Before You Start

This document describes how to use Application Performance Management (APM).

Application List

The Applications page displays information such as components, environments, Agent status, and supported operations.

CMDB Management

APM has built-in CMDB for managing the application structure and related configurations.

Application Metric Monitoring

APM can manage tags and monitor the metric data of JVM, GC, service calls, exceptions, external calls, database access, and middleware, helping you comprehensively monitor application running. Application metrics can be reported to the AOM console through Prometheus instances.

Tracing

Information such as the call status, duration, and API is displayed, helping you further locate fault causes.

Application Topology

The call and dependency relationships between applications are displayed, and abnormal instances can be automatically discovered.

There are two types of application topologies:

  • Single-component topology: topology of a single component under an environment. You can also view the call relationships of direct and indirect upstream and downstream components.

  • Global application topology: topology of some or all components under an application.

URL Tracing

Through URL tracing, you can monitor the call relationships between important APIs and downstream services, and then detect problems more precisely.

Alarm Management

When an application connected to APM meets a preset alarm condition, an alarm is triggered and reported in a timely manner. In this way, you can quickly learn about service exceptions and rectify faults to prevent loss.

Agent Management

Agent Management allows you to check the deployment and running statuses of the Agents that are connected to APM, and to stop, start, or delete them.

Configuration Management

Configuration Management manages and displays the configurations supported by APM in a centralized manner. It consists of two parts:

  • Collection Center: displays collectors in a centralized manner. You can view and manage various collectors, metrics, and collection parameters supported by APM.

  • Data Masking: You can set policies to mask the data reported using APM APIs.

System Management

System Management manages and displays system configurations in a centralized manner, including:

  • Access Keys: long-term identity credentials. They ensure that the requests are secret, complete, and correct.

  • General Configuration: You can determine whether to collect data through bytecode instrumentation, specify the slow request threshold and maximum number of rows to collect, and set web monitoring aggregation.

  • Agent Count: APM counts the number of Agents used by tenants.

Permissions Management

Enterprise Project Management Service (EPS) is used to control user access to APM resources.

Learn more

Permissions Management

Create a user and grant permissions.

Getting Started

Learn how to connect applications to APM in different scenarios.