diff --git a/docs/aom/umn/ALL_META.TXT.json b/docs/aom/umn/ALL_META.TXT.json index 58ff675f..c9b49db7 100644 --- a/docs/aom/umn/ALL_META.TXT.json +++ b/docs/aom/umn/ALL_META.TXT.json @@ -1,891 +1,1929 @@ [ + { + "dockw":"User Guide" + }, { "uri":"aom_06_6000.html", + "node_id":"aom_06_6000.xml", "product_code":"aom", "code":"1", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Service Overview", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual", + "IsMulti":"Yes", + "opensource":"true" + } + ], "title":"Service Overview", "githuburl":"" }, { "uri":"aom_06_0006.html", + "node_id":"aom_06_0006.xml", "product_code":"aom", "code":"2", "des":"With the popularization of container technologies, lots of enterprises develop applications using microservice frameworks. Because the number of cloud services increases,", "doc_type":"productdesc", "kw":"What Is AOM?,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"What Is AOM?", "githuburl":"" }, { "uri":"aom_06_0013.html", + "node_id":"aom_06_0013.xml", "product_code":"aom", "code":"3", "des":"AOM is a multi-dimensional O&M platform that focuses on resource data and associates log, metric, resource, alarm, and event data. It consists of the data collection and ", "doc_type":"productdesc", "kw":"Product Architecture,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Product Architecture", "githuburl":"" }, { "uri":"aom_06_0005.html", + "node_id":"aom_06_0005.xml", "product_code":"aom", "code":"4", "des":"Application monitoring allows you to view application resource usage, trends, and alarms in real time, so that you can make fast responses to ensure smooth running for ap", "doc_type":"productdesc", "kw":"Functions,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Functions", "githuburl":"" }, { "uri":"aom_06_0003.html", + "node_id":"aom_06_0003.xml", "product_code":"aom", "code":"5", "des":"During routine O&M, it is hard to locate faults and obtain logs. Therefore, a monitoring platform is required to monitor resources, logs, and application performance.AOM ", "doc_type":"productdesc", "kw":"Application Scenarios,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Application Scenarios", "githuburl":"" }, { "uri":"aom_06_0007.html", + "node_id":"aom_06_0007.xml", "product_code":"aom", "code":"6", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"productdesc", "kw":"Metric Overview", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Metric Overview", "githuburl":"" }, { "uri":"aom_06_0014.html", + "node_id":"aom_06_0014.xml", "product_code":"aom", "code":"7", "des":"Metrics reflect resource performance data or status. A metric consists of a namespace, dimension, name, and unit. Metrics can be divided into:System metrics: basic metric", "doc_type":"productdesc", "kw":"Introduction,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Introduction", "githuburl":"" }, { "uri":"aom_06_0015.html", + "node_id":"aom_06_0015.xml", "product_code":"aom", "code":"8", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"productdesc", "kw":"Network Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Network Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0016.html", + "node_id":"aom_06_0016.xml", "product_code":"aom", "code":"9", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"productdesc", "kw":"Disk Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Disk Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0024.html", + "node_id":"aom_06_0024.xml", "product_code":"aom", "code":"10", "des":"If the host type is CCE, you can view disk partition metrics. The supported OSs are CentOS 7.6 and EulerOS 2.5.Log in to the CCE node as the root user and run the docker ", "doc_type":"productdesc", "kw":"Disk Partition Metrics,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Disk Partition Metrics", "githuburl":"" }, { "uri":"aom_06_0017.html", + "node_id":"aom_06_0017.xml", "product_code":"aom", "code":"11", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"productdesc", "kw":"File System Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"File System Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0009.html", + "node_id":"aom_06_0009.xml", "product_code":"aom", "code":"12", "des":"Memory usage = (Physical memory capacity – Available physical memory capacity)/Physical memory capacity; Virtual memory usage = ((Physical memory capacity + Total virtual", "doc_type":"productdesc", "kw":"Host Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Host Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0010.html", + "node_id":"aom_06_0010.xml", "product_code":"aom", "code":"13", "des":"Cluster metrics are aggregated by AOM based on host metrics, and do not include the metrics of master nodes.", "doc_type":"productdesc", "kw":"Cluster Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Cluster Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0018.html", + "node_id":"aom_06_0018.xml", "product_code":"aom", "code":"14", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"productdesc", "kw":"Container Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Container Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0019.html", + "node_id":"aom_06_0019.xml", "product_code":"aom", "code":"15", "des":"In AOM, VMs refer to processes, and VM metrics refer to process metrics.", "doc_type":"productdesc", "kw":"VM Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"VM Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0020.html", + "node_id":"aom_06_0020.xml", "product_code":"aom", "code":"16", "des":"Instance metrics consist of container or process metrics. The dimensions of instance metrics are the same as those of container or process metrics. For details, see Conta", "doc_type":"productdesc", "kw":"Instance Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Instance Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0008.html", + "node_id":"aom_06_0008.xml", "product_code":"aom", "code":"17", "des":"Service metrics consist of instance metrics. The dimensions of service metrics are the same as those of instance metrics. For details, see Instance Metrics and Dimensions", "doc_type":"productdesc", "kw":"Service Metrics and Dimensions,Metric Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Service Metrics and Dimensions", "githuburl":"" }, { "uri":"aom_06_0001.html", + "node_id":"aom_06_0001.xml", "product_code":"aom", "code":"18", "des":"AOM supports multiple operating systems (OSs). When creating a host, ensure that its OS meets the requirements in Table 1. Otherwise, the host cannot be monitored by AOM.", "doc_type":"productdesc", "kw":"Restrictions,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Restrictions", "githuburl":"" }, { "uri":"aom_06_0023.html", + "node_id":"aom_06_0023.xml", "product_code":"aom", "code":"19", "des":"All O&M data will be displayed on the AOM console. Therefore, do not upload your privacy or sensitive data to AOM. If necessary, encrypt such data.When you manually insta", "doc_type":"productdesc", "kw":"Privacy and Sensitive Information Protection Statement,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Privacy and Sensitive Information Protection Statement", "githuburl":"" }, { "uri":"aom_06_0012.html", + "node_id":"aom_06_0012.xml", "product_code":"aom", "code":"20", "des":"AOM can work with Distributed Message Service (DMS), and Cloud Trace Service (CTS). When AOM interconnects with middleware services such as Virtual Private Cloud (VPC) an", "doc_type":"productdesc", "kw":"Relationships Between AOM and Other Services,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Relationships Between AOM and Other Services", "githuburl":"" }, { "uri":"aom_06_0002.html", + "node_id":"aom_06_0002.xml", "product_code":"aom", "code":"21", "des":"Metrics reflect resource performance data or status. A metric consists of a namespace, dimension, name, and unit.Metric namespaces can be regarded as containers for stori", "doc_type":"productdesc", "kw":"Basic Concepts,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Basic Concepts", "githuburl":"" }, { "uri":"aom_06_0021.html", + "node_id":"aom_06_0021.xml", "product_code":"aom", "code":"22", "des":"If you need to assign different permissions to employees in your enterprise to access your AOM resources, Identity and Access Management (IAM) is a good choice for fine-g", "doc_type":"productdesc", "kw":"Permissions,Service Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"productdesc", + "IsBot":"Yes", + "IsMulti":"Yes" + } + ], "title":"Permissions", "githuburl":"" }, { "uri":"aom_05_0004.html", + "node_id":"aom_05_0004.xml", "product_code":"aom", "code":"23", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Getting Started", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual", + "IsMulti":"Yes", + "opensource":"true" + } + ], "title":"Getting Started", "githuburl":"" }, { "uri":"aom_00_0001.html", + "node_id":"aom_00_0001.xml", "product_code":"aom", "code":"24", "des":"Application Operations Management (AOM) is a one-stop cloud operations management platform that helps you with problem management, monitoring, security, and performance. ", "doc_type":"qs", "kw":"Process of Using AOM,Getting Started,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "documenttype":"qs", + "IsMulti":"Yes" + } + ], "title":"Process of Using AOM", "githuburl":"" }, { "uri":"aom_00_0003.html", + "node_id":"aom_00_0003.xml", "product_code":"aom", "code":"25", "des":"This section describes how to install an ICAgent on an ECS and monitor its resources on the AOM console.You have created an ECS.You have obtained an AK/SK.The time of the", "doc_type":"qs", "kw":"Installing an ICAgent,Getting Started,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "documenttype":"qs", + "IsMulti":"Yes" + } + ], "title":"Installing an ICAgent", "githuburl":"" }, { "uri":"aom_02_0088.html", + "node_id":"aom_02_0088.xml", "product_code":"aom", "code":"26", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Permissions Management", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], "title":"Permissions Management", "githuburl":"" }, { "uri":"aom_02_0090.html", + "node_id":"aom_02_0090.xml", "product_code":"aom", "code":"27", - "des":"This chapter describes how to use Identity and Access Management (IAM) for fine-grained permissions control for your Application Operations Management (AOM) resources. Wi", + "des":"This chapter describes how to use Identity and Access Management (IAM) for fine-grained permissions control for your AOM resources. With IAM, you can:Create IAM users for", "doc_type":"usermanual", "kw":"Creating a User and Granting Permissions,Permissions Management,User Guide", + "search_title":"", + "metedata":[ + { + "IsMulti":"Yes", + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], "title":"Creating a User and Granting Permissions", "githuburl":"" }, { "uri":"aom_02_0091.html", + "node_id":"aom_02_0091.xml", "product_code":"aom", "code":"28", "des":"Custom policies can be created as a supplement to the system policies of AOM.You can create custom policies in either of the following two ways:Visual editor: Select clou", "doc_type":"usermanual", "kw":"Creating a Custom Policy,Permissions Management,User Guide", + "search_title":"", + "metedata":[ + { + "IsMulti":"Yes", + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], "title":"Creating a Custom Policy", "githuburl":"" }, { "uri":"aom_02_0068.html", + "node_id":"aom_02_0068.xml", "product_code":"aom", "code":"29", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Connecting Resources to AOM", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Connecting Resources to AOM", "githuburl":"" }, { "uri":"aom_02_002301.html", + "node_id":"aom_02_002301.xml", "product_code":"", "code":"30", - "des":"ICAgent is used to collect metrics, logs, and application performance data. For servers that are directly purchased on the Elastic Cloud Server (ECS) or Bare Metal Server", + "des":"ICAgents collect metrics, logs, and application performance data in real time. For hosts purchased from the ECS or BMS console, you need to manually install the ICAgent. ", "doc_type":"", "kw":"Installing an ICAgent,Connecting Resources to AOM,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Installing an ICAgent", "githuburl":"" }, { "uri":"aom_02_0023.html", + "node_id":"aom_02_0023.xml", "product_code":"aom", "code":"31", "des":"AOM can discover applications and collect their metrics based on configured rules. There are two modes to configure application discovery: auto mode and manual mode. This", "doc_type":"usermanual", "kw":"Configuring Application Discovery Rules,Connecting Resources to AOM,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Configuring Application Discovery Rules", "githuburl":"" }, { "uri":"aom_02_0039.html", + "node_id":"aom_02_0039.xml", "product_code":"aom", "code":"32", "des":"AOM can collect and display VM logs. VM refers to an Elastic Cloud Server (ECS) or a Bare Metal Server (BMS) running Linux. To use this function, first configure a log co", "doc_type":"usermanual", "kw":"Configuring VM Log Collection Paths,Connecting Resources to AOM,User Guide", + "search_title":"", + "metedata":[ + { + "IsMulti":"Yes", + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], "title":"Configuring VM Log Collection Paths", "githuburl":"" }, { "uri":"aom_02_0001.html", + "node_id":"aom_02_0001.xml", "product_code":"aom", "code":"33", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Monitoring Overview", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Monitoring Overview", "githuburl":"" }, { "uri":"aom_02_0041.html", + "node_id":"aom_02_0041.xml", "product_code":"aom", "code":"34", "des":"The O&M page supports full-link, multi-layer, and one-stop O&M for resources, applications, and user experience. Specifically, this page displays the following types of c", "doc_type":"usermanual", "kw":"O&M,Monitoring Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"O&M", "githuburl":"" }, { "uri":"aom_02_0003.html", + "node_id":"aom_02_0003.xml", "product_code":"aom", "code":"35", "des":"With a dashboard, different graphs such as line graphs and digit graphs are displayed on the same screen, which lets you view comprehensive monitoring data.For example, y", "doc_type":"usermanual", "kw":"Dashboard,Monitoring Overview,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Dashboard", "githuburl":"" }, { "uri":"aom_02_0044.html", + "node_id":"aom_02_0044.xml", "product_code":"aom", "code":"36", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Alarm Management", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Alarm Management", "githuburl":"" }, { "uri":"aom_02_0037.html", + "node_id":"aom_02_0037.xml", "product_code":"aom", "code":"37", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Alarm Rules", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual", + "IsMulti":"Yes" + } + ], "title":"Alarm Rules", "githuburl":"" }, { "uri":"aom_02_0062.html", + "node_id":"aom_02_0062.xml", "product_code":"", "code":"38", - "des":"By setting alarms rules, you can define threshold conditions for resource metrics. A threshold alarm is generated when the metric data of a resource meets the threshold