-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Stack Monitoring] [Alerting] Investigate why "Missing monitoring data" rule is much slower than other rules on the same cluster #123844
Comments
Pinging @elastic/infra-monitoring-ui (Team:Infra Monitoring UI) |
Haven't look into this much but noticed today while looking at this rule's query that, unlike the others, it doesn't have a term filter for the metricset in the bool query. I noticed while writing unit tests for them and added one. Also left a comment https://github.com/elastic/kibana/pull/124033/files#r794930698 |
@neptunian do you believe this should improve performance? |
@lizozom Yes the filter should improve performance. Will let you know when its merged. |
@lizozom The change to the query was merged! |
@neptunian any thoughts on how to benchmark this? |
I'll setup APM locally with some test data and see what I find. |
We found that having a default 1 day We've opened another issue #126709 to discuss improvements so I am closing this issue. |
Using APM data to investigate the alerting rules and their performance, it was discovered that the "Missing monitoring data" rule appears to be running much slower than the other rules in a given cluster. (Info provided by @lizozom).
APM graphs
Acceptance Criteria
The text was updated successfully, but these errors were encountered: