检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
手动迁移AOM 1.0数据至AOM 2.0 引导用户如何将AOM 1.0 的数据迁移至AOM 2.0 ,目前仅支持日志升级、采集器升级和告警规则升级功能。 功能介绍 日志升级 日志升级后,容器日志和虚机日志均接入AOM 2.0,历史虚机日志可登录AOM 1.0查看。 采集器升级
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"event_type" : "alarm", "resource_id" : "ecs123", "resource_provider" : "ecs", "resource_type" : "vm" }, "policy"
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
collectTime、containerName、hostIP、hostIPv6、hostId、hostName、nameSpace、pathFile、podName、serviceID,默认简化显示,并且hostIP、hostName、pathFile默认显示在最前面。 结构
"id": "2137", "alarmName": "aaaaaaaa", "alarmDescription": "", "actionEnabled": false, "okActions": [],
Agent版本2.4.5-profiler/2.4.5-profiler-jdk17及以后版本,支持Profiler。 Agent获取地址,请参考:探针下载地址。 使用限制及说明如下: 表3 使用限制及说明 序号 使用限制及说明 1 每个环境最多支持开启500个Profiler。 2 P
通过日志列表查看日志内容 日志列表中展示了满足2中已设查询条件的日志的详细内容。 图2 通过日志列表查看日志内容 您还可执行如下操作: 单击,可查看指定日志的主机IP、来源等详细信息。 对搜索结果排序:AOM会根据日志的采集时间对搜索结果进行排序,以方便您查看,排序方式默认为倒序,您可单击“采集时间”列
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
alarm_rule_template_name_en String 告警规则模板英文名称。 alarm_rule_template_description String 告警规则模板描述。 alarm_rule_template_id String 告警规则模板id。 alarm_r
从资源列表中选择合适的资源实例。 资源列表仅展示与应用企业项目相同的资源。 图7 关联资源 设置完成后,单击“关联”。 如果关联的资源为云服务器ECS资源,需要单击“关联资源&安装Agent”,在关联资源后继续完成Agent安装。安装Agent的详情操作请参见安装UniAgent。 配置告警