c", + "des":"By setting alarms rules, you can define event conditions for services or threshold conditions for resource metrics. If the resource data of a service meets the event cond", "doc_type":"", "kw":"Overview,Alarm Rules,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Overview", "githuburl":"" }, { - "uri":"aom_02_0060.html", - "product_code":"aom", + "uri":"aom_02_0113.html", + "node_id":"aom_02_0113.xml", + "product_code":"", "code":"39", - "des":"You can set threshold conditions for resource metrics by setting threshold rules. If a metric value meets the threshold condition, a threshold alarm will be generated. If", + "des":"When creating alarm rules, you can set alarm tags and annotations. Tags are attributes that can be used to identify alarms. They are applied to the alarm noise reduction ", + "doc_type":"", + "kw":"Alarm Tags and Annotations,Alarm Rules,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Alarm Tags and Annotations", + "githuburl":"" + }, + { + "uri":"aom_02_0060.html", + "node_id":"aom_02_0060.xml", + "product_code":"aom", + "code":"40", + "des":"You can set threshold conditions for resource metrics by setting threshold rules. If a metric value meets a threshold condition, a threshold alarm will be reported. If th", "doc_type":"usermanual", "kw":"Creating a Threshold Rule,Alarm Rules,User Guide", + "search_title":"", + "metedata":[ + { + "IsMulti":"Yes", + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], "title":"Creating a Threshold Rule", "githuburl":"" }, { "uri":"aom_02_0063.html", + "node_id":"aom_02_0063.xml", "product_code":"aom", - "code":"40", + "code":"41", "des":"Ensure that a static threshold template is available if you want to create threshold rules based on a template.You can create a maximum of 50 static threshold templates. ", "doc_type":"usermanual", "kw":"Creating a Static Threshold Template,Alarm Rules,User Guide", + "search_title":"", + "metedata":[ + { + "IsMulti":"Yes", + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], "title":"Creating a Static Threshold Template", "githuburl":"" }, { - "uri":"aom_02_0004.html", + "uri":"aom_02_0061.html", + "node_id":"aom_02_0061.xml", "product_code":"aom", - "code":"41", + "code":"42", + "des":"You can set event conditions for services by setting event alarm rules. When the resource data meets an event condition, an event alarm is generated.If you want to receiv", + "doc_type":"usermanual", + "kw":"Creating an Event Alarm Rule,Alarm Rules,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], + "title":"Creating an Event Alarm Rule", + "githuburl":"" + }, + { + "uri":"aom_02_0004.html", + "node_id":"aom_02_0004.xml", + "product_code":"aom", + "code":"43", "des":"Set a time range to view alarms. There are two methods to set a time range:Method 1: Use the predefined time label, such as Last 1 hour, Last 6 hours, or Last 1 day. Sele", "doc_type":"usermanual", "kw":"Viewing Alarms,Alarm Management,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Viewing Alarms", "githuburl":"" }, { "uri":"aom_02_0045.html", + "node_id":"aom_02_0045.xml", "product_code":"aom", - "code":"42", + "code":"44", "des":"Events generally carry some important information, informing you of the changes of AOM or an external service. Such changes do not necessarily cause exceptions. Events do", "doc_type":"usermanual", "kw":"Viewing Events,Alarm Management,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Viewing Events", "githuburl":"" }, { - "uri":"aom_02_0048.html", + "uri":"aom_02_0925.html", + "node_id":"aom_02_0925.xml", "product_code":"aom", - "code":"43", + "code":"45", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Alarm Action Rules", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual", + "IsMulti":"Yes" + } + ], + "title":"Alarm Action Rules", + "githuburl":"" + }, + { + "uri":"aom_02_0933.html", + "node_id":"aom_02_0933.xml", + "product_code":"", + "code":"46", + "des":"AOM allows you to customize alarm action rules. You can create an alarm action rule to associate an SMN topic with a message template. You can also customize notification", + "doc_type":"", + "kw":"Overview,Alarm Action Rules,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Overview", + "githuburl":"" + }, + { + "uri":"aom_02_0926.html", + "node_id":"aom_02_0926.xml", + "product_code":"", + "code":"47", + "des":"A topic has been created.A topic policy has been set.A subscriber, that is, an email or SMS message recipient has been added to the topic.You can create a maximum of 1000", + "doc_type":"", + "kw":"Creating an Alarm Action Rule,Alarm Action Rules,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Creating an Alarm Action Rule", + "githuburl":"" + }, + { + "uri":"aom_02_0927.html", + "node_id":"aom_02_0927.xml", + "product_code":"", + "code":"48", + "des":"You can create message templates to customize notifications. When a preset notification rule is triggered, notifications can be sent to specified personnel by emails, SMS", + "doc_type":"", + "kw":"Creating a Message Template,Alarm Action Rules,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Creating a Message Template", + "githuburl":"" + }, + { + "uri":"aom_02_0950.html", + "node_id":"aom_02_0950.xml", + "product_code":"", + "code":"49", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"", + "kw":"Alarm Noise Reduction", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Alarm Noise Reduction", + "githuburl":"" + }, + { + "uri":"aom_02_0951.html", + "node_id":"aom_02_0951.xml", + "product_code":"", + "code":"50", + "des":"AOM supports alarm noise reduction. Alarms can be processed based on the alarm noise reduction rules to prevent notification storms.Alarm noise reduction consists of four", + "doc_type":"", + "kw":"Overview,Alarm Noise Reduction,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Overview", + "githuburl":"" + }, + { + "uri":"aom_02_0952.html", + "node_id":"aom_02_0952.xml", + "product_code":"", + "code":"51", + "des":"You can filter alarm subsets and then group them based on the grouping conditions. Alarms in the same group are aggregated to trigger one notification.As shown in Figure ", + "doc_type":"", + "kw":"Creating a Grouping Rule,Alarm Noise Reduction,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Creating a Grouping Rule", + "githuburl":"" + }, + { + "uri":"aom_02_0953.html", + "node_id":"aom_02_0953.xml", + "product_code":"", + "code":"52", + "des":"By using suppression rules, you can suppress or block notifications related to specific alarms. For example, when a major alarm is generated, less severe alarms can be su", + "doc_type":"", + "kw":"Creating a Suppression Rule,Alarm Noise Reduction,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Creating a Suppression Rule", + "githuburl":"" + }, + { + "uri":"aom_02_0954.html", + "node_id":"aom_02_0954.xml", + "product_code":"", + "code":"53", + "des":"You can shield alarm notifications in a specified period. A silence rule takes effect immediately after it is created.You can create up to 100 silence rules.After creatin", + "doc_type":"", + "kw":"Creating a Silence Rule,Alarm Noise Reduction,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Creating a Silence Rule", + "githuburl":"" + }, + { + "uri":"aom_02_0048.html", + "node_id":"aom_02_0048.xml", + "product_code":"aom", + "code":"54", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Resource Monitoring", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Resource Monitoring", "githuburl":"" }, { "uri":"aom_02_0049.html", + "node_id":"aom_02_0049.xml", "product_code":"aom", - "code":"44", + "code":"55", "des":"An application is a group of identical or similar components divided based on service requirements. Applications are categorized into system applications and custom appli", "doc_type":"usermanual", "kw":"Application Monitoring,Resource Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Application Monitoring", "githuburl":"" }, { "uri":"aom_02_0007.html", + "node_id":"aom_02_0007.xml", "product_code":"aom", - "code":"45", + "code":"56", "des":"Components refer to the services that you deploy, including containers and common processes. For example, a workload on the Cloud Container Engine (CCE) is a component, a", "doc_type":"usermanual", "kw":"Component Monitoring,Resource Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Component Monitoring", "githuburl":"" }, { "uri":"aom_02_0008.html", + "node_id":"aom_02_0008.xml", "product_code":"aom", - "code":"46", + "code":"57", "des":"Hosts include the Elastic Cloud Server (ECS) and Bare Metal Server (BMS). AOM monitors the hosts purchased during Cloud Container Engine (CCE) cluster creation and those ", "doc_type":"usermanual", "kw":"Host Monitoring,Resource Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Host Monitoring", "githuburl":"" }, { "uri":"aom_02_0051.html", + "node_id":"aom_02_0051.xml", "product_code":"aom", - "code":"47", + "code":"58", "des":"Container and component monitoring differs in their monitored objects. For component monitoring, workloads deployed using Cloud Container Engine (CCE), and components dep", "doc_type":"usermanual", "kw":"Container Monitoring,Resource Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Container Monitoring", "githuburl":"" }, { "uri":"aom_02_0017.html", + "node_id":"aom_02_0017.xml", "product_code":"aom", - "code":"48", + "code":"59", "des":"The Metric Monitoring page displays metric data of each resource. You can monitor metric values and trends in real time, and create threshold rules for desired metrics. I", "doc_type":"usermanual", "kw":"Metric Monitoring,Resource Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Metric Monitoring", "githuburl":"" }, { "uri":"aom_02_0054.html", + "node_id":"aom_02_0054.xml", "product_code":"aom", - "code":"49", + "code":"60", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Log Management", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Log Management", "githuburl":"" }, { "uri":"aom_02_0009.html", + "node_id":"aom_02_0009.xml", "product_code":"aom", - "code":"50", + "code":"61", "des":"AOM enables you to quickly query logs, and locate faults based on log sources and contexts.You can search for logs by component, system, or host.For component logs, you c", "doc_type":"usermanual", "kw":"Searching for Logs,Log Management,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Searching for Logs", "githuburl":"" }, { "uri":"aom_02_0010.html", + "node_id":"aom_02_0010.xml", "product_code":"aom", - "code":"51", + "code":"62", "des":"You can quickly view log files of component instances to locate faults.The time information contained in a log file, if any, is automatically displayed, as shown in the r", "doc_type":"usermanual", "kw":"Viewing Log Files,Log Management,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Viewing Log Files", "githuburl":"" }, { "uri":"aom_02_0079.html", + "node_id":"aom_02_0079.xml", "product_code":"aom", - "code":"52", + "code":"63", "des":"A log bucket is a logical group of log files. Before using functions such as Viewing Bucket Logs, ensure that a log bucket has been created.You can add up to 500 log file", "doc_type":"usermanual", "kw":"Adding Log Buckets,Log Management,User Guide", + "search_title":"", + "metedata":[ + { + "IsMulti":"Yes", + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], "title":"Adding Log Buckets", "githuburl":"" }, { "uri":"aom_02_0083.html", + "node_id":"aom_02_0083.xml", "product_code":"aom", - "code":"53", + "code":"64", "des":"AOM supports fine-grained log query. That is, you can view logs by bucket to obtain key service data and quickly locate problems.Before viewing bucket logs, ensure that y", "doc_type":"usermanual", "kw":"Viewing Bucket Logs,Log Management,User Guide", + "search_title":"", + "metedata":[ + { + "IsMulti":"Yes", + "prodname":"aom", + "opensource":"true", + "documenttype":"usermanual" + } + ], "title":"Viewing Bucket Logs", "githuburl":"" }, { "uri":"aom_02_0080.html", + "node_id":"aom_02_0080.xml", "product_code":"aom", - "code":"54", + "code":"65", "des":"AOM enables you to dump logs to Object Storage Service (OBS) buckets for long-term storage. To store logs for a longer time, add log dumps.AOM offers periodical dump and ", "doc_type":"usermanual", "kw":"Adding Log Dumps,Log Management,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Adding Log Dumps", "githuburl":"" }, { "uri":"aom_02_001101.html", + "node_id":"aom_02_001101.xml", "product_code":"", - "code":"55", + "code":"66", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"", "kw":"Configuration Management", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Configuration Management", "githuburl":"" }, { "uri":"aom_02_0011.html", + "node_id":"aom_02_0011.xml", "product_code":"aom", - "code":"56", + "code":"67", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"ICAgent Management", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"ICAgent Management", "githuburl":"" }, { "uri":"aom_02_0012.html", + "node_id":"aom_02_0012.xml", "product_code":"aom", - "code":"57", - "des":"ICAgent is used to collect metrics, logs, and application performance data. For servers that are directly purchased on the Elastic Cloud Server (ECS) or Bare Metal Server", + "code":"68", + "des":"ICAgents collect metrics, logs, and application performance data in real time. For hosts purchased from the ECS or BMS console, you need to manually install the ICAgent. ", "doc_type":"usermanual", "kw":"Installing an ICAgent,ICAgent Management,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Installing an ICAgent", "githuburl":"" }, { "uri":"aom_02_0013.html", + "node_id":"aom_02_0013.xml", "product_code":"aom", - "code":"58", + "code":"69", "des":"To ensure better collection experience, AOM will continuously upgrade ICAgent versions. When the system displays a message indicating that a new ICAgent version is availa", "doc_type":"usermanual", "kw":"Upgrading the ICAgent,ICAgent Management,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Upgrading the ICAgent", "githuburl":"" }, { "uri":"aom_02_0014.html", + "node_id":"aom_02_0014.xml", "product_code":"aom", - "code":"59", + "code":"70", "des":"If the ICAgent on a server is uninstalled, server O&M will be affected, making AOM functions unavailable. Exercise caution when performing this operation.You can uninstal", "doc_type":"usermanual", "kw":"Uninstalling the ICAgent,ICAgent Management,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Uninstalling the ICAgent", "githuburl":"" }, { "uri":"aom_02_0087.html", + "node_id":"aom_02_0087.xml", "product_code":"aom", - "code":"60", + "code":"71", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Log Configuration", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Log Configuration", "githuburl":"" }, { "uri":"aom_02_0024.html", + "node_id":"aom_02_0024.xml", "product_code":"aom", - "code":"61", + "code":"72", "des":"The default log retention period is 7 days and can be changed as required (maximum: 30 days).", "doc_type":"usermanual", "kw":"Setting the Log Quota,Log Configuration,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Setting the Log