🔗CDN Analytics

The CDN (Content Delivery Network) Analytics feature in Aerie provides users with comprehensive insights into the performance and efficiency of their content delivery network. This tool is essential for users who need to optimize the distribution and accessibility of their digital assets, ensuring that content is delivered quickly and reliably to users across the globe.

Accessing CDN Analytics

  1. Navigating to CDN Analytics:

    • From the main dashboard, locate the sidebar menu on the left.

    • Click on "Tools" to expand the submenu.

    • Select "CDN Analytics" to access the analytics interface.

Key Components of CDN Analytics

  1. Overview Dashboard:

    • The Overview Dashboard provides a high-level summary of CDN performance.

    • Key metrics such as total requests, bandwidth usage, and response times are displayed.

    • Users can quickly assess the overall health and efficiency of their CDN.

  2. Traffic Analysis:

    • This section provides detailed insights into traffic patterns and usage.

    • Users can view data on request volumes, geographic distribution, and peak traffic times.

    • Graphs and charts visualize traffic trends, helping users identify patterns and anomalies.

  3. Performance Metrics:

    • Performance Metrics offer detailed information on the speed and reliability of content delivery.

    • Metrics such as average response time, cache hit/miss ratio, and error rates are available.

    • Users can monitor these metrics to ensure optimal performance and identify areas for improvement.

  4. Node Monitoring:

    • Node Monitoring allows users to track the status and performance of individual CDN nodes.

    • Information such as node uptime, request handling, and regional performance is displayed.

    • Users can identify underperforming nodes and take corrective actions as needed.

  5. Security Insights:

    • The Security Insights section provides data on security-related events and measures.

    • Users can monitor incidents such as DDoS attacks, malicious requests, and access violations.

    • Alerts and notifications can be set up to inform users of significant security events.

  6. Custom Reports:

    • Custom Reports enable users to generate detailed reports tailored to specific needs.

    • Users can select metrics, time ranges, and filters to create reports that address their unique requirements.

    • Reports can be exported for sharing and further analysis.

Last updated