Set up alarms to be notified when your monitored devices exceed defined thresholds. Alarm rules can be configured at a group level or directly on individual agents.
Cloudmon significantly reduces alarm noise by requiring conditions to persist across consecutive intervals before firing. This prevents repeated alerts for momentary spikes and reduces operator fatigue. Default alarm profiles are automatically assigned to monitored agents to provide basic alerting from day one, and can be modified or removed as needed.
There are two ways to configure alarm rules for agent-monitored devices:
Each alarm is built around a simple IF/THEN model, where you select a metric, set a threshold, and define what happens when it is breached. Learn more.
Below are recommended alarm configurations for the most common agent monitoring scenarios:
| Use Case | Device Type | Metric | Suggested Threshold | Why |
| High CPU load | All | CPU usage | Above 90% for 2 intervals | Catches sustained CPU pressure before it affects users or services |
| Low memory | All | Memory usage | Above 90% for 2 intervals | Prevents out-of-memory crashes on servers and virtual machines |
| Disk nearly full | All | Disk usage | Above 85% for 1 interval | Gives time to act before disk-full conditions cause service failures or data loss |
| Low battery health | Laptops | Battery percent | Below 20% for 1 interval | Proactively identifies laptops with degrading batteries before they cause unexpected shutdowns for remote workers |
| High network throughput | Servers, VMs | Transmit rate / Receive rate | Above expected baseline | Detects unusual traffic spikes that could indicate a security incident or misconfigured service |
Once saved, all triggers for a device are listed in the Triggers table under the Alarm Rule section. Each row shows the trigger title, alarm severity, notification configuration, and whether a runbook is set to run. You can edit or delete any trigger at any time using the action icons. Alarm rules can also be cloned to quickly apply similar configurations to other device types, and associated with groups to apply uniform alarm settings across all monitored devices of the same type without manual per-device configuration.