Quota", "githuburl":"" }, { "uri":"aom_02_0082.html", + "node_id":"aom_02_0082.xml", "product_code":"aom", - "code":"62", + "code":"73", "des":"AOM enables you to divide the log content into multiple words for search by configuring delimiters. By default, AOM provides the following delimiters:If default delimiter", "doc_type":"usermanual", "kw":"Configuring Delimiters,Log Configuration,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual" + } + ], "title":"Configuring Delimiters", "githuburl":"" }, { "uri":"aom_02_008201.html", + "node_id":"aom_02_008201.xml", "product_code":"", - "code":"63", + "code":"74", "des":"You can enable or disable log collection as required to reduce memory, database, and disk space usage.Before enabling this function, ensure that you have installed the IC", "doc_type":"", "kw":"Setting Log Collection,Log Configuration,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Setting Log Collection", "githuburl":"" }, { "uri":"aom_02_008202.html", + "node_id":"aom_02_008202.xml", "product_code":"", - "code":"64", + "code":"75", "des":"Earlier metrics will be deleted when the metric quota is exceeded.", "doc_type":"", "kw":"Quota Configuration,Configuration Management,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Quota Configuration", "githuburl":"" }, { "uri":"aom_02_008203.html", + "node_id":"aom_02_008203.xml", "product_code":"", - "code":"65", - "des":"Metric Collection determines whether to collect metrics (excluding SLA and custom metrics).Before enabling this function, ensure that you have installed the ICAgent on an", + "code":"76", + "des":"You can determine whether to enable Metric Collection to collect metrics (excluding SLA and custom metrics).Before enabling this function, ensure that you have installed ", "doc_type":"", "kw":"Metric Configuration,Configuration Management,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Metric Configuration", "githuburl":"" }, { "uri":"aom_02_1013.html", + "node_id":"aom_02_1013.xml", "product_code":"", - "code":"66", + "code":"77", "des":"AOM allows you to subscribe to metrics or alarms. After the subscription, data can be forwarded to custom Kafka or Distributed Message Service (DMS) topics for you to ret", "doc_type":"", "kw":"Data Subscription,Configuration Management,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Data Subscription", "githuburl":"" }, { "uri":"aom_02_0114.html", + "node_id":"aom_02_0114.xml", "product_code":"", - "code":"67", + "code":"78", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"", "kw":"Auditing", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Auditing", "githuburl":"" }, { "uri":"aom_02_0115.html", + "node_id":"aom_02_0115.xml", "product_code":"", - "code":"68", + "code":"79", "des":"AOM is a one-stop O&M platform that monitors applications and resources in real time. By analyzing dozens of metrics and correlation between alarms and logs, AOM helps O&", "doc_type":"", "kw":"Operations Logged by CTS,Auditing,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Operations Logged by CTS", "githuburl":"" }, { "uri":"aom_02_0116.html", - "product_code":"", - "code":"69", - "des":"For details, seeQuerying Real-Time Traces.", - "doc_type":"", - "kw":"Viewing Audit Logs,Auditing,User Guide", - "title":"Viewing Audit Logs", + "node_id":"aom_02_0116.xml", + "product_code":"aom", + "code":"80", + "des":"After you enable CTS and the management tracker is created, CTS starts recording operations on cloud resources. CTS stores operation records generated in the last seven d", + "doc_type":"usermanual", + "kw":"Querying Real-Time Traces,Auditing,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual", + "IsMulti":"yes", + "IsBot":"yes" + } + ], + "title":"Querying Real-Time Traces", "githuburl":"" }, { "uri":"aom_02_0112.html", + "node_id":"aom_02_0112.xml", "product_code":"", - "code":"70", - "des":"This section describes how to migrate data from AOM 1.0 to AOM 2.0. Currently, only collector, and alarm rule upgrades are supported.Collector UpgradeAfter the collector ", + "code":"81", + "des":"This section describes how to migrate data from AOM 1.0 to AOM 2.0. Currently, only alarm rule and collector upgrades are supported.Collector UpgradeAfter the upgrade, th", "doc_type":"", "kw":"Upgrading to AOM 2.0,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], "title":"Upgrading to AOM 2.0", "githuburl":"" }, { "uri":"aom_02_1101.html", + "node_id":"aom_02_1101.xml", "product_code":"aom", - "code":"71", + "code":"82", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"FAQs", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual", + "IsMulti":"Yes", + "opensource":"true" + } + ], "title":"FAQs", "githuburl":"" }, { "uri":"aom_03_0021.html", + "node_id":"aom_03_0021.xml", "product_code":"aom", - "code":"72", + "code":"83", "des":"After you create resources such as hosts, applications, components, and processes, the ICAgent reports their monitoring data every 10 minutes. Only when a report period e", "doc_type":"usermanual", "kw":"User FAQs,FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"User FAQs", "githuburl":"" }, { "uri":"aom_03_0017.html", + "node_id":"aom_03_0017.xml", "product_code":"aom", - "code":"73", + "code":"84", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Consultation FAQs", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"Consultation FAQs", "githuburl":"" }, { "uri":"aom_03_0002.html", + "node_id":"aom_03_0002.xml", "product_code":"aom", - "code":"74", + "code":"85", "des":"AOM supports multiple operating systems (OSs). When creating a host, ensure that its OS meets the requirements in Table 1. Otherwise, the host cannot be monitored by AOM.", "doc_type":"usermanual", "kw":"What Are the Usage Restrictions of AOM?,Consultation FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"What Are the Usage Restrictions of AOM?", "githuburl":"" }, { "uri":"aom_03_0005.html", + "node_id":"aom_03_0005.xml", "product_code":"aom", - "code":"75", - "des":"Both alarms and events are the information reported to AOM when the status of AOM or an external service, such as Cloud Container Engine (CCE) changes.Alarms are reported", + "code":"86", + "des":"Both alarms and events are the information reported to AOM when the status of AOM or an external service (such as CCE) changes.Alarms are reported when AOM or an external", "doc_type":"usermanual", "kw":"How Do I Distinguish Alarms from Events?,Consultation FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"How Do I Distinguish Alarms from Events?", "githuburl":"" }, { "uri":"aom_03_0009.html", + "node_id":"aom_03_0009.xml", "product_code":"aom", - "code":"76", + "code":"87", "des":"For Application Operations Management (AOM), a maximum of 1440 data points can be returned for a single metric query. The relationship between the time range and statisti", "doc_type":"usermanual", "kw":"What Is the Relationship Between the Time Range and Statistical Cycle?,Consultation FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"What Is the Relationship Between the Time Range and Statistical Cycle?", "githuburl":"" }, { "uri":"aom_03_0014.html", + "node_id":"aom_03_0014.xml", "product_code":"aom", - "code":"77", + "code":"88", "des":"The logs displayed on Application Operations Management (AOM) are near real-time logs, of which the latency is in seconds.There is a time interval between log collection ", "doc_type":"usermanual", "kw":"Does AOM Display Logs in Real Time?,Consultation FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"Does AOM Display Logs in Real Time?", "githuburl":"" }, { "uri":"aom_03_0018.html", + "node_id":"aom_03_0018.xml", "product_code":"aom", - "code":"78", + "code":"89", "des":"No.", "doc_type":"usermanual", "kw":"Will Container Logs Be Deleted After They Are Dumped?,Consultation FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"Will Container Logs Be Deleted After They Are Dumped?", "githuburl":"" }, { "uri":"aom_03_0025.html", + "node_id":"aom_03_0025.xml", "product_code":"aom", - "code":"79", + "code":"90", "des":"Different Virtual Private Clouds (VPCs) cannot communicate with each other. To solve this problem, create an application in the VPC where the data subscription applicatio", "doc_type":"usermanual", "kw":"Why Are Connection Channels Required?,Consultation FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"Why Are Connection Channels Required?", "githuburl":"" }, { "uri":"aom_03_0006.html", + "node_id":"aom_03_0006.xml", "product_code":"aom", - "code":"80", + "code":"91", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Usage FAQs", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"Usage FAQs", "githuburl":"" }, { "uri":"aom_03_0010.html", + "node_id":"aom_03_0010.xml", "product_code":"aom", - "code":"81", + "code":"92", "des":"The resource status includes Normal, Warning, Alarm, and Silent. Warning, Alarm, or Silent may result in resource exceptions. You can analyze and rectify exceptions based", "doc_type":"usermanual", "kw":"What Can I Do If Resources Are Not Running Properly?,Usage FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"What Can I Do If Resources Are Not Running Properly?", "githuburl":"" }, { "uri":"aom_03_0012.html", + "node_id":"aom_03_0012.xml", "product_code":"aom", - "code":"82", + "code":"93", "des":"AOM provides an automatic logout mechanism to secure customer information. Specifically, after you access a page on the console but do not perform any operations within 1", "doc_type":"usermanual", "kw":"How Do I Set the Full-Screen Online Duration?,Usage FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"How Do I Set the Full-Screen Online Duration?", "githuburl":"" }, { "uri":"aom_03_0015.html", + "node_id":"aom_03_0015.xml", "product_code":"aom", - "code":"83", + "code":"94", "des":"Each user can create a maximum of two Access Key ID/Secret Access Key (AK/SK) pairs. Once they are generated, they are permanently valid.AK: unique ID associated with the", "doc_type":"usermanual", "kw":"How Do I Obtain an AK/SK?,Usage FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"How Do I Obtain an AK/SK?", "githuburl":"" }, { "uri":"aom_03_0020.html", + "node_id":"aom_03_0020.xml", "product_code":"aom", - "code":"84", + "code":"95", "des":"Log in to the Application Operations Management (AOM) console, choose Container Monitoring in the navigation pane, and check the service status value at each time point i", "doc_type":"usermanual", "kw":"How Can I Check Whether a Service Is Available?,Usage FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"How Can I Check Whether a Service Is Available?", "githuburl":"" }, { "uri":"aom_03_0022.html", + "node_id":"aom_03_0022.xml", "product_code":"aom", - "code":"85", + "code":"96", "des":"When you create an alarm rule for a resource, its data reported to AOM may be insufficient, as shown in the following figure.Possible causes:The data reporting latency is", "doc_type":"usermanual", "kw":"Why Is the Status of an Alarm Rule Displayed as \"Insufficient\"?,Usage FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"Why Is the Status of an Alarm Rule Displayed as \"Insufficient\"?", "githuburl":"" }, { "uri":"aom_03_0023.html", + "node_id":"aom_03_0023.xml", "product_code":"aom", - "code":"86", + "code":"97", "des":"A workload runs normally on Cloud Container Engine (CCE), but its status is Abnormal on the AOM page.Possible causes:The ICAgent version is too old.ICAgent needs to be up", "doc_type":"usermanual", "kw":"Why the Status of a Workload that Runs Normally Is Displayed as \"Abnormal\" on the AOM Page?,Usage FA", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"Why the Status of a Workload that Runs Normally Is Displayed as \"Abnormal\" on the AOM Page?", "githuburl":"" }, { "uri":"aom_03_0024.html", + "node_id":"aom_03_0024.xml", "product_code":"aom", - "code":"87", + "code":"98", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"How Do I Create the apm_admin_trust Agency?,Usage FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"How Do I Create the apm_admin_trust Agency?", "githuburl":"" }, { "uri":"aom_04_1100.html", + "node_id":"aom_04_1100.xml", "product_code":"aom", - "code":"88", + "code":"99", "des":"After an ICAgent is installed, its status is offline.Cause: The AK/SK are incorrect or ports 30200 and 30201 are disconnected.Impact: The ICAgent cannot work.If no comman", "doc_type":"usermanual", "kw":"What Can I Do If an ICAgent Is Offline?,Usage FAQs,User Guide", + "search_title":"", + "metedata":[ + { + "IsBot":"Yes", + "prodname":"aom", + "IsMulti":"Yes", + "documenttype":"usermanual", + "opensource":"true" + } + ], "title":"What Can I Do If an ICAgent Is Offline?", "githuburl":"" }, + { + "uri":"aom_03_0037.html", + "node_id":"aom_03_0037.xml", + "product_code":"", + "code":"100", + "des":"During ICAgent installation, the system displays the message \"no crontab for root\".When you execute the script for installing an ICAgent, crontab scheduled tasks will als", + "doc_type":"", + "kw":"Why Is \"no crontab for root\" Displayed During ICAgent Installation?,Usage FAQs,User Guide", + "search_title":"", + "metedata":[ + { + + } + ], + "title":"Why Is \"no crontab for root\" Displayed During ICAgent Installation?", + "githuburl":"" + }, { "uri":"aom_02_1011.html", + "node_id":"aom_02_1011.xml", "product_code":"aom", - "code":"89", + "code":"101", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Change History,User Guide", + "search_title":"", + "metedata":[ + { + "prodname":"aom", + "documenttype":"usermanual", + "IsMulti":"Yes", + "opensource":"true" + } + ], "title":"Change History", "githuburl":"" } diff --git a/docs/aom/umn/CLASS.TXT.json b/docs/aom/umn/CLASS.TXT.json index 152b9351..1c2e286a 100644 --- a/docs/aom/umn/CLASS.TXT.json +++ b/docs/aom/umn/CLASS.TXT.json @@ -234,7 +234,7 @@ "code":"26" }, { - "desc":"This chapter describes how to use Identity and Access Management (IAM) for fine-grained permissions control for your Application Operations Management (AOM) resources. Wi", + "desc":"This chapter describes how to use Identity and Access Management (IAM) for fine-grained permissions control for your AOM resources. With IAM, you can:Create IAM users for", "product_code":"aom", "title":"Creating a User and Granting Permissions", "uri":"aom_02_0090.html", @@ -261,7 +261,7 @@ "code":"29" }, { - "desc":"ICAgent is used to collect metrics, logs, and application performance data. For servers that are directly purchased on the Elastic Cloud Server (ECS) or Bare Metal Server", + "desc":"ICAgents collect metrics, logs, and application performance data in real time. For hosts purchased from the ECS or BMS console, you need to manually install the ICAgent. ", "product_code":"aom", "title":"Installing an ICAgent", "uri":"aom_02_002301.html", @@ -333,7 +333,7 @@ "code":"37" }, { - "desc":"By setting alarms rules, you can define threshold conditions for resource metrics. A threshold alarm is generated when the metric data of a resource meets the threshold c", + "desc":"By setting alarms rules, you can define event conditions for services or threshold conditions for resource metrics. If the resource data of a service meets the event cond", "product_code":"aom", "title":"Overview", "uri":"aom_02_0062.html", @@ -342,13 +342,22 @@ "code":"38" }, { - "desc":"You can set threshold conditions for resource metrics by setting threshold rules. If a metric value meets the threshold condition, a threshold alarm will be generated. If", + "desc":"When creating alarm rules, you can set alarm tags and annotations. Tags are attributes that can be used to identify alarms. They are applied to the alarm noise reduction ", + "product_code":"aom", + "title":"Alarm Tags and Annotations", + "uri":"aom_02_0113.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"39" + }, + { + "desc":"You can set threshold conditions for resource metrics by setting threshold rules. If a metric value meets a threshold condition, a threshold alarm will be reported. If th", "product_code":"aom", "title":"Creating a Threshold Rule", "uri":"aom_02_0060.html", "doc_type":"usermanual", "p_code":"37", - "code":"39" + "code":"40" }, { "desc":"Ensure that a static threshold template is available if you want to create threshold rules based on a template.You can create a maximum of 50 static threshold templates. ", @@ -357,7 +366,16 @@ "uri":"aom_02_0063.html", "doc_type":"usermanual", "p_code":"37", - "code":"40" + "code":"41" + }, + { + "desc":"You can set event conditions for services by setting event alarm rules. When the resource data meets an event condition, an event alarm is generated.If you want to receiv", + "product_code":"aom", + "title":"Creating an Event Alarm Rule", + "uri":"aom_02_0061.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"42" }, { "desc":"Set a time range to view alarms. There are two methods to set a time range:Method 1: Use the predefined time label, such as Last 1 hour, Last 6 hours, or Last 1 day. Sele", @@ -366,7 +384,7 @@ "uri":"aom_02_0004.html", "doc_type":"usermanual", "p_code":"36", - "code":"41" + "code":"43" }, { "desc":"Events generally carry some important information, informing you of the changes of AOM or an external service. Such changes do not necessarily cause exceptions. Events do", @@ -375,7 +393,88 @@ "uri":"aom_02_0045.html", "doc_type":"usermanual", "p_code":"36", - "code":"42" + "code":"44" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"aom", + "title":"Alarm Action Rules", + "uri":"aom_02_0925.html", + "doc_type":"usermanual", + "p_code":"36", + "code":"45" + }, + { + "desc":"AOM allows you to customize alarm action rules. You can create an alarm action rule to associate an SMN topic with a message template. You can also customize notification", + "product_code":"aom", + "title":"Overview", + "uri":"aom_02_0933.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"46" + }, + { + "desc":"A topic has been created.A topic policy has been set.A subscriber, that is, an email or SMS message recipient has been added to the topic.You can create a maximum of 1000", + "product_code":"aom", + "title":"Creating an Alarm Action Rule", + "uri":"aom_02_0926.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"47" + }, + { + "desc":"You can create message templates to customize notifications. When a preset notification rule is triggered, notifications can be sent to specified personnel by emails, SMS", + "product_code":"aom", + "title":"Creating a Message Template", + "uri":"aom_02_0927.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"48" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"aom", + "title":"Alarm Noise Reduction", + "uri":"aom_02_0950.html", + "doc_type":"usermanual", + "p_code":"36", + "code":"49" + }, + { + "desc":"AOM supports alarm noise reduction. Alarms can be processed based on the alarm noise reduction rules to prevent notification storms.Alarm noise reduction consists of four", + "product_code":"aom", + "title":"Overview", + "uri":"aom_02_0951.html", + "doc_type":"usermanual", + "p_code":"49", + "code":"50" + }, + { + "desc":"You can filter alarm subsets and then group them based on the grouping conditions. Alarms in the same group are aggregated to trigger one notification.As shown in Figure ", + "product_code":"aom", + "title":"Creating a Grouping Rule", + "uri":"aom_02_0952.html", + "doc_type":"usermanual", + "p_code":"49", + "code":"51" + }, + { + "desc":"By using suppression rules, you can suppress or block notifications related to specific alarms. For example, when a major alarm is generated, less severe alarms can be su", + "product_code":"aom", + "title":"Creating a Suppression Rule", + "uri":"aom_02_0953.html", + "doc_type":"usermanual", + "p_code":"49", + "code":"52" + }, + { + "desc":"You can shield alarm notifications in a specified period. A silence rule takes effect immediately after it is created.You can create up to 100 silence rules.After creatin", + "product_code":"aom", + "title":"Creating a Silence Rule", + "uri":"aom_02_0954.html", + "doc_type":"usermanual", + "p_code":"49", + "code":"53" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -384,7 +483,7 @@ "uri":"aom_02_0048.html", "doc_type":"usermanual", "p_code":"", - "code":"43" + "code":"54" }, { "desc":"An application is a group of identical or similar components divided based on service requirements. Applications are categorized into system applications and custom appli", @@ -392,8 +491,8 @@ "title":"Application Monitoring", "uri":"aom_02_0049.html", "doc_type":"usermanual", - "p_code":"43", - "code":"44" + "p_code":"54", + "code":"55" }, { "desc":"Components refer to the services that you deploy, including containers and common processes. For example, a workload on the Cloud Container Engine (CCE) is a component, a", @@ -401,8 +500,8 @@ "title":"Component Monitoring", "uri":"aom_02_0007.html", "doc_type":"usermanual", - "p_code":"43", - "code":"45" + "p_code":"54", + "code":"56" }, { "desc":"Hosts include the Elastic Cloud Server (ECS) and Bare Metal Server (BMS). AOM monitors the hosts purchased during Cloud Container Engine (CCE) cluster creation and those ", @@ -410,8 +509,8 @@ "title":"Host Monitoring", "uri":"aom_02_0008.html", "doc_type":"usermanual", - "p_code":"43", - "code":"46" + "p_code":"54", + "code":"57" }, { "desc":"Container and component monitoring differs in their monitored objects. For component monitoring, workloads deployed using Cloud Container Engine (CCE), and components dep", @@ -419,8 +518,8 @@ "title":"Container Monitoring", "uri":"aom_02_0051.html", "doc_type":"usermanual", - "p_code":"43", - "code":"47" + "p_code":"54", + "code":"58" }, { "desc":"The Metric Monitoring page displays metric data of each resource. You can monitor metric values and trends in real time, and create threshold rules for desired metrics. I", @@ -428,8 +527,8 @@ "title":"Metric Monitoring", "uri":"aom_02_0017.html", "doc_type":"usermanual", - "p_code":"43", - "code":"48" + "p_code":"54", + "code":"59" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -438,7 +537,7 @@ "uri":"aom_02_0054.html", "doc_type":"usermanual", "p_code":"", - "code":"49" + "code":"60" }, { "desc":"AOM enables you to quickly query logs, and locate faults based on log sources and contexts.You can search for logs by component, system, or host.For component logs, you c", @@ -446,8 +545,8 @@ "title":"Searching for Logs", "uri":"aom_02_0009.html", "doc_type":"usermanual", - "p_code":"49", - "code":"50" + "p_code":"60", + "code":"61" }, { "desc":"You can quickly view log files of component instances to locate faults.The time information contained in a log file, if any, is automatically displayed, as shown in the r", @@ -455,8 +554,8 @@ "title":"Viewing Log Files", "uri":"aom_02_0010.html", "doc_type":"usermanual", - "p_code":"49", - "code":"51" + "p_code":"60", + "code":"62" }, { "desc":"A log bucket is a logical group of log files. Before using functions such as Viewing Bucket Logs, ensure that a log bucket has been created.You can add up to 500 log file", @@ -464,8 +563,8 @@ "title":"Adding Log Buckets", "uri":"aom_02_0079.html", "doc_type":"usermanual", - "p_code":"49", - "code":"52" + "p_code":"60", + "code":"63" }, { "desc":"AOM supports fine-grained log query. That is, you can view logs by bucket to obtain key service data and quickly locate problems.Before viewing bucket logs, ensure that y", @@ -473,8 +572,8 @@ "title":"Viewing Bucket Logs", "uri":"aom_02_0083.html", "doc_type":"usermanual", - "p_code":"49", - "code":"53" + "p_code":"60", + "code":"64" }, { "desc":"AOM enables you to dump logs to Object Storage Service (OBS) buckets for long-term storage. To store logs for a longer time, add log dumps.AOM offers periodical dump and ", @@ -482,8 +581,8 @@ "title":"Adding Log Dumps", "uri":"aom_02_0080.html", "doc_type":"usermanual", - "p_code":"49", - "code":"54" + "p_code":"60", + "code":"65" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -492,7 +591,7 @@ "uri":"aom_02_001101.html", "doc_type":"usermanual", "p_code":"", - "code":"55" + "code":"66" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -500,17 +599,17 @@ "title":"ICAgent Management", "uri":"aom_02_0011.html", "doc_type":"usermanual", - "p_code":"55", - "code":"56" + "p_code":"66", + "code":"67" }, { - "desc":"ICAgent is used to collect metrics, logs, and application performance data. For servers that are directly purchased on the Elastic Cloud Server (ECS) or Bare Metal Server", + "desc":"ICAgents collect metrics, logs, and application performance data in real time. For hosts purchased from the ECS or BMS console, you need to manually install the ICAgent. ", "product_code":"aom", "title":"Installing an ICAgent", "uri":"aom_02_0012.html", "doc_type":"usermanual", - "p_code":"56", - "code":"57" + "p_code":"67", + "code":"68" }, { "desc":"To ensure better collection experience, AOM will continuously upgrade ICAgent versions. When the system displays a message indicating that a new ICAgent version is availa", @@ -518,8 +617,8 @@ "title":"Upgrading the ICAgent", "uri":"aom_02_0013.html", "doc_type":"usermanual", - "p_code":"56", - "code":"58" + "p_code":"67", + "code":"69" }, { "desc":"If the ICAgent on a server is uninstalled, server O&M will be affected, making AOM functions unavailable. Exercise caution when performing this operation.You can uninstal", @@ -527,8 +626,8 @@ "title":"Uninstalling the ICAgent", "uri":"aom_02_0014.html", "doc_type":"usermanual", - "p_code":"56", - "code":"59" + "p_code":"67", + "code":"70" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -536,8 +635,8 @@ "title":"Log Configuration", "uri":"aom_02_0087.html", "doc_type":"usermanual", - "p_code":"55", - "code":"60" + "p_code":"66", + "code":"71" }, { "desc":"The default log retention period is 7 days and can be changed as required (maximum: 30 days).", @@ -545,8 +644,8 @@ "title":"Setting the Log Quota", "uri":"aom_02_0024.html", "doc_type":"usermanual", - "p_code":"60", - "code":"61" + "p_code":"71", + "code":"72" }, { "desc":"AOM enables you to divide the log content into multiple words for search by configuring delimiters. By default, AOM provides the following delimiters:If default delimiter", @@ -554,8 +653,8 @@ "title":"Configuring Delimiters", "uri":"aom_02_0082.html", "doc_type":"usermanual", - "p_code":"60", - "code":"62" + "p_code":"71", + "code":"73" }, { "desc":"You can enable or disable log collection as required to reduce memory, database, and disk space usage.Before enabling this function, ensure that you have installed the IC", @@ -563,8 +662,8 @@ "title":"Setting Log Collection", "uri":"aom_02_008201.html", "doc_type":"usermanual", - "p_code":"60", - "code":"63" + "p_code":"71", + "code":"74" }, { "desc":"Earlier metrics will be deleted when the metric quota is exceeded.", @@ -572,17 +671,17 @@ "title":"Quota Configuration", "uri":"aom_02_008202.html", "doc_type":"usermanual", - "p_code":"55", - "code":"64" + "p_code":"66", + "code":"75" }, { - "desc":"Metric Collection determines whether to collect metrics (excluding SLA and custom metrics).Before enabling this function, ensure that you have installed the ICAgent on an", + "desc":"You can determine whether to enable Metric Collection to collect metrics (excluding SLA and custom metrics).Before enabling this function, ensure that you have installed ", "product_code":"aom", "title":"Metric Configuration", "uri":"aom_02_008203.html", "doc_type":"usermanual", - "p_code":"55", - "code":"65" + "p_code":"66", + "code":"76" }, { "desc":"AOM allows you to subscribe to metrics or alarms. After the subscription, data can be forwarded to custom Kafka or Distributed Message Service (DMS) topics for you to ret", @@ -590,8 +689,8 @@ "title":"Data Subscription", "uri":"aom_02_1013.html", "doc_type":"usermanual", - "p_code":"55", - "code":"66" + "p_code":"66", + "code":"77" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -600,7 +699,7 @@ "uri":"aom_02_0114.html", "doc_type":"usermanual", "p_code":"", - "code":"67" + "code":"78" }, { "desc":"AOM is a one-stop O&M platform that monitors applications and resources in real time. By analyzing dozens of metrics and correlation between alarms and logs, AOM helps O&", @@ -608,26 +707,26 @@ "title":"Operations Logged by CTS", "uri":"aom_02_0115.html", "doc_type":"usermanual", - "p_code":"67", - "code":"68" + "p_code":"78", + "code":"79" }, { - "desc":"For details, seeQuerying Real-Time Traces.", + "desc":"After you enable CTS and the management tracker is created, CTS starts recording operations on cloud resources. CTS stores operation records generated in the last seven d", "product_code":"aom", - "title":"Viewing Audit Logs", + "title":"Querying Real-Time Traces", "uri":"aom_02_0116.html", "doc_type":"usermanual", - "p_code":"67", - "code":"69" + "p_code":"78", + "code":"80" }, { - "desc":"This section describes how to migrate data from AOM 1.0 to AOM 2.0. Currently, only collector, and alarm rule upgrades are supported.Collector UpgradeAfter the collector ", + "desc":"This section describes how to migrate data from AOM 1.0 to AOM 2.0. Currently, only alarm rule and collector upgrades are supported.Collector UpgradeAfter the upgrade, th", "product_code":"aom", "title":"Upgrading to AOM 2.0", "uri":"aom_02_0112.html", "doc_type":"usermanual", "p_code":"", - "code":"70" + "code":"81" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -636,7 +735,7 @@ "uri":"aom_02_1101.html", "doc_type":"usermanual", "p_code":"", - "code":"71" + "code":"82" }, { "desc":"After you create resources such as hosts, applications, components, and processes, the ICAgent reports their monitoring data every 10 minutes. Only when a report period e", @@ -644,8 +743,8 @@ "title":"User FAQs", "uri":"aom_03_0021.html", "doc_type":"usermanual", - "p_code":"71", - "code":"72" + "p_code":"82", + "code":"83" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -653,8 +752,8 @@ "title":"Consultation FAQs", "uri":"aom_03_0017.html", "doc_type":"usermanual", - "p_code":"71", - "code":"73" + "p_code":"82", + "code":"84" }, { "desc":"AOM supports multiple operating systems (OSs). When creating a host, ensure that its OS meets the requirements in Table 1. Otherwise, the host cannot be monitored by AOM.", @@ -662,17 +761,17 @@ "title":"What Are the Usage Restrictions of AOM?", "uri":"aom_03_0002.html", "doc_type":"usermanual", - "p_code":"73", - "code":"74" + "p_code":"84", + "code":"85" }, { - "desc":"Both alarms and events are the information