Got it

What Is Cloud Eye?

Latest reply: Apr 22, 2017 00:54:26 1828 2 0 0 0

What Is Cloud Eye?

Cloud Eye (CES) is an open monitoring platform that provides monitoring, alarm reporting, and alarm notification for your resources. CES can monitor metrics of the following services: Elastic Cloud Server (ECS), Elastic Volume Service (EVS), Virtual Private Cloud (VPC), Relational Database Service (RDS), Distributed Cache Service (DCS), Distributed Message Service (DMS), Elastic Load Balance (ELB), Auto Scaling (AS), Web Application Firewall (WAF), Host Vulnerability Detection (HVD), Workspace.. You can add alarm rules and configure alarm notification policies to learn the running status and performance of service instances in a timely manner.

Table 1 describes the functions provided by CES.

Table 1 CES functions

Function

Description

Dashboard

Displays the number of metrics of each service monitored by CES. You can add or delete monitoring metrics.

The service metrics to choose from are as follows:

  • ECS: CPU Usage, Disks Read Rate, Disks Read Requests, Disk Usage, Disks Write Rate, Disks Write Requests, Memory Usage, Inband Incoming Rate, Inband Outgoing Rate, Outband Incoming Rate, System Status Check Failed, and Outband Outgoing Rate
  • EVS: Disks Read Rate, Disks Write Rate, Disks Read Requests, and Disks Write Requests
  • AS: CPU Usage, Memory Usage, Instance Qty., Inbound Rate, and Outbound Rate
  • ELB: cps, Active Connections, Inactive Connections, New cps, Inbound Packets, Outbound Packets, Inbound Rate, Outbound Rate, Abnormal Hosts, and Normal Hosts
  • VPC: Upstream Bandwidth and Downstream Bandwidth
  • DMS: Number of accumulated messages
  • DCS: CPU Usage, Memory Usage, Network Input Throughput, Network Output Throughput, Connected Clients, Client Longest Output List, Client Biggest Input Buf, Blocked Clients, Used Memory, Used Memory RSS, Used Memory Peak, Used Memory Lua, Memory Fragmentation Ratio, Total Connections Received, Total Commands Processed, Instantaneous Ops Per Second, Total Net Input Bytes, Total Net Output Bytes, Instantaneous Input Kbps, Instantaneous Output Kbps, Rejected Connections, Sync Full, Sync Partial OK, Sync Partial Err, Expired Keys, Evicted Keys, Keyspace Hits, Keyspace Misses, PubSub Channels, PubSub Patterns, Aof Current Size, and Latest Fork usec
  • RDS: Disk Usage, CPU Usage, Memory Usage, Input/output operations per second (IOPS), Network Input Throughput, Network Output Throughput, Total Connections, Active Connections, Query Per Second (QPS), transactions per second (TPS), Buffer Pool Usage, Buffer Pool Hit Rate, Buffer Pool Dirty Block Rate, InnoDB Read Throughput, InnoDB Write Throughput, File Read Speed, File Write Speed, Log Write Request Speed, Log Physical Write Speed, Log fsync() Write Speed, Temporary Tables Qty, Key Buffer Usage, Key Buffer Write Hit Rate, Key Buffer Read Hit Rate, MyISAM Disk Write Speed, MyISAM Disk Read Speed, MyISAM Buffer Pool Write Speed, MyISAM Buffer Pool Read Speed, Delete Execute Speed, Insert Execute Speed, Insert_Select Execute Speed, Replace Execute Speed, Replace_Select Execute Speed, Select Execute Speed, Update Execute Speed, Row Delete Speed, Row Insert Speed, Row Read Speed, Row Update Speed,
  • WAF: SQL Injection Alarms, cross site script (XSS) Vulnerability, Alarms, Webshell Upload Alarms, Link Theft Alarms, IP Address Blacklist Alarms, and IP Address Whitelist Alarms
  • HVD: High-Risk Vulnerabilities, Medium-Risk Vulnerabilities, and Low-Risk Vulnerabilities
  • Workspace: CPU Usage, Memory Usage, Disk Usage, Input/output operations per second (IOPS), Network Input Throughput, and Network Output Throughput.

Instance monitoring

Shows the status of service instances. If you have signed up for one or more services from the following services: ECS, EVS, VPC, ELB, AS, DMS, DCS, WAF, HVD, Workspace, and RDS, you can use CES to view the status of service instances without installing additional plug-ins.

Alarm

Adds, views, modifies, deletes, enables, or disables alarm rules.

View more
  • x
  • convention:

thanks!
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.