In addition to shielding the machine, the alarm shield can also do more fine-grained shielding strategies. For example, you can specify monitoring indicators and a certain label.
We recorded a small video for quick start, it is recommended to take a look first:
Here is a brief introduction to the data structure describing the monitoring indicators. Nightingale and Open-Falcon are compatible
Because Nightingale has a built-in machine grouping mechanism such as service tree, compared with Open-Falcon, the alert flexibility is a great improvement
Port monitoring In Nightingale, you can specify which ports to collect by configuring specific collection strategies, and also support reading the target machine identification file
Process monitoring in Nightingale by configuring specific collection strategies to specify which processes to collect, and also supports reading the target machine identification file
Compared with Open-Falcon, Nightingale has built-in log monitoring. You can place the log collection strategy file on the target machine, or you can configure the log collection strategy on the page
Nightingale can designate a certain directory as a plug-in directory, read the files in this directory that conform to a specific format, and execute it as a plug-in, thereby expanding the collector’s ability