# Alert Sources

### **Create Webhook for incoming alerts from different Monitoring Tools:**

**Step 1:** Login to cfxDimensions through web-browser UI (as Project Admin user)

![](https://gblobscdn.gitbook.com/assets%2F-MAygHzNCQ33zRR43qxF%2F-MChvHt9fmbQJZzWNJlg%2F-MChvvM-DiOGam6nHmNt%2FScreen%20Shot%202020-07-20%20at%201.34.38%20PM.png?alt=media\&token=446b4225-0934-40c1-99fa-8be9d897ed8b)

**Step 2:** Click on ‘OIA (Ops Intelligence & Analytics)’ app

![](https://gblobscdn.gitbook.com/assets%2F-MAygHzNCQ33zRR43qxF%2F-MChvHt9fmbQJZzWNJlg%2F-MChwLo4OzoQtnZ3bF8h%2FScreen%20Shot%202020-07-20%20at%201.36.34%20PM.png?alt=media\&token=40d4f5c5-4f90-4c98-9383-289df8cbfa5a)

**Step 3:** Edit on an existing Project and click on 'Configure Project'

![](https://gblobscdn.gitbook.com/assets%2F-MAygHzNCQ33zRR43qxF%2F-MChvHt9fmbQJZzWNJlg%2F-MChyEOTksgjIG4zbnja%2FScreen%20Shot%202020-07-20%20at%201.44.42%20PM.png?alt=media\&token=1de6b128-3eec-4038-b336-8b421a84c3d3)

**Step 4:** Click on ‘**Alerts**’ (left menu)

**Step 5:** Under '**Alert Endpoints**' tab, Click on ‘**+**’ button to add a new Alert source

![](https://gblobscdn.gitbook.com/assets%2F-MAygHzNCQ33zRR43qxF%2F-MChvHt9fmbQJZzWNJlg%2F-MChypW1CGICrmsSNNMR%2FScreen%20Shot%202020-07-20%20at%201.47.17%20PM.png?alt=media\&token=90be063a-3170-4eed-b0f3-b502a82896a4)

**Step 6:** Select '**Endpoint Role**' as Source

**Step 7:** Enter alert source '**Name**' appropriately based on source Monitoring tool (Ex: Alerts from Zabbix/VMware vROps/AppDynamics/Dyntrace/Solarwinds etc..)

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MFcYKQ_zyvIn_VWG1QN%2F-MFcZKVOLy_tlKUMdwVf%2FScreen%20Shot%202020-08-25%20at%207.20.32%20PM.png?alt=media\&token=cc22473b-c72e-404f-bdd0-dbc12195851e)

**Step 8:** Enter Description for alert source

**Step 9:** Under '**Event Type**' section, select OIA Alert '**Type**' as shown in the below screen.

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MVOW-b7vwavy0IHWigT%2F-MVOWwV4I0DezJTq5kdy%2FScreen%20Shot%202021-03-09%20at%204.26.42%20PM.png?alt=media\&token=bacd108d-959e-495f-8d24-ddfeefbce411)

**Step 10:** Under '**Endpoint Type**' section, select '**Webhook with Basic Authentication**'

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MCi-1CC8fJ-f044Hmsi%2F-MCi-KsFnj_FE1FryqU8%2FScreen%20Shot%202020-07-20%20at%201.54.01%20PM.png?alt=media\&token=a0062509-4963-48c8-9ebf-f53be13c1008)

**Step 11:** For '**Hostname or IP address**', enter FQDN DNS Name or IP Address of cfxDimensions platform. This is used within the Webhook URL.

**Step 12:** For 'Timezone' select appropriate timezone of incoming alerts from the selected Monitoring tool type in **Step 9**. (By default, it is set to UTC, which means, it expects the incoming alert timestamp is in UTC)

**Step 13:** Protocol, Port, URI and Security Token are optional and not required

**Step 14:** Enter 'Username' and 'Password' to enable HTTP Basic authentication for Webhook. These are optional settings and leave them empty to disable HTTP Basic authentication.

