Monitoring Metric | Unit | Description |
Write Requests | - | Number of write requests received by the instance. |
Read Requests | - | Number of read requests received by the instance. |
Update Requests | - | Number of update requests received by the instance. |
Deletion Requests | - | Number of deletion requests received by the instance. |
Count Requests | - | Number of total requests received by the instance. |
Aggregate Requests | - | Number of aggregate requests received by the instance. |
Successfully Executed Requests | - | Number of requests received by the instance that are executed successfully. |
Disk Utilization | % | The percentage of the used space to the total space of the current disk. |
Requests Consuming 10-50 ms | - | Number of requests with an execution time between 10 and 50 ms. |
Requests Consuming 50-100 ms | - | Number of requests with an execution time between 50 and 100 ms. |
Requests Consuming More Than 100 ms | - | Number of requests with an execution time of more than 100 ms. |
Connection Utilization | % | The percentage of current connections to the maximum connections of the cluster. |
Requests per Second | - | Number of requests received by the instance per second. |
Command Requests | - | Number of command requests received by the cluster other than INSERT, UPDATE, DELETE, and QUERY requests. |
Number of Connections | - | Number of TCP connections from cluster clients. |
Monitoring Metric | Unit | Description |
Dirty Data in Cache | % |
The percentage of data in the current cache that has been modified but not yet written to disk to the total cache data. |
Cache Utilization | % | The percentage of the used space to the total space of the current cache. |
Disk Utilization | % | The percentage of the used space to the total space of the current disk. |
Cache Hit Rate | % | The percentage of requested data that already exists in the cache when the system uses the cache. |
Oplog Retention Period | hours | Oplog is used to record the operation log of the database, and this metric counts its storage time. |
Average primary-secondary delay in Unit Time | s | In the replica set architecture, the secondary node periodically polls the oplog (operation log) of the primary node to replicate the data from it. This metric counts the primary-secondary delay in data sync. |
Monitoring Metric | Unit | Description |
CPU Utilization | % | The percentage of time the CPU is executing processes to the total CPU time. |
Memory Utilization | % | The percentage of the used space in the current memory to the total memory space. |
Inbound Network Traffic | KB/s | Number of bytes per second in the traffic inbound to the node. |
Outbound Network Traffic | KB/s | Number of bytes per second in the traffic outbound from the node. |
Read Requests in Queue | Pcs | Number of read requests waiting in the queue. |
Write Requests in Queue | Pcs | Number of write requests waiting in the queue. |
Number of Connections | Pcs | Number of client connections. |
Used Disk Space | MB | Used node disk capacity. |
WiredTiger Active Reads | Pcs | Number of active read requests in the memory. |
WiredTiger Active Writes | Pcs | Number of active write requests in the memory. |
Data Entries Deleted via TTL | Pcs | The number of data entries automatically deleted by the database after the TTL expires. |
TTL Run Times | - | The number of times data is checked within the TTL time set in the database. |
Parameter | Description |
Policy Name | Customize the alarm policy name for easier identification. |
Remarks | Briefly describe the alarm policy for easier identification. |
Monitoring Type | Select Cloud Product Monitoring. |
Policy Type | Set Policy Type to TencentDB/MongoDB/instance, TencentDB/MongoDB/node, or TencentDB/MongoDB/replica set. |
Project | Specify a project for the alarm policy. You can quickly locate all alarm policies of a project in the alarm policy list. |
Alarm Object | If you select Instance ID, the alarm policy will be bound to the specified database instance. If you select Instance Group, the alarm policy will be bound to the specified database instance group. For more information on how to create an instance group, see Instance Group. If you select All Objects, the alarm policy will be bound to all instances the current account has permission on. If you select Tag, the alarm policy will be bound to all instances associated with the current tag key and tag value. |
Trigger Condition | Select template: You can select a template file in the drop-down list, and alarms will be reported based on the trigger conditions preset in the template. For specific configurations, see Configuring Trigger Condition Template. Configure manually: You need to configure the threshold for triggering an alarm for each metric in the Metric Alarm section below. Alarm threshold type has the following values: If you select Static, you can manually set a fixed threshold, and alarms will be triggered when the threshold is reached. If you select Dynamic, exceptions will be determined based on the dynamic threshold boundaries calculated by machine learning algorithms. |
Alarm Notification | You can select a preset or custom notification template. Each alarm policy can be bound to three notification templates at most. For more information, see Alarm Notification. |
API Name | Description |
Creates an alarm policy in TCOP |
Was this page helpful?