Skip to content

Latest commit

 

History

History
389 lines (260 loc) · 14.1 KB

integrations.rst

File metadata and controls

389 lines (260 loc) · 14.1 KB
.. spelling::

    Alertmanager
    Kibana
    Solarwinds
    Logstash
    Cloudwatch
    Chronograf
    Grafana
    Graylog
    Hipchat
    Kapacitor
    Nagios
    Oembed
    Opsweekly
    Sensu
    Stackdriver
    Telegraf
    Zabbix

Integrations & Plugins

There are several different ways to integrate other alert sources into Alerta.

Firstly, existing :ref:`integrations <integrations>` with well known monitoring tools like Nagios, Zabbix and Sensu make use of the Alerta API and demonstrate how to build integrations with other monitoring tools.

Secondly, there are built-in :ref:`webhooks <webhooks>` for AWS Cloudwatch, Pingdom, PagerDuty, Google Stackdriver, Prometheus Alertmanager and more which provide 'out-of-the-box' integrations for some of the most popular monitoring systems available.

Thirdly, :ref:`alert severity indicators <widgets>` or widgets can be placed on any web page using oEmbed for easy integration with existing dashboards.

Lastly, :ref:`plugins <plugins>` can be used to quickly and easily forward alerts to or notify other systems like Slack or Hipchat.

There are a few core integrations which have been developed to showcase how easy it is to get alerts or events from other tools into Alerta. They are:

There are several more integrations available in the contrib repo which may be useful. They are:

  • Amazon SQS - receive alerts from SQS that were sent using the SNS core plugin
  • E-mail - send emails after a hold-time has expired (requires the `AMQP`_ message queue core plugin)
  • Opsweekly - query Alerta to generate Opsweekly reports
  • Pinger - generate ping alerts from list of network resources being pinged
  • SNMP Trap - generate alerts from SNMPv1 and SNMPv2 sources
  • Supervisor - trigger alerts and heartbeats based on process deamon events
  • Syslog Forwarder - receive RFC 5424, RFC 3164 syslog and Cisco syslog messages
  • URL monitor - trigger alerts from web service query responses

Some third-party monitoring tools have built-in support for Alerta. They are:

  • elastalert - alerting on anomalies, spikes, or other patterns of interest from data in Elasticsearch
  • netdata - a system for distributed real-time performance and health monitoring
  • Tick Stack - designed to handle metrics and events using Telegraf, InfluxDB, Chronograf, and Kapacitor

Bi-directional integration is where the system integrating with Alerta provides information that enables Alerta to link back to the originating system, either via an external link or simply a hostname and reference ID.

There are several examples of this two-way integration and they mostly take advantage of the flexible nature of the the tags and attributes alert attributes which can be used to keep track of the external reference.

Usage

In it's simplest form, pass the URL of the external system that generated the alert in an attribute called externalUrl (or similar):

$ alerta send -E ... --attribute externalUrl=https://my.example.com/go?id=1234

Better still, surroud the URL with HTML markup to make the link clickable in the web UI:

$ alerta send -E ... --attribute externalUrl='<a href="https://my.example.com/go?id=1234">ref 1234</a>'

Examples

The following is a list of integrations, webbhooks and plugins that highlight the use of bi-directional integration in different ways.

Webhooks are a way of integrating with other systems by triggering HTTP callbacks to the Alerta server API when an event occurs.

Note

If authentication is enforced, then an API key is needed to access the alerta API programatically and use the webhooks.

Please follow this page for more information on how to pass your api-key : https://docs.alerta.io/en/latest/authentication.html#api-keys

Alerta can be configured to receive AWS CloudWatch alarms by subscribing the Alerta API endpoint to an SNS topic.

For details on how to set this up see the Sending Amazon SNS Messages to HTTP/HTTPS Endpoints page and in the Endpoint input box append :file:`/webhooks/cloudwatch` to the Alerta API URL.

Example AWS CloudWatch Webhook URL

:file:`https://alerta.example.com/api/webhooks/cloudwatch`

Example AWS CloudWatch Webhook URL with authentication

:file:`https://alerta.example.com/api/webhooks/cloudwatch?api-key=xxxxx`

Alerta can be configured to receive Grafana alerts by adding a webhook endpoint to the Notification Channels.

For details on how to set this up see Grafana webhook page and in the Endpoint URL input box append :file:`/webhooks/grafana` to the Alerta API URL.

