When alert rules trigger within a business trace, Application Real-Time Monitoring Service (ARMS) generates alert events that capture each occurrence. The Events tab in Business Trace Explorer provides real-time analysis of event data through configurable filter conditions, so you can diagnose issues, identify patterns across alert events, and meet custom analysis requirements in various scenarios.
How alert events work
Alert events connect three components in ARMS:
| Component | Role | Relationship |
|---|---|---|
| Business trace | Defines the monitoring scope for your application | Serves as the context in which alert rules are evaluated |
| Alert rule | Defines conditions and thresholds on Prometheus metrics | Generates alert events when a threshold is met |
| Alert event | Records each occurrence of a triggered alert rule | Appears on the Events tab with severity, status, and history |
When a Prometheus alert rule threshold is met, ARMS creates an alert event linked to the business trace. The Events tab aggregates these events, letting you filter by severity, track trends, and take action.
Prerequisites
Before you begin, ensure that you have:
A business trace in the ARMS console
An alert rule configured for your Managed Service for Prometheus instance
View and filter alert events
Log on to the ARMS console.
In the left-side navigation pane, choose Application Monitoring > Business Trace Explorer.
In the top navigation bar, select a region, then click the target business trace.
Click the Events tab.
The Events tab contains three sections: Quick Filter, Alert Event Trend, and the event list.
Filter events with Quick Filter
The Quick Filter section narrows down both the trend chart and the event list simultaneously. Use the available filter conditions to locate specific events. Changes to any filter condition update both views in sync.
Analyze trends with Alert Event Trend
The Alert Event Trend section displays a timeline chart that shows event distribution by severity level within the selected time range. Use this chart to:
Spot spikes in critical or warning events that indicate emerging issues.
Identify recurring alert patterns at specific time intervals.
Correlate event volume changes with deployments or configuration changes.
Review events in the event list
The event list shows all events that match the current filters. Each row contains the following columns:
| Column | Description |
|---|---|
| Event name | The name of the alert event. Click the name to open the event detail view |
| Feature fields | Attributes that characterize the event |
| Event status | The current state of the event (for example, active or recovered) |
| Event count | The number of times this event has occurred |
| Associated alert | The alert rule linked to this event. Click to view alert rule details |
| Actions | Available operations for the event |
Manage alert events
You can perform the following operations from the event list:
View event details: Click an event name to open its detail view. The detail view includes the event history and associated events, which helps you trace the full lifecycle of an alert from first trigger to resolution.
View alert rule details: Click the associated alert link to see the alert rule configuration, including the threshold conditions and notification settings.
Manually resolve an event: Click Manually Clear Alert in the Actions column to set the event state to recovered. Use this when the underlying issue is resolved but the event has not automatically cleared.