All Products
Search
Document Center

Key Management Service:Alert events

Last Updated:Mar 31, 2026

KMS integrates with Cloud Monitor to track security-relevant lifecycle events and instance resource usage. When an event is triggered, it appears automatically in both the KMS console and the Cloud Monitor console — no configuration required to start receiving events.

This topic covers:

KMS system events

The following events are generated automatically when trigger conditions are met.

EventLevelTrigger condition
QPS has reached 90%CRITICALReal-time queries per second (QPS) of a KMS instance reaches 90% of its quota.
QPS has reached 70%INFOReal-time QPS reaches 70% of its quota. If the limit is exceeded, KMS may become inaccessible and affect business continuity.
Key scheduled for deletionWARNA key enters the scheduled deletion waiting period.
Key deletedWARNA key is permanently deleted.
Secret scheduled for deletionWARNA secret enters the scheduled deletion waiting period.
Secret deletedWARNA secret is permanently deleted.
Managed secret rotation failedCRITICALAn automatic secret rotation fails.
Managed secret rotation succeededINFOAn automatic secret rotation completes successfully.
Key sync failedCRITICALA key fails to sync across regions. See Cross-region synchronization.
Key sync succeededINFOA key successfully syncs across regions. See Cross-region synchronization.
ClientKey expiration reminderCRITICALTriggered 180, 90, 30, and 7 days before a ClientKey expires. See Application access points overview.
Access management usage has reached 70%INFOAccess management usage reaches 70% of its quota. If the limit is exceeded, you cannot create new access management policies.
Access management usage has reached 90%WARNAccess management usage reaches 90% of its quota. If the limit is exceeded, you cannot create new access management policies.
Key usage has reached 70%INFOKey usage reaches 70% of its quota. If the limit is exceeded, you cannot create new keys.
Key usage has reached 90%WARNKey usage reaches 90% of its quota. If the limit is exceeded, you cannot create new keys.
Log analysis log volume has reached 70%INFOLog analysis log volume reaches 70% of its quota. If the limit is exceeded, new logs cannot be written.
Log analysis log volume has reached 90%WARNLog analysis log volume reaches 90% of its quota. If the limit is exceeded, new logs cannot be written.
Secret usage has reached 70%INFOSecret usage reaches 70% of its quota. If the limit is exceeded, you cannot create new secrets.
Secret usage has reached 90%WARNSecret usage reaches 90% of its quota. If the limit is exceeded, you cannot create new secrets.
To receive notifications (email, SMS, or webhook) for these events, configure alert rules in the Cloud Monitor console. See Set up alert notifications.

Cloud Monitor metrics

The following KMS metrics are available in Cloud Monitor. All metrics support alerting, and the statistics type for all metrics is Value.

MetricDescriptionDimensionsRecommended use
Requests per minute for an instanceTotal requests per minute across all operation typesuserId, regionId, instanceIdIdentify overall traffic trends; alert on sustained spikes that may exhaust your QPS quota
Symmetric encryption/decryption requests per minuteSymmetric operation requests per minuteuserId, regionId, instanceIdMonitor symmetric operation load
Asymmetric encryption requests per minuteAsymmetric encryption requests per minuteuserId, regionId, instanceIdMonitor asymmetric encryption load
Asymmetric decryption requests per minuteAsymmetric decryption requests per minuteuserId, regionId, instanceIdMonitor asymmetric decryption load
Asymmetric signing requests per minuteAsymmetric signing requests per minuteuserId, regionId, instanceIdMonitor signing operation load
Asymmetric signature verification requests per minuteAsymmetric signature verification requests per minuteuserId, regionId, instanceIdMonitor signature verification load
Secret operation requests per minuteSecret-related requests per minuteuserId, regionId, instanceIdMonitor Secrets Manager usage
Other requests per minuteRequests not classified under the above operation typesuserId, regionId, instanceIdCatch unexpected request patterns
5xx error requestsRequests that returned 5xx error codes per minuteuserId, regionId, instanceIdDetect service-side failures; alert on sustained error spikes to catch systemic issues early
4xx error requestsRequests that returned 4xx error codes per minuteuserId, regionId, instanceIdDetect misconfigured clients or permission issues
Request latencyAverage request latency per minute across all operationsuserId, regionId, instanceIdAlert when latency exceeds your application's tolerance threshold
KMS instance CPU utilizationCPU utilization of the KMS instanceuser_id, instance_idAlert when CPU is consistently high, indicating the need for capacity review
KMS instance symmetric QPS utilizationSymmetric QPS utilization as a percentage of quotauser_id, instance_idAlert before quota exhaustion causes service degradation
KMS instance asymmetric QPS utilizationAsymmetric QPS utilization as a percentage of quotauser_id, instance_idAlert before quota exhaustion causes service degradation

For instructions on configuring Cloud Monitor alerts and viewing metric statistics, see KMS overview.

View system events

KMS retains system events for the last 90 days. Use either of the following methods to query them.

Method 1: KMS console

  1. Log on to the KMS console. In the top navigation bar, select a region. In the left navigation pane, choose Security Operations > Alert Events.KMS console

  2. On the CloudMonitor Alerts tab, select the event type and time range you want to query.

    image

  3. In the Actions column, click Details to view the full event payload.

Method 2: Cloud Monitor console

  1. Log on to the Cloud Monitor console.

  2. In the left navigation pane, choose Event Center > System Event.

  3. On the Event Monitoring tab, set Product to Key Management Service, select an event level, event name, and time period, then click Search.

  4. Click Details in the Actions column for the target event.

Set up alert notifications

Alert rules route event notifications to contacts via email, SMS, or webhook. Rules can only be configured in the Cloud Monitor console.

  1. Log on to the Cloud Monitor console.

  2. In the left navigation pane, choose Event Center > System Event.

  3. On the Event Monitoring tab, click Save as Alert Rule.

    image.png

  4. In the Create/Modify Event-triggered Alert Rule panel, configure the alert settings. For details on each configuration field, see Create an alert rule for a system event.

To apply custom processing to alert notifications — such as deduplication or noise reduction — configure notification policies on the Event Subscription page instead. For more information, see Manage event subscriptions (recommended).

Event notification JSON reference

Each system event notification includes a JSON payload with two parts:

  • Top-level fields — metadata for routing and filtering (product, resource, level, event name, status)

  • `content` fields — the event-specific data payload

All event notification examples below follow this structure.

QPS has reached 90%

This event fires when real-time QPS on a KMS instance reaches 90% of its configured quota. At this threshold, KMS is at risk of becoming inaccessible if traffic continues to grow. Use the qps and qpsQuota fields to calculate how close you are to the limit and plan capacity accordingly.

{
    "product": "kms",
    "resourceId": "acs:kms:cn-shanghai:119285********60:instance/<resource-id>",
    "level": "CRITICAL",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:QPS:Reminder",
    "content": {
        "eventId": "119285********60:0d603b4a-********71:175*****07",
        "qps": "***",
        "kmsInstanceId": "kst***pn8",
        "time": "2025-08-26 05:43:00",
        "qpsQuota": "***"
    },
    "status": "normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:0d603b4a-****71:175***07
qpsCurrent QPS10000
kmsInstanceIdKMS instance IDkst***pn8
qpsQuotaQPS quota limit10000

QPS has reached 70%

This event fires when real-time QPS reaches 70% of quota. Use it as an early warning to investigate traffic growth before the 90% threshold is reached.

{
    "product": "kms",
    "resourceId": "acs:kms:cn-hangzhou:1192******18460:instance/<resource-id>",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:QPS:Reminder:70%",
    "content": {
        "eventId": "130***756",
        "qps": "***",
        "kmsInstanceId": "kst***e4x",
        "time": "2025-12-12 07:49:00",
        "qpsQuota": "10***"
    },
    "status": "normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:0d603b4a-****71:175***07
qpsCurrent QPS10000
kmsInstanceIdKMS instance IDkst***pn8
qpsQuotaQPS quota limit10000

Key scheduled for deletion

This event fires when a key enters the scheduled deletion waiting period. The key is not yet deleted — use this window to cancel the deletion if it was unintentional. Check plannedDeleteTime to determine how much time remains before the deletion becomes permanent.

{
    "id": "83d05dd6-1066-4b3f-99be-********19",
    "status": "normal",
    "instanceName": "0d603b4a-********71be",
    "resourceId": "acs:kms:cn-hangzhou:119285********60:key/0d603b4a-********71be",
    "content": {
        "eventId": "119285********60:0d603b4a-********71:175*****07",
        "keyId": "0d603b4a-********71be",
        "deleteEntityArn": "acs:kms:cn-hangzhou:119285********60:key/0d603b4a-********71be",
        "plannedDeleteTime": "2025-09-01T07:15:07Z"
    },
    "product": "kms",
    "time": 1756106122000,
    "level": "WARN",
    "regionId": "cn-hangzhou",
    "groupId": "0",
    "name": "Key:DeleteKey:ScheduleDeletion"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:0d603b4a-****71:175***07
keyIdKey ID0d603b4a-********71be
deleteEntityArnAlibaba Cloud Resource Name (ARN) of the key pending deletionacs:kms:cn-hangzhou:119285******60:key/0d603b4a-******71be
plannedDeleteTimeScheduled deletion time2025-09-01T07:15:07Z

Key deleted

This event fires when a key is permanently deleted after the scheduled waiting period ends. After this event is generated, the key cannot be recovered.

{
    "id": "40d14dbc-5b49-481f-********ce",
    "status": "normal",
    "instanceName": "key-hzz68916ed********q4",
    "resourceId": "acs:kms:cn-hangzhou:119285********60:key/key-hzz6********pq4",
    "content": {
        "eventId": "119285********60:key-hzz6********pq4:1755855590",
        "keyId": "0d603b4a-********71be",
        "deleteEntityArn": "acs:kms:cn-hangzhou:119285********60:key/0d603b4a-********71be",
        "deleteTime": "2025-08-22T09:39:50Z"
    },
    "product": "kms",
    "time": 1755855632000,
    "level": "WARN",
    "regionId": "cn-hangzhou",
    "groupId": "0",
    "name": "Key:DeleteKey:ActualDeletion"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:0d603b4a-****71:175***07
keyIdKey ID0d603b4a-********71be
deleteEntityArnARN of the deleted keyacs:kms:cn-hangzhou:119285******60:key/0d603b4a-******71be
deleteTimeTime the key was permanently deleted2025-08-22T09:39:50Z

Secret scheduled for deletion

This event fires when a secret enters the scheduled deletion waiting period. The secret is not yet deleted — cancel the deletion if it was unintentional. Check plannedDeleteTime to see how much time remains before the deletion becomes permanent.

{
    "id": "a065edc8-*******f9ba432",
    "status": "normal",
    "instanceName": "XrGp****",
    "resourceId": "acs:kms:cn-shanghai:119285********60:secret/XrGp****",
    "content": {
        "eventId": "119285********60:XrGp****:175*****45",
        "secretName": "XrGp****",
        "deleteEntityArn": "acs:kms:cn-shanghai:119285********60:secret/XrGp****",
        "plannedDeleteTime": "2025-09-01T06:10:45Z"
    },
    "product": "kms",
    "time": 1756102268000,
    "level": "WARN",
    "regionId": "cn-shanghai",
    "groupId": "0",
    "name": "Secret:DeleteSecret:ScheduleDeletion"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:0d603b4a-****71:175***07
secretNameSecret nameXrGp****
deleteEntityArnARN of the secret pending deletionacs:kms:cn-shanghai:119285******60:secret/XrGp**
plannedDeleteTimeScheduled deletion time2025-09-01T06:10:45Z

Secret deleted

This event fires when a secret is permanently deleted after the scheduled waiting period ends. After this event is generated, the secret cannot be recovered.

{
    "id": "a065edc8-********ba432",
    "status": "normal",
    "instanceName": "XrGp****",
    "resourceId": "acs:kms:cn-shanghai:119285********60:secret/XrGp****",
    "content": {
        "eventId": "119285********60:XrGp****:1756102245",
        "secretName": "XrGp****",
        "deleteEntityArn": "acs:kms:cn-shanghai:119285********60:secret/XrGp****",
        "deleteTime": "2025-09-01T06:10:45Z"
    },
    "product": "kms",
    "time": 1756102268000,
    "level": "WARN",
    "regionId": "cn-shanghai",
    "groupId": "0",
    "name": "Secret:DeleteSecret:ScheduleDeletion"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:0d603b4a-****71:175***07
secretNameSecret nameXrGp****
deleteEntityArnARN of the deleted secretacs:kms:cn-shanghai:119285******60:secret/XrGp**
deleteTimeTime the secret was permanently deleted2025-08-22T09:39:50Z

Managed secret rotation failed

This event fires when Secrets Manager fails to automatically rotate a secret. Check the failureInfo field for the specific error code and message to diagnose the root cause.

{
    "id": "ac54ac2b-********01aba",
    "status": "Failed",
    "instanceName": "acs/ecs/secret_rotator",
    "resourceId": "acs:kms:cn-chengdu:119285********60:secret/acs/ecs/secret_rotator",
    "content": {
        "eventId": "119285********60:acs/ecs/secret_rotator:1755853996",
        "secretName": "acs/ecs/secret_rotator",
        "secretType": "ECS",
        "rotationEntityArn": "acs:kms:cn-chengdu:119285********60:secret/acs/ecs/secret_rotator",
        "rotationStatus": "Enabled",
        "secretSubType": "ECSLoginPassword",
        "failureInfo": {
            "errorCode": "RotateError",
            "errorMessage": "output , err stdout:[Module:DescribeECSInstances failed] "
        },
        "failureTime": "2025-08-22T09:13:16Z"
    },
    "product": "kms",
    "time": 1755854045000,
    "level": "CRITICAL",
    "regionId": "cn-chengdu",
    "groupId": "0",
    "name": "Secret:RotateSecret:Failure"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:0d603b4a-****71:175***07
secretNameSecret nameacs/ecs/secret_rotator
secretTypeSecret type: Rds, Redis, RAMCredentials, ECS, or PolarDBECS
secretSubTypeSecret subtype, determined by secretType: <br>- RdsRdsSingleUser, RdsDoubleUsers <br>- RedisRedisDoubleUsers <br>- RAMCredentialsRamUserAccessKey <br>- ECSECSLoginPassword, ECSLoginSSHKey <br>- PolarDBPolarDBDoubleUsersECSLoginPassword
rotationEntityArnARN of the resource for which rotation was attemptedacs:kms:cn-hangzhou:119285******60:key/0d603b4a-******71be
rotationStatusRotation configuration status: Enabled, Disabled, or InvalidEnabled
failureInfoRotation failure details: errorCode and errorMessage{"errorCode": "RotateError", "errorMessage": "..."}
failureTimeTime the rotation failed2025-08-22T09:13:16Z

Managed secret rotation succeeded

This event fires when Secrets Manager successfully completes an automatic secret rotation.

{
    "id": "21c9b9e0-********f3e678",
    "status": "normal",
    "instanceName": "acs/ram/user/secrettest",
    "resourceId": "acs:kms:cn-shanghai:119285********60:secret/acs/ram/user/secrettest",
    "content": {
        "eventId": "119285********60:acs/ram/user/secrettest:17******59",
        "secretName": "acs/ram/user/secrettest",
        "secretType": "RAMCredentials",
        "rotationEntityArn": "acs:kms:cn-shanghai:119285********60:secret/acs/ram/user/secrettest",
        "rotationStatus": "Enabled",
        "secretSubType": "RamUserAccessKey",
        "successTime": "2025-08-20T09:37:19Z",
        "message": ""
    },
    "product": "kms",
    "time": 1755855610000,
    "level": "INFO",
    "regionId": "cn-shanghai",
    "groupId": "0",
    "name": "Secret:RotateSecret:Success"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:acs/ram/user/secrettest:17****59
secretNameSecret nameacs/ram/user/secrettest
secretTypeSecret type: Rds, Redis, RAMCredentials, ECS, or PolarDBRAMCredentials
secretSubTypeSecret subtype, determined by secretType (see values in Managed secret rotation failed)RamUserAccessKey
rotationEntityArnARN of the rotated resourceacs:kms:cn-shanghai:119285********60:secret/acs/ram/user/secrettest
rotationStatusRotation configuration status: Enabled, Disabled, or InvalidEnabled
successTimeTime the rotation completed successfully2025-08-20T09:37:19Z

Key sync failed

This event fires when a key fails to sync from the primary instance to the replica instance during cross-region synchronization. Check errorCode for the failure reason and verify network connectivity and permissions between instances.

