# Alert Sources

### **Create Webhook for incoming alerts from different Monitoring Tools:**

**Step 1:** Login to cfxDimensions through web-browser UI (as Project Admin user)

![](https://gblobscdn.gitbook.com/assets%2F-MAygHzNCQ33zRR43qxF%2F-MChvHt9fmbQJZzWNJlg%2F-MChvvM-DiOGam6nHmNt%2FScreen%20Shot%202020-07-20%20at%201.34.38%20PM.png?alt=media\&token=446b4225-0934-40c1-99fa-8be9d897ed8b)

**Step 2:** Click on ‘OIA (Ops Intelligence & Analytics)’ app

![](https://gblobscdn.gitbook.com/assets%2F-MAygHzNCQ33zRR43qxF%2F-MChvHt9fmbQJZzWNJlg%2F-MChwLo4OzoQtnZ3bF8h%2FScreen%20Shot%202020-07-20%20at%201.36.34%20PM.png?alt=media\&token=40d4f5c5-4f90-4c98-9383-289df8cbfa5a)

**Step 3:** Edit on an existing Project and click on 'Configure Project'

![](https://gblobscdn.gitbook.com/assets%2F-MAygHzNCQ33zRR43qxF%2F-MChvHt9fmbQJZzWNJlg%2F-MChyEOTksgjIG4zbnja%2FScreen%20Shot%202020-07-20%20at%201.44.42%20PM.png?alt=media\&token=1de6b128-3eec-4038-b336-8b421a84c3d3)

**Step 4:** Click on ‘**Alerts**’ (left menu)

**Step 5:** Under '**Alert Endpoints**' tab, Click on ‘**+**’ button to add a new Alert source

![](https://gblobscdn.gitbook.com/assets%2F-MAygHzNCQ33zRR43qxF%2F-MChvHt9fmbQJZzWNJlg%2F-MChypW1CGICrmsSNNMR%2FScreen%20Shot%202020-07-20%20at%201.47.17%20PM.png?alt=media\&token=90be063a-3170-4eed-b0f3-b502a82896a4)

**Step 6:** Select '**Endpoint Role**' as Source

**Step 7:** Enter alert source '**Name**' appropriately based on source Monitoring tool (Ex: Alerts from Zabbix/VMware vROps/AppDynamics/Dyntrace/Solarwinds etc..)

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MFcYKQ_zyvIn_VWG1QN%2F-MFcZKVOLy_tlKUMdwVf%2FScreen%20Shot%202020-08-25%20at%207.20.32%20PM.png?alt=media\&token=cc22473b-c72e-404f-bdd0-dbc12195851e)

**Step 8:** Enter Description for alert source

**Step 9:** Under '**Event Type**' section, select OIA Alert '**Type**' as shown in the below screen.

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MVOW-b7vwavy0IHWigT%2F-MVOWwV4I0DezJTq5kdy%2FScreen%20Shot%202021-03-09%20at%204.26.42%20PM.png?alt=media\&token=bacd108d-959e-495f-8d24-ddfeefbce411)

**Step 10:** Under '**Endpoint Type**' section, select '**Webhook with Basic Authentication**'

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MCi-1CC8fJ-f044Hmsi%2F-MCi-KsFnj_FE1FryqU8%2FScreen%20Shot%202020-07-20%20at%201.54.01%20PM.png?alt=media\&token=a0062509-4963-48c8-9ebf-f53be13c1008)

**Step 11:** For '**Hostname or IP address**', enter FQDN DNS Name or IP Address of cfxDimensions platform. This is used within the Webhook URL.

**Step 12:** For 'Timezone' select appropriate timezone of incoming alerts from the selected Monitoring tool type in **Step 9**. (By default, it is set to UTC, which means, it expects the incoming alert timestamp is in UTC)

**Step 13:** Protocol, Port, URI and Security Token are optional and not required

**Step 14:** Enter 'Username' and 'Password' to enable HTTP Basic authentication for Webhook. These are optional settings and leave them empty to disable HTTP Basic authentication.