**Step 15:** Click on '**Save**' to create Webhook based alert endpoint for the  alerts.

**Step 16:** Edit the newly created alert endpoint and click on '**Enable**' to activate it.

**Step 17:** Edit the newly created alert endpoint and click on '**Webhook URL**' to view and copy it.

### **Configure Alert Mapping for defined alert sources (Webhook / Email):**

**Step 1:** Click on '**ALERT MAPPINGS**' tab as shown in the below screen to create an Alert mapping configuration for a Webhook or Email based alert source.

Click on '**+**' button.

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-Ma_yqucXkaEirbVtSpy%2F-Maa5zukt6ya2-4Plh9y%2FScreen%20Shot%202021-05-25%20at%205.38.34%20PM.png?alt=media\&token=c6270be4-0efa-4bbc-a133-a61aeb7fdc35)

**Step 2:** Enter the description for the alert mapping (ex: Alert mapping for VMware vROps Production Environment Webhook)

**Step 3:** Select the created Webhook or Email under alert endpoints section which is needed for alert mapping configuration.

**Step 4:** Select '**OIA Alert**' as the target endpoint and click on '**Next**' button.

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-Ma_yqucXkaEirbVtSpy%2F-Maa7EQLyXlnglUCIf8c%2FScreen%20Shot%202021-05-25%20at%205.43.57%20PM.png?alt=media\&token=fa3e9aca-6a9e-4a41-8d8c-62fa169ed8f5)

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-Ma_yqucXkaEirbVtSpy%2F-Maa7XeIfB-aJMi0tfia%2FScreen%20Shot%202021-05-25%20at%205.45.19%20PM.png?alt=media\&token=4062b1a8-552f-4e22-80a7-772271b557a2)

**Step 5:** Select appropriate mapper from the list based on the alert source. Below are some of the certified mapper configuration for different alert sources.

| **Alert Source**               | **Mapper Configuration file** |
| ------------------------------ | ----------------------------- |
| AppDynamics (webhook)          | appdynamics\_json.json        |
| VMware vROps (webhook)         | vmware\_vrop\_json.json       |
| Nagios (webhook)               | nagios\_json.json             |
| PRTG Network Monitor (webhook) | prtg\_json.json               |
| Grafana (webhook)              | grafana\_json.json            |
| Dynatrace (webhook)            | dynatrace.py                  |
| CA APM (email)                 | caapm\_json.json              |
| Solarwinds (webhook)           | solarwinds.py                 |
| Manage Engine OpManager        | opmanager.py                  |

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-Ma_yqucXkaEirbVtSpy%2F-Maa8svS9cK1zO656xY5%2FScreen%20Shot%202021-05-25%20at%205.51.08%20PM.png?alt=media\&token=da1581d1-fcd0-429f-b4d4-49feb16b6480)

**Step 6:** Select default pipeline as shown in the below screen and click on '**Next**'

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MaaAhjW9nn6RC1b1HQl%2F-MaaBJetGJJmvow4IiPx%2FScreen%20Shot%202021-05-25%20at%206.01.51%20PM.png?alt=media\&token=877bda9b-e974-478b-9d86-a28c04ce0af8)

**Step 7:** Select '**JSON**' option as showin the below screen. Mapping script allows to tune the alert mapping attributes as needed.

{% hint style="info" %}
Please contact CloudFabrix technical support to modify the alert mapping attributes
{% endhint %}

Under **Test Input** box, a test alert payload can be pasted in JSON format and click on '**Run Test**' to verify the alert mapping configuration.

Click '**Next**' and Click '**Finish**' in the next screen to complete the alert mapping configuration. The above procedure need to be followed for every alert source integration.

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MaaAhjW9nn6RC1b1HQl%2F-MaaBuM8_SDGZGO-5fkA%2FScreen%20Shot%202021-05-25%20at%206.04.19%20PM.png?alt=media\&token=49bcd037-8bfd-4e96-afc2-9620844393ba)

Now go to [Featured Integrations](https://oiadocs.cloudfabrix.io/integrations-guide/integrations)