Example Grafana Webhook URL

:file:`https://alerta.example.com/api/webhooks/grafana`

The following parameters can be set in the url
environment, event_type, group, origin, service, severity, timeout

Example Grafana Webhook URL with parameters

:file:`https://alerta.example.com/api/webhooks/grafana?api-key=xxx&environment=Production&service=Web&timeout=3600`

TBC

Alerta can be configured to receive New Relic incidents by adding a webhook endpoint to the Notification Channels.

For details on how to set this up see New Relic webhook page and in the Endpoint URL input box append :file:`/webhooks/newrelic` to the Alerta API URL.

Example New Relic Webhook URL

:file:`https://alerta.example.com/api/webhooks/newrelic`

Example New Relic Webhook URL with authentication

:file:`https://alerta.example.com/api/webhooks/newrelic?api-key=xxxxx`

Alerta can be configured to receive PagerDuty incident-based webhooks -- any change to the status or assigned_to_user of an incident will cause an outgoing message to be sent.

For details on how to set this up see the PagerDuty webhook page and where it requires the webhook URL append :file:`/webhooks/pagerduty` to the Alerta API URL.

Example PagerDuty Webhook URL

:file:`https://alerta.example.com/api/webhooks/pagerduty`

Example PagerDuty Webhook URL with authentication

:file:`https://alerta.example.com/api/webhooks/pagerduty?api-key=xxxxx`

Alerta can be configured to receive Pingdom URL check alerts by adding a webhook alerting endpoint that calls the Alerta API.

For details on how to set this up see the Pingdom webhook page and in the webhook URL input box append :file:`/webhooks/pingdom` to the Alerta API URL.

Example Pingdom Webhook URL

:file:`https://alerta.example.com/api/webhooks/pingdom`

Example Pingdom Webhook URL with authentication

:file:`https://alerta.example.com/api/webhooks/pingdom?api-key=xxxx`

Alerta can be configured as a webhook receiver in Alertmanager.

For details on how to set this up see the Prometheus Config GitHub Repo

Alerta can be configured to receive Riemann events. The integration makes no assumptions about the format of the Riemann events and consumes standard events. If events are decorated with additional metadata (eg. tags, environment, group, etc) then these will be used.

Example Riemann Webhook URL

:file:`https://alerta.example.com/api/webhooks/riemann`

Example Riemann Webhook URL with authentication

:file:`https://alerta.example.com/api/webhooks/riemann?api-key=xxxxx`

Alerta can be configured to receive SeverDensity alerts by adding a webhook endpoint to the Notification Preferences.

For details on how to set this up see SeverDensity webhook page and in the Endpoint URL input box append :file:`/webhooks/serverdensity` to the Alerta API URL.

Example SeverDensity Webhook URL

:file:`https://alerta.example.com/api/webhooks/serverdensity`

Example SeverDensity Webhook URL with authentication

:file:`https://alerta.example.com/api/webhooks/serverdensity?api-key=xxxxx`

TBC

Alerta can be configured to receive Google Stackdriver incidents by adding a webhook endpoint to the notifications configuration.

For details on how to set this up see Stackdriver webhook page and in the ENDPOINT URL input box append :file:`/webhooks/stackdriver` to the Alerta API URL.

Example Stackdriver Webhook URL

:file:`https://alerta.example.com/api/webhooks/stackdriver`

Example Stackdriver Webhook URL with authentication

:file:`https://alerta.example.com/api/webhooks/stackdriver?api-key=xxxxx`

Alerta can be configured to receive Telegram callback queries from the inline buttons in the `Telegram Bot`_ plugin.

For details on how to set this up see `Telegram Bot`_ page and for the TELEGRAM_WEBHOOK_URL setting append :file:`/webhooks/telegram` to the Alerta API URL.

Example Telegram Webhook URL

:file:`https://alerta.example.com/api/webhooks/telegram`

Example Telegram Webhook URL with authentication

:file:`https://alerta.example.com/api/webhooks/telegram?api-key=xxxxx`

Add an alert severity indicator (aka. widget) to any dashboard using the Oembed API endpoint. The severity indicator is coloured with the maximum severity for that alert query filter and has a count for the total number of matching alerts for each severity.

Multiple severity indicators can be placed on the same page each for a different environment, service or group. See the example oembed web page.