检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
You can delete a service card in the following scenarios: The service connected to APM has been deleted. The ICAgent has been uninstalled and service data does not need to be collected.
You can delete a service card in the following scenarios: The service connected to APM has been deleted. The ICAgent has been uninstalled and service data does not need to be collected.
Deleting a policy Click Delete in the Operation column in the row that contains the policy you want to delete. Parent topic: Alarm Policies
Billing Termination If you no longer need to use APM, unsubscribe from it or delete its resources to avoid unnecessary fees. For details, see Billing Termination.
If the metrics reported to or stored on APM 2.0 are no longer needed, delete them to avoid unnecessary fees. Enable balance alert on the Billing Center > Overview page.
Deleting an app Click Delete in the Operation column. Parent topic: App Monitoring
Deleting an environment Click Delete in the Operation column of an environment. Searching for a component or environment Enter a component or environment keyword or name on the right.
For example, some software developers in your enterprise need to use APM resources but must not delete them or perform any high-risk operations.
The following is an example deny policy: { "Version": "1.1", "Statement": [ { "Effect": "Deny", "Action": [ "apm:icmgr:delete" ] } ] } Example 3: Defining permissions for multiple services in a policy
The following is an example deny policy: { "Version": "1.1", "Statement": [ { "Effect": "Deny", "Action": [ "apm:icmgr:delete" ] } ] } Example 3: Defining permissions for multiple services in a policy
-p tcp --dport 41335 -j DNAT --to-destination {IP address of the host that reports data to APM}:41335 -A POSTROUTING -d {IP address of the host that reports data to APM}/32 -p tcp --dport 41335 -j SNAT --to-source {IP address of the jump server} # If the following rule exists, delete
You can also create, delete, and disable access keys on the Access Keys page. Using custom functions to encrypt authentication information To better protect your identity authentication information, APM supports custom encryption for keys.
When you copy the command to install JavaAgent, delete {} when setting APM_AK and APM_SK. Example: curl -k https://javaagent.
When you copy the command to install JavaAgent, delete {} when setting APM_AK and APM_SK. Example: curl -k https://javaagent.
Request methods include GET, PUT, DELETE, POST, HEAD, CONNECT, OPTIONS, PATCH, TRACE, and Select all. Select all indicates all request methods. In the Regular Expression text box, enter a transaction rule and click OK.
Agent Management You can view the deployment and running statuses of the Agents that are connected to APM, and to stop, start, or delete them. Configuration Management Configuration Management consists of Collection Center and Data Masking.
Request methods include GET, PUT, DELETE, POST, HEAD, CONNECT, OPTIONS, PATCH, TRACE, and Select all. Select all indicates all request methods. In the Regular Expression text box, enter a transaction rule and click OK.
For example, some software developers in your enterprise need to use APM resources but cannot delete them or perform any high-risk operations.
Agent Management Agent Management allows you to check the deployment and running statuses of the Agents that are connected to APM, and to stop, start, or delete them.
Deleting a website Click Delete in the Operation column. Parent topic: Web Monitoring