Observability
  • Log Service
    • Overview
    • Real-time Logs
      • Real-time Logs Overview
      • Push to Tencent Cloud CLS
      • Push to AWS S3-Compatible COS
      • Push to HTTP Server
    • Offline Logs
    • Related References
      • Field description
        • L7 Access Logs
        • L4 Proxy Logs
      • Real-Time Log Push Filter Conditions
      • Custom Log Push Fields
  • Data Analysis
    • Overview
    • Traffic Analysis
    • Cache Analysis
    • Security Analysis
      • Site Security Overview
      • Web Security Analysis
    • L4 Proxy
    • DNS Resolution
    • Related References
      • How to use filter condition
      • How to Modify Query Time Range
      • How to Export Statistical Data and Reports
  • AlarmService
    • Custom Statistical Metrics

Overview

Tencent Cloud EdgeOne security acceleration platform analyzes access log data and provides various data metrics in the data analysis page for you to understand your business data from multiple dimensions.

Applicable Scenarios

Scenario
Specific Demand
Daily monitoring and inspection
By observing the trends and distribution of various data metrics of acceleration domain names/L4 proxy instances, continuously monitor whether EdgeOne has high latency or failures.
Troubleshooting analysis
By analyzing access logs, understand the path and content of the user's access to locate and troubleshoot issues.
Business data insight
By analyzing and mining client data, understand user profiles.

Function Details

Data analysis function
Function introduction
Provides aggregated metric data on the traffic, bandwidth, number of requests, etc., and supports viewing the access region distribution, cache hit ratio, security protection status, and status codes, to help you understand the operational status of various businesses that have accessed EdgeOne.
Analyzes the access logs that match the Web security rules, to obtain the attack surface data related to your business, including attack sources and attack methods. This helps you better understand the attack situation and formulate more effective security policies. You can also directly view the sample logs to understand the attack request context.