Alert Sources

Create Webhook for incoming alerts from different Monitoring Tools:

Step 1: Login to cfxDimensions through web-browser UI (as Project Admin user)
Step 2: Click on ‘OIA (Ops Intelligence & Analytics)’ app
Step 3: Edit on an existing Project and click on 'Configure Project'
Step 4: Click on ‘Alerts’ (left menu)
Step 5: Under 'Alert Endpoints' tab, Click on ‘+’ button to add a new Alert source
Step 6: Select 'Endpoint Role' as Source
Step 7: Enter alert source 'Name' appropriately based on source Monitoring tool (Ex: Alerts from Zabbix/VMware vROps/AppDynamics/Dyntrace/Solarwinds etc..)
Step 8: Enter Description for alert source
Step 9: Under 'Event Type' section, select OIA Alert 'Type' as shown in the below screen.
Step 10: Under 'Endpoint Type' section, select 'Webhook with Basic Authentication'
Step 11: For 'Hostname or IP address', enter FQDN DNS Name or IP Address of cfxDimensions platform. This is used within the Webhook URL.
Step 12: For 'Timezone' select appropriate timezone of incoming alerts from the selected Monitoring tool type in Step 9. (By default, it is set to UTC, which means, it expects the incoming alert timestamp is in UTC)
Step 13: Protocol, Port, URI and Security Token are optional and not required
Step 14: Enter 'Username' and 'Password' to enable HTTP Basic authentication for Webhook. These are optional settings and leave them empty to disable HTTP Basic authentication.
Step 15: Click on 'Save' to create Webhook based alert endpoint for the alerts.
Step 16: Edit the newly created alert endpoint and click on 'Enable' to activate it.
Step 17: Edit the newly created alert endpoint and click on 'Webhook URL' to view and copy it.

Configure Alert Mapping for defined alert sources (Webhook / Email):

Step 1: Click on 'ALERT MAPPINGS' tab as shown in the below screen to create an Alert mapping configuration for a Webhook or Email based alert source.
Click on '+' button.
Step 2: Enter the description for the alert mapping (ex: Alert mapping for VMware vROps Production Environment Webhook)
Step 3: Select the created Webhook or Email under alert endpoints section which is needed for alert mapping configuration.
Step 4: Select 'OIA Alert' as the target endpoint and click on 'Next' button.
Step 5: Select appropriate mapper from the list based on the alert source. Below are some of the certified mapper configuration for different alert sources.
Alert Source
Mapper Configuration file
AppDynamics (webhook)
appdynamics_json.json
VMware vROps (webhook)
vmware_vrop_json.json
Nagios (webhook)
nagios_json.json
PRTG Network Monitor (webhook)
prtg_json.json
Grafana (webhook)
grafana_json.json
Dynatrace (webhook)
dynatrace.py
CA APM (email)
caapm_json.json
Solarwinds (webhook)
solarwinds.py
Manage Engine OpManager
opmanager.py
Step 6: Select default pipeline as shown in the below screen and click on 'Next'
Step 7: Select 'JSON' option as showin the below screen. Mapping script allows to tune the alert mapping attributes as needed.
Please contact CloudFabrix technical support to modify the alert mapping attributes
Under Test Input box, a test alert payload can be pasted in JSON format and click on 'Run Test' to verify the alert mapping configuration.
Click 'Next' and Click 'Finish' in the next screen to complete the alert mapping configuration. The above procedure need to be followed for every alert source integration.