지금 지원 담당자와 채팅
지원 담당자와 채팅

Foglight for Container Management 6.0.0 - User Guide

Understanding Foglight for Container Management Using Foglight for Container Management Reference

Health Check

This rule detects abnormal Container health status and fires alarm for different severity abnormal health status.

DockerContainer

 

Container that is already stopped for abnormal reason.

Critical

Send email to Docker Swarm Administrator

This rule detects abnormal long-time paused Container and fires alarm for different severity abnormal health status.

DockerContainer

 

Container paused for two continuous data submission periods.

Warning

None

This rule detects abnormal Docker Swarm Service health status and fires alarm for different severity abnormal health status.

DockerService

 

Missing some of the replicated task running for this service.

Critical

Send email to Docker Swarm Administrator

This rule detects abnormal Docker Swarm Task health status and fires alarm for different severity abnormal health status.

DockerTask

 

Task that is in failed, orphaned or remove status.

Critical

Send email to Docker Swarm Administrator

This rule detects abnormal long-time pending Docker Swarm Task and fires alarm for different severity abnormal health status.

DockerTask

 

Task that is in pending status for two continuous data submission periods.

Warning

None

Usage

This rule detects abnormal CPU Utilization for Docker Swarm Containers, and fire alarm on different severities. It is disabled by default. You can customize it and enable it based on your different requirements. For more details about customization, refer to Customization . You can also change value of the registry variables or use your own value to change the threshold of each severities. This rule only works for those Containers that configures CPU limit.

DockerContainerCPU

 

Container whose usage is about to reach the limit, the ration is above the value configured in fatal Threshold.

Fatal

Docker:ContainerCpuUtilizationFatal

Send email to Kubernetes Administrator

Pods whose usage is about to reach the limit, the ration is above the value configured in critical Threshold.

Critical

Docker:ContainerCpuUtilizationCritical

None

Pods whose usage is about to reach the limit, the ration is above the value configured in warning Threshold.

Warning

Docker:ContainerCpuUtilizationWarning

None

This rule detects abnormal Memory Utilization for Docker Swarm Containers, and fire alarm on different severities. It is disabled by default. You can customize it and enable it based on your different requirements. For more details about customization, refer to Customization . You can also change value of the registry variables or use your own value to change the threshold of each severities. This rule only works for those Containers that configures Memory limit.

DockerContainerMemory

 

Container whose usage is about to reach the limit, the ration is above the value configured in fatal Threshold.

Fatal

Docker:ContainerMemoryUtilizationFatal

Send email to Kubernetes Administrator

Pods whose usage is about to reach the limit, the ration is above the value configured in critical Threshold.

Critical

Docker:ContainerMemoryUtilizationCritical

None

Pods whose usage is about to reach the limit, the ration is above the value configured in warning Threshold.

Warning

Docker:ContainerMemoryUtilizationWarning

None

Customization

IMPORTANT: Avoid editing rules in the Administration > Rules & Notifications > Rule Management dashboard. Default rules may be modified during regular software updates and your edits will be lost. Always use the Alarm Templates dashboard.

Foglight 6.0 introduces alarm templates to gather alarm rules into a domain-specific template that is easily modified and applied to targets. You can customize how the alarms generated by the default cartridge rules are triggered and displayed by assigning alarm templates via the Alarm Templates dashboard. You can apply an existing template or create a new template using an existing template as reference.

Refer to Viewing, Creating, and Managing Alarm Templates in the Foglight 6.0.0 User Guide for more information.

You can and should modify the thresholds associated with alarms to better suit your environment. If you find that alarms are firing for conditions that you consider to be acceptable, you can change the threshold values that trigger the alarm. You can also enable or disable severity levels to better suit your environment.

When a rule has severity levels, a Threshold section appears in the Alarm Settings tab showing the severity levels and bounds by agent. Many rules, such as Baseline rules, do not have severity levels and thresholds.

When editing thresholds, ensure that the new values make sense in context with the other threshold values. For most metrics, threshold values are set so that Warning < Critical < Fatal. However, in metrics where normal performance has a higher value, the threshold values are reversed: Warning > Critical > Fatal.

IMPORTANT: The procedure below is a summary. Refer to Viewing, Creating, and Managing Alarm Templates in the Foglight 6.0 User Guide for more information on editing alarm templates for more information on working with alarm templates.
1
In the Navigation panel, click Alarm Templates.
5
Edit the rules using the procedure described in Viewing, Creating, and Managing Alarm Templates in the Foglight 6.0 User Guide

Kubernetes

Finding Pods inside cluster “kubecluster”, enter following statement in the Scope of a rule, and choose KubePod as the Topology Type in the Rule Scope.

KubePod where namespace.cluster.name='kubecluster'

Finding Pods inside namespace “default” of Cluster “kubecluster”, enter following statement in the Scope of a rule, and choose KubePod as the Topology Type in the Rule Scope.

KubePod where namespace.cluster.name='kubecluster' and namespace.name='test'

Finding Nodes inside cluster “kubecluster”, enter following statement in the Scope of a rule, and choose KubeNode as the Topology Type in the Rule Scope.

KubeNode where cluster.name='nancyakscluster'

Find Pods with labels “run=nginx” and “env=prod” among all clusters, enter following statement in the Scope of a rule, and choose KubePod as the Topology Type in the Rule Scope.

KubePod where labels.key='run' and labels.value='nginx-rollingupdate' and labels.key=’env’ and labels.value=’prod’

If you want to find Pods by labels in namespace “test” of cluster “kubecluster”, you can append and namespace.cluster.name='kubecluster' and namespace.name='test' to the end of above statement.

Find Nodes with labels “env=prod” among all clusters, enter following statement in the Scope of a rule, and choose KubeNode as the Topology Type in the Rule Scope.

KubeNode where labels.key='env' and labels.value='prod'

If you want to find Nodes by labels in cluster “kubecluster”, you can append and cluster.name='kubecluster' to the end of above statement.

Find Pods Metrics with labels “run=nginx” and “env=prod” among all clusters, enter following statement in the Scope of a rule, and choose KubeHeapsterMetrics as the Topology Type in the Rule Scope.

KubePod.metrics where object.labels.key='run' and object.labels.value=’nginx’ and object.labels.key='env' and object.labels.value=’prod’

If you want to find Pods by labels in namespace “test” of cluster “kubecluster”, you can append and namespace.cluster.name='kubecluster' and namespace.name='test' to the end of above statement.

Find Node Metrics with labels “env=prod” among all clusters, enter following statement in the Scope of a rule, and choose KubeHeapsterMetrics as the Topology Type in the Rule Scope.

KubeNode.metrics where object.labels.key='env' and object.labels.value=’prod’

If you want to find Nodes by labels in cluster “kubecluster”, you can append and cluster.name='kubecluster' to the end of above statement.

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택