Overview
Integration configuration aims to provide you with an easy and quick way to interconnect COC with existing and third-party monitoring systems, such as Huawei Cloud Eye, AOM, and other monitoring tools.
The core value is to collect alarm information scattered in different monitoring systems of the same service centrally to implement centralized management, preventing monitoring blind spots and complex management caused by scattered alarm data on different platforms.
To ensure the security and independence of the interconnection, different monitoring systems use dedicated integration access keys to complete the interconnection process. This ensures that the access permissions of each system are controllable and the systems are isolated from each other, improving the stability and security of the overall integration process.
After the monitoring systems are integrated, you can view alarm information in raw alarms. After alarm conversion rules are configured, alarm information can be converted to incidents or aggregated alarms.
Core Value
The core value of integration configuration is to break the information silos of the monitoring systems. Through simple and efficient interconnection, a service's monitoring data and alarm information scattered on different platforms are collected and displayed in one view. In this way, O&M personnel can learn the global monitoring status without switching between multiple systems. In addition, the security mechanism of independent keys ensures efficient system integration and secure data transmission and ingestion, improving the centralization, efficiency, and reliability of monitoring management and providing strong support for stable service running.
Advantages
- Quick integration: One-click or lightweight configuration is supported to quickly interconnect with existing and third-party monitoring systems, greatly reducing the technical threshold and time cost of integration.
- Unified management: Alarm data of all associated monitoring systems in the same business line or enterprise can be collected centrally. In this way, alarms can be stored, displayed, queried, and analyzed in a unified manner, preventing management disorder caused by scattered data.
- Independent security mechanism: A unique connection key is allocated to each connected monitoring system to ensure that the connection permissions of each system are independent and controllable. The data transmission process is encrypted and isolated to prevent permissions confusion or information leakage.
- Wide compatibility: Multiple interface protocols and data formats of monitoring systems and monitoring tools of different vendors and architectures are compatible with COC. This enables smooth connection of monitoring systems without large number of reconstructions on the systems.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot