All Products
Search
Document Center

Application Real-Time Monitoring Service:Integrate Simple Log Service alerts

Last Updated:Mar 11, 2026

Forward Simple Log Service alerts to Application Real-Time Monitoring Service (ARMS) Alert Management through webhooks. This centralizes alert triage, deduplication, and response so you can manage alerts from multiple sources in one place.

How it works

The integration connects Simple Log Service to ARMS Alert Management in three stages:

  1. Ingest -- ARMS generates a unique webhook URL. Simple Log Service posts alert payloads to this URL.

  2. Map and deduplicate -- ARMS maps incoming fields to its standard alert schema and merges duplicate events into single notifications to reduce alert noise.

  3. Notify -- A notification policy routes processed alerts to the channels and responders you configure.

Choose an integration method

MethodScopeWhen to use
All project alertsEvery alert rule in the selected Simple Log Service projectsQuick setup when all alerts from a project are relevant
Specific alert rules (recommended)Only the alert rules you selectFine-grained control over which alerts reach ARMS

Both methods start by creating an integration in ARMS. The specific-alert-rules method adds a webhook configuration step in the Simple Log Service console.

Prerequisites

Before you begin, make sure that you have:

  • An Alibaba Cloud account with access to both the ARMS console and the Simple Log Service console

  • At least one Simple Log Service project with alert rules configured

Create an integration

Step 1: Set up the integration in ARMS

  1. Log on to the ARMS console. In the left-side navigation pane, choose Alert Management > Integrations.

  2. On the Alert Integrations tab, click Log Service.

  3. Enter a name and description, and set the automatic recovery time.

    Note

    If an alert event is not re-triggered within the specified recovery period, ARMS clears it automatically.

  4. In the Projects Enabling Alert Events section, select the projects whose alerts you want to integrate from the All Projects list, click the right_arrow icon, and then click Save.

    Note

    ARMS traverses all alert rules in the selected projects and rewrites their request URLs to https://alerts.aliyuncs.com/api/v1/cm/callback/{{token}}, where {{token}} is a key generated automatically when the integration is created.

    Log Service integration

After saving, the new integration appears on the Alert Integrations tab.

Integration key

If you chose "All project alerts", the setup is complete. Proceed to Configure field mappings to customize event processing, or skip to What's next to set up notifications.

If you chose "Specific alert rules", continue with Step 2.

Step 2: Forward specific alert rules from Simple Log Service

Important

A Simple Log Service integration must already exist in ARMS before you can add specific alert rules. Complete Step 1 first.

In ARMS

  1. On the Alert Integrations tab, find the Simple Log Service integration and copy its URL.

In Simple Log Service

  1. Log on to the Simple Log Service console.

  2. In the Projects section, click the target project name. In the left-side navigation pane, click the alert center icon.

  3. On the Alert Center page, choose Notification Objects > Webhook Integration, and click Create.

  4. Set Name to Alert Management and Type to Universal Webhook. Complete the remaining fields as prompted.

  5. Choose Notification Policy > Alert Template. Find the alert template and click Edit in the Actions column. On the Webhook-Custom tab, paste the following JSON and click Confirm:

    {
      "uid": "{{ alert.aliuid }}",
      "project": "{{ alert.project }}(https://sls.console.alibabacloud.com/#/project/{{ alert.project }}/categoryList)",
      "trigger": "{{ alert.alert_name }}",
      "condition": "{{ alert.condition }}",
      "context": "{{ alert.results[0].raw_results }}",
      "message": " [Uid] {{ alert.aliuid }}\n\n>  [Project] [{{ alert.project }}](https://sls.console.alibabacloud.com/#/project/{{ alert.project }}/categoryList)\n\n> [Trigger] {{ alert.alert_name }}\n\n> [Condition] {{ alert.alert_name }}\n\n> [Message] Notification Content\n\n> [Context] {{ alert.results[0].raw_results }}\n\n> [View Details]({{ alert.query_url }})"
    }
  6. Click the Alert Rule tab. Find the target alert rule and click Edit in the Actions column. Expand Advanced Settings, set Destination to Simple Log Service Notification and Alert Policy to Simple Mode, configure the webhook notification method as prompted, and click OK.

Configure field mappings

ARMS provides default field mappings between Simple Log Service alert payloads and ARMS alert events. Modify these mappings on the integration's edit page to match your alert schema.

Send test data

Send sample data before adjusting mappings so the editor has real fields to work with.

  1. On the Alert Integrations tab, find the integration and click Edit.

  2. In the Event Mapping section, click Send Test Data.

  3. Paste alert content in JSON format and click Send.

    • "Uploaded. No events are generated. Configure mappings based on the original data." -- Fields are not mapped yet. The raw payload appears in the left pane for reference.

    • "Uploaded." -- The data was accepted and appears on the Alert Event History page. See View historical alert events.

  4. Click Disable in the Send Test Data dialog to exit test mode.

Select a root node (optional)

If the alert payload contains an array node, designate it as the root node so each array element is processed as a separate event.

Note

Only one array node can be selected for batch processing at a time.

In the Select Root Node section, select Use Batch Processing and choose the array node.

Configure alert recovery events (optional)

Select Configure Alert Recovery Events and define the field conditions that clear an active alert. When ARMS receives an event matching these conditions, it clears the corresponding alert.

The field used to clear alerts must represent a status concept equivalent to alert severity, not the $.severity field itself. For example, setting the condition to {$.eventType = "resolved"} clears all alerts whose eventType value is resolved in this integration.

Map source fields to target fields

In the Map Source Fields to Target Fields section, map each alert source field to an ARMS alert field. Click the mapping icon to switch between mapping methods:

MethodDescription
DirectMaps one source field directly to one ARMS field.
SeriesConcatenates multiple source fields using a delimiter (special characters only), then maps the result to one ARMS field.
ConditionalMaps source fields to ARMS fields only when specified conditions are met.
Mapping tableMaps alert source severity values to ARMS severity levels. Available for the severity field only.

ARMS alert field reference

FieldDescriptionNotes
alertnameCustom alert name.
severitySeverity level.Must use the Direct mapping method.
messageAlert description used as the notification message content.Maximum 15,000 characters.
valueSample metric value.
imageUrlURL of a Grafana metrics line chart, displayed in the alert.
checkCheck item, such as CPU, JVM, Application Crash, or Deployment.
sourceAlert source.
classObject type that triggers the alert event, such as host.
serviceSource service, such as Login Service.
startatTimestamp for the event start time.
endatTimestamp for the event end time.
generatorUrlURL linking to event details.

Configure event deduplication

Deduplication merges events that share the same field value into a single alert notification, reducing noise and alert fatigue.

Note

Deduplication applies only to active (not cleared) events.

  1. In the Event Deduplication section, select the fields to use for deduplication.

  2. Click Deduplication Test to preview how events group after deduplication.

    Note

    The test runs against the 10 most recently uploaded records in the Event Mapping section.

  3. Click Save to apply the configuration.

Add projects to an existing integration

To add more Simple Log Service projects to an existing integration:

  1. On the Alert Integrations tab, find the integration, and choose More > Select Service in the Actions column.

  2. In the Select Project dialog, select the project, click the right_arrow icon, and click Save.

View alert event details

  1. In the ARMS console, choose Alert Management > Alert Event History.

  2. Click an alert event name to view details. See View historical alert events.

Manage integrations

On the Alert Integrations tab, the following actions are available for each integration:

ActionSteps
View detailsClick the integration row to open the Integration Details page.
Update the keyChoose More > Update Key and click OK. After the update, re-add project alerts to the integration. See Add projects to an existing integration.
EditClick Edit in the Actions column, modify settings on the Integration Details page, and click Save.
Enable or disableClick Enable or Disable in the Actions column.
DeleteClick Delete in the Actions column, and click OK to confirm.
Add an event processing flowClick Add Event Processing Flow in the Actions column. See Work with event processing flows.
Create a notification policyChoose More > Create Notification Policy. See Create and manage a notification policy.

What's next

After the integration is active, create a notification policy so ARMS generates alerts and routes notifications for incoming events. See Create and manage a notification policy.

To review past notifications, see View historical alerts.