All Products
Search
Document Center

Application Real-Time Monitoring Service:Integrate Open-Falcon with ARMS

Last Updated:Mar 11, 2026

Forward Open-Falcon alerts to ARMS Alert Management for centralized alert handling, deduplication, and notification routing.

Prerequisites

Before you begin, make sure that you have:

  • An Alibaba Cloud account with access to the ARMS console

  • A running Open-Falcon deployment

Step 1: Create an Open-Falcon integration

  1. Log on to the ARMS console. In the left-side navigation pane, choose Alert Management > Integrations.

  2. On the Alert Integration tab, click OpenFalcon.

  3. In the Create OpenFalcon Integration dialog box, enter a name and description, specify the automatic recovery time, and click Save.

    Note

    If an alert event is not triggered again within the specified recovery period, it is automatically cleared.

  4. On the Alert Integration tab, find the integration you created and copy the URL in the Integration Address column.

    Integration address for the Open-Falcon integration

Step 2: Configure the callback in Open-Falcon

  1. Log on to the Open-Falcon homepage.

  2. In the top navigation bar, click Templates.

  3. In the upper-right corner of the Templates page, enter a name for the new alert template and click the + icon.

  4. On the Configure Template page, create an alert rule in the Policies in the Template section. For details, see the Open-Falcon documentation.

  5. Set Callback Address to the integration address you copied in Step 1 and click Save.

(Optional) Step 3: Customize field mappings

ARMS provides field mappings between Open-Falcon alert sources and ARMS alert events. To add or modify mappings, edit the integration.

Sample alert source:

{
    "name": "cpu alert",
    "endpoint": "test-host",
    "metric": "cpu.user",
    "status": "PROBLEM",
    "step": "1",
    "priority": 2,
    "time": "2021-09-08 09:25:00",
    "tpl_id": 1,
    "exp_id": 2,
    "stra_id": 1,
    "tags": ""
}

Send test data

  1. On the Alert Integration tab, find the integration and click Edit in the Actions column.

  2. In the Event Mapping section, click Send Test Data.

  3. In the Send Test Data dialog box, paste a JSON alert payload and click Send.

    Note
    • If the message Uploaded. No events are generated. Configure mappings based on the original data. appears, the source fields have not been mapped yet. The raw data appears in the left pane for field selection during mapping configuration.

    • If the message Uploaded. appears, the event was reported successfully. For details, see View historical alert events.

  4. In the Send Test Data dialog box, click Disable.

Configure field mappings

  1. In the left pane of the Event Mapping section, click a data record to view its details.

  2. In the right pane, map source fields to ARMS alert fields. Click the Map icon next to a field to choose a mapping method:

    MethodDescription
    DirectMap one source field directly to one ARMS alert field
    SeriesConcatenate multiple source fields with a delimiter, then map the result to one ARMS alert field. Only special characters are supported as delimiters
    ConditionMap source fields only when their values meet specified conditions
    Mapping tableMap source severity levels to ARMS severity levels. Use this method only for the severity field

ARMS alert fields

FieldDescription
alertnameCustom alert name
severityAlert level. You must configure mappings for this field. The mapping method must be set to Direct
messageAlert description used as the notification message body. Maximum 15,000 characters
valueSample metric value
imageUrlURL of a Grafana metrics line chart, displayed in the alert details
checkCheck item, such as CPU, JVM, Application Crash, or Deployment
sourceAlert source identifier
classObject type that triggered the event, such as host
serviceSource service, such as Login Service
startatTimestamp for the event start time
endatTimestamp for the event end time
generatorUrlURL of the event details page

(Optional) Set a root node for batch processing

If the alert data contains an array node, you can designate it as the root node to process each element as a separate event.

  1. In the Select Root Node section, select Use Batch Processing.

  2. Select the array node to process as the root node.

Note

Only one array node can be selected for batch processing at a time.

Configure event deduplication

Deduplication merges events that share the same value for a specified field into a single alert notification, reducing noise from repeated alerts.

Note

Deduplication applies only to events that have not been cleared.

  1. In the Event Deduplication section on the Integration Details page, select the fields to use for deduplication.

  2. Click Deduplication Test to preview how historical events would be grouped.

    Note

    The deduplication test uses only the 10 most recently uploaded data records from the Event Mapping section.

  3. Click Save.

View alert event details

  1. In the left-side navigation pane of the ARMS console, choose Alert Management > Alert Event History.

  2. Click an alert event name to view its details. For more information, see View historical alert events.

Manage the integration

On the Alert Integration tab (Alert Management > Integrations), the following operations are available:

OperationSteps
View detailsClick the integration row to open the Integration Details page
Update the keyChoose More > Update Key in the Actions column and click OK. After the key is updated, update the callback address in your Open-Falcon alert template as described in Step 2
EditClick Edit in the Actions column, modify the settings, and click Save
Enable or disableClick Enable or Disable in the Actions column
DeleteClick Delete in the Actions column and click OK
Add an event processing flowClick Add Event Processing Flow in the Actions column. For details, see Work with event processing flows
Create a notification policyChoose More > Create Notification Policy in the Actions column. For details, see Create and manage a notification policy

What to do next

Create a notification policy so that the system generates alerts and sends alert notifications for reported alert events based on the policy. For details, see Create and manage a notification policy.

After notifications are configured, verify delivery on the Alert Sending History page. For details, see View historical alerts.