Updated at: 2022-12-09 03:49:50
1. Click Rule > + New to enter the New Rule interface, as follow: 

• Alert Type: Real-Time Alert
Field Name Description
Rule Type It includes 2 types: Event Count and Field Aggregation
Log Type The configuration of saved log type as alert data source
Data Filter The data source can be filtered by Field or Keyword
Note: You can add multiple data filter conditions and connect them by the logical operators AND/OR.
Data Grouping It is equivalent to GroupBy in SQL, grouping alert data according to the specified fields, and up to 5 grouping fields can be added: 
• If no group fields are added, the aggregation is for all alert data;
• If data grouping is enabled, when an alert policy is triggered to generate an alert record, the group field can be viewed in the optional Field Gear display list on the alert record page.

Note: The alias is the name of the field displayed on the alert record page, which shows by default the original field name, and the alias cannot be repeated.
Trigger Event Count as Rule Type: The number of alert occurrences of a certain type of event that exceeds the threshold range in a given time period triggers the alert.
 
Field Aggregation as Rule Type: A certain aggregation value of a field exceeds the threshold range in a given time period triggers the alert. 
Note: If the selected field is a non-numeric type, the aggregation type can only be selected with Unique Count. If the selected field is a numeric type, the aggregation type can be selected with Unique Count, Min, Max, Avg, Sum, and the default is Unique Count.
Severity The urgency of alert, including Low, Medium and High risk.

• Alert Type: Scheduled Alert
Field Name Description
Rule Type It supports source log non-aggregation alert.
Monitoring for The host object to be monitored, including Host and Host Group: 
• Host as Object: You can select multiple hosts for alert monitoring;
• Host Group as Object: You can select all hosts in host group for alert monitoring.
Note: The monitoring object of the source log non-aggregation alert is the host with the configuration of AR-Agent aggregation task. For details, please refer to the section Agent Management .
Trigger An alert will be triggered if the monitored host has not aggregated a log file for longer than the set threshold, which is 24 hours by default.
Severity The urgency of alert, including Low, Medium and High risk.
2. After configuration, click Save to finish rule creation.