**Step 15:** Click on '**Save**' to create Webhook based alert endpoint for the  alerts.

**Step 16:** Edit the newly created alert endpoint and click on '**Enable**' to activate it.

**Step 17:** Edit the newly created alert endpoint and click on '**Webhook URL**' to view and copy it.

### **Configure Alert Mapping for defined alert sources (Webhook / Email):**

**Step 1:** Click on '**ALERT MAPPINGS**' tab as shown in the below screen to create an Alert mapping configuration for a Webhook or Email based alert source.

Click on '**+**' button.

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-Ma_yqucXkaEirbVtSpy%2F-Maa5zukt6ya2-4Plh9y%2FScreen%20Shot%202021-05-25%20at%205.38.34%20PM.png?alt=media\&token=c6270be4-0efa-4bbc-a133-a61aeb7fdc35)

**Step 2:** Enter the description for the alert mapping (ex: Alert mapping for VMware vROps Production Environment Webhook)

**Step 3:** Select the created Webhook or Email under alert endpoints section which is needed for alert mapping configuration.

**Step 4:** Select '**OIA Alert**' as the target endpoint and click on '**Next**' button.

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-Ma_yqucXkaEirbVtSpy%2F-Maa7EQLyXlnglUCIf8c%2FScreen%20Shot%202021-05-25%20at%205.43.57%20PM.png?alt=media\&token=fa3e9aca-6a9e-4a41-8d8c-62fa169ed8f5)

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-Ma_yqucXkaEirbVtSpy%2F-Maa7XeIfB-aJMi0tfia%2FScreen%20Shot%202021-05-25%20at%205.45.19%20PM.png?alt=media\&token=4062b1a8-552f-4e22-80a7-772271b557a2)

**Step 5:** Select appropriate mapper from the list based on the alert source. Below are some of the certified mapper configuration for different alert sources.

| **Alert Source**               | **Mapper Configuration file** |
| ------------------------------ | ----------------------------- |
| AppDynamics (webhook)          | appdynamics\_json.json        |
| VMware vROps (webhook)         | vmware\_vrop\_json.json       |
| Nagios (webhook)               | nagios\_json.json             |
| PRTG Network Monitor (webhook) | prtg\_json.json               |
| Grafana (webhook)              | grafana\_json.json            |
| Dynatrace (webhook)            | dynatrace.py                  |
| CA APM (email)                 | caapm\_json.json              |
| Solarwinds (webhook)           | solarwinds.py                 |
| Manage Engine OpManager        | opmanager.py                  |

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-Ma_yqucXkaEirbVtSpy%2F-Maa8svS9cK1zO656xY5%2FScreen%20Shot%202021-05-25%20at%205.51.08%20PM.png?alt=media\&token=da1581d1-fcd0-429f-b4d4-49feb16b6480)

**Step 6:** Select default pipeline as shown in the below screen and click on '**Next**'

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MaaAhjW9nn6RC1b1HQl%2F-MaaBJetGJJmvow4IiPx%2FScreen%20Shot%202021-05-25%20at%206.01.51%20PM.png?alt=media\&token=877bda9b-e974-478b-9d86-a28c04ce0af8)

**Step 7:** Select '**JSON**' option as showin the below screen. Mapping script allows to tune the alert mapping attributes as needed.

{% hint style="info" %}
Please contact CloudFabrix technical support to modify the alert mapping attributes
{% endhint %}

Under **Test Input** box, a test alert payload can be pasted in JSON format and click on '**Run Test**' to verify the alert mapping configuration.

Click '**Next**' and Click '**Finish**' in the next screen to complete the alert mapping configuration. The above procedure need to be followed for every alert source integration.

![](https://4260296531-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MAygHzNCQ33zRR43qxF%2F-MaaAhjW9nn6RC1b1HQl%2F-MaaBuM8_SDGZGO-5fkA%2FScreen%20Shot%202021-05-25%20at%206.04.19%20PM.png?alt=media\&token=49bcd037-8bfd-4e96-afc2-9620844393ba)

Now go to [Featured Integrations](https://oiadocs.cloudfabrix.io/integrations-guide/integrations)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://oiadocs.cloudfabrix.io/features-guide/alert-watch/alert-sources.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
