data.
- Locate code-level exceptions
Service node request analysis and slow SQL analysis are used to locate code-level exceptions.
- Full-link topology analysis
Node information, call relationships, and access performance are used to quickly locate abnormal nodes and performance bottlenecks.
Product Functions
- Full-link topology analysis
From the granularity of the application, function, and operation call chain, the root cause of the problem is discovered, and the code problem is clearly visible.
- Call train analysis
Track and record the service calling process, and monitor the key indicators of application calling in an all-round way.
- Transaction analysis
Analyze indicators such as response delay and error rate of business function menus, and periodically monitor business function menus.
Application scenarios
-
It supports self-discovery of application topology, and there is nowhere to hide abnormal application services.
Code-level fault location for complete control over application performance.
-
After an abnormal application or service is found, drill down through the call chain to clearly see the root cause of the code problem.
-
Analyze the application transaction process in real time, perceive user satisfaction with the application in real time, and comprehensively understand the user experience.
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.