Enterprise Governance
Admin Logs
Admin logs are files or database records that document the activities and operations of administrators within a system. They are typically used to monitor, audit, and analyze administrator behavior to ensure system security, compliance, and performance.
Information Provided by Admin Logs
Admin logs can provide the following key information:
-
Account Information
Records the administrator account that performed the operation, helping to trace which user executed a specific action. -
IP Address
Logs the IP address used by the administrator during login or operation, aiding in identifying the source of the activity. -
Client Information
Records the type of client used by the administrator (e.g., browser, operating system), helping to understand the operating environment. -
Operation Details
Provides detailed records of specific actions performed by the administrator, such as logging in, modifying configurations, or deleting files. -
Operation Time
Logs the exact time the operation occurred, facilitating time-series analysis and troubleshooting.
Functions of Administrator Logs
- Security Monitoring: Administrator logs help detect unauthorized access or suspicious activities, enhancing system security.
- Compliance Auditing: Log records provide evidence for compliance requirements, ensuring administrator actions align with company or industry regulations.
- Issue Troubleshooting: The time and operation details recorded in admin logs assist in tracing and quickly resolving issues.
File Logs
File logs are a system that records user actions related to file operations. They document various user activities such as uploading, downloading, modifying, and deleting files. File logs are crucial for maintaining system security, auditing compliance, and tracking user behavior.
Information Provided by File Logs
File logs can provide the following key information:
-
Account Records
Logs the user account that performed the operation, helping to trace which user executed a specific action. -
IP Address
Logs the IP address used by the user during login or operation, aiding in identifying the source of the activity. -
Client Information
Records the type of client used by the user (e.g., browser, operating system), helping to understand the operating environment. -
Operation Details
Provides detailed records of specific actions performed by the user, such as file uploads, downloads, modifications, or deletions. -
Operation Time
Logs the exact time the operation occurred, facilitating time-series analysis and troubleshooting. -
File Information
Records details about the files involved in the operation, such as file name, file path, and file space.
Functions of File Logs
- Security Monitoring: File logs help detect unauthorized operations or access, enhancing system security.
- Compliance Auditing: File logs provide evidence for compliance checks, ensuring file operations adhere to regulations.
- Behavior Tracking: By recording user actions, file logs enable tracing file changes and identifying responsible parties.
- Issue Troubleshooting: The time and operation details recorded in file logs assist in analyzing and resolving file operation-related system issues.
Billing Details
In the SERVICEME system, you can view detailed billing information for Token usage. The line chart at the top of the interface displays changes in Token-related values over time, providing a clear visualization of usage trends. The table below records detailed Token consumption data for various models within a specific time period, along with associated costs and usage types, making it easy to understand the billing details for each Token usage.
Information Provided on the Billing Details Page
The billing details interface provides the following information:
-
Model Group: Displays the group category to which the model belongs.
-
Model Set: Indicates the collection name to which the model belongs.
-
Model: Shows the specific model used.
-
Channel: Identifies the channel through which the model operates.
-
API Key Name: Displays the name of the API key used to access the model.
-
Input Tokens: Records the number of Tokens input into the model.
-
Input Tokens (Cache Hit): Shows the number of Tokens input when the cache is hit.
-
Output Tokens: Displays the number of Tokens consumed by the model to generate output.
-
Token Costs: Lists the costs incurred from Token usage.
-
Time: Logs the exact time the model operation occurred.
-
Actions: Provides options for actions such as viewing log details.
Functions of Billing Details
- Real-Time Monitoring of Token Consumption: Administrators can view Token consumption in real time and use the line chart to assess usage trends.
- Cost Tracking: Facilitates tracking the costs of each operation, helping administrators control expenses.
- Log Viewing: The action column provides a log details viewing feature, allowing users to delve into the specifics of each model operation for troubleshooting.
Data Center
The data center provides comprehensive statistics and analysis of the usage of intelligent agents and user conversation content, helping users better understand the performance and operational status of AI, thereby optimizing management and decision-making.
The data center supports data statistics from the perspectives of agent dimension, system API dimension, and time dimension.
Agent Analysis
This section focuses on quantitative analysis of the usage of various AI agents, including:
- Number of Conversation Participants: The number of unique users who have interacted with the agent.
- Number of Conversations: The total number of interactions between users and the agent, measuring usage activity.
- Token Consumption: Measures the resource consumption of model calls during agent operation.
- Agent Usage Ranking: Ranks all agents by usage frequency to identify high-frequency agents.
- Token Consumption Ranking: Tracks Token usage for each agent to aid in resource optimization and cost control.
Conversation Analysis
This section delves into the content of conversations between users and agents, uncovering user needs and interaction patterns, including:
- High-Frequency Word Analysis: Extracts keywords from user conversations to identify focus areas and demand trends.
- Conversation Logs: Provides access to historical conversation details for quality review, issue troubleshooting, and content auditing.
💡 Note: Conversation count statistics and agent usage rankings are updated daily; other information, such as conversation logs, is updated in real time.