Skip to content

Detection Rules


The system has built-in rich detection rules that can accurately match the monitoring needs of various types of data, effectively avoiding false alarms and missed alarms.

Rule Types

Rule Name
Data Scope
Basic Description
Threshold Detection All Performs anomaly detection on metric data based on set thresholds
Mutation Detection Metrics(M) Performs anomaly detection on sudden abnormal behavior of metrics based on historical data, often suitable for business data and short time window scenarios
Interval Detection Metrics(M) Detects abnormal data points of metrics based on a dynamic threshold range, often suitable for stable trend time series
Interval Detection V2 Metrics(M)
Traces(T)
RUM Data(R)
Detects abnormal data points of metrics based on a dynamic threshold range, often suitable for stable trend time series
Outlier Detection Metrics(M) Detects whether metrics/statistical data of detected objects under specific groups have outlier deviations
Log Detection Logs(L) Performs anomaly detection on business applications based on log data
Process Anomaly Detection Process Objects(O::host_processes) Periodically checks process data to understand process anomalies
Infrastructure Liveness Detection V2 Objects(O) Sets liveness conditions based on infrastructure object data to monitor infrastructure stability
Application Performance Metric Detection Traces(T) Sets threshold rules based on APM data to detect anomalies
RUM Metric Detection RUM Data(R) Sets threshold rules based on RUM data to detect anomalies
Composite Detection All Combines the results of multiple monitors into one monitor through expressions, and alerts based on the combined result
Synthetic Testing Anomaly Detection Synthetic Data(D::Type) Sets threshold rules based on Synthetic Tests data to detect anomalies
Network Data Detection Network(N) Sets threshold rules based on network data to detect network performance stability
Third-Party Event Detection Others Generates event data by sending abnormal events or records produced by third-party systems to an HTTP server via a POST request to a specified URL address
Infrastructure Change Detection Objects(O) Monitors various change behaviors based on tracking the infrastructure lifecycle, accurately identifying abnormal conditions such as configuration drift and illegal operations
Programmable Detection All Writes detection rules via scripts, often suitable for monitoring scenarios with complex and frequently changing rules

Rule Configuration

Detection Configuration

Set corresponding detection frequency, detection interval, detection metrics, and other information for different detection rules.

Event Notification

Event Title

Defines the event name for the alarm trigger condition. Predefined template variables can be used.

Note

In the latest version, the monitor name will be generated synchronously after the event title is entered. In older monitors, there might be inconsistencies between the monitor name and the event title. It is recommended to synchronize to the latest version.

Event Content

Write the event notification content. When the trigger condition is met, the system will send this content externally. It generally includes the following information:

Note

The @ member configuration only takes effect and sends the event content here to the specified members when associating with an Incident is enabled.

The monitor automatically generates jump links based on the detection metrics in the Detection Configuration. You can adjust the filter conditions and time range after inserting the link. It is generally a fixed link address prefix containing the current domain name and workspace ID. You can also choose to customize the jump link.

Among these, if you need to insert a link to jump to a dashboard, based on the above logic, you also need to supplement the dashboard ID and name, and adjust the view variables and time range as needed.

Custom Advanced Configuration

Through advanced configuration, you can add associated logs or error stacks to the event content to view the contextual data when the anomaly occurred.

  • Add associated logs:

Query:

For example: Get one log message with index default:

{% set dql_data = DQL("L::RE(`.*`):(`message`) { `index` = 'default' } LIMIT 1") %}

Associated log:

{{ dql_data.message | limit_lines(10) }}
  • Add associated error stack

Query:

{% set dql_data = DQL("T::re(`.*`):(`error_message`,`error_stack`){ (`source` NOT IN ['service_map', 'tracing_stat', 'service_list_1m', 'service_list_1d', 'service_list_1h', 'profile']) AND (`error_stack` = exists()) } LIMIT 1") %}

Associated error stack:

{{ dql_data.error_message | limit_lines(10) }}

{{ dql_data.error_stack | limit_lines(10) }}
Custom Notification Content

By default, the system uses the Event Content as the alarm notification content. If you need to customize the actual notification sent externally, you can choose to enable the switch here and fill in the notification information.

Note

Different alarm notification targets support different Markdown syntax. For example, WeCom does not support unordered lists.

Data Gap Events

This refers to customizing the notification content for data gaps. You can synchronously configure the title, content, and other information of such events that will ultimately be sent externally.

If not configured here, the official default notification template will be automatically used when finally sent externally.

Associate Incident

After enabling association, if an abnormal event is generated under this monitor, an Issue will be created synchronously. You can choose to create Issues synchronously for different event severities.

  1. Select event severity.
  2. Define the severity of the ultimately generated Issue.
  3. Select the responsible person for this type of Issue.
  4. Select the delivery channel.
  5. Optionally choose whether to close the Issue synchronously after the event recovers.

The Issues generated here can be viewed in Incident > the channel you selected.

Alert Configuration

Once the monitoring trigger conditions are met, immediately send alert messages to the specified notification targets. The alert strategy includes the event severity level to be notified, the notification targets, and the alert silence period.

Alert strategies support single or multiple selection. Click the strategy name to expand the details page. Click Edit Alert Strategy to modify the strategy.

Association

Supports associating the monitor with dashboards for quick jumping and visual viewing of monitoring data.

Permissions

Sets the operational permissions for the monitor to ensure different users perform compliant configuration operations according to their roles and permission levels.

  • Do not enable this configuration: Follow the default permissions of "Monitor Configuration Management".
  • Enable this configuration and select custom permission objects: Only the creator and the assigned permission objects can perform enable/disable, edit, and delete operations on the rules set by this monitor.
  • Enable this configuration, but do not select custom permission objects: Then only the creator has the enable/disable, edit, and delete permissions for this monitor.
Note

The Owner role of the current workspace is not affected by the operational permission configuration here.

Trigger Detection Now

After the rule configuration is completed, you can choose to trigger detection immediately to test the overall effect of the current rule configuration.

Feedback

Is this page helpful? ×