Get started with Opsgenie as a user
Learn how to configure your profile, get notifications from Opsgenie and view on-call schedules.
Use Opsgenie’s Alert Logic Integration to forward Alert Logic alerts to Opsgenie. Opsgenie determines the right people to notify based on on-call schedules– notifies email, text messages (SMS), phone calls, iOS & Android push notifications, and escalates alerts until the alert is acknowledged or closed.
When an alert is created in Alert Logic, an alert is created in Opsgenie.
If you're using Opsgenie's Free or Essentials plan or if you’re using Opsgenie with Jira Service Management's Standard plan, you can add this integration from your team dashboard only. The Integrations page under Settings is not available in your plan.
Go to Teams and select your team.
Select Integrations on the left navigation and then select Add integration.
Adding the integration from your team dashboard will make your team the owner of the integration. This means Opsgenie will assign the alerts received through this integration to your team only. Follow the rest of the steps in this section to set up the integration.
Go to Settings > Integrations. Search for Alert Logic and select Add.
Specify who is notified for Alert Logic alerts using the Responders field. Autocomplete suggestions are provided as you type.
Copy the Webhook URL.
Select Save Integration.
In Alert Logic, Navigate to Management > Notifications > Webhooks.
Select +Add New, add a Name/Title.
Paste the integration API URL into "URL".
Click Save.
5. Navigate to Management > Notifications > Policies.
6. Either edit or create a new policy.
7. In the "Alert Recipients" field, add the previously created webhook.
8. Click Save.
Create Alert payload:
JSON
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
{
"aggregated_alerts_count": 0,
"additional_content": [],
"alert_definition_type_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"customer_id": 111111,
"data": {
"message": "Alert Date : 2016-01-15 21:53:09 GMT\nCustomer Name : Your-customer-name\n\nAlert Type : log\nAlert Name : Log Correlation Alert Test - Your-customer-name\nMessage Type : Unix DHCP IP Assigned\n\nLogEvent link:\nhttps://invision.alertlogic.net/log_message.php?id= XXXXXXXXXXXXX",
"alert_rule_id": 1111,
"source": "correlation_alert_rules"
},
"description": "Your-customer-name LogEvent: Log Correlation Alert - Your-customer-name",
"id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"product": {
"name": "Log Manager"
},
"severity": "warning",
"state": "created",
"tags": ["example_tag", "example_tag2"],
"timestamp": 1452894789,
"type": "correlation",
"deleted": false,
"notifications": [
{
"id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"timestamp": 1452894789,
"alert_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"status": "pending",
"updated": 1452894789,
"policy_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"target_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"target_cid": 111111,
"target_label": "testing",
"target_channel": "webhook",
"target_target": "http://your-web-hook-url/",
"target_contact_id": null
}
]
}
This payload is parsed by Opsgenie as:
JSON
1
2
3
4
5
6
7
8
9
10
11
{
"aggregatedAlertCount" : 0
"description" : "Alert Date : 2016-01-15 21:53:09 GMT\nCustomer Name : Your-customer-name\n\nAlert Type : log\nAlert Name : Log Correlation Alert Test - Your-customer-name\nMessage Type : Unix DHCP IP Assigned\n\nLogEvent link:\nhttps://invision.alertlogic.net/log_message.php?id= XXXXXXXXXXXXX"
"message" : "Your-customer-name LogEvent: Log Correlation Alert - Your-customer-name"
"productName" : "Log Manager"
"severity" : "warning"
"source" : "correlation_alert_rules"
"state" : "created"
"type" : "correlation"
"tags" : "example_tag", "example_tag2"
}
Was this helpful?