Search: "alarm rule"
How do I add an alarm contact when setting alarm rules in CloudMonitor? - CloudMonitor Documentation
Contact Group. You can add the contacts you have created to the group and click Save. Re-create the Alarm Rule. Now When setting the Alarm Policy in CloudMonitor, you may fail to see the contact information, even after ...
Manage alarm contact and alarm contact group - CloudMonitor Documentation
contact and contact group first, and then select the corresponding contact group when creating an alarm rule, to receive alarm Contact and contact group information is the basis for sending alarm notifications. You need to create the ...
Implication and matching sequence of the ECS security group rule priority - Elastic Compute Service Documentation
matched the first rule, if not, then determine whether it matched the second rule or not. For example, In this case, all ports group, the rule’s priority corresponds to its ranking order. When an instance belongs to at least two security groups: An ...
FAQs about forwarding rule configurations - Game Shield Documentation
1025 to 65535 Supported forwarding rule: TCP What is the forwarding entry limit on Game Shield ports-forwarding backend servers supported? The single forwarding rule can support 20 origin sites. By default, load balancing and ...
Configure "combined alarm" and "alarm retries" to reduce cloud monitoring Documentation
The user receives an alarm from the CloudMonitor. However, after the manual tests, the user confirms that the service is running properly and the alarm is a false one. CloudMonitor simulates access tests to your service from metric ...
Matching rule for workflow file triggering - ApsaraVideo for Media Processing Documentation
Matching rule for workflow file triggering Matching rule executes the strategy in the following way: Based on the path of new files, the matching rule checks the location where the workflow is bound. If the path of ...
Security group rule misconfiguration results into access exceptions - DDoS Protection Documentation
SymptomsYou can configure Non-Web Service of Anti-DDoS Pro for an origin site of Alibaba Cloud ECS or VPC. However, if the rule addresses. Therefore, the “only allow/deny all” access rule can disturb the normal access traffic. ResolutionModify ...
Template rule - DataWorks V2.0 Documentation
true, it returns normal, otherwise, red alarm is triggered. Template rule. For example, rule is the number of rows in the SQL task table and one-day fluctuation detection, then the ...
What if the auto scaling rule does not take effect - Container Service Documentation
on the Clusters page to view the alarm rules automatically configured by auto scaling. If no monitoring alarm rule is displayed (acsmonitoring). For more information, see Upgrade system services. View alarm historyIf the status of an alarm rule is abnormal ...
Rule Management - DataWorks V2.0 Documentation
This article show you how to customize alarm rules on the Rule Management page. On the Rule Management page, click Create a new custom rule on the right side to define alarm policies. In the displayed Basic information dialog ...