reported to AOM when the status of AOM or an external service, such as Cloud Container Engine (CCE) changes.Alarms are reported", + "desc":"Both alarms and events are the information reported to AOM when the status of AOM or an external service (such as CCE) changes.Alarms are reported when AOM or an external", "product_code":"aom", "title":"How Do I Distinguish Alarms from Events?", "uri":"aom_03_0005.html", "doc_type":"usermanual", - "p_code":"73", - "code":"75" + "p_code":"84", + "code":"86" }, { "desc":"For Application Operations Management (AOM), a maximum of 1440 data points can be returned for a single metric query. The relationship between the time range and statisti", @@ -680,8 +779,8 @@ "title":"What Is the Relationship Between the Time Range and Statistical Cycle?", "uri":"aom_03_0009.html", "doc_type":"usermanual", - "p_code":"73", - "code":"76" + "p_code":"84", + "code":"87" }, { "desc":"The logs displayed on Application Operations Management (AOM) are near real-time logs, of which the latency is in seconds.There is a time interval between log collection ", @@ -689,8 +788,8 @@ "title":"Does AOM Display Logs in Real Time?", "uri":"aom_03_0014.html", "doc_type":"usermanual", - "p_code":"73", - "code":"77" + "p_code":"84", + "code":"88" }, { "desc":"No.", @@ -698,8 +797,8 @@ "title":"Will Container Logs Be Deleted After They Are Dumped?", "uri":"aom_03_0018.html", "doc_type":"usermanual", - "p_code":"73", - "code":"78" + "p_code":"84", + "code":"89" }, { "desc":"Different Virtual Private Clouds (VPCs) cannot communicate with each other. To solve this problem, create an application in the VPC where the data subscription applicatio", @@ -707,8 +806,8 @@ "title":"Why Are Connection Channels Required?", "uri":"aom_03_0025.html", "doc_type":"usermanual", - "p_code":"73", - "code":"79" + "p_code":"84", + "code":"90" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -716,8 +815,8 @@ "title":"Usage FAQs", "uri":"aom_03_0006.html", "doc_type":"usermanual", - "p_code":"71", - "code":"80" + "p_code":"82", + "code":"91" }, { "desc":"The resource status includes Normal, Warning, Alarm, and Silent. Warning, Alarm, or Silent may result in resource exceptions. You can analyze and rectify exceptions based", @@ -725,8 +824,8 @@ "title":"What Can I Do If Resources Are Not Running Properly?", "uri":"aom_03_0010.html", "doc_type":"usermanual", - "p_code":"80", - "code":"81" + "p_code":"91", + "code":"92" }, { "desc":"AOM provides an automatic logout mechanism to secure customer information. Specifically, after you access a page on the console but do not perform any operations within 1", @@ -734,8 +833,8 @@ "title":"How Do I Set the Full-Screen Online Duration?", "uri":"aom_03_0012.html", "doc_type":"usermanual", - "p_code":"80", - "code":"82" + "p_code":"91", + "code":"93" }, { "desc":"Each user can create a maximum of two Access Key ID/Secret Access Key (AK/SK) pairs. Once they are generated, they are permanently valid.AK: unique ID associated with the", @@ -743,8 +842,8 @@ "title":"How Do I Obtain an AK/SK?", "uri":"aom_03_0015.html", "doc_type":"usermanual", - "p_code":"80", - "code":"83" + "p_code":"91", + "code":"94" }, { "desc":"Log in to the Application Operations Management (AOM) console, choose Container Monitoring in the navigation pane, and check the service status value at each time point i", @@ -752,8 +851,8 @@ "title":"How Can I Check Whether a Service Is Available?", "uri":"aom_03_0020.html", "doc_type":"usermanual", - "p_code":"80", - "code":"84" + "p_code":"91", + "code":"95" }, { "desc":"When you create an alarm rule for a resource, its data reported to AOM may be insufficient, as shown in the following figure.Possible causes:The data reporting latency is", @@ -761,8 +860,8 @@ "title":"Why Is the Status of an Alarm Rule Displayed as \"Insufficient\"?", "uri":"aom_03_0022.html", "doc_type":"usermanual", - "p_code":"80", - "code":"85" + "p_code":"91", + "code":"96" }, { "desc":"A workload runs normally on Cloud Container Engine (CCE), but its status is Abnormal on the AOM page.Possible causes:The ICAgent version is too old.ICAgent needs to be up", @@ -770,8 +869,8 @@ "title":"Why the Status of a Workload that Runs Normally Is Displayed as \"Abnormal\" on the AOM Page?", "uri":"aom_03_0023.html", "doc_type":"usermanual", - "p_code":"80", - "code":"86" + "p_code":"91", + "code":"97" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -779,8 +878,8 @@ "title":"How Do I Create the apm_admin_trust Agency?", "uri":"aom_03_0024.html", "doc_type":"usermanual", - "p_code":"80", - "code":"87" + "p_code":"91", + "code":"98" }, { "desc":"After an ICAgent is installed, its status is offline.Cause: The AK/SK are incorrect or ports 30200 and 30201 are disconnected.Impact: The ICAgent cannot work.If no comman", @@ -788,8 +887,17 @@ "title":"What Can I Do If an ICAgent Is Offline?", "uri":"aom_04_1100.html", "doc_type":"usermanual", - "p_code":"80", - "code":"88" + "p_code":"91", + "code":"99" + }, + { + "desc":"During ICAgent installation, the system displays the message \"no crontab for root\".When you execute the script for installing an ICAgent, crontab scheduled tasks will als", + "product_code":"aom", + "title":"Why Is \"no crontab for root\" Displayed During ICAgent Installation?", + "uri":"aom_03_0037.html", + "doc_type":"usermanual", + "p_code":"91", + "code":"100" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -798,6 +906,6 @@ "uri":"aom_02_1011.html", "doc_type":"usermanual", "p_code":"", - "code":"89" + "code":"101" } ] \ No newline at end of file diff --git a/docs/aom/umn/aom_00_0001.html b/docs/aom/umn/aom_00_0001.html index e2c06acf..d5bb15bd 100644 --- a/docs/aom/umn/aom_00_0001.html +++ b/docs/aom/umn/aom_00_0001.html @@ -6,7 +6,7 @@
Create IAM users for employees based on the organizational structure of your enterprise, and grant different access permissions to them.
A host corresponds to a VM, for example, Elastic Cloud Server (ECS), or a physical machine, for example, Bare Metal Server (BMS). A host can be directly created on the ECS or BMS console, or indirectly created on the Cloud Container Engine (CCE) console.
An ICAgent is a collector of AOM. It collects metrics, logs, and application performance data in real time. For hosts created on the ECS or BMS console, install the ICAgent manually. For hosts created on the CCE console, the ICAgent is automatically installed.
-Connect applications on the host to AOM for monitoring. For the applications that meet built-in application discovery rules, they will be automatically discovered after the ICAgent is installed. For those that do not meet built-in rules, custom your own rules.
+Connect applications on the host to AOM for monitoring. For the applications that meet built-in application discovery rules, they will be automatically discovered after the ICAgent is installed. For those that do not meet built-in rules, custom your own rules.
To use AOM to monitor host logs, configure a log collection path first.
Use AOM functions such as , and alarm management to perform routine O&M.
This section describes how to install an ICAgent on an ECS and monitor its resources on the AOM console.
Ensure that the AK/SK are correct. Otherwise, the ICAgent cannot be installed.
-Specifically, log in to the ECS console, click Remote Login in the Operation column of the target ECS, and then log in to the ECS as the root user.
-On the ECS page, click Copy & Paste. On the page that is displayed, press Ctrl+V to paste the ICAgent installation command obtained in 3, and click Send to send the command to the CLI, as shown in the following figure. In the CLI, press Enter to run the ICAgent installation command.
-Specifically, log in to the ECS console, click Remote Login in the Operation column of the target ECS, and then log in to the ECS as the root user.
+On the ECS page, click Copy & Paste. On the page that is displayed, press Ctrl+V to paste the ICAgent installation command obtained in 3, and click Send to send the command to the CLI, as shown in the following figure. In the CLI, press Enter to run the ICAgent installation command.
+After the ICAgent is installed, wait for about 1–2 minutes. Then, in the navigation pane, choose Overview > O&M to monitor the ECS.
Set the full-screen online duration
For example, if you enter 2 in the text box, the login page is automatically displayed 2 hours later.
+For example, if you enter 2 in the text box, the login page is automatically displayed 2 hours later.
Edit
Choose Edit, Copy, Delete, and View Larger (only a line graph can be enlarged) from the Operation column. The Time Select option is available only in a line graph. This option allows you to set a temporary time range and statistical cycle so that you can view the resource data within a specified time range.
-In the dashboard, when resources such as hosts and components are deleted, graphs created for these resources are not automatically deleted. To improve system performance, manually delete unnecessary graphs.
In the host list, click Add alias in the Operation column.
A tag is the identifier of a host. You can manage and classify hosts by tag. After a tag is added, you can quickly identify, select, or search for a host.
In the host list, choose More > Add tags in the Operation column, enter a tag, and click and OK to add a tag. The Tags column of the host list is hidden by default. You can click
in the upper right corner and select or deselect Tags to show or hide tags.
In the host list, locate the target host and choose More > Sync Host Data in the Operation column to synchronize host data.
+In the host list, locate the target host and choose More > Sync Host Data in the Operation column to synchronize host data.
Hosts cannot be searched by alias.
ICAgent is used to collect metrics, logs, and application performance data. For servers that are directly purchased on the Elastic Cloud Server (ECS) or Bare Metal Server (BMS) console, manually install an ICAgent. For hosts purchased through Cloud Container Engine (CCE), an ICAgent is automatically installed.
+ICAgents collect metrics, logs, and application performance data in real time. For hosts purchased from the ECS or BMS console, you need to manually install the ICAgent. For hosts purchased from the CCE console, the ICAgent is automatically installed.
AOM and LTS use the same ICAgent functions. All metric data collected by ICAgents will be reported to AOM for analysis and processing. However, for logs, only those matching the latest log collection configuration in the system will be collected.
For example, if you configure log collection paths in AOM for ECSs, the previous LTS collection configurations of all ECSs under the resource set become invalid.
After you apply for a server and install an ICAgent for the first time, perform the following operations:
set +o history
+If an ICAgent has been installed on a server and the ICProbeAgent.zip installation package exists in the /opt/ICAgent/ directory of this server, use this method to install an ICAgent on a remote server with a few clicks.
bash /opt/oss/servicemgr/ICAgent/bin/remoteInstall/remote_install.sh -ip x.x.x.x
-Prerequisites
The IP addresses and passwords of all servers on which an ICAgent is to be installed have been collected, sorted in the iplist.cfg file, and uploaded to the /opt/ICAgent/ directory on the server where an ICAgent has been installed. The following is an example of the iplist.cfg file, where IP addresses and passwords are separated by spaces.
192.168.0.109 password (Set the password as required.)
-192.168.0.39 password (Set the password as required.)
+192.168.0.39 password (Set the password as required.)
Wait until the message All hosts install icagent finish. is displayed, which indicates that the ICAgent has been installed on all the hosts listed in the configuration file.
-ICAgent is used to collect metrics, logs, and application performance data. For servers that are directly purchased on the Elastic Cloud Server (ECS) or Bare Metal Server (BMS) console, manually install an ICAgent. For hosts purchased through Cloud Container Engine (CCE), an ICAgent is automatically installed.
+ICAgents collect metrics, logs, and application performance data in real time. For hosts purchased from the ECS or BMS console, you need to manually install the ICAgent. For hosts purchased from the CCE console, the ICAgent is automatically installed.
There are two methods to install an ICAgent. Note that the two methods are not applicable to container nodes created using CCE. For container nodes, you do not need to manually install an ICAgent. Instead, you only need to perform certain operations when creating clusters or deploying applications.
@@ -32,9 +32,9 @@After you apply for a server and install an ICAgent for the first time, perform the following operations:
set -o history
-set +o history
+set -o history
+AOM can collect and display VM logs. VM refers to an Elastic Cloud Server (ECS) or a Bare Metal Server (BMS) running Linux. To use this function, first configure a log collection path according to the following procedure.
-The ICAgent automatically scans the log files of your VM, and displays all the .log, .trace, or .out log files with handles and their paths on the page.
You can click in the Operation column to add a path automatically identified by the ICAgent to the log collection path list. To configure multiple paths, repeat this operation.
You can set threshold conditions for resource metrics by setting threshold rules. If a metric value meets the threshold condition, a threshold alarm will be generated. If no metric data is reported, an insufficient data event will be generated.
+You can set threshold conditions for resource metrics by setting threshold rules. If a metric value meets a threshold condition, a threshold alarm will be reported. If there is no metric data, an insufficient data event will be reported.
There are two creation methods: Directly Creating Threshold Rules and Using Templates to Create Threshold Rules. Only one rule is generated at a time. All resources are monitored using the same rule. To use the second method to create threshold rules, ensure that a static threshold template has been created according to Creating a Static Threshold Template.
Specifically, choose Monitoring > Metric Monitoring in the navigation pane. Then, click Add Metric and select Dimension or Resource for Add By. Select up to 12 metrics to monitor. Next, click in the Operation column. The system automatically switches to the threshold rule creation page and fills the Prometheus command for your metric.
Click Add Tag or Add Annotation.
Select a grouping rule from the drop-down list. If existing grouping rules cannot meet your requirements, click Create Rule to create one. For details, see Creating a Grouping Rule.
+In the expanded list, if the metric data of a host meets the preset alarm condition, a threshold alarm is generated on the alarm page. To view the alarm, go to the AOM console and choose Alarm Center > Alarm List in the navigation pane.
-Before creating threshold rules, ensure that a static threshold template has been created according to Creating a Static Threshold Template.
