Alert Sources

Create Webhook for incoming alerts from different Monitoring Tools:

Step 1: Login to cfxDimensions through web-browser UI (as Project Admin user)

Step 2: Click on ‘OIA (Ops Intelligence & Analytics)’ app

Step 3: Edit on an existing Project and click on 'Configure Project'

Step 4: Click on ‘Alerts’ (left menu)

Step 5: Under 'Alert Endpoints' tab, Click on ‘+’ button to add a new Alert source

Step 6: Select 'Endpoint Role' as Source

Step 7: Enter alert source 'Name' appropriately based on source Monitoring tool (Ex: Alerts from Zabbix/VMware vROps/AppDynamics/Dyntrace/Solarwinds etc..)

Step 8: Enter Description for alert source

Step 9: Under 'Event Type' section, select OIA Alert 'Type' as shown in the below screen.

Step 10: Under 'Endpoint Type' section, select 'Webhook with Basic Authentication'

Step 11: For 'Hostname or IP address', enter FQDN DNS Name or IP Address of cfxDimensions platform. This is used within the Webhook URL.

Step 12: For 'Timezone' select appropriate timezone of incoming alerts from the selected Monitoring tool type in Step 9. (By default, it is set to UTC, which means, it expects the incoming alert timestamp is in UTC)

Step 13: Protocol, Port, URI and Security Token are optional and not required

Step 14: Enter 'Username' and 'Password' to enable HTTP Basic authentication for Webhook. These are optional settings and leave them empty to disable HTTP Basic authentication.

Step 15: Click on 'Save' to create Webhook based alert endpoint for the alerts.

Step 16: Edit the newly created alert endpoint and click on 'Enable' to activate it.

Step 17: Edit the newly created alert endpoint and click on 'Webhook URL' to view and copy it.

Configure Alert Mapping for defined alert sources (Webhook / Email):

Step 1: Click on 'ALERT MAPPINGS' tab as shown in the below screen to create an Alert mapping configuration for a Webhook or Email based alert source.

Click on '+' button.

Step 2: Enter the description for the alert mapping (ex: Alert mapping for VMware vROps Production Environment Webhook)

Step 3: Select the created Webhook or Email under alert endpoints section which is needed for alert mapping configuration.

Step 4: Select 'OIA Alert' as the target endpoint and click on 'Next' button.

Step 5: Select appropriate mapper from the list based on the alert source. Below are some of the certified mapper configuration for different alert sources.

Alert Source

Mapper Configuration file

AppDynamics (webhook)

appdynamics_json.json

VMware vROps (webhook)

vmware_vrop_json.json

Nagios (webhook)

nagios_json.json

PRTG Network Monitor (webhook)

prtg_json.json

Grafana (webhook)

grafana_json.json

Dynatrace (webhook)

dynatrace.py

CA APM (email)

caapm_json.json

Solarwinds (webhook)

solarwinds.py

Manage Engine OpManager

opmanager.py

Step 6: Select default pipeline as shown in the below screen and click on 'Next'

Step 7: Select 'JSON' option as showin the below screen. Mapping script allows to tune the alert mapping attributes as needed.

Please contact CloudFabrix technical support to modify the alert mapping attributes

Under Test Input box, a test alert payload can be pasted in JSON format and click on 'Run Test' to verify the alert mapping configuration.

Click 'Next' and Click 'Finish' in the next screen to complete the alert mapping configuration. The above procedure need to be followed for every alert source integration.

Now go to Featured Integrations