- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-Threat logs
- 07-Reputation logs
- 08-URL filtering logs
- 09-File filtering logs
- 10-Data filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-NAT logs
- 15-SSL VPN user access logs
- 16-SSL VPN access resource logs
- 17-Terminal status
- 18-DLP logs
- 19-Zero trust policy logs
- 20-Application audit logs
- 21-System logs
- 22-Configuration logs
- 23-Traffic logs
- 24-Load balancing logs
- 25-TopN traffic
- 26-Security policy hit analysis
- 27-TopN threats
- 28-TopN URL filtering statistics
- 29-TopN file filtering statistics
- 30-Attack defense statistics
- 31-Server load balancing statistics
- 32-Outbound link load balancing statistics
- 33-Transparent DNS proxy statistics
- 34-Connection rate ranking
- 35-DLP statistics
- 36-TopN traffic trends
- 37-Security policy hit trend analysis
- 38-TopN threat trends
- 39-TopN URL filtering trends
- 40-TopN file filtering trends
- 41-Link trend
- 42-Routing policy trends
- 43-Virtual server trend
- 44-Server farm trends
- 45-Real server trend
- 46-Domain Requested Times Trend
- 47-TopN file filtering trends
- 48-Online SSL VPN users trend
- 49-Botnet analysis
- 50-Asset security
- 51-Threat case management
- 52-Report settings
- 53-Session list
- 54-LB session information
- 55-DNS cache information
- 56-User information center
- 57-IPv4 online users
- 58-IPv6 online users
- 59-MAC authentication online users
- 60-Terminal status
- 61-Asset scan
- 62-Ping
- 63-Tracert
- 64-Packet capture
- 65-Webpage Diagnosis
- 66-Diagnostic Info
- 67-Packet trace
- 68-Load balancing test
- 69-IPsec diagnosis
- 70-Risk analysis
- 71-Content moderation logs
- 72-Content security top
- Related Documents
-
Title | Size | Download |
---|---|---|
31-Server load balancing statistics | 36.04 KB |
Server load balancing statistics
Introduction
Virtual server statistics
You can display real-time statistics for virtual servers.
Table 1 shows the information displayed on the virtual sever statistics page.
Table 1 Virtual server statistics
Item |
Description |
|
Virtual server name |
Virtual server for which the statistics information is displayed. |
|
State |
Virtual server state: · Available. · Unavailable. · Disabled. |
|
Connection count |
Active |
Number of active connections for the virtual server. |
New |
Average number of connections established with the virtual server per second. |
|
Bandwidth (Kbps) |
Outbound |
Outbound bandwidth of the virtual server. |
Inbound |
Inbound bandwidth of the virtual server. |
Server farm statistics
Real-time statistics
Table 2 shows the information displayed on the sever farm statistics page.
Table 2 Server farm statistics
Item |
Description |
|
Server farm name |
Server farm for which the statistics information is displayed. |
|
State |
Server farm state: · Available. · Unavailable. |
|
Total real servers |
Total number of real servers in the server farm. |
|
Available real servers |
Number of available real servers in the server farm. |
|
Connection count |
Active |
Number of active connections for the server farm. |
New |
Average number of connections established with the server farm per second. |
|
Total bandwidth (Kbps) |
Total bandwidth of the server farm. |
Trends
This page displays the server farm statistics over time.
You can specify the server farm scope and statistics duration in the Statistics conditions section to display the following information:
· Traffic trend.
· Visit count trend.
· Active connection count trend.
· Stability trend.
Real server statistics
Table 3 shows the information displayed on the real sever statistics page.
Table 3 Real server statistics
Item |
Description |
|
Real server name |
Real server for which the statistics information is displayed. |
|
State |
Virtual server state: · Available. · Unavailable. · Service slow offline. · Service disabled. · Probe failed. · Ramp-up phase of slow online. · Busy. · Unknown. |
|
Connection count |
Active |
Number of active connections for the real server. |
New |
Average number of connections established with the real server per second. |
|
Bandwidth (Kbps) |
Outbound |
Outbound bandwidth of the real server. |
Inbound |
Inbound bandwidth of the real server. |
Trends
This page displays the real server statistics over time.
You can specify the real server scope and statistics duration in the Statistics conditions section to display the following information:
· Traffic trend.
· Visit count trend.
· Active connection count trend.
· Stability trend.
· HTTP delay trend.
URL visit statistics
The URL visit statistics shows the statistics of URLs accessed by users in a bar chart, pie chart, or list.
You can set statistics conditions to rank URLs by virtual server or statistics node. Table 4 shows the statistics conditions.
Table 4 URL visit statistics conditions
Item |
Description |
Virtual server name |
Counts the total number of URL accesses to a virtual server. |
Statistics node name |
Counts the total number of URL accesses to an HTTP statistics node that belongs to the specified virtual server. |
Statistics period |
Specifies the time period for collecting the total number of URL accesses. |
Click Start to enable the device to collect URL visit statistics and rank URL accesses based on the specified statistics conditions.
HTTP protection statistics
The HTTP protection statistics page shows attack record statistics and attack rankings in a bar chart or a list to help you understand the protection results of protection policies.
Attack records
The Attack Records tab displays information about attack traffic matching a protection policy, including attack duration, source IP address, URL, virtual server name, cookie name, protection action, attack times, and context.
Attack ranking
You can set statistics conditions to rank attack traffic. Table 5 shows the supported statistics conditions.
Table 5 Attack traffic statistics conditions
Item |
Description |
Ranking |
Specifies the top N ranking: Top 5 or Top 10. |
Count by |
Specifies the counting type: · Source IP address. · URL. |
Duration |
Specifies the duration for collecting attack traffic statistics. |
Click Start to enable the device to collect attack traffic statistics and rank attack traffic based on the specified statistics conditions.
Protection logs
The protection log page displays information about traffic matching a protection policy, including attack duration, source IP address, URL, virtual server name, cookie name, and context.