Create a Site Reliability Guardian
When creating a new Site Reliability Guardian, you have two options: create it from a pre-defined template, or manually provide all the required input.
Create from a template
- In the Dynatrace Launcher, select Site Reliability Guardian
.
- Select + Guardian to create a new guardian.
- In the template you want to use, select Use template.
- Adjust the name of the guardian in the top.
- optional Add a description on the right-hand side.
- optional Assign tags.
- Refine your objectives on the left-hand side. Be sure to replace all placeholders (
PLACEHOLDER
) in your DQL queries with actual values. - Select Create.
Create manually
- In the Dynatrace Launcher, select Site Reliability Guardian
.
- Select + Guardian to create a new guardian.
- Select Create without template.
- Set the name of the guardian in the top.
- optional Add a description on the right-hand side.
- optional Assign tags.
- Add objectives on the left-hand side. Use a custom DQL query, or reference an existing SLO.
- Select Create.
Templates
The following examples are provided:
Template | Description |
---|---|
Kubernetes workload saturation | Safeguard your Kubernetes environment with dedicated resource utilization objectives for a Kubernetes workload (i.e., K8s deployment). The objectives focus on memory and CPU consumption of the workload. |
Kubernetes cluster saturation | Constantly check the resource consumption of your Kubernetes environment by validating CPU and memory objectives of a Kubernetes cluster. |
Kubernetes namespace saturation | Safeguard your Kubernetes environment with dedicated resource utilization objectives for a Kubernetes namespace. The objectives focus on memory and CPU consumption of the namespace including a reliability objective on the container restarts. |
Host utilization and saturation | Protect your infrastructure with resource consumption and saturation objectives for a dedicated host. |
Security gate | Establish a security gate in your release process to ensure your releases have no known and exploitable vulnerabilities. |