• Products
  • Get started
  • Documentation
  • Resources

Integrate Opsgenie with Alert Logic

What does Opsgenie offer to Alert Logic users?

Use Opsgenie’s Alert Logic Integration to forward Alert Logic alerts to Opsgenie. Opsgenie determines the right people to notify based on on-call schedules– notifies email, text messages (SMS), phone calls, iOS & Android push notifications, and escalates alerts until the alert is acknowledged or closed.

Functionality of the integration

When an alert is created in Alert Logic, an alert is created in Opsgenie.

Add Alert Logic Integration in Opsgenie

  1. Go to Opsgenie's Alert Logic Integration page.

Under the Free and Essentials plans, the tabs under the Team dashboard are limited to Main, Integrations, Members, and Activity Stream.

2. Specify who is notified for Alert Logic alerts using the Teams field. Autocomplete suggestions are provided as you type.

An alternative for Step 1) and Step 2) is to add the integration from the Team Dashboard of the team which will own the integration. To add an integration directly to a team, navigate to the Team Dashboard and open Integrations tab. Click Add Integration and select the integration that you would like to add.

3. Copy the Webhook URL.

4. Click Save Integration.

Alert Logic integration setting

Configuration in Alert Logic

  1. In Alert Logic, Navigate to Management --> Notifications --> Webhooks.

  2. Select +Add New, add a Name/Title.

  3. Paste the integration API URL into "URL".

  4. Click Save.

Alert Logic configuration step 1

5. Navigate to Management --> Notifications --> Policies.

6. Either edit or create a new policy.

7. In the "Alert Recipients" field, add the previously created webhook.

8. Click Save.

Alert Logic configuration step 2

Sample payload sent from Alert Logic

Create Alert payload:

JSON

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 { "aggregated_alerts_count": 0, "additional_content": [], "alert_definition_type_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX", "customer_id": 111111, "data": { "message": "Alert Date : 2016-01-15 21:53:09 GMT\nCustomer Name : Your-customer-name\n\nAlert Type : log\nAlert Name : Log Correlation Alert Test - Your-customer-name\nMessage Type : Unix DHCP IP Assigned\n\nLogEvent link:\nhttps://invision.alertlogic.net/log_message.php?id= XXXXXXXXXXXXX", "alert_rule_id": 1111, "source": "correlation_alert_rules" }, "description": "Your-customer-name LogEvent: Log Correlation Alert - Your-customer-name", "id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX", "product": { "name": "Log Manager" }, "severity": "warning", "state": "created", "tags": ["example_tag", "example_tag2"], "timestamp": 1452894789, "type": "correlation", "deleted": false, "notifications": [ { "id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX", "timestamp": 1452894789, "alert_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX", "status": "pending", "updated": 1452894789, "policy_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX", "target_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX", "target_cid": 111111, "target_label": "testing", "target_channel": "webhook", "target_target": "http://your-web-hook-url/", "target_contact_id": null } ] }

This payload is parsed by Opsgenie as:

JSON

1 2 3 4 5 6 7 8 9 10 11 { "aggregatedAlertCount" : 0 "description" : "Alert Date : 2016-01-15 21:53:09 GMT\nCustomer Name : Your-customer-name\n\nAlert Type : log\nAlert Name : Log Correlation Alert Test - Your-customer-name\nMessage Type : Unix DHCP IP Assigned\n\nLogEvent link:\nhttps://invision.alertlogic.net/log_message.php?id= XXXXXXXXXXXXX" "message" : "Your-customer-name LogEvent: Log Correlation Alert - Your-customer-name" "productName" : "Log Manager" "severity" : "warning" "source" : "correlation_alert_rules" "state" : "created" "type" : "correlation" "tags" : "example_tag", "example_tag2" }

Sample alert

Alert Logic sample alert
Last modified on Dec 23, 2020
Cached at 8:56 PM on May 8, 2021 |

Additional Help

Ask the Community