Skip to content

Alert Aggregation Notification Template

Title

You have {N} {{level}} alert notifications

Content

No Aggregation

You have N new TrueWatch alerts

1st / 2nd:

Title

Content

Go to Workspace to View


2nd / 2nd:

Title

Content

Go to Workspace to View

  • Go to Workspace to View: Redirects to the Event Viewer to view current events (filter condition: df_event_id)

Diagram:

Rule Aggregation

All

Associated Events: 123

Aggregation Period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated Detection Rules:

  • {{Event Title}} >>View
  • View: Redirects to the Explorer to view all events generated by the current monitor within the aggregation period (filter condition: df_monitor_checker_id)

Diagram:

Detection Rule - Monitor

Detection Type: Monitor

Detection Rule Name: {{Host}} CPU exceeds {Result}%

Detection Rule ID: rule_cdbkjcbsdjcb1234445455

Associated Events: 123

Aggregation Period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Go to Workspace to View

  • Redirects to the Explorer to view associated events for the current monitor (filter condition: df_monitor_checker_id)

Diagram:

Detection Rule - Smart Check

Detection Type: Smart Check

Detection Rule Name: {{Host}} CPU exceeds {Result}%

Detection Rule ID: rule_cdbkjcbsdjcb1234445455

Associated Events: 123

Aggregation Period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Go to Workspace to View

  • Redirects to the Explorer to view associated events for the current smart check rule (filter condition: df_monitor_checker_id)

Diagram:

Detection Rule - SLO

Detection Type: SLO

Detection Rule Name: {{Host}} CPU exceeds {Result}%

Detection Rule ID: rule_cdbkjcbsdjcb1234445455

Associated Events: 123

Aggregation Period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Go to Workspace to View

  • Redirects to the Explorer to view associated events for the current SLO (filter condition: df_monitor_checker_id)

Diagram:

Detection Dimensions

Detection Dimensions: service:kodo,host:test

Associated Events: 123

Aggregation Period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated Detection Rules:

  • {{Event Title}} >>View

Tags

Tags: service:kodo,host:test

Associated Events: 123

Aggregation Period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated Detection Rules:

  • {{Event Title}} >>View
  • Redirects to the Explorer to view associated events for the current detection rule (filter condition: df_monitor_checker_id)

Diagram:

Intelligent Aggregation

Title Clustering

Title: {{Host}} CPU exceeds {Result}%

Associated Events: 123

Aggregation Period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated Detection Rules:

  • {{Event Title}} >>View
  • Redirects to the Explorer to view all events generated by the current detection rule within the aggregation period (filter condition: df_monitor_checker_id)

Diagram:

Content Clustering

Title: {{Host}} CPU exceeds {Result}%

Associated Events: 123

Aggregation Period: 2023/11/20 10:00 ~ 2023/11/20 10:05

Associated Detection Rules:

  • {{Event Title}} >>View
  • Redirects to the Explorer to view all events generated by the current detection rule within the aggregation period (filter condition: df_monitor_checker_id)

Diagram:

AI Aggregation

Title: Summary of this alert.

Handling Suggestions: Recommendations for handling the current alert.

Aggregated Alerts: "Summary": Multiple hosts experienced CPU and memory anomalies, with the highest anomaly value being 98% (host 172.16.200.108). Host 1

Related Detection Rules: df_monitor_checker_ids: Involved monitors (rule IDs).

Aggregated Alerts: "Summary": Multiple hosts experienced CPU and memory anomalies, with the highest anomaly value being 98% (host 172.16.200.108). Host 1

Related Detection Rules: df_monitor_checker_ids: Involved monitors (rule IDs).

Example:

Title: Within the aggregation period, a total of 3 monitors triggered alert events, generating 19 alert notifications.

Handling Suggestions: Prioritize handling high-frequency alert hosts, such as host 172.16.200.101 involving CPU anomalies, memory anomalies, and communication issues, requiring a comprehensive inspection. Check alert correlations; multiple monitors (rule IDs) involve host resources (CPU, memory) and module communication, which may indicate a systemic issue. Optimize monitoring strategies to reduce repeated alerts within short time periods and apply alert noise reduction based on time windows.

Aggregated Host Alerts: Multiple hosts experienced CPU and memory anomalies, with the highest anomaly value being 98% (host 172.16.200.108). Host 172.16.200.101 triggered both CPU and memory alerts and requires focused inspection.

Related Detection Rules: View title ("rul_e68e2d5e620b40c691128a399de3f479")

Aggregated Application Alerts: Multiple hosts experienced CPU and memory anomalies, with the highest anomaly value being 98% (host 172.16.200.108). Host 172.16.200.101 triggered both CPU and memory alerts and requires focused inspection.

Related Detection Rules: View title ("rul_e68e2d5e620b40c691128a399de3f479")

Diagram: