All Products
Search
Document Center

Enterprise Distributed Application Service:Create and manage alert rules for application monitoring

Last Updated:Mar 11, 2026

Application performance issues -- such as JVM garbage collection spikes, slow response times, or rising error rates -- require timely detection. Alert rules in Enterprise Distributed Application Service (EDAS) monitor these metrics and notify your team through specified contacts or DingTalk groups when thresholds are crossed, so you can respond before users are affected.

Prerequisites

Before you begin, make sure that you have:

Create an alert rule

An alert rule defines which metric to watch, what threshold triggers an alert, and who gets notified.

  1. Log on to the EDAS console.

  2. In the left-side navigation pane, click Application Management > Applications. In the top navigation bar, select a region. In the upper part of the page, select a microservices namespace. Select Kubernetes Cluster from the Cluster Type drop-down list. Then, find the application and click the application name.

  3. In the left-side navigation pane, choose Alert Management > Alert Rules.

  4. On the Application Monitoring Alert Rules page, click Create Application Monitoring Alert Rule.

  5. Configure the parameters described in the following sections and click Save.

    Application monitoring alert rule configuration

Alert name and scope

ParameterDescription
Alert NameA descriptive name for this rule. Example: Alert on JVM-GC occurrences in period-over-period comparison.
Select ApplicationsThe application this alert rule applies to.
Metric TypeThe type of metric to monitor, such as JVM metrics, host metrics, or exception metrics. The available options for Alert Condition and Filter Condition change based on the metric type you select. For the full list of supported metrics, see Alert rule metrics.

Alert triggering conditions

Define when an alert fires and how metric dimensions are filtered.

ParameterDescription
Alert Triggering RulesHow multiple conditions combine: Meet all the following rules (AND logic -- all conditions must be met) or Meet One of the Following Rules (OR logic -- any single condition triggers the alert).
Alert ConditionThe threshold expression that triggers the alert. Click +Add Condition to define each condition. For example, trigger an alert when the average number of JVM full garbage collection (GC) events in the last 5 minutes increases by 100% compared to the previous hour. After you configure a condition, click the confirm icon to save it. To preview the metric trend, click the magnify icon. To delete a condition, click the delete icon. To add more conditions, click +Add Condition again.
Note

Preview the metric trend before saving to verify that your condition matches expected behavior.

Filter conditions

The Filter Condition parameter controls which dimension values are included when evaluating the alert condition.

FilterBehavior
TraversalEvaluates each value of the selected metric type individually.
NoAggregates (sums) all values of the selected metric type.
=Includes only the specified dimension values.
!=Excludes dimension values that match the specified value.
ContainIncludes only dimension values that contain the specified string.
Do Not ContainExcludes dimension values that contain the specified string.
Match Regular ExpressionIncludes only dimension values that match the specified regular expression.

Severity and notifications

ParameterDescription
Alert LevelThe severity level: P4 (lowest), P3, P2, or P1 (highest).
Notification PolicyControls how alert notifications are delivered. Without a notification rule, Application Real-Time Monitoring Service (ARMS) sends notifications only when the dispatch rule in the notification policy matches. With a notification rule, ARMS sends notifications through the method specified in the policy. Select an existing notification policy or create one. For more information, see Create and manage a notification policy. To review existing policies, click View all notification policies.

Advanced alert settings

ParameterDescription
No DataHandles data anomalies such as missing data, abnormal composite metrics, and abnormal period-over-period comparison results. If the metric data does not meet the specified conditions, the system automatically sets the value to 0 or 1, or suppresses the alert. For more information, see Terminologies.

Manage alert rules

After you create alert rules, they appear on the Application Monitoring Alert Rules page. You can search for specific rules and perform management actions.

Find an alert rule

  1. Log on to the EDAS console.

  2. In the left-side navigation pane, click Application Management > Applications. In the top navigation bar, select a region. In the upper part of the page, select a microservices namespace. Select Kubernetes Cluster from the Cluster Type drop-down list. Then, find the application and click the application name.

  3. In the left-side navigation pane, choose Alert Management > Alert Rules.

  4. (Optional) On the Application Monitoring Alert Rules page, select Rule name from the drop-down list, enter the rule name in the search box, and then click the search icon.

    Note

    The search supports fuzzy matching, so entering a keyword from the rule name is sufficient.

Available actions

In the alert rule list, find the rule and use the following actions in the Actions column:

ActionDescription
EditModify the rule configuration.
StartEnable a disabled rule.
StopDisable an active rule.
DeletePermanently remove the rule.
CopyDuplicate the rule to create a similar one.
Alert HistoryView past alert events triggered by this rule.
Alert rule list with available actions