Updated on 2025-08-12 GMT+08:00

Configuring Alarm Rules on the LTS Console

After event reporting is enabled, resource events will be reported to the log stream created by CCI 2.0. You can configure alarm rules on the LTS console. After events are generated and reported, the contacts configured on the SMN console will receive notifications.

Configuring Structured Parsing

  1. Log in to the LTS console. In the log group list on the Log Management page, click the log group name to go to the log group details page.
  2. Click in the upper right corner.
  3. On the Cloud Structuring Parsing tab, select JSON, and enter the event content in the Select a sample log event step.
  4. Click Intelligent Extraction and then Save. After the configuration is successful, the reported events will be parsed based on the structured analysis rule.
    Figure 1 Configuring structured parsing

Creating an Alarm Rule

  1. Log in to the LTS console. In the log group list on the Log Management page, click the log group name to go to the log group details page.
  2. Configure filtering criteria for searing for the target events. You can also refer to Configuring Log Alarm Rules.
    Figure 2 Configuring filtering criteria

    When searching for events based on the type field, you should use fuzzy matching so that you will not miss the events that need special attention.

  1. Log in to the LTS console. On the Log Alarms page, click Alarm Rules.
  2. Click Create.
  3. Enter basic information, select the log group and log stream, and enter keywords.
  4. Enable Alarm Action Rules and select an alarm action rule. If there are no alarm action rules, click Create Alarm Action Rule first.
    Figure 3 Configuring advanced settings
  5. Click OK.
  6. An alarm is triggered after a specific event is reported. You can view the alarm on the LTS console (Log Alarms > Alarms).
    Figure 4 Alarm triggered after a specific event is reported