Skip to content

Detection Rules


The system comes with a rich set of built-in detection rules, which can accurately match the monitoring needs of various data types, effectively avoiding false alarms and missed alarms.

Rule Types

Rule Name
Data Scope
Description
Threshold Detection All Performs anomaly detection on metric data based on set thresholds.
Mutation Detection Metrics(M) Detects anomalies based on sudden反常 behavior of metrics against historical data. Often used for business data and short time windows.
Interval Detection Metrics(M) Detects anomalous data points in metrics based on a dynamic threshold range. Best suited for stable trend time series.
Interval Detection V2 Metrics(M)
Traces(T)
RUM Data(R)
Detects anomalous data points in metrics based on a dynamic threshold range. Best suited for stable trend time series.
Outlier Detection Metrics(M) Detects whether metrics/statistical data of detected objects under specific groupings have outlier deviations.
Log Detection Logs(L) Performs anomaly detection for business applications based on log data.
Process Anomaly Detection Process Objects(O::host_processes) Periodically checks process data to understand process anomalies.
Infrastructure Liveness Detection V2 Objects(O) Monitors infrastructure stability by setting liveness conditions based on infrastructure object data.
Application Performance Detection Traces(T) Sets threshold rules based on APM data to detect anomalies.
Real User Monitoring Detection RUM Data(R) Sets threshold rules based on RUM data to detect anomalies.
Composite Detection All Combines the results of multiple monitors into one monitor using expressions, and triggers alerts based on the combined result.
Synthetic Testing Anomaly Detection Synthetic Data(D::Type) Sets threshold rules based on Synthetic Tests data to detect anomalies.
Network Data Detection Network(N) Sets threshold rules based on network data to detect network performance stability.
Third-Party Event Detection Others Generates event data by sending异常 events or records from third-party systems to an HTTP server via a POST request to a specified URL.
Infrastructure Change Detection Objects(O) Tracks the infrastructure lifecycle to monitor various change behaviors, accurately identifying anomalies like configuration drift and unauthorized operations.
Programmable Detection All Writes detection rules via scripts, suitable for monitoring scenarios with complex and frequently changing rules.

Rule Configuration

Detection Configuration

Set corresponding detection frequency, detection interval, detection metrics, etc., for different detection rules.

Event Notification

Event Title

Defines the event name for the alert trigger condition; pre-defined template variables can be used.

Note

In the latest version, the monitor name will be generated automatically after entering the event title. In older monitors, the monitor name and event title might be inconsistent. It is recommended to sync to the latest version.

Event Content

Write the event notification content. When the trigger condition is met, the system will send this content externally. It generally includes the following information:

Note

The @ member configuration only takes effect and sends the event content here to specified members when Associate Incident is enabled.

The monitor automatically generates jump links based on the detection metrics in the Detection Configuration. You can adjust filter conditions and time range after inserting the link. It is generally a fixed link address prefix containing the current domain name and workspace ID; you can also choose to customize the jump link.

Among them, if you need to insert a link to a dashboard, based on the above logic, you also need to supplement the dashboard ID and name, and adjust view variables and time range as needed.

Custom Advanced Settings

Through advanced settings, you can add associated logs or error stacks to the event content to view the contextual data when the anomaly occurred.

  • Add associated logs:

Query:

e.g., Get one log message with index default:

{% set dql_data = DQL("L::RE(`.*`):(`message`) { `index` = 'default' } LIMIT 1") %}

Associated log:

{{ dql_data.message | limit_lines(10) }}
  • Add associated error stack

Query:

{% set dql_data = DQL("T::re(`.*`):(`error_message`,`error_stack`){ (`source` NOT IN ['service_map', 'tracing_stat', 'service_list_1m', 'service_list_1d', 'service_list_1h', 'profile']) AND (`error_stack` = exists()) } LIMIT 1") %}

Associated error stack:

{{ dql_data.error_message | limit_lines(10) }}

{{ dql_data.error_stack | limit_lines(10) }}
Custom Notification Content

By default, the system uses the Event Content as the alert notification content. If you need to customize the actual notification sent externally, you can enable the switch here and fill in the notification information.

Note

Different alert notification objects support different Markdown syntax. For example, WeCom does not support unordered lists.

Data Gap Events

i.e., customize the notification content for data gaps. You can synchronously configure the final title, content, etc., of such events when sent externally.

If not configured here, the official default notification template will be used automatically when finally sent externally.

Associate Incident

After enabling association, if an abnormal event is generated under this monitor, an Incident will be created同步ly. You can choose to create incidents同步ly for different event severities.

  1. Define tags for the incident;
  2. Select the event severity;
  3. Define the severity of the最终 resulting incident.

The incidents generated here can be viewed in the Incident Center (❗️Such incidents include tag filter conditions).

Alert Configuration

When the monitoring trigger condition is met, immediately send an Alert message to the specified notification targets. The alert strategy includes the event severity to be notified, the notification targets, and the alert silence period.

Alert strategies support single or multiple selection. Click the strategy name to expand the details page. Click Edit Alert Strategy to modify the strategy.

Associate

Supports associating the monitor with dashboards for quick jumping and visual viewing of monitoring data.

Permission

Sets the operational permissions for the monitor to ensure different users perform compliant configuration operations according to their roles and permission levels.

  • Do not enable this configuration: Follow the default permissions of "Monitor Configuration Management";
  • Enable this configuration and select custom permission objects: Only the creator and the assigned permission objects can enable/disable, edit, and delete the rules set by this monitor;
  • Enable this configuration, but no custom permission objects are selected: Then only the creator has the permissions to enable/disable, edit, and delete this monitor.
Note

The Owner role of the current workspace is not affected by the operational permission configuration here.

Trigger Detection Now

After the rule configuration is completed, you can choose to trigger detection immediately to test the overall effect of the current rule configuration.

Feedback

Is this page helpful? ×