Incident management
Users can choose a variety of incident management integrations to bring reliability into your production operations.
When an alert triggers, LOGIQ Insights sends alert details to its designated alert destinations. LOGIQ Insights supports following types of alert destinations.
  • E-mail
  • Slack
  • PagerDuty
  • OpsGenie
  • ServiceNow
  • Generic Webhook

Configuring Destinations

To configure alert destinations navigate to settings and open “Alert Destinations” tab

Email

It’s required to configure the e-mail server to receive e-mail notifications.
  1. 1.
    Click on + New Alert Destination”, pick Email.
  2. 2.
    Specify, recipient’s name & email address.
  3. 3.
    Subject is configurable. It’s recommended to use format: Alert {alert_name} changed status to {state}. alert_name and state are template parameters and will be replaced by the urls to give more information about the alert that will have occurred.
James Smith's Email configuration
Email destination is created by clicking the save button.
Email Alert Destination

Slack

In your slack console, pick or create a channel such as #alerts-events in this example and create an incoming webhook by clicking on "Add Incoming Webhooks Integration"
Slack Webhooks integration
In your LOGIQ Insight's UI, Open “Alert Destinations” tab in the settings screen, and click on ”+ New Alert Destination”. Pick “Slack” as the type. Set the name, channel, etc. and provide a “Slack Webhook URL”, from above
Slack Destination Configuration

Pager Duty

Obtain the PagerDuty Integration Key from your PagerDuty service. Use Events API v2 Integration Type.
After obtaining the Integration Key:
  1. 1.
    Open “Alert Destinations” tab in the settings screen, and click on ”+ New Alert Destination”.
  2. 2.
    Pick “PagerDuty” as the type.
  3. 3.
    Populate mandatory fields are Name and Integration Key obtained earlier.
PagerDuty Configuration

OpsGenie

In the OpsGenie UI, navigate to your Teams page and select the team for which you want to create the alert integration. In the example below we will use the logflow team.
NOTE: More than one OpsGenie alert destinations can be defined in LOGIQ
Select the team
In the teams page, select Add integration and create a new REST API HTTPS over JSON Integration type
Add an integration to the team
REST API HTTPS OVER JSON
Copy the API integration key from the integration created above.
The API Key must be created with Read and Create and Update permissions and must be Enabled
You are now ready to add the OpsGenie integration in LOGIQ under alert destinations. Provide a name for the integration and the OpsGenie api key. You are now ready to receive incident notifications from LOGIQ.
OpsGenie Alert destination

OpsGenie alerts view for LOGIQ alerts

You can now see the alerts being raised in the OpsGenie UI under the alerts tab.
OpsGenie alerts table
OpsGenie LOGIQ generated alert detail

Associating alert destinations to alert

Once the Alert destinations are created, one or more alert destinations can be configured in alert create or edit ui. Each configured destination is notified whenever that alert triggers.
Last modified 10d ago