-Category |
@@ -122,9 +127,14 @@
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Starting or stopping a threshold rule |
-Click Start or Stop in the Operation column. + | Click Start or Stop in the Operation column. NOTE:
Single-resource threshold rules cannot be started or stopped. |
diff --git a/docs/aom/umn/aom_02_0061.html b/docs/aom/umn/aom_02_0061.html
new file mode 100644
index 00000000..85c6d8dd
--- /dev/null
+++ b/docs/aom/umn/aom_02_0061.html
@@ -0,0 +1,84 @@
+
+
+
Parameter + |
+Description + |
+
---|---|
Alarm Source + |
+Name of the service for which an event alarm is reported. You can select a service from the service list. + |
+
Trigger Object + |
+Select criteria to filter service events. You can select Notification Type, Event Name, Alarm Severity, Custom Attributes, Namespace, or Cluster Name as the filter criterion. One or more criteria can be selected. + |
+
Trigger Policy + |
+Policy for triggering event alarms. +
|
+
You need to configure whether to enable an alarm action rule. After this function is enabled, the system sends alarm notifications based on the associated SMN topic and message template. If the existing alarm action rules cannot meet your requirements, click Create Rule to create one. For details, see Creating an Alarm Action Rule.
+Select a grouping rule from the drop-down list. If existing grouping rules cannot meet your requirements, click Create Rule to create one. For details, see Creating a Grouping Rule.
+This rule monitors critical alarm events of AOM. When a service event meets the preset notification policy, the system sends an alarm notification to specified personnel by email or SMS.
+After creating an event alarm rule, perform the operations listed in Table 2 if needed.
+ +Operation + |
+Description + |
+
---|---|
Editing an event alarm rule + |
+Click Edit in the Operation column. + |
+
Deleting event alarm rules + |
+
|
+
Starting or stopping an event alarm rule + |
+Click Start or Stop in the Operation column. + |
+
Searching for an event alarm rule + |
+You can search for a rule by rule name, description, or metric name. Simply enter a keyword in the search box in the upper right corner and click |
+
By setting alarms rules, you can define threshold conditions for resource metrics. A threshold alarm is generated when the metric data of a resource meets the threshold condition. An insufficient data event is generated when no metric data is reported.
-Generally, threshold rules are used to monitor the usage of resources such as hosts and components in the environment in real time.
-The total number of threshold rules is 1000. If the number of alarm rules has reached the upper limit, delete unnecessary rules and create new ones.
+By setting alarms rules, you can define event conditions for services or threshold conditions for resource metrics. If the resource data of a service meets the event condition, an event alarm will be generated. If a metric value meets a threshold condition, a threshold alarm will be reported. If there is no metric data, an insufficient data event will be reported.
+Alarm rules are classified into threshold rules and event alarm rules. Generally, threshold rules monitor the usage of resources such as hosts and components in real time. If there are too many resource usage alarms and notifications are sent too often, use an event alarm rule to identify a type of resource usage problems for simplified notification.
+The total number of threshold rules and event alarm rules is 1000. If the number of alarm rules has reached the upper limit, delete unnecessary rules and create new ones.
Target OBS Bucket
OBS bucket that store logs.
-If no OBS bucket is available, click View OBS to create a bucket on the OBS console.
+obs-store-test
diff --git a/docs/aom/umn/aom_02_008203.html b/docs/aom/umn/aom_02_008203.html index d79827cb..3e425400 100644 --- a/docs/aom/umn/aom_02_008203.html +++ b/docs/aom/umn/aom_02_008203.html @@ -1,10 +1,10 @@Metric Collection determines whether to collect metrics (excluding SLA and custom metrics).
+You can determine whether to enable Metric Collection to collect metrics (excluding SLA and custom metrics).
Before enabling this function, ensure that you have installed the ICAgent on an Elastic Cloud Server (ECS) according to Installing an ICAgent.
-After the metric collection function is disabled, ICAgents will stop collecting metric data and related metric data will not be updated. However, custom metrics can still be reported.
+After metric collection is disabled, ICAgents will stop collecting metric data and related metric data will not be updated. However, custom metrics can still be reported.
This chapter describes how to use Identity and Access Management (IAM) for fine-grained permissions control for your Application Operations Management (AOM) resources. With IAM, you can:
-If your account does not need individual IAM users, then you may skip over this chapter.
+This chapter describes how to use Identity and Access Management (IAM) for fine-grained permissions control for your AOM resources. With IAM, you can:
+If your account does not need individual IAM users, then you may skip over this section.
This section describes the procedure for granting permissions (see Figure 1).
-Learn about the permissions supported by AOM and choose policies or roles according to your requirements. See AOM Permissions. For the permissions of other services, see Permission Description.
+Learn about the permissions (see AOM Permissions) supported by AOM and choose policies or roles according to your requirements. For the permissions of other services, see Permission Description.
Create a user group on the IAM console, and assign the AOM ReadOnlyAccess policy to the group.
diff --git a/docs/aom/umn/aom_02_0091.html b/docs/aom/umn/aom_02_0091.html index 0df12845..58f870aa 100644 --- a/docs/aom/umn/aom_02_0091.html +++ b/docs/aom/umn/aom_02_0091.html @@ -4,7 +4,7 @@Custom policies can be created as a supplement to the system policies of AOM.
You can create custom policies in either of the following two ways:
For details about how to create custom policies, see Creating a Custom Policy. For example custom policies, see the following description.
+For details about how to create custom policies, see Creating a Custom Policy. For example custom policies, see the following description.
{ "Version": "1.1", "Statement": [ diff --git a/docs/aom/umn/aom_02_0112.html b/docs/aom/umn/aom_02_0112.html index fdc11538..89ba4d26 100644 --- a/docs/aom/umn/aom_02_0112.html +++ b/docs/aom/umn/aom_02_0112.html @@ -1,18 +1,18 @@Upgrading to AOM 2.0
-This section describes how to migrate data from AOM 1.0 to AOM 2.0. Currently, only collector, and alarm rule upgrades are supported.
-Functions
- Collector Upgrade
After the collector is upgraded, the process discovery capability is enhanced and the collector can automatically adapt to functions related to CMDB, and monitoring center.
-- Alarm Rule Upgrade
After alarm rules are upgraded, alarm rule data is smoothly switched from AOM 1.0 to AOM 2.0, and is automatically adapted to alarm rule functions of AOM 2.0.
+This section describes how to migrate data from AOM 1.0 to AOM 2.0. Currently, only alarm rule and collector upgrades are supported.
+-Introduction
- Collector Upgrade
After the upgrade, the process discovery capability is enhanced and the collector can automatically adapt to functions related to CMDB, and monitoring center.
+- Alarm Rule Upgrade
After the upgrade, alarm rule data is smoothly switched from AOM 1.0 to AOM 2.0, and is automatically adapted to alarm rule functions of AOM 2.0.
Collector Upgrade
- Log in to the AOM 1.0 console.
- In the navigation pane, choose Configuration Management > Agent Management.
- Select Other: custom hosts from the drop-down list on the right of the page.
- Select a host and click Upgrade ICAgent.
- Select a target AOM 2.0 version from the drop-down list and click OK.
- Wait for the upgrade, which may take about 1 minute to complete. When the ICAgent status changes from Updating to Running, the ICAgent has been upgraded.
![]()
If the ICAgent state is abnormal after the upgrade or the upgrade fails, log in to the node and run the installation command to reinstall the ICAgent. (The original configuration can be overwritten, so there is no need for you to uninstall the ICAgent.)
+-Collector Upgrade
- Log in to the AOM 1.0 console.
- In the navigation pane, choose Configuration Management > Agent Management.
- Select Other: custom hosts from the drop-down list on the right of the page.
- Select a host and click Upgrade ICAgent.
- Select a target version from the drop-down list and click OK.
- Wait for the upgrade. This process takes about one minute. When the ICAgent status changes from Updating to Running, the ICAgent has been upgraded.
![]()
If the ICAgent is abnormal after the upgrade or if the upgrade fails, log in to the host and run the installation command again. There is no need for you to uninstall the original ICAgent.
Alarm Rule Upgrade
- Log in to the AOM 1.0 console.
- In the navigation pane on the left, choose Alarm Center > Alarm Rules.
- Select one or more alarm rules and click Migrate to AOM 2.0 above the rule list.
diff --git a/docs/aom/umn/aom_02_0115.html b/docs/aom/umn/aom_02_0115.html index 588dd6b4..10a00b3a 100644 --- a/docs/aom/umn/aom_02_0115.html +++ b/docs/aom/umn/aom_02_0115.html @@ -156,14 +156,14 @@
diff --git a/docs/aom/umn/aom_02_0113.html b/docs/aom/umn/aom_02_0113.html new file mode 100644 index 00000000..e1e8d808 --- /dev/null +++ b/docs/aom/umn/aom_02_0113.html @@ -0,0 +1,15 @@ + + ++
- Migration cannot be undone. Exercise caution when performing this operation.
- If the alarm rules to be migrated depend on alarm templates, these alarm templates will also be migrated.
Alarm Rule Upgrade
- Log in to the AOM 1.0 console.
- In the navigation pane on the left, choose Alarm Center > Alarm Rules.
- Select one or more alarm rules and click Migrate to AOM 2.0 above the rule list.
-![]()
- Migration cannot be undone. Exercise caution when performing this operation.
- If the alarm rules to be migrated depend on alarm templates, these alarm templates will also be migrated.
+
- In the displayed dialog box, click Confirm. The selected alarm rules will be migrated to AOM 2.0 in batches.
- In the displayed dialog box, click Confirm. The selected alarm rules will be migrated to AOM 2.0 in batches.
Alarm Tags and Annotations
++When creating alarm rules, you can set alarm tags and annotations. Tags are attributes that can be used to identify alarms. They are applied to the alarm noise reduction scenario. Annotations are attributes that cannot be used to identify alarms. They are applied to scenarios such as alarm notification and message templates.
++Alarm Tags
+
- Alarm tags can apply to grouping rules, suppression rules, and silence rules. The alarm management system manages alarms and notifications based on the tags.
- Each tag is in "key:value" format and can be customized. The key and value can contain only letters, digits, and underscores (_) and cannot start with an underscore (_). You can create up to 10 custom tags.
- If you set a tag when creating an alarm rule, the tag is automatically added as an alarm attribute when an alarm is triggered.
- In the message template, the $event.metadata.key1 variable specifies the tag. For details, see Table 1.
+Alarm Annotations
+
- Annotations are attributes that cannot be used to identify alarms. They are applied to scenarios such as alarm notification and message templates.
- Each annotation is in "key:value" format and can be customized. The key and value can contain only letters, digits, and underscores (_) and cannot start with an underscore (_). You can create up to 10 custom annotations.
- In the message template, the $event.annotations.key2 variable specifies the annotation. For details, see Table 1.
++ diff --git a/docs/aom/umn/aom_02_0114.html b/docs/aom/umn/aom_02_0114.html index 73de622c..a105e88f 100644 --- a/docs/aom/umn/aom_02_0114.html +++ b/docs/aom/umn/aom_02_0114.html @@ -7,7 +7,7 @@++Parent topic: Alarm Rules+
Creating or modifying an application discovery rule
apminventory
+apminventory
addOrUpdateAppRules
+addOrUpdateAppRules
Deleting an application discovery rule
apminventory
+apminventory
deleteAppRules
For details, see Querying Real-Time Traces.
+After you enable CTS and the management tracker is created, CTS starts recording operations on cloud resources. CTS stores operation records generated in the last seven days.
+This section describes how to query and export operation records of the last seven days on the CTS console.
+ +You can create a maximum of 1000 alarm action rules. If this number has been reached, delete unnecessary rules.
+Parameter + |
+Description + |
+
---|---|
Rule Name + |
+Name of an action rule. Enter 3 to 36 characters, and do not start or end with an underscore (_). Only digits, letters, and underscores are allowed. + |
+
Description + |
+Description of the action rule. + |
+
Action Type + |
+Type of action that is associated with the SMN topic and message template. Select your desired action from the drop-down list. Currently, only Notification is supported. + |
+
Topic + |
+SMN topic. Select your desired topic from the drop-down list. +If there is no topic you want to select, create one on the SMN console. + |
+
Message Template + |
+Notification message template. Select your desired template from the drop-down list. +If there is no message template you want to select, create one by referring to Creating a Message Template. + |
+
After an alarm action rule is created, you can perform operations described in Table 2.
+ +Operation + |
+Description + |
+
---|---|
Modifying an alarm action rule + |
+Click Edit in the Operation column. + |
+
Deleting an alarm action rule + |
+
|
+
Searching for an alarm action rule + |
+Enter a rule name in the search box in the upper right corner and click |
+
You can create message templates to customize notifications. When a preset notification rule is triggered, notifications can be sent to specified personnel by emails, SMS, voice calls, HTTP, or HTTPS. If no message template is created, the default message template will be used.
+Variable + |
+Description + |
+Definition + |
+
---|---|---|
OTC account + |
+Account used to log in to the management console. + |
+${domain_name} + |
+
Notification Type + |
+Type selected when a notification rule is created, which can be Alarm or Event. + |
+${event_type} + |
+
Severity + |
+Alarm or event severity, which can be Critical, Major, Minor, or Warning. + |
+${event_severity} + |
+
Name + |
+Name of the alarm or event that triggers the notification rule. + |
+$event.metadata.event_name + |
+
Occurred + |
+Time when the alarm or event is triggered. + |
+${starts_at} + |
+
Source + |
+Name of the service corresponding to the alarm or event that triggers the notification rule. + |
+$event.metadata.resource_provider + |
+
Resource Type + |
+Type of the resource selected when you customize a threshold rule or define alarm reporting. + |
+$event.metadata.resource_type + |
+
Resource Identifier + |
+Resource that triggers the alarm or event. + |
+${resources} + |
+
Custom tag + |
+Extended tag. + |
+$event.metadata.key1 + |
+
Possible Cause + |
+Cause of the alarm. For non-custom reporting, "NA" is displayed. + |
+${alarm_probableCause_zh} + |
+
Additional Info + |
+Additional alarm description, such as the metric name and alarm rule status change. + |
+${message} + |
+
Suggestion + |
+Suggestion on how to handle the alarm. For non-custom reporting, "NA" is displayed. + |
+${alarm_fix_suggestion_zh} + |
+
Custom annotation + |
+Extended annotation. + |
+$event.annotations.key2 + |
+
{ + "event": { + "starts_at": 1579420868000, //${starts_at} + "ends_at": 1579420868000, + "timeout": 60000, + "resource_group_id": "5680587ab6*******755c543c1f", + "metadata": { + "event_name": "test", //${metadata.event_name} + "event_severity": "Major", //${metadata.event_severity} + "event_type": "alarm", //${metadata.event_type} + "resource_provider": "ecs", //${metadata.resource_provider} + "resource_type": "vm", //${metadata.resource_type} + "resource_id": "ecs123", + "key1": "Custom field" //$event.metadata.key1 + }, + "annotations": { + "alarm_probableCause_zh_cn": "possible cause", //${annotations.alarm_probableCause_zh} + "alarm_fix_suggestion_zh_cn": "fix suggestion", //${annotations.alarm_fix_suggestion_zh} + "key2": "Custom field" //$event.annotations.key2 + } + } +} ++
After creating a message template, you can perform the operations listed in Table 2.