{
    "product": "kms",
    "resourceId": "acs:kms:cn-hangzhou:119285********60:key/<resource-id>",
    "level": "CRITICAL",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:KeySync:Failure",
    "content": {
        "eventId": "119285********60:8071aa27-********87",
        "syncTaskId": "8071aa27-********0fc87",
        "masterInstanceId": "kst-ph********z6",
        "shadowInstanceId": "kst-ps********qq",
        "syncStatus": "SyncFailure",
        "errorCode": "",
        "resourceId": "key-ph********4d",
        "resourceType": "KEY",
        "eventTime": "2024-03-22T07:41:17Z"
    },
    "status": "Normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:8071aa27-******87
syncTaskIdSync task ID8071aa27-********0fc87
masterInstanceIdPrimary instance ID (sync source)kst-ph********z6
shadowInstanceIdReplica instance ID (sync destination)kst-ps********qq
syncStatusSync result: SyncFailureSyncFailure
errorCodeError code, if available""
resourceIdResource ID of the key that failed to synckey-ph********04d
resourceTypeResource type. Only KEY is supported.KEY
eventTimeTime the sync was attempted2024-03-22T07:41:17Z

Key sync succeeded

This event fires when a key successfully syncs from the primary instance to the replica instance.

{
    "product": "kms",
    "resourceId": "acs:kms:cn-hangzhou:119285********60:key/<resource-id>",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:KeySync:Success",
    "content": {
        "eventId": "119285********60:8071aa27-********0fc87",
        "syncTaskId": "8071aa27-********420fc87",
        "masterInstanceId": "kst-ph********z6",
        "shadowInstanceId": "kst-ps********qq",
        "syncStatus": "SyncSuccess",
        "errorCode": "",
        "resourceId": "key-ph********04d",
        "resourceType": "KEY",
        "eventTime": "2024-03-22T07:41:17Z"
    },
    "status": "Normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:8071aa27-******0fc87
syncTaskIdSync task ID8071aa27-********420fc87
masterInstanceIdPrimary instance ID (sync source)kst-ph********z6
shadowInstanceIdReplica instance ID (sync destination)kst-ps********qq
syncStatusSync result: SyncSuccessSyncSuccess
errorCodeError code, if any""
resourceIdResource ID of the synced keykey-ph********04d
resourceTypeResource type. Only KEY is supported.KEY
eventTimeTime the sync completed2024-03-22T07:41:17Z

ClientKey expiration reminder

This event fires 180, 90, 30, and 7 days before a ClientKey expires. Use daysToExpire to track how much time remains and renew the ClientKey before expiration to avoid application access failures.

{
    "product": "kms",
    "resourceId": "<aap_arn>",
    "level": "CRITICAL",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:ClientKey:ExpireReminder",
    "content": {
        "clientKeyName": "clientKeyName",
        "eventId": "eventId",
        "dateOfExpiration": "2024-09-30T18:23:46Z",
        "daysToExpire": "180",
        "affectedKmsInstanceId": "kst-exxxx"
    },
    "status": "Normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119285******60:0d603b4a-****71:175***07
clientKeyNameApplication access point (AAP) namekms-client
dateOfExpirationClientKey expiration time2024-09-30T18:23:46Z
daysToExpireDays remaining until expiration180
affectedKmsInstanceIdKMS instance ID associated with this ClientKeykst-hzz********bxt

Access management usage has reached 70%

This event fires when access management usage on a KMS instance reaches 70% of its quota. If the quota is fully consumed, you cannot create new access management policies.

{
    "product": "kms",
    "resourceId": "acs:kms:cn-shanghai:1192******18460:instance/<resource-id>",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:Quota:AccessManagement:70%",
    "content": {
        "eventId": "119***d:2",
        "quota": "***",
        "kmsInstanceId": "kst***em7",
        "used": "***"
    },
    "status": "normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119***d:2
kmsInstanceIdKMS instance IDkst***pn8
quotaTotal access management policy quota1000
usedCurrent number of access management policies in use700

Access management usage has reached 90%

This event fires when access management usage on a KMS instance reaches 90% of its quota. At this threshold, you are close to being unable to create new access management policies.

