Skip to main content

Demo video: Send events to APEX AIOps Incident Management from New Relic ►

This video explains how to set up the New Relic integration in APEX AIOps Incident Management.

*Please note Moogsoft is now part of Dell's IT Operations solution called APEX AIOps, and changed its name to APEX AIOps Incident Management. The UI in this video may differ slightly but the content covered is still relevant.

After watching this video, you will be able to create an integration to ingest New Relic incidents and set up a webhook in New Relic.

Here’s our scenario. We want to ingest alerts identified by New Relic so we can deduplicate and correlate them in Incident Management.

1_New_Relic.png

Here’s the New Relic integration.

2_New_Relic.png

The API is provisioned. We’ll make it active after we finish setting it up.

3_new_Relic.png

Next we are going to get data from New Relic. Incident Management will cache up to 10 New Relic events until the integration is active. These counters show how many payloads we’ve received - so far, in this case, none.

4_New_Relic.png

These are what we need.

5_New_Relic.png

Now going back to New Relic. We’ll start by configuring a notification channel to send issues to Incident Management.

6_New_Relic.png

The channel type is webhook.

7_New_Relic.png

...and this is where you paste the Incident Management Endpoint API URL we grabbed.

8_New_Relic.png

We need some custom request headers for our data payload. The content type is application/json.

9_New_Relic.png

And here is where we enter the apiKey.

10_New_Relic.png

We’ll use the default New Relic output, so we don’t need to set up a custom data payload and test these settings. Good!

11_New_Relic.png

Make sure to add this notification to the New Relic policy associated with the alerts you want to send to Incident Management.

12_New_Relic.png

The test notification showed up in Incident Management.

13_New_Relic.png

Here's the JSON payload from the test notification.

14_New_Relic.png

Field mapping is preconfigured to make it easy for you.

15_New_Relic.png

Optionally, at this point, you can also pick the deduplication key. Incident Management uses the dedupe key value to combine events with the same context into a single alert, while updating the alert fields that change over time like description and status. By default Incident Management uses the combination of source, class, service, and check fields. We’ll keep the defaults...

16_New_Relic.png

And test the deduplication key. Looks good! Now when another event with the same value for this field comes in, Incident Management will update alert fields like latest event arrival time and severity, as needed.

17_New_Relic.png

Our integration activates with data flowing in.

18_New_Relic.png

Now we can see our data from New Relic in the  Alert view. Thanks for watching!

19_New_Relic.png