百度智能云

All Product Document

          Cloud Monitor

          Overview

          When using the BCM alarm service, you can set the alarm rules for the monitoring items in the cloud product monitoring, sensing points in the site monitoring, instance in the application monitoring and monitoring items in the custom monitoring; after the alarm is triggered, you can receive the alarm information through various channels, and take measures to handle the problem in the first time.

          The alarm mainly includes the following components:

          • Name of the alarm strategy
          • Type of the alarm strategy
          • Alarm rules (the conditions under which the alarm is sent)
          • Alarm object (which object sends the alarm)
          • Alarm action (what person to whom the alarm is sent and through what channel)

          Among them, the alarm action supports phone, SMS, mails and other modes.

          Alarm rules for cloud product monitoring

          You have set proper alarm rules for the cloud services that have been accessed to BCM, including the threshold alarm for the performance consumption metric set for the resources, or set event alarm for the status of instance or service, namely the event monitoring. Currently, it supports to set alarm rules from the dimensions of a single instance and instance group. (Subsequently, the dimensions like tag, multiple instances and all instances are available).

          Alarm rules for event monitoring

          For the cloud products that have been accessed to BCM event monitoring, you can set alarm policies to trigger the alarm according to all kinds of important and exceptional events occurred during the operation.

          Alarm rules for site monitoring

          You can create the alarm rules for the sensing points in the site monitoring, including setting the threshold alarm for the monitoring items of HTTP, HTTPS, PING and TCP monitoring types.

          Application alarm rules

          You can set different types of alarm rules for the server modules that provide services for the business in view of the exceptional problems that may occur during the operation of the application. Currently, it supports to set the alarm strategy for process monitoring, and port monitoring and log monitoring will be available in the future.

          Custom monitoring alarm rules

          The BCM provides users with the innate data to realize the monitoring and alarm functions. By pushing data to cloud monitoring through API, you can set the alarm strategy to realize the custom monitoring alarm.

          Previous
          Event Monitoring
          Next
          Management Alarm