{
    "product": "kms",
    "resourceId": "acs:kms:ap-southeast-6:1192******18460:instance/<resource-id>",
    "level": "WARN",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:Quota:AccessManagement:90%",
    "content": {
        "eventId": "119***d:1",
        "quota": "***",
        "kmsInstanceId": "kst***rz5",
        "used": "***"
    },
    "status": "normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119***d:2
kmsInstanceIdKMS instance IDkst***pn8
quotaTotal access management policy quota1000
usedCurrent number of access management policies in use900

Key usage has reached 70%

This event fires when key usage on a KMS instance reaches 70% of its quota. If the quota is fully consumed, you cannot create new keys.

{
    "product": "kms",
    "resourceId": "acs:kms:cn-shanghai:1192******18460:instance/<resource-id>",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:Quota:Key:70%",
    "content": {
        "eventId": "119***774",
        "quota": "10***",
        "kmsInstanceId": "kst***urs",
        "used": "***"
    },
    "status": "normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119***d:2
kmsInstanceIdKMS instance IDkst***pn8
quotaTotal key quota1000
usedCurrent number of keys in use700

Key usage has reached 90%

This event fires when key usage on a KMS instance reaches 90% of its quota. At this threshold, you are close to being unable to create new keys.

{
    "product": "kms",
    "resourceId": "acs:kms:cn-shanghai:1192******18460:instance/<resource-id>",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:Quota:Key:90%",
    "content": {
        "eventId": "119***774",
        "quota": "10***",
        "kmsInstanceId": "kst***urs",
        "used": "***"
    },
    "status": "normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119***d:2
kmsInstanceIdKMS instance IDkst***pn8
quotaTotal key quota1000
usedCurrent number of keys in use900

Log analysis log volume has reached 70%

This event fires when log analysis log volume on a KMS instance reaches 70% of its quota. If the quota is fully consumed, new logs cannot be written.

{
    "product": "kms",
    "resourceId": "key-phzz******jro04d",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:Quota:Log:70%",
    "content": {
        "eventId": "eventId",
        "quota": "1000",
        "kmsInstanceId": "key-phzz******jro04d",
        "used": "700"
    },
    "status": "Normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119***d
kmsInstanceIdKMS instance IDkst***pn8
quotaTotal log analysis capacity (GB)1000
usedUsed log analysis capacity (GB)700

Log analysis log volume has reached 90%

This event fires when log analysis log volume on a KMS instance reaches 90% of its quota. At this threshold, you are close to being unable to write new logs.

{
    "product": "kms",
    "resourceId": "key-phzz******jro04d",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:Quota:Log:90%",
    "content": {
        "eventId": "eventId",
        "quota": "1000",
        "kmsInstanceId": "key-phzz******jro04d",
        "used": "900"
    },
    "status": "Normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119***d
kmsInstanceIdKMS instance IDkst***pn8
quotaTotal log analysis capacity (GB)1000
usedUsed log analysis capacity (GB)900

Secret usage has reached 70%

This event fires when secret usage on a KMS instance reaches 70% of its quota. If the quota is fully consumed, you cannot create new secrets.

{
    "product": "kms",
    "resourceId": "key-phzz******jro04d",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:Quota:Secret:70%",
    "content": {
        "eventId": "eventId",
        "quota": "1000",
        "kmsInstanceId": "key-phzz******jro04d",
        "used": "700"
    },
    "status": "Normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119***d
kmsInstanceIdKMS instance IDkst***pn8
quotaTotal secret quota1000
usedCurrent number of secrets in use700

Secret usage has reached 90%

This event fires when secret usage on a KMS instance reaches 90% of its quota. At this threshold, you are close to being unable to create new secrets.

{
    "product": "kms",
    "resourceId": "key-phzz******jro04d",
    "level": "INFO",
    "instanceName": "instanceName",
    "regionId": "cn-hangzhou",
    "name": "Instance:Quota:Secret:70%",
    "content": {
        "eventId": "eventId",
        "quota": "1000",
        "kmsInstanceId": "key-phzz******jro04d",
        "used": "900"
    },
    "status": "Normal"
}

content field descriptions:

FieldDescriptionExample
eventIdEvent ID119***d
kmsInstanceIdKMS instance IDkst***pn8
quotaTotal secret quota1000
usedCurrent number of secrets in use900