LogoLogo
Ops IntelligenceAsset IntelligenceObservabilityRobotic Data
  • Introduction
  • How it Works
  • Getting Started
  • Glossary
  • Implementer Guide
    • cfxDimensions Installation
      • Hardware and Software
      • cfxDimenions on VMware vSphere
        • Post cfxDimensions VM Installation
      • SSL Certificates Installation
      • cfxDimensions Setup & Install
        • Known Issues
      • cfxDimensions High Availability
        • GlusterFS Operations
        • Minio Operations
        • MariaDB Operations
      • cfxDimensions Start, Stop order
      • Macaw CLI
        • macaw CLI Installation
          • macaw CLI v2.1.17
        • macaw setup
        • macaw infra
        • macaw platform
        • macaw user
        • macaw application
        • macaw status
        • macaw services
        • macaw clambda
        • macaw techsupport
        • macaw backup
        • macaw restore
        • macaw reset
      • Release Notes
        • cfxDimensions v2.0.3
        • cfxDimensions v2.1.17
        • cfxDimensions v2.2.20
    • cfxDimensions Backup & Restore
    • cfxOIA Installation
    • cfxOIA Application Services
    • cfxOIA Release Notes
      • cfxOIA v5.1.5
      • cfxOIA v5.1.5.2
      • cfxOIA v5.1.5.3
      • cfxOIA v6.0.0
      • cfxOIA v6.1.0
  • KEY FEATURES GUIDE
    • Incident Management
      • Incidents Overview
      • Create Incident
      • Incident States
      • Accessing Incident
        • Stack
        • Alerts
        • Metrics & Logs
        • Insights
        • Collaboration
        • Diagnostics
        • Remediation
        • Attachments
        • Activities
      • Incident Actions
    • Alert Management
      • Alerts Overview
      • Alert Analytics
      • Alert States
      • Alert Sources
    • Advanced Alert Configuration
      • Alert Mappings
      • Alert Enrichment
      • Alert Correlation & Suppression
        • Creating and Updating Correlation Policies
        • Creating and Updating Suppression Policies
        • Correlation Recommendations
    • ML Driven Operations
    • Data Exploration
    • RDA (Robotic Data Automation)
      • Accessing UI
      • Sources Addition and Configuration
      • Check Connectivity
      • Proxy Settings
      • Explore
        • Bots
        • Pipelines
        • Schedules
        • Jobs
    • Analytics
  • UI & PORTAL FEATURES GUIDE
    • Filters Management
    • Customizing Table Views
    • Exporting Data
  • Administrator Guide
    • User Roles & RBAC
    • Collaboration
    • Projects
      • How to add Project
      • Configure Project
        • Stacks
        • Incidents
        • Alerts
        • Messages
          • Message Endpoints
            • Rest Data Consumer
            • Kafka Message Consumer
            • ServiceNow SaaS
            • Webhook with Basic Authentication
          • Message Mappings
        • Teams
        • Datasources
        • Resolution Codes
  • INTEGRATIONS GUIDE
    • Integrations Overview
    • Featured Integrations
      • AppDynamics
      • Dynatrace
      • Microsoft Teams
      • NetApp Cluster Mode
      • NetApp 7 Mode
      • Prometheus
      • ServiceNow
      • Slack
      • Splunk Enterprise
      • VMware vCenter
      • Zabbix
      • NodePing
      • Nagios XI
      • Check MK
      • VMware vRealize Operations
      • PRTG Network Monitor
      • Grafana
      • AWS Cloudwatch
      • ManageEngine OpManager
      • PagerDuty
Powered by GitBook
On this page
  • Create Webhook for incoming alerts from different Monitoring Tools:
  • Configure Alert Mapping for defined alert sources (Webhook / Email):
  1. KEY FEATURES GUIDE
  2. Alert Management

Alert Sources

PreviousAlert StatesNextAdvanced Alert Configuration

Last updated 3 years ago

Create Webhook for incoming alerts from different Monitoring Tools:

Step 1: Login to cfxDimensions through web-browser UI (as Project Admin user)

Step 2: Click on ‘OIA (Ops Intelligence & Analytics)’ app

Step 3: Edit on an existing Project and click on 'Configure Project'

Step 4: Click on ‘Alerts’ (left menu)

Step 5: Under 'Alert Endpoints' tab, Click on ‘+’ button to add a new Alert source

Step 6: Select 'Endpoint Role' as Source

Step 7: Enter alert source 'Name' appropriately based on source Monitoring tool (Ex: Alerts from Zabbix/VMware vROps/AppDynamics/Dyntrace/Solarwinds etc..)

Step 8: Enter Description for alert source

Step 9: Under 'Event Type' section, select OIA Alert 'Type' as shown in the below screen.

Step 10: Under 'Endpoint Type' section, select 'Webhook with Basic Authentication'

Step 11: For 'Hostname or IP address', enter FQDN DNS Name or IP Address of cfxDimensions platform. This is used within the Webhook URL.

Step 12: For 'Timezone' select appropriate timezone of incoming alerts from the selected Monitoring tool type in Step 9. (By default, it is set to UTC, which means, it expects the incoming alert timestamp is in UTC)

Step 13: Protocol, Port, URI and Security Token are optional and not required

Step 14: Enter 'Username' and 'Password' to enable HTTP Basic authentication for Webhook. These are optional settings and leave them empty to disable HTTP Basic authentication.

Step 15: Click on 'Save' to create Webhook based alert endpoint for the alerts.

Step 16: Edit the newly created alert endpoint and click on 'Enable' to activate it.

Step 17: Edit the newly created alert endpoint and click on 'Webhook URL' to view and copy it.

Configure Alert Mapping for defined alert sources (Webhook / Email):

Step 1: Click on 'ALERT MAPPINGS' tab as shown in the below screen to create an Alert mapping configuration for a Webhook or Email based alert source.

Click on '+' button.

Step 2: Enter the description for the alert mapping (ex: Alert mapping for VMware vROps Production Environment Webhook)

Step 3: Select the created Webhook or Email under alert endpoints section which is needed for alert mapping configuration.

Step 4: Select 'OIA Alert' as the target endpoint and click on 'Next' button.

Step 5: Select appropriate mapper from the list based on the alert source. Below are some of the certified mapper configuration for different alert sources.

Alert Source

Mapper Configuration file

AppDynamics (webhook)

appdynamics_json.json

VMware vROps (webhook)

vmware_vrop_json.json

Nagios (webhook)

nagios_json.json

PRTG Network Monitor (webhook)

prtg_json.json

Grafana (webhook)

grafana_json.json

Dynatrace (webhook)

dynatrace.py

CA APM (email)

caapm_json.json

Solarwinds (webhook)

solarwinds.py

Manage Engine OpManager

opmanager.py

Step 6: Select default pipeline as shown in the below screen and click on 'Next'

Step 7: Select 'JSON' option as showin the below screen. Mapping script allows to tune the alert mapping attributes as needed.

Please contact CloudFabrix technical support to modify the alert mapping attributes

Under Test Input box, a test alert payload can be pasted in JSON format and click on 'Run Test' to verify the alert mapping configuration.

Click 'Next' and Click 'Finish' in the next screen to complete the alert mapping configuration. The above procedure need to be followed for every alert source integration.

Now go to

Featured Integrations