+ +Operation + |
+Description + |
+
---|---|
Editing a message template + |
+Click Edit in the Operation column. + |
+
Copying a message template + |
+Click Copy in the Operation column. + |
+
Deleting a message template + |
+
|
+
Searching for a message template + |
+Enter a template name in the search box in the upper right corner and click |
+
AOM allows you to customize alarm action rules. You can create an alarm action rule to associate an SMN topic with a message template. You can also customize notification content based on a message template. After an alarm action rule is created, choose Alarm Center > Alarm Noise Reduction in the navigation pane. Then, click the Grouping Rules tab and click Create. On the displayed page, specify an alarm action rule.
+AOM supports alarm noise reduction. Alarms can be processed based on the alarm noise reduction rules to prevent notification storms.
+Alarm noise reduction consists of four parts: grouping, deduplication, suppression, and silence.
+AOM uses built-in deduplication rules. The service backend automatically deduplicates alarms. You do not need to manually create rules.
+You need to manually create grouping, suppression, and silence rules. For details, see the following description.
+{ + "starts_at" : 1579420868000, + "ends_at" : 1579420868000, + "timeout" : 60000, + "resource_group_id" : "5680587ab6*******755c543c1f", + "metadata" : { + "event_name" : "test", + "event_severity" : "Major", + "event_type" : "alarm", + "resource_provider" : "ecs", + "resource_type" : "vm", + "resource_id" : "ecs123" , + "key1" : "value1" // Alarm tag configured when the alarm rule is created + }, + "annotations" : { + "alarm_probableCause_en_us": " Possible causes", + "alarm_fix_suggestion_en_us": "Handling suggestion" + } +}+
You can filter alarm subsets and then group them based on the grouping conditions. Alarms in the same group are aggregated to trigger one notification.
+As shown in Figure 1, when Alarm Severity under Grouping Condition is set to Critical, the system filters out the critical alarms, and then combines these alarms based on the specified mode. The combined alarms can then be associated with an action rule for sending notifications.
+ +You can create up to 100 grouping rules.
+Category + |
+Parameter + |
+Description + |
+
---|---|---|
- + |
+Rule Name + |
+Grouping rule name, which can contain up to 100 characters and cannot start or end with an underscore (_). Only letters, digits, and underscores are allowed. + |
+
Description + |
+Grouping rule description, which can contain up to 1024 characters. + |
+|
Grouping rules + |
+Grouping Condition + |
+Conditions set to filter alarms. After alarms are filtered out, you can set alarm action rules for them. +You can create a maximum of 10 parallel conditions, each of which can contain up to 10 serial conditions. One or more alarm action rules can be set for each parallel condition. +Serial conditions are in the AND relationship whereas parallel conditions are in the OR relationship. An alarm must meet all serial conditions under one of the parallel conditions. +For example, if two serial conditions (that is, Alarm Severity = Critical and Provider = AOM) are set under a parallel condition, critical AOM alarms are filtered out, and notification actions are performed based on the alarm action rule you set. + |
+
Combination rules + |
+Combine Notifications + |
+Notifications for alarms with certain fields to be the same will be combined. +Notifications can be combined: +
|
+
Initial Wait Time + |
+Interval for sending an alarm notification after alarms are combined for the first time. It is recommended that the time be set to seconds to prevent alarm storms. +Value range: 0s to 10 minutes. Recommended: 15s. + |
+|
Batch Processing Interval + |
+Waiting time for sending an alarm notification after the combined alarm data changes. It is recommended that the time be set to minutes. If you want to receive alarm notifications as soon as possible, set the time to seconds. +The change here refers to a new alarm or an alarm status change. +Value range: 5s to 30 minutes. Recommended: 60s. + |
+|
Repeat Interval + |
+Waiting time for sending an alarm notification after the combined alarm data becomes duplicate. It is recommended that the time be set to hours. +Duplication means that no new alarm is generated and no alarm status is changed while other attributes (such as titles and content) are changed. +Value range: 0 minutes to 15 days. Recommended: 1 hour. + |
+
After creating a grouping rule, perform the operations listed in Table 2 if needed.
+ +Operation + |
+Description + |
+
---|---|
Modifying a grouping rule + |
+Click Modify in the Operation column. + |
+
Deleting a grouping rule + |
+
|
+
Searching for a grouping rule + |
+Enter a rule name in the search box in the upper right corner and click |
+
By using suppression rules, you can suppress or block notifications related to specific alarms. For example, when a major alarm is generated, less severe alarms can be suppressed. Another example, when a node is faulty, all other alarms of the processes or containers on this node can be suppressed.
+If the source alarm corresponding to the suppression condition is cleared before the alarm notification is sent, the suppression rule becomes invalid. For the suppressed object (alarm suppressed by the source alarm), the alarm notification can still be sent as usual.
+You can create up to 100 suppression rules.
+Category + |
+Parameter + |
+Description + |
+
---|---|---|
- + |
+Rule Name + |
+Suppression rule name, which can contain up to 100 characters and cannot start or end with an underscore (_). Only letters, digits, and underscores are allowed. + |
+
Description + |
+Suppression rule description, which can contain up to 1024 characters. + |
+|
Suppression rules + |
+Source Alarm + |
+Alarm that triggers suppression. +You can create up to 10 parallel conditions under Source Alarm, and up to 10 serial conditions under each parallel condition. Serial conditions are in the AND relationship whereas parallel conditions are in the OR relationship. An alarm must meet all serial conditions under one of the parallel conditions. +For a serial condition, if Alarm Severity is set to Critical, critical alarms are filtered out as the root alarms. + |
+
Suppressed Alarm + |
+Alarm that is suppressed by the root alarm. +Set parameters for the suppressed alarm in the same way that you set parameters for the source alarm. +If Serial Condition of Source Alarm is set to Critical and that of Suppressed Alarm is set to Warning, warnings will be suppressed when critical alarms are generated. + |
+
After a suppression rule is created, it will take effect for all alarms that are grouped.
+After creating a suppression rule, perform the operations listed in Table 2 if needed.
+ +Operation + |
+Description + |
+
---|---|
Modifying a suppression rule + |
+Click Modify in the Operation column. + |
+
Deleting a suppression rule + |
+
|
+
Searching for a suppression rule + |
+Enter a rule name in the search box in the upper right corner and click |
+
You can shield alarm notifications in a specified period. A silence rule takes effect immediately after it is created.
+You can create up to 100 silence rules.
+Category + |
+Parameter + |
+Description + |
+
---|---|---|
- + |
+Rule Name + |
+Silence rule name, which can contain up to 100 characters and cannot start or end with an underscore (_). Only letters, digits, and underscores are allowed. + |
+
Description + |
+Silence rule description, which can contain up to 1024 characters. + |
+|
Silence rules + |
+Silence Condition + |
+Any alarm notifications that meet the silence condition will be shielded. +You can create up to 10 parallel conditions under Silence Condition, and up to 10 serial conditions under each parallel condition. Serial conditions are in the AND relationship whereas parallel conditions are in the OR relationship. An alarm must meet all serial conditions under one of the parallel conditions. +For a serial condition, if Alarm Severity is set to Critical, critical alarms are shielded. + |
+
Silence Time + |
+Time when alarm notifications are shielded. There are two options: +
|
+|
Time Zone/Language + |
+Time zone and language for which alarm notifications are shielded. The time zone and language configured in Preferences are selected by default. You can change them as required. + |
+
After creating a silence rule, perform the operations listed in Table 2 if needed.
+ +Operation + |
+Description + |
+
---|---|
Modifying a silence rule + |
+Click Modify in the Operation column. + |
+
Deleting a silence rule + |
+
|
+
Searching for a silence rule + |
+Enter a rule name in the search box in the upper right corner and click |
+
2023-08-09
+2024-07-15
Added section Upgrading to AOM 2.0.
+2024-04-17
+2022-09-29
diff --git a/docs/aom/umn/aom_03_0002.html b/docs/aom/umn/aom_03_0002.html index 5898c6cd..fac03c89 100644 --- a/docs/aom/umn/aom_03_0002.html +++ b/docs/aom/umn/aom_03_0002.html @@ -35,7 +35,11 @@2.3 64-bit
2.5 64-bit
+2.5 64-bit
+2.9 64-bit
+2.10 64-bit
CentOS
@@ -95,6 +99,11 @@9.0.0 64-bit
Kylin
+Kylin V10 SP1 64-bit
+Number of resources, threshold rules, components, or hosts in a graph
Metric
@@ -193,7 +202,7 @@Size of a log
The maximum size of each log is 10 KB. If a log exceeds 10 KB, the ICAgent does not collect it. That is, the log will be discarded.
+The maximum size of each log is 10 KB. If a log is greater than that, the ICAgent will not collect it. In that case, the log will be discarded.
Log traffic
@@ -226,7 +235,7 @@Log loss
When a single log line exceeds 10,240 bytes, the line will be discarded.
+When a single log line exceeds 1024 bytes, this line will be discarded.
Log repetition
@@ -257,7 +266,7 @@ -If the AMS-Access service is powered off or restarted unexpectedly when you use AOM, a metric data breakpoint occurs on some resources such as hosts, components, and containers in a collection period. This breakpoint is visible on the monitoring page and has no impacts. To avoid breakpoints in a metric graph, set the value of Interpolation Mode to 0 or average on the Metric Monitoring page. In this way, the system automatically replaces breakpoints with 0 or average values, as shown in Figure 1.
+If the AMS-Access service is powered off or restarted unexpectedly when you use AOM, a metric data breakpoint occurs on some resources such as hosts, components, and containers in a collection period. This breakpoint is visible on the monitoring page and has no impacts. To avoid breakpoints in a metric graph, set the value of Interpolation Mode to 0 or average on the Metric Monitoring page. In this way, the system automatically replaces breakpoints with 0 or average values, as shown in Figure 1.
Both alarms and events are the information reported to AOM when the status of AOM or an external service, such as Cloud Container Engine (CCE) changes.
+Both alarms and events are the information reported to AOM when the status of AOM or an external service (such as CCE) changes.
Uninstalled
Install the ICAgent according to Installing an ICAgent.
+Installing
@@ -29,7 +29,7 @@Installation failed
Uninstall the ICAgent according to Uninstalling the ICAgent by Logging In to the Server and then install it again.
+Uninstall the ICAgent by logging in to the server and then install it again.
Upgrading
@@ -39,7 +39,7 @@Upgrade failed
Uninstall the ICAgent according to Uninstalling the ICAgent by Logging In to the Server and then install it again.
+Uninstall the ICAgent by logging in to the server and then install it again.
Offline
diff --git a/docs/aom/umn/aom_03_0021.html b/docs/aom/umn/aom_03_0021.html index ad7626cd..51f5c25d 100644 --- a/docs/aom/umn/aom_03_0021.html +++ b/docs/aom/umn/aom_03_0021.html @@ -35,8 +35,6 @@In the Windows environment, manually add log collection paths. The ICAgent can collect .log, .trace, and .out files, but does not collect binary files or Windows system logs.
The AK/SK is incorrect, or no agency is set when Installation Mode is set to Create Agency. Perform operations according to and install the ICAgent again.
-Agency Name
Set an agency name.
-The agency name must be apm_admin_trust.
+The agency name must be apm_admin_trust.
apm_admin_trust
+-
Agency Type
Select Account.
+Select Cloud service.
Common account
+Cloud service
Delegated Account
+Cloud Service
Specify an account to delegate.
+Select Application Operations Management (AOM).
op_svc_apm
+-
Validity Period
Select Unlimited.
Unlimited
+Unlimited
Description
@@ -50,7 +50,7 @@During ICAgent installation, the system displays the message "no crontab for root".
+When you execute the script for installing an ICAgent, crontab scheduled tasks will also be installed. The message "no crontab for root" indicates that there is no scheduled task of the root user.
+No measure needs to be taken.
+If the command output contains "ICAgent install success", the ICAgent is successfully installed and O&M data can be collected.
+2.3 64-bit
2.5 64-bit
+2.5 64-bit
+2.9 64-bit
+2.10 64-bit
CentOS
@@ -95,6 +99,11 @@9.0.0 64-bit
Kylin
+Kylin V10 SP1 64-bit
+Number of resources, threshold rules, components, or hosts in a graph
Metric
@@ -193,7 +202,7 @@Size of a log
The maximum size of each log is 10 KB. If a log exceeds 10 KB, the ICAgent does not collect it. That is, the log will be discarded.
+The maximum size of each log is 10 KB. If a log is greater than that, the ICAgent will not collect it. In that case, the log will be discarded.
Log traffic
@@ -226,7 +235,7 @@Log loss
When a single log line exceeds 10,240 bytes, the line will be discarded.
+When a single log line exceeds 1024 bytes, this line will be discarded.
Log repetition
@@ -257,7 +266,7 @@ -If the AMS-Access service is powered off or restarted unexpectedly when you use AOM, a metric data breakpoint occurs on some resources such as hosts, components, and containers in a collection period. This breakpoint is visible on the monitoring page and has no impacts. To avoid breakpoints in a metric graph, set the value of Interpolation Mode to 0 or average on the Metric Monitoring page. In this way, the system automatically replaces breakpoints with 0 or average values, as shown in Figure 1.
+If the AMS-Access service is powered off or restarted unexpectedly when you use AOM, a metric data breakpoint occurs on some resources such as hosts, components, and containers in a collection period. This breakpoint is visible on the monitoring page and has no impacts. To avoid breakpoints in a metric graph, set the value of Interpolation Mode to 0 or average on the Metric Monitoring page. In this way, the system automatically replaces breakpoints with 0 or average values, as shown in Figure 1.
