New MaxCDN Insights Tool for Quickly Analyzing File Delivery
October 26, 2015 | Robert Gibb
Daily Files is the first tool inside our real-time reporting suite, MaxCDN Insights, dedicated to offering visibility into how your content is delivered at the file level. It serves as a powerful CDN monitoring and troubleshooting tool by providing a drilldown of status codes, schemes, and cache statuses for individual files.
With the three reports inside Daily Files, you can easily detect successful file deliveries and culprits of inefficiencies for a given day. The three reports include:
- Status Code Report. Check the reliability of files with a drilldown of different status codes (2xx, 3xx, 4xx, 5xx).
- Scheme Report. Check the security of files with a drilldown of HTTP requests vs HTTPS requests.
- Cache Status Report. Check the cache performance of files with a drilldown of cache HIT’s vs cache MISS’s.
Reporting functionality inside the Daily Files tool is presented in this demo video:
Note: The demo uses a MaxCDN Enterprise account, but Daily Files comes with every MaxCDN package.
Daily Files and Raw Logs
As you can see, Daily Files is a great starting point for file analysis. You can also use it simultaneously with Raw Logs when thorough file breakdowns are needed. For instance, you could use Daily Files to find a specific status code (301, 404, etc.) and Raw Logs to gain additional insight about the requests generating the status codes (PoP, referer, client_city, user_agent, and more).
Before Daily Files, filtering options inside Raw Logs had to be used for individual file inspection. And while Raw Logs is great for extracting granular detail, sometimes a file view is all you need. Daily Files provides that, offering a high level view of CDN performance for every file you deliver.
You can take a deeper dive into the tool’s finer functionalities in this MaxCDN One tutorial. Here we provide a breakdown of everything in the video demo.
If you like our new reporting tool or have suggestions for improvement, let us know in the comment section below!