Get started with Opsgenie as a user
Learn how to configure your profile, get notifications from Opsgenie and view on-call schedules.
Use Opsgenie’s Alert Logic Integration to forward Alert Logic alerts to Opsgenie. Opsgenie determines the right people to notify based on on-call schedules– notifies email, text messages (SMS), phone calls, iOS & Android push notifications, and escalates alerts until the alert is acknowledged or closed.
When an alert is created in Alert Logic, an alert is created in Opsgenie.
You can add this integration from your team dashboard
If you're using Opsgenie's Free or Essentials plan, or if you’re using Opsgenie with Jira Service Management's Standard plan, you can only add this integration from your team dashboard as the Integrations page under Settings is not available in your plan.
Adding the integration from your team dashboard will make your team the owner of the integration. This means Opsgenie will assign the alerts received through this integration to your team only.
To do that,
Go to your team’s dashboard from Teams,
Select Integrations, and select Add integration.
Follow the rest of the steps to complete the integration.
Go to Settings > Integrations. Search for Alert Logic and select Add.
Specify who is notified for Alert Logic alerts using the Responders field. Autocomplete suggestions are provided as you type.
Copy the Webhook URL.
Select Save Integration.
In Alert Logic, Navigate to Management > Notifications > Webhooks.
Select +Add New, add a Name/Title.
Paste the integration API URL into "URL".
Click Save.
5. Navigate to Management > Notifications > Policies.
6. Either edit or create a new policy.
7. In the "Alert Recipients" field, add the previously created webhook.
8. Click Save.
Create Alert payload:
JSON
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
{
"aggregated_alerts_count": 0,
"additional_content": [],
"alert_definition_type_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"customer_id": 111111,
"data": {
"message": "Alert Date : 2016-01-15 21:53:09 GMT\nCustomer Name : Your-customer-name\n\nAlert Type : log\nAlert Name : Log Correlation Alert Test - Your-customer-name\nMessage Type : Unix DHCP IP Assigned\n\nLogEvent link:\nhttps://invision.alertlogic.net/log_message.php?id= XXXXXXXXXXXXX",
"alert_rule_id": 1111,
"source": "correlation_alert_rules"
},
"description": "Your-customer-name LogEvent: Log Correlation Alert - Your-customer-name",
"id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"product": {
"name": "Log Manager"
},
"severity": "warning",
"state": "created",
"tags": ["example_tag", "example_tag2"],
"timestamp": 1452894789,
"type": "correlation",
"deleted": false,
"notifications": [
{
"id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"timestamp": 1452894789,
"alert_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"status": "pending",
"updated": 1452894789,
"policy_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"target_id": "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX",
"target_cid": 111111,
"target_label": "testing",
"target_channel": "webhook",
"target_target": "http://your-web-hook-url/",
"target_contact_id": null
}
]
}
This payload is parsed by Opsgenie as:
JSON
1
2
3
4
5
6
7
8
9
10
11
{
"aggregatedAlertCount" : 0
"description" : "Alert Date : 2016-01-15 21:53:09 GMT\nCustomer Name : Your-customer-name\n\nAlert Type : log\nAlert Name : Log Correlation Alert Test - Your-customer-name\nMessage Type : Unix DHCP IP Assigned\n\nLogEvent link:\nhttps://invision.alertlogic.net/log_message.php?id= XXXXXXXXXXXXX"
"message" : "Your-customer-name LogEvent: Log Correlation Alert - Your-customer-name"
"productName" : "Log Manager"
"severity" : "warning"
"source" : "correlation_alert_rules"
"state" : "created"
"type" : "correlation"
"tags" : "example_tag", "example_tag2"
}
Was this helpful?