# Monitoring view

In order to facilitate the service to view the service performance, security protection and package resource use request after accessing the security gateway, the security gateway provides three dimensional monitoring views, including performance monitoring, security monitoring and package monitoring. Because the data is real-time computing data, there are about 1min The delay left and right.

# Performance monitoring

In accordance with the business dimension (Mini Program/Web/APP) to view, drop-down select the target to view the business can be. The supported performance metrics are as follows:

  • Service Request Success Rate: Percentage of Client Service Successful Requests in Total Requests
  • Timeout request: Number of requests requesting a service source timeout
  • Average Request Time: The average time spent by the C-end user from initiating the request to receiving the request back packet on the Mini Program side
  • Request P50 Time Consuming: The C end user spends 50% of the time from initiating the request to receiving the request back packet at the Mini Program end (that is, the request time consuming data in the 50% position after the ascending order)
  • Request P95 Time Consuming: The C end user spends 95% of the time from initiating the request to receiving the request back packet at the Mini Program end (that is, the request time consuming is ranked in the 95% position after the ascending order)
  • Request size: the average packet size of the request made by the C-end user
  • Request Back Packet Size: The server returns the average size of the request packet body

Query each performance indicator according to the URL dimension, and more performance data indicators are continuously updated...

# Security monitoring

In accordance with the business dimension (Mini Program/Web/APP) to view, drop-down select the target to view the business can be. Currently Supported ViewException request quantityThat is, the number of requests intercepted after entering the security gateway are recognized as abnormal requests by the risk control policy.

  • Non-whitelist Mini Program request: the security gateway only receives the request of the Mini Program that uses the security gateway, and the Mini Program request that does not access the security gateway is intercepted.
  • User Level Frequency Limiting Requests: Based on the user dimension, a single user requests requests requests beyond the normal frequency per unit time.
  • Illegal requests: forged requests that conform to the private protocol of the security gateway, etc.

The ability to intercept logs and other abnormal requests is continuously updated...

# Package monitoring

The package monitors the use of package resources for all services under the entire security gateway, and does not support viewing the use of package resources for each service.

  • Number of Requests: The number of requests through the security gateway
  • QPS: Concurrent requests per second, real-time data
  • Bandwidth: the peak bandwidth of the service per second, the sum of the upstream bandwidth and the downstream bandwidth, in Mbps
  • Request Over Concurrent Limit: The number of concurrent requests that exceed the QPS Concurrent Requests Per Second specification in the current gateway plan
  • Bandwidth Limit Exceeded Requests: The number of requests that exceed the bandwidth specification in the current gateway plan