• Cloud Eye

  1. Help Center
  2. Cloud Eye
  3. User Guide
  4. Alarm Rule Management
  5. Modifying an Alarm Rule

Modifying an Alarm Rule


  1. Log in to the management console.
  2. Click in the upper left to select a region and a project.
  3. Under Management & Deployment, select Cloud Eye.
  4. Choose Alarm Management > Alarm Rules.
  5. You can choose either of the following two methods to access the page for modifying alarm rules:
    • On the Alarm Rules page, locate the row containing the target alarm rule, click More in the Operation column, and click Modify.
    • On the Alarm Rules page, click the name of the target alarm rule. On the displayed page, click Modify in the upper right corner.
  6. In the Modify Alarm Rule dialog box, modify parameters of the alarm rule.

    Table 1 Parameters



    Example Value


    Specifies the alarm rule name. The system generates a name randomly but you can change it.



    (Optional) Provides supplementary information about the alarm rule.


    Resource Type

    Specifies the name of the service for which the alarm rule is configured.

    Elastic Cloud Server


    Specifies the metric dimension of the alarm rule.


    Monitored Object

    Specifies the resource for which the alarm rule is set. You can specify one or more resources.


    Monitored Object ID

    Specifies the resource ID.



    For example:

    • CPU Usage

      Indicates the CPU usage of the monitored object. The unit is percent.

    • Memory Usage

      Indicates the percentage of memory currently in use. The unit is percent.


    Alarm Policy

    Specifies the policy that triggers an alarm.

    For example, trigger an alarm if the metric average data equals to or is greater than 80% for 3 consecutive periods of 5 minutes.


    Alarm Severity

    Specifies the severity of the alarm. Valid values are Critical, Major, Minor, and Informational.


    Alarm Notification

    Specifies whether to notify users when alarms are triggered. Notifications can be sent as emails or text messages, or HTTP/HTTPS requests sent to the servers.


  1. Click OK.