From 5707153521b9bf2c569a16dbad9efa14c2c2e45e Mon Sep 17 00:00:00 2001 From: Patrick Toal Date: Wed, 17 Apr 2024 11:33:40 -0400 Subject: [PATCH] Add High CPU Investitgaion. --- rulebooks/alertmanager_listener.yml | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/rulebooks/alertmanager_listener.yml b/rulebooks/alertmanager_listener.yml index c326dd9..0765216 100644 --- a/rulebooks/alertmanager_listener.yml +++ b/rulebooks/alertmanager_listener.yml @@ -7,13 +7,12 @@ port: 9101 host: 0.0.0.0 rules: - - name: Run Template + - name: Resolve Disk Usage condition: all: - - event.alert.labels.org == "OYS" and event.alert.status == "firing" and event.alert.labels.alertname == "root filesystem over 80% full" + - event.alert.labels.org == "OYS" and event.alert.status == "firing" \ + and event.alert.labels.alertname == "root filesystem over 80% full" actions: - - print_event: - pretty: true - run_job_template: name: Demo - Clean Log Directory organization: OYS @@ -23,6 +22,15 @@ alertmanager_generator_url: "{{ event.alert.generatorURL }}" event_mountpoint: "{{ event.alert.labels.mountpoint }}" alertmanager_instance: "{{ event.alert.labels.instance }}" + - name: Investigate High CPU + condition: + all: + - event.alert.labels.org == "OYS" and event.alert.status == "firing" \ + and event.alert.labels.alertname == "ProcessCPUHog" + actions: + - print_event: + pretty: true + - name: Test Contact Point condition: event.alert.labels.alertname == "TestAlert" or event.alert.labels.org == "OYS" actions: