Converse agora com nosso suporte
Chat com o suporte

Foglight for Container Management 4.0 - User Guide

Understanding Foglight for Container Management Using Foglight for Container Management Reference

Health Check

This rule detects abnormal Container health status and fires alarm for different severity abnormal health status.

DockerContainer

 

Container that is already stopped for abnormal reason.

Critical

Send email to Docker Swarm Administrator

This rule detects abnormal long-time paused Container and fires alarm for different severity abnormal health status.

DockerContainer

 

Container paused for two continuous data submission periods.

Warning

None

This rule detects abnormal Docker Swarm Service health status and fires alarm for different severity abnormal health status.

DockerService

 

Missing some of the replicated task running for this service.

Critical

Send email to Docker Swarm Administrator

This rule detects abnormal Docker Swarm Task health status and fires alarm for different severity abnormal health status.

DockerTask

 

Task that is in failed, orphaned or remove status.

Critical

Send email to Docker Swarm Administrator

This rule detects abnormal long-time pending Docker Swarm Task and fires alarm for different severity abnormal health status.

DockerTask

 

Task that is in pending status for two continuous data submission periods.

Warning

None

Usage

This rule detects abnormal CPU Utilization for Docker Swarm Containers, and fire alarm on different severities. It is disabled by default. You can customize it and enable it based on your different requirements. For more details about customization, refer to Customization . You can also change value of the registry variables or use your own value to change the threshold of each severities. This rule only works for those Containers that configures CPU limit.

DockerContainerCPU

 

Container whose usage is about to reach the limit, the ration is above the value configured in fatal Threshold.

Fatal

Docker:ContainerCpuUtilizationFatal

Send email to Kubernetes Administrator

Pods whose usage is about to reach the limit, the ration is above the value configured in critical Threshold.

Critical

Docker:ContainerCpuUtilizationCritical

None

Pods whose usage is about to reach the limit, the ration is above the value configured in warning Threshold.

Warning

Docker:ContainerCpuUtilizationWarning

None

This rule detects abnormal Memory Utilization for Docker Swarm Containers, and fire alarm on different severities. It is disabled by default. You can customize it and enable it based on your different requirements. For more details about customization, refer to Customization . You can also change value of the registry variables or use your own value to change the threshold of each severities. This rule only works for those Containers that configures Memory limit.

DockerContainerMemory

 

Container whose usage is about to reach the limit, the ration is above the value configured in fatal Threshold.

Fatal

Docker:ContainerMemoryUtilizationFatal

Send email to Kubernetes Administrator

Pods whose usage is about to reach the limit, the ration is above the value configured in critical Threshold.

Critical

Docker:ContainerMemoryUtilizationCritical

None

Pods whose usage is about to reach the limit, the ration is above the value configured in warning Threshold.

Warning

Docker:ContainerMemoryUtilizationWarning

None

Customization

To customize a rule, Rule Scope and Condition will be used frequently.

To access Rule Scope and Condition, do the following:
1
Under Dashboards, click Administration > Rules & Notifications > Rules, then click on the rule and select View and Edit.
2
Click Rule Editor on the Rule Detail popup dialog box. Then click Continue on the Confirm Edit Rule popup dialog box.
3
On the Rule Editor dashboard, Rule Scope can be located on the Rule Definition tab and Condition can be located on the Condition & Actions tab.
Figure 56. Rule Scope
Figure 57. Condition

Kubernetes

Finding Pods inside cluster “kubecluster”, enter following statement in the Scope of a rule, and choose KubePod as the Topology Type in the Rule Scope.

KubePod where namespace.cluster.name='kubecluster'

Finding Pods inside namespace “default” of Cluster “kubecluster”, enter following statement in the Scope of a rule, and choose KubePod as the Topology Type in the Rule Scope.

KubePod where namespace.cluster.name='kubecluster' and namespace.name='test'

Finding Nodes inside cluster “kubecluster”, enter following statement in the Scope of a rule, and choose KubeNode as the Topology Type in the Rule Scope.

KubeNode where cluster.name='nancyakscluster'

Find Pods with labels “run=nginx” and “env=prod” among all clusters, enter following statement in the Scope of a rule, and choose KubePod as the Topology Type in the Rule Scope.

KubePod where labels.key='run' and labels.value='nginx-rollingupdate' and labels.key=’env’ and labels.value=’prod’

If you want to find Pods by labels in namespace “test” of cluster “kubecluster”, you can append and namespace.cluster.name='kubecluster' and namespace.name='test' to the end of above statement.

Find Nodes with labels “env=prod” among all clusters, enter following statement in the Scope of a rule, and choose KubeNode as the Topology Type in the Rule Scope.

KubeNode where labels.key='env' and labels.value='prod'

If you want to find Nodes by labels in cluster “kubecluster”, you can append and cluster.name='kubecluster' to the end of above statement.

Find Pods Metrics with labels “run=nginx” and “env=prod” among all clusters, enter following statement in the Scope of a rule, and choose KubeHeapsterMetrics as the Topology Type in the Rule Scope.

KubePod.metrics where object.labels.key='run' and object.labels.value=’nginx’ and object.labels.key='env' and object.labels.value=’prod’

If you want to find Pods by labels in namespace “test” of cluster “kubecluster”, you can append and namespace.cluster.name='kubecluster' and namespace.name='test' to the end of above statement.

Find Node Metrics with labels “env=prod” among all clusters, enter following statement in the Scope of a rule, and choose KubeHeapsterMetrics as the Topology Type in the Rule Scope.

KubeNode.metrics where object.labels.key='env' and object.labels.value=’prod’

If you want to find Nodes by labels in cluster “kubecluster”, you can append and cluster.name='kubecluster' to the end of above statement.

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação