All Products
Search
Document Center

Application Real-Time Monitoring Service:Create a synthetic monitoring task to test file transfer and CDN speed

Last Updated:Jul 31, 2024

The Synthetic Monitoring sub-service of Application Real-Time Monitoring Service (ARMS) allows you to create a synthetic monitoring task to test the speed of file transfer and Alibaba Cloud CDN (CDN). Synthetic Monitoring simulates how users upload and download resources in different environments to monitor and analyze the availability and performance of resources, and the acceleration capability of CDN. This helps you optimize the network architecture, adjust service deployment, and improve network performance and user experience.

  1. Log on to the ARMS console.

  2. In the left-side navigation pane, choose Synthetic Monitoring > Scheduled Tests. On the Synthetic Tasks page, click New Task.

  3. On the Create Synthetic Task page, click File Transfer & CDN Speed Test.

  4. In the STEP1 section, configure the parameters that are described in the following table.

    Parameter

    Description

    Task name

    The name of the synthetic monitoring task.

    Target Address

    The address of the web application on which you want to perform synthetic monitoring. You can enter a URL that starts with http or https, or an address in the IP address:Port number format.

    Dialing Frequency

    • Frequency: the intervals at which the synthetic monitoring task runs.

    • Custom: If you turn on the Custom switch, you can select the time periods during which the synthetic monitoring task is performed.

  5. Select detection points in the STEP2 section.

    Parameter

    Description

    Monitoring point type

    Valid values: PC End and Mobile End.

    Monitoring Point Group

    • Recommended Monitoring Point Group: The group contains the common detection points recommend by the system.

    • All Monitoring Point Group: The group contains all detection points supported by Synthetic Monitoring.

    • Custom Monitoring Point Group: The group contains the frequently used detection points.

    Note

    You cannot monitor IPv6 web applications in data centers.

    Select Monitoring Point

    Add the carriers that you want to monitor to the Selected Monitoring Point section on the right.

    Note

    You can save the carriers added in the Selected Monitoring Point section to a custom detection point group. This way, you can quickly select detection points when you create a synthetic monitoring task.

  6. In the STEP3 section, configure the advanced settings. The following table describes the parameters.

    Parameter

    Description

    IP Protocol

    The IP protocol used by the servers that access the website. Valid values:

    • Automation: randomly tests the performance of IPv4 or IPv6 servers.

    • IPv4: tests the performance of IPv4 servers.

    • IPv6: tests the performance of IPv6 servers.

    Monitoring Related Items

    The monitoring settings of the task. Valid values:

    Redirect: specifies whether to continue browsing after a redirection occurs.

    Ignore Certificate Errors

    Specifies whether to ignore certificate errors during certificate verification in the Secure Sockets Layer (SSL) handshake and continue downloading. Valid values:

    • Ignore Certificate Status Error

    • Ignore Certificate Untrusted

    • Ignore Host Invalid Error

    Monitoring Timeout

    The maximum duration of the task. If the specified value is exceeded, the task is stopped. Default value: 60000. Unit: milliseconds.

    Transfer Size

    The maximum size of a file that can be downloaded in the task.

    Note

    Maximum value: 20 MB.

    Connection Timeout

    The timeout period for a Transmission Control Protocol (TCP) connection. If the specified value is exceeded, a message with error code 601 is returned, indicating that the connection failed. Default value: 5000. Unit: milliseconds.

    Download Kernel

    The kernel used to download files. Valid values:

    • curl: a cross-platform open source library that supports Windows, Linux, and macOS. If you want to test the download speed of a server or macOS OS, we recommend that you select cURL.

    • WinInet: an API library that is part of Microsoft Windows. If you want to test the download speed of a Windows OS, we recommend that you select WinInet.

    Protocol

    The protocol of the kernel.

    Custom Header

    Specifies whether to add or modify specific field values in the request header. Enter a custom header in the field.

    Customize host

    The custom host mode. You can select Poling or Random and then enter the IP address of a custom host in the field.

    You can enter multiple IP addresses. Separate the IP addresses with commas (,). Example: 192.168.1.11,192.168.1.12:www.a.domain.

    Note

    If a colon (:) is used, a URL before the colon (:) is automatically resolved.

    Verify Keywords

    The string extracted from the response header for verification. If the string is not contained in the data sample, an error is reported. Valid values:

    • String Verification: The response data must contain the specified string for verification. Otherwise, an error is reported.

    • MD5 Verification: The response data is saved as a file and processed by using the MD5 algorithms. The obtained value must be exactly the same as the expected value.

    Hijack Parameters

    DNS Hijack Whitelist: If the IP address or CNAME record resolved from a domain name, such as www.aliyun.com, is not in the whitelist for DNS hijacking, you cannot access the domain name, or an IP address that belongs to a different domain name is returned. If the IP address or CNAME record is included in the whitelist for DNS hijacking, DNS hijacking does not occur.

    Format: domain name:matching rule. The matching rule can be an exact IP address, wildcard, subnet mask, or CNAME record. Separate multiple matching rules with vertical bars (|). Example: www.aiyun.com:202.0.3.55|203.3.44.67. It indicates that all IP addresses resolved from the www.alliyun.com domain name, except for 202.0.3.55 and 203.3.44.67, are hijacked.

    Availability Assertion

    The conditions that are used to determine whether monitoring is available. The monitoring is available only if the response for the monitoring points of the synthetic monitoring task meets all specified conditions.

    Resource Group

    The resource group to which the task belongs. For information about how to create a resource group, see Create a resource group.

  7. Click Create Task.

    After you create a task, you are redirected to the Synthetic Tasks page.

References

After the task is created, you can view the metrics related to file transfer on the dashboard. For more information about the metrics, see View the dashboard of a file transfer and CDN speed test task.