Metrics reflect resource performance data or status. A metric consists of a namespace, dimension, name, and unit.
Metric namespaces can be regarded as containers for storing metrics. Metrics in different namespaces are independent of each other so that metrics of different applications will not be aggregated to the same statistics information. Each metric has certain features, and a dimension may be considered as a category of such features. Figure 1 describes the relationships among namespaces, dimensions, and cluster metrics.
- +Each host of AOM corresponds to a VM or physical machine. A host can be your own VM or physical machine, or a VM (for example, an ECS) that you created. A host can only be connected to AOM for monitoring when its OS is supported by AOM and an ICAgent has been installed on the host.
The alarm list helps you manage alarms and events.
You can create threshold rules for key resource metrics. When the metric value reaches the threshold, AOM will generate alarms.
AOM provides powerful log management capabilities. Log search enables you to quickly search for required logs from massive quantities of logs. Log dump enables you to store logs for a long time. After you create statistical rules, AOM can periodically count keywords in logs and generate metric data, so that you can monitor system performance and services in real time. By configuring delimiters, you can divide log content into multiple words and use these words to search for logs.
+AOM provides powerful log management capabilities. Log search enables you to quickly search for required logs from massive quantities of logs. Log dump enables you to store logs for a long period. By configuring delimiters, you can divide log content into multiple words and use these words to search for logs.
+The Metric Browsing page displays metric data of each resource. You can monitor metric values and trends in real time, and create alarm rules for desired metrics. In this way, you can monitor services in real time and perform data correlation analysis.
Byte/s
Total physical memory (aom_cluster_memory_total_megabyte)
+Total physical memory (aom_cluster_memory_total_megabytes)
Total physical memory that has been applied for a measured object
AOM is a multi-dimensional O&M platform that focuses on resource data and associates log, metric, resource, alarm, and event data. It consists of the data collection and access layer, transmission and storage layer, and service computing layer.
-You can install the ICAgent (a plug-in data collector) on a host and use it to report O&M data.
+AOM provides basic O&M services such as alarm management, log management, and resource monitoring (such as metric monitoring).
Metrics reflect resource performance data or status. A metric consists of a namespace, dimension, name, and unit. Metrics can be divided into:
-A namespace is an abstract collection of resources and objects. Metrics in different namespaces are independent of each other so that metrics of different applications will not be aggregated to the same statistics information.
Downlink rate (PPS) (aom_node_network_receive_packets)
Number of data packets received by an NIC per second
+Number of data packets received by a NIC per second
≥ 0
Downlink error rate (aom_node_network_receive_error_packets)
Number of error packets received by an NIC per second
+Number of error packets received by a NIC per second
≥ 0
Uplink error rate (aom_node_network_transmit_error_packets)
Number of error packets sent by an NIC per second
+Number of error packets sent by a NIC per second
≥ 0
Uplink rate (PPS) (aom_node_network_transmit_packets)
Number of data packets sent by an NIC per second
+Number of data packets sent by a NIC per second
≥ 0
Cluster namespace
netDevice
+netDevice
NIC name
Cluster name
fileSystem
+fileSystem
File system
Host ID
mountPoint
+mountPoint
Mount point
Used physical memory (aom_container_memory_used_megabytes)
Used physical memory of a measured object
-If the cluster version is 1.2.1 or later, this metric indicates the used working set memory and is equivalent to container_memory_working_set_bytes on the CCE console.
-≥ 0
Downlink rate (PPS) (aom_container_network_receive_packets)
Number of data packets received by an NIC per second
+Number of data packets received by a NIC per second
≥ 0
Downlink error rate (aom_container_network_receive_error_packets)
Number of error packets received by an NIC per second
+Number of error packets received by a NIC per second
≥ 0
Uplink error rate (aom_container_network_transmit_error_packets)
Number of error packets sent by an NIC per second
+Number of error packets sent by a NIC per second
≥ 0
Uplink rate (PPS) (aom_container_network_transmit_packets)
Number of data packets sent by an NIC per second
+Number of data packets sent by a NIC per second
≥ 0
If you need to assign different permissions to employees in your enterprise to access your AOM resources, Identity and Access Management (IAM) is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you secure access to your AOM resources.
-With IAM, you can use your account to create IAM users for your employees, and assign permissions to the users to control their access to specific types of resources. For example, some software developers in your enterprise need to use AOM resources but must not delete them or perform any high-risk operations such as deleting application discovery rules. To achieve this result, you can create IAM users for the software developers and grant them only the permissions required for using AOM resources.
-If your account does not need individual IAM users for permissions management, you may skip over this chapter.
+With IAM, you can use your account to create IAM users for your employees, and assign permissions to the users to control their access to specific types of resources. For example, some software developers in your enterprise need to use AOM resources but are not allowed to delete them or perform any high-risk operations such as deleting application discovery rules. To achieve this result, you can create IAM users for the software developers and grant them only the permissions required for using AOM resources.
+If your cloud account does not need individual IAM users for permissions management, you may skip over this chapter.
IAM can be used free of charge. You pay only for the resources in your account. For more information about IAM, see IAM Service Overview.
By default, new IAM users do not have any permissions assigned. You need to add a user to one or more groups, and assign permissions policies or roles to these groups. The user then inherits permissions from the groups it is a member of. This process is called authorization. After authorization, the user can perform specified operations on AOM.
AOM is a project-level service deployed and accessed in specific physical regions. To assign AOM permissions to a user group, specify the scope as region-specific projects and select projects for the permissions to take effect. If All projects is selected, the permissions will take effect for the user group in all region-specific projects. When accessing AOM, the users need to switch to a region where they have been authorized to use this service.
@@ -20,7 +20,7 @@AOM Admin
+AOM Admin
Administrator permissions for AOM. Users granted these permissions can operate and use AOM.
CCE Administrator, OBS Administrator, and LTS FullAccess
AOM Viewer
+AOM Viewer
Read-only permissions for AOM. Users granted these permissions can only view AOM data.
Operation |
-AOM Admin + | AOM Admin |
-AOM Viewer + | AOM Viewer |
x |
-
---|---|---|---|---|
Creating a dashboard - |
-√ - |
-x - |
-||
Modifying a dashboard - |
-√ - |
-x - |
-||
Deleting a dashboard - |
-√ - |
-x - |
-||
Creating an application discovery rule |
√ @@ -148,48 +127,6 @@ | x |
||
Viewing bucket logs - |
-√ - |
-√ - |
-||
Adding a log dump - |
-√ - |
-x - |
-||
Modifying a log dump - |
-√ - |
-x - |
-||
Deleting a log dump - |
-√ - |
-x - |
-||
Starting periodical dump - |
-√ - |
-x - |
-||
Stopping periodical dump - |
-√ - |
-x - |
-||
Configuring a delimiter |
√ @@ -221,7 +158,7 @@ |
To use a custom fine-grained policy, log in to IAM as the administrator and select fine-grained permissions of AOM as required. For details about fine-grained permissions of AOM, see Table 3.
+To use a custom fine-grained policy, log in to IAM as the administrator and select fine-grained permissions of AOM as required. For details, see Table 3
Permission Name |
diff --git a/docs/aom/umn/en-us_image_0000001233445193.png b/docs/aom/umn/en-us_image_0000001233445193.png
new file mode 100644
index 00000000..75729a66
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001233445193.png differ
diff --git a/docs/aom/umn/en-us_image_0000001261639913.png b/docs/aom/umn/en-us_image_0000001261639913.png
new file mode 100644
index 00000000..75729a66
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001261639913.png differ
diff --git a/docs/aom/umn/en-us_image_0000001261759895.png b/docs/aom/umn/en-us_image_0000001261759895.png
new file mode 100644
index 00000000..75729a66
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001261759895.png differ
diff --git a/docs/aom/umn/en-us_image_0000001261759905.png b/docs/aom/umn/en-us_image_0000001261759905.png
new file mode 100644
index 00000000..75729a66
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001261759905.png differ
diff --git a/docs/aom/umn/en-us_image_0000001353985836.png b/docs/aom/umn/en-us_image_0000001353985836.png
new file mode 100644
index 00000000..6b9e018b
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001353985836.png differ
diff --git a/docs/aom/umn/en-us_image_0000001404765705.png b/docs/aom/umn/en-us_image_0000001404765705.png
new file mode 100644
index 00000000..ecced07b
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001404765705.png differ
diff --git a/docs/aom/umn/en-us_image_0000001410647264.png b/docs/aom/umn/en-us_image_0000001410647264.png
index 2f2d7795..4e8dc01a 100644
Binary files a/docs/aom/umn/en-us_image_0000001410647264.png and b/docs/aom/umn/en-us_image_0000001410647264.png differ
diff --git a/docs/aom/umn/en-us_image_0000001410807236.png b/docs/aom/umn/en-us_image_0000001410807236.png
new file mode 100644
index 00000000..75729a66
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001410807236.png differ
diff --git a/docs/aom/umn/en-us_image_0000001410883828.png b/docs/aom/umn/en-us_image_0000001410883828.png
new file mode 100644
index 00000000..6266da02
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001410883828.png differ
diff --git a/docs/aom/umn/en-us_image_0000001411169790.png b/docs/aom/umn/en-us_image_0000001411169790.png
deleted file mode 100644
index 637192d8..00000000
Binary files a/docs/aom/umn/en-us_image_0000001411169790.png and /dev/null differ
diff --git a/docs/aom/umn/en-us_image_0000001411933048.png b/docs/aom/umn/en-us_image_0000001411933048.png
new file mode 100644
index 00000000..64ed27a3
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001411933048.png differ
diff --git a/docs/aom/umn/en-us_image_0000001411990512.png b/docs/aom/umn/en-us_image_0000001411990512.png
new file mode 100644
index 00000000..75729a66
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001411990512.png differ
diff --git a/docs/aom/umn/en-us_image_0000001412095554.png b/docs/aom/umn/en-us_image_0000001412095554.png
new file mode 100644
index 00000000..f251b1cf
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001412095554.png differ
diff --git a/docs/aom/umn/en-us_image_0000001412589150.png b/docs/aom/umn/en-us_image_0000001412589150.png
new file mode 100644
index 00000000..64ed27a3
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001412589150.png differ
diff --git a/docs/aom/umn/en-us_image_0000001413081586.png b/docs/aom/umn/en-us_image_0000001413081586.png
new file mode 100644
index 00000000..494c6805
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001413081586.png differ
diff --git a/docs/aom/umn/en-us_image_0000001423571610.png b/docs/aom/umn/en-us_image_0000001423571610.png
deleted file mode 100644
index 1cf19ab6..00000000
Binary files a/docs/aom/umn/en-us_image_0000001423571610.png and /dev/null differ
diff --git a/docs/aom/umn/en-us_image_0000001461323461.png b/docs/aom/umn/en-us_image_0000001461323461.png
new file mode 100644
index 00000000..59a4a088
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001461323461.png differ
diff --git a/docs/aom/umn/en-us_image_0000001461410609.png b/docs/aom/umn/en-us_image_0000001461410609.png
deleted file mode 100644
index fd12e250..00000000
Binary files a/docs/aom/umn/en-us_image_0000001461410609.png and /dev/null differ
diff --git a/docs/aom/umn/en-us_image_0000001461819281.png b/docs/aom/umn/en-us_image_0000001461819281.png
new file mode 100644
index 00000000..56598ac9
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001461819281.png differ
diff --git a/docs/aom/umn/en-us_image_0000001462367929.png b/docs/aom/umn/en-us_image_0000001462367929.png
new file mode 100644
index 00000000..0299bca1
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001462367929.png differ
diff --git a/docs/aom/umn/en-us_image_0000001462893469.png b/docs/aom/umn/en-us_image_0000001462893469.png
new file mode 100644
index 00000000..625adf02
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001462893469.png differ
diff --git a/docs/aom/umn/en-us_image_0000001462896701.png b/docs/aom/umn/en-us_image_0000001462896701.png
new file mode 100644
index 00000000..84a5a727
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001462896701.png differ
diff --git a/docs/aom/umn/en-us_image_0000001472254649.png b/docs/aom/umn/en-us_image_0000001472254649.png
new file mode 100644
index 00000000..60be8fa6
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001472254649.png differ
diff --git a/docs/aom/umn/en-us_image_0000001582213732.png b/docs/aom/umn/en-us_image_0000001582213732.png
index 4fdf91eb..1bfa837c 100644
Binary files a/docs/aom/umn/en-us_image_0000001582213732.png and b/docs/aom/umn/en-us_image_0000001582213732.png differ
diff --git a/docs/aom/umn/en-us_image_0000001696678850.png b/docs/aom/umn/en-us_image_0000001696678850.png
new file mode 100644
index 00000000..6b11888b
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001696678850.png differ
diff --git a/docs/aom/umn/en-us_image_0000001696838310.png b/docs/aom/umn/en-us_image_0000001696838310.png
new file mode 100644
index 00000000..582b1618
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001696838310.png differ
diff --git a/docs/aom/umn/en-us_image_0000001696838318.png b/docs/aom/umn/en-us_image_0000001696838318.png
new file mode 100644
index 00000000..e4fcbfa9
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001696838318.png differ
diff --git a/docs/aom/umn/en-us_image_0000001744598325.png b/docs/aom/umn/en-us_image_0000001744598325.png
new file mode 100644
index 00000000..3e15dbf9
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001744598325.png differ
diff --git a/docs/aom/umn/en-us_image_0000001744678489.jpg b/docs/aom/umn/en-us_image_0000001744678489.jpg
new file mode 100644
index 00000000..fac6892b
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001744678489.jpg differ
diff --git a/docs/aom/umn/en-us_image_0000001758618249.png b/docs/aom/umn/en-us_image_0000001758618249.png
new file mode 100644
index 00000000..0d21733f
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001758618249.png differ
diff --git a/docs/aom/umn/en-us_image_0000001759018189.png b/docs/aom/umn/en-us_image_0000001759018189.png
new file mode 100644
index 00000000..c1356749
Binary files /dev/null and b/docs/aom/umn/en-us_image_0000001759018189.png differ
---|