Skip to content

Alert Aggregation Notification Template

Title

You have {N} {{severity}} alert notifications

Content

Not Aggregated

You have N new Guance alerts

Item 1 / 2:

Title

Content

Go to workspace to view

Go to workspace for AI analysis


Item 2 / 2:

Title

Content

Go to workspace to view

Go to workspace for AI analysis

  • Go to workspace to view: navigate to the Incident Explorer to view current incident (filter condition: df_event_id)

Screenshot:

Rule Aggregation

All

Related incidents: 123

Aggregation period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated detection rules:

  • {{event title}} >>View
  • View: navigate to the Explorer to view all incidents generated by the current monitor within the aggregation period (filter condition: df_monitor_checker_id)

Screenshot:

Detection Rule - Monitor

Detection type: Monitor

Detection rule name: {{Host}} CPU exceeded {Result}%

Detection rule ID: rule_cdbkjcbsdjcb1234445455

Related incidents: 123

Aggregation period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Go to workspace to view

Go to workspace for AI analysis

  • Navigate to the Explorer to view associated incidents of the current monitor (filter condition: df_monitor_checker_id)

Screenshot:

Detection Rule - Intelligent Inspection

Detection type: Intelligent Inspection

Detection rule name: {{Host}} CPU exceeded {Result}%

Detection rule ID: rule_cdbkjcbsdjcb1234445455

Related incidents: 123

Aggregation period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Go to workspace to view

Go to workspace for AI analysis

  • Navigate to the Explorer to view associated incidents of the current intelligent inspection rule (filter condition: df_monitor_checker_id)

Screenshot:

Detection Rule - SLO

Detection type: SLO

Detection rule name: {{Host}} CPU exceeded {Result}%

Detection rule ID: rule_cdbkjcbsdjcb1234445455

Related incidents: 123

Aggregation period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Go to workspace to view

Go to workspace for AI analysis

  • Navigate to the Explorer to view associated incidents of the current SLO rule (filter condition: df_monitor_checker_id)

Screenshot:

Detection Dimension

Detection dimension: service:kodo,host:test

Related incidents: 123

Aggregation period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated detection rules:

  • {{event title}} >>View

Tags

Tags: service:kodo,host:test

Related incidents: 123

Aggregation period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated detection rules:

  • {{event title}} >>View
  • Navigate to the Explorer to view associated incidents of the current detection rule (filter condition: df_monitor_checker_id)

Screenshot:

Intelligent Aggregation

Title Clustering

Title: {{Host}} CPU exceeded {Result}%

Related incidents: 123

Aggregation period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated detection rules:

  • {{event title}} >>View
  • Navigate to the Explorer to view all incidents generated by the current detection rule during the aggregation period (filter condition: df_monitor_checker_id)

Screenshot:

Content Clustering

Title: {{Host}} CPU exceeded {Result}%

Related incidents: 123

Aggregation period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated detection rules:

  • {{event title}} >>View
  • Navigate to the Explorer to view all incidents generated by the current detection rule during the aggregation period (filter condition: df_monitor_checker_id)

Screenshot:

AI Aggregation

Title: title: Brief summary of this alert.

Action suggestion: suggestion: Suggestions for handling the current alert.

{xxx related} alert clustering: "summary": "Multiple hosts show CPU and memory anomalies, with a maximum anomaly value of 98% (host 172.16.200.108). Host 1

Associated detection rules: df_monitor_checker_ids: Involved monitors (rule IDs).

{xxx related} alert clustering: "summary": "Multiple hosts show CPU and memory anomalies, with a maximum anomaly value of 98% (host 172.16.200.108). Host 1

Associated detection rules: df_monitor_checker_ids: Involved monitors (rule IDs).

Example:

Title: During the aggregation period, a total of 3 monitors triggered alert events, generating 19 alert notifications.

Action suggestion: Prioritize high-frequency alert hosts. Host 172.16.200.101 involves CPU anomalies, memory anomalies, and communication issues and requires comprehensive inspection. Check alert correlations; multiple monitors (rule IDs) involve host resources (CPU, memory), and module communications may indicate systematic issues. Optimize monitoring strategies to reduce repeated alerts triggered within short periods, combining time windows for alert noise reduction processing.

Host-related alert clustering: Multiple hosts show CPU and memory anomalies, with a maximum anomaly value of 98% (host 172.16.200.108). Host 172.16.200.101 simultaneously triggered CPU and memory alerts and needs focused inspection.

Associated detection rules: title view ("rul_e68e2d5e620b40c691128a399de3f479")

Application-related alert clustering: Multiple hosts show CPU and memory anomalies, with a maximum anomaly value of 98% (host 172.16.200.108). Host 172.16.200.101 simultaneously triggered CPU and memory alerts and needs focused inspection.

Associated detection rules: title view ("rul_e68e2d5e620b40c691128a399de3f479")

Screenshot:

Feedback

Is this page helpful? ×