检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Click Delete in the Operation column of the target resource group.
Deleting event alarm rules To delete an event alarm rule, click Delete in the Operation column. To delete one or more event alarm rules, select the check boxes before them and click Delete above the rule list.
Deleting a threshold rule To delete a threshold rule, choose More > Delete in the Operation column. To delete one or more threshold rules, select them and click Delete above the rule list.
Deleting a suppression rule To delete a single rule, click Delete in the Operation column in the row that contains the rule. To delete one or more rules, select them and click Delete above the rule list.
Delete On the Log Ingestion page, click Delete in the Operation column in the row that contains the target configuration. You can also delete configurations in batches. Deleted access configurations or mapped log streams cannot be recovered.
If there is more than one plug-in, both Copy and Delete are available in the Operation column. You can click Delete to delete a plug-in version. Modifying a plug-in Locate the target plug-in, hover the mouse pointer over the plug-in, and choose > Modify.
To delete one or more message templates, select them, click Delete above the template list, and then click Yes on the displayed page. NOTE: Before deleting a message template, delete the alarm action rules bound to it.
To grant a user the AOM FullAccess system policy but forbid the user to delete application discovery rules, create a custom policy that denies the deletion of application discovery rules, and grant both the AOM FullAccess and deny policies to the user.
To grant a user the AOM FullAccess system policy but forbid the user to delete application discovery rules, create a custom policy that denies the deletion of application discovery rules, and grant both the AOM FullAccess and deny policies to the user.
Click in the upper right corner of the Quick Analysis area to modify or delete an existing field. If you delete a field or modify the name of a field on the Log Structuring page, the field will be updated in the quick analysis.
Deleting a host If a UniAgent is Abnormal, Not installed, or Installation failed, you can delete the corresponding host. Locate the target host and choose Delete in the Operation column. NOTE: Hosts with UniAgent being installed, upgraded, or uninstalled cannot be deleted.
Deleting a grouping rule To delete a single rule, click Delete in the Operation column in the row that contains the rule. To delete one or more rules, select them and click Delete above the rule list.
To delete the access code, click Delete in the Operation column. Deleted access codes cannot be recovered. Exercise caution when performing this operation. Figure 2 Viewing the access code Configure Grafana. Log in to Grafana.
For example, some software developers in your enterprise need to use AOM resources but are not allowed to delete them or perform any high-risk operations such as deleting application discovery rules.
To improve system performance, manually delete unnecessary graphs. Copy Delete View larger Time select Refresh Resize Move the cursor to the lower right corner of a graph. When the cursor changes to , hold down your left mouse button to resize the graph.
Deleting one or more metrics To delete a metric, click in the Operation column. To delete one or more metrics, select them and click Delete above the metric list. Exporting a monitoring report Click Export Report to export a metric graph as a CSV file to your local PC.
Deleting an alarm tag or annotation: Move the cursor to a desired alarm tag or annotation and click to delete them. Parent topic: Remarks
Why Is "delete success:{}" Displayed (Files Cannot Be Deleted) During Disk Clearance? What Can I Do If the Execution Plan Is Not Updated After I Modify the Job? What Can I Do If "agent not found" Is Displayed?
Delete the configuration script: rm -f /root/install_uniagentd_self_OS.sh After the preceding steps are complete, you can create an image. Do not restart the Linux host before you create an image.
Deleting an access code Click Delete in the Operation column. Refreshing an access code Click to obtain the latest information of the access code. Parent topic: Settings