Pages Used for a Deeper Analysis
This screenshot shows the Front End page:
The Front End page (1) of the Real User Monitoring app displays usage and performance metrics from front-end requests. In the OS & Browsers (2) section, the types of the operating systems, browsers, and devices (used by the end users) with their number of users are displayed. You can use this information, for example, to inform users to upgrade their operating systems, browsers or devices in case of non-compliance or security risks.
The next screenshot shows the Back End page:
The Back End page (1) of the Real User Monitoring app displays usage and performance metrics from back-end requests. In this page, you can display the most important back-end usage and performance metrics for the following back-end request types (2):
- HTTP
- HTTPS
- RFC
- RFCS
- Dialog
- WS (Web Service)
For all these request types the response times are displayed; also, the number of executions of the displayed request types is shown.
This screenshot shows the Service / System page:
The Services / Systems page (1) offers an overview of your different request types, grouped by the managed components in scope. This helps you to identify entities that show poor performance. It displays the different ratings per component and request type. You can also identify how many requests of a particular request type are executed, and which component handles the highest number of requests.
The color of the requests depends on the response time. The status for every request action is determined by comparing the response time with the median of all historic response times of the corresponding action:
- If the response time is at least 2 times the standard deviation longer than this median, the status is Critical (color red).
- If the response time is at least the standard deviation longer than this median, the status is Warning (color yellow).
The next screenshot displays the Clients page:
On the Clients page (1), the operating system, the browser, and the device type used by the different users are displayed. You can use this information, for example, to inform users to upgrade their operating systems, browsers, or devices in case of non-compliance or security risks.
Caution
If your user does not have granted the Real User Analyst Sensitive role, the user names are hashed to protect the sensitive data.
The next screenshot shows the Execution Flow page:
In the Execution Flow page (1), detailed information about the actions of a user and the corresponding system response, is displayed in chronological order. Use this information to analyze usage and identify possible problems in the system.
By default, the initial display is empty. Enter a valid User name or Root Context ID in the Filter (2).
Note
A root context ID is assigned to a session when it is created. It is unchanged when the SAP passport is sent to a server and hence identifies the original session. This happens, for example, when a user starts an application from the SAP Fiori Launchpad.
Once the results are displayed, all user activities and corresponding backend requests with response times are displayed.
This screenshot shows the Expensive Requests page:
The Expensive Requests page (1) displays request names and spotlights the most critical ones. On this page, of the numerous requests in your services and systems in scope, the request names using the most resources and causing the most critical execution results, are displayed. By default, the Time Frame is This Week, and the view is limited to the 200 most expensive request names. You can change this number by using the Filter function (2).
You can select one of the following three views via the Display Mode (3) function:
- Performance (default): The request names with the maximum number of red executions are displayed.
- Workload: The request names with the maximum total response time are displayed. The total response time of a request name is the product of the number of executions and the average response time. This reflects the resources used by the corresponding requests.
- Usage: The request names with the maximum number of unique calls are displayed. The number of unique calls represent the number of users executing the corresponding requests. This indicates how comprehensively the request name is used.
The results are displayed in a tree map in which the different request names are displayed as squares, grouped by the different request types. The size of the squares depends on the selected display mode. The color of the squares depends on the percentage of red executions compared to all executions of the request name.
Note
An execution is defined as red, if the response time is at least 12 times as long as the median response time of all executions of the same request type. The thresholds of the different colors are displayed in the legend next to the tree map.
Note that this is different from the definition of red entries on the Services/Systems page and for the Status Summary on the Requests page.
This screenshot displays the HTTP Errors Page page:
The HTTP Errors page (1) shows the number of errors while executing request types HTTP(S) for the systems and services in scope. For every system or service, the following data for the selected time frame is displayed in detail:
- Number of Total Executions for requests of request types HTTP(S).
- Success Rate of calls, as a percentage.
- Percentage of calls with HTTP status codes 4xx (Client Errors).
- Percentage of calls with HTTP status codes 5xx (Server Errors).
In the History (2) section, the development over time of HTTP(S) calls and errors is displayed. To give you a better overview, an adjusted period before the Selected Time Frame is also included in the charts. The selected time frame itself is highlighted in purple.
The last screenshot displays the Alerting page:
On the Alerting page (1) of the Real User Monitoring app, the alerts you have activated in the Configuration (2) are displayed in a list. You activate and configure the alerting in the Configuration of the corresponding managed component.
Scan the list via Alert Name and Message, Status, Processor, and Object Details. You can perform the following actions:
- Sort the open alerts
- Assign or remove alert processors
- Confirm open alerts
- View the action logs of an alert
- Export the alert list to a spreadsheet
For analyzing an alert, you can drilldown the alert details (3) to get information on the related message. By choosing the relevant option from Actions button (4), you can perform actions such as adding comments, starting a workflow, sending notification, and so on per alert.