当前位置:网站首页>Alibaba cloud Prometheus monitoring service
Alibaba cloud Prometheus monitoring service
2022-07-02 09:54:00 【Don't talk about Xiao Li】
What is? Prometheus?
Prometheus Is an open source system monitoring and alerting toolkit
Native Prometheus:Overview | Prometheus
working principle :prometheus Introduction of the principle _ Yuan Sheng's blog -CSDN Blog _prometheus principle
frame :
Alibaba cloud Prometheus
1. brief introduction :
Alibaba cloud Prometheus Monitoring and comprehensive docking Prometheus ecology , Support component monitoring with rich types , Provide a variety of out of the box preset monitoring market , And provide fully managed Prometheus service .
Please refer to Alibaba cloud Prometheus Official documents explain .
explain Prometheus It is an open source monitoring and alarm system . The main features include multidimensional data model 、 Flexible query statements PromQL And visual display of data . For more information , Please see the Prometheus Official documents .
2. Use : Application real-time monitoring service ARMS
1) establish Prometheusf example
for The cloud service :
1. Suitable for passing Prometheus Monitor to collect 、 Scenarios for storing and displaying monitoring data of various Alibaba cloud services . Supported cloud services include ECS、RDS、 Message service RocketMQ、 Message service Kafka etc.
2. At present, our company's services are deployed ecs , Alibaba cloud Prometheus Direct access .
for VPC:
1. Suitable for Alibaba cloud VPC Inside ( Usually it is ECS colony ) Conduct Prometheus The scene of monitoring . You can add... Through the integration center VPC Monitoring of applications and components in .
2. At present, our company's redis,mq And other components are deployed in ecs But for independence , Not Alibaba cloud integrated components , So use vpc Instance to monitor
After creation, you can see the instance list .
2) Component access
Enter the access center , Select the components to be accessed , Here we choose three components of our company , For database RDS Direct access to cloud services , There is no need to monitor
Configure the accessed components : Enter the corresponding address and port password
3) Configure related security groups , Enable data to be monitored
As shown below , After adding corresponding components , You need to check whether the corresponding port is in the security group white list
Security group link , If it is already within the scope, there is no need to add
4) Check the market list
After access, the vpc The list of monitored components can be seen in the instance
View the monitored in the cloud service instance list ecs Services and rds
Enter cloud services ecs Monitoring interface , Select the service you want to view , You can view the real-time service
5) Monitor alarms and notifications
Set up contacts
Real people and robots can be set Real people can be added directly The robot is as follows :
1. Choose group chat to create robot
2. Copy the robot address here Add
Set alarm rules
1. Customize PromQL For Alibaba cloud products , Static threshold is for k8s pod Of memory
2. We choose to customize PromQL that will do , And select the monitoring examples
3. Select the reference index , Or write it yourself PromQL
4. The alarm content can be edited , To distinguish which service sent it , You can print the instance name { { $labels.instanceName }} The system used to print id You can't tell which service it is at a glance .
5. You can select the corresponding notification policy , Or not .
Be careful : Because the warning rules can only monitor the target accurately example And which cloud products cannot be distinguished from which specific services , Therefore, you cannot create alarm rules for specific services , Nor can it be created for any environment , It can only be distinguished by creating and assigning different notification policies Different environments and services . See notification strategy
Set notification policy
1. For services that need to be monitored , Or create notification policies in specific environments
2. This strategy can be assigned to specific alarm rules .
3. Save and enable after creation
Alarm handling
1.Prometheus The created alarm will be sent to the corresponding contact through the notification strategy
2. After receiving the alarm , The alarm can be handled , If it is not handled, the alarm will be sent continuously after the set time , Until the alarm is restored
边栏推荐
- How to use pyqt5 to make a sensitive word detection tool
- 高考那些事
- YOLO物体识别,生成数据用到的工具
- Safety production early warning system software - Download safety production app software
- Fragmenttabhost implements the interface of housing loan calculator
- 图像识别-数据采集
- Error reporting on the first day of work (incomplete awvs unloading)
- 阿里云ack介绍
- Cmake command - Official Document
- 2837xd code generation - stateflow (2)
猜你喜欢
互联网API接口幂等设计
TD conducts functional simulation with Modelsim
攻防世界-Web进阶区-unserialize3
ZK configuration center -- configuration and use of config Toolkit
阿里云短信服务
【UE5】动画重定向:如何将幻塔人物导入进游戏玩耍
滲透測試的介紹和防範
Image recognition - Data Cleaning
The latest progress and development trend of 2022 intelligent voice technology
Share a blog (water blog)
随机推荐
2837xd代码生成模块学习(1)——GPIO模块
2837xd 代码生成——StateFlow(2)
2837xd code generation - stateflow (1)
2837xd 代码生成——总结篇
Mixed development of uni app -- Taking wechat applet as an example
PI control of grid connected inverter (grid connected mode)
Attack and defense world web advanced area unserialize3
Bugkuctf-web21 (detailed problem solving ideas and steps)
BugkuCTF-web16(备份是个好习惯)
The latest progress and development trend of 2022 intelligent voice technology
Discussion on improving development quality and reducing test bug rate
Junit5 支持suite的方法
Supplier selection and prequalification of Oracle project management system
Image recognition - Data Acquisition
Read Day5 30 minutes before going to bed every day_ All key values in the map, how to obtain all value values
C语言之最小数
Introduction et prévention des essais de pénétration
高考那些事
每天睡前30分钟阅读Day5_Map中全部Key值,全部Value值获取方式
Required request body is missing:(跨域问题)