Rackspace Integration Guide

Rackspace Cloud Monitoring monitors websites and sends critical alerts, regardless of where the sites are hosted. Integrate AlertOps’ alert management platform with Rackspace to receive and respond to critical alerts through email, SMS, push notification, and phone alerts. AlertOps ensures that alerts received from Rackspace always reach the correct, available team member by utilizing escalation policies and on-call schedules.

AlertOps Configuration

  1. From the main menu, click on Integrations and then select Inbound Integrations from the sub menu.

  2. Select API tab

  3. Select the 'ADD API INTEGRATION' button.

  4. You should now be on the API Integration Detail page. Select Rackspace from the pre-built Integration Templates.

  5. Enter a name for the integration. Select an escalation rule to determine the integration's escalation policy. And, enter the names of recipient group(s) and recipient user(s). Click 'SAVE.' Then, click 'COPY URL' to copy the URL endpoint to be used in the Rackspace configuration.

Rackspace Configuration

Step 1: Refer to Documentation on Rackspace.

Sample Payload:

Typical payload:

{

"event_id": "acOne:enOne:alOne:chOne:1326910500000:WARNING",

"log_entry_id": "6da55310-4200-11e1-aaaf-cd4c8801b6b1",

"details": {

"target": null,

"timestamp": 1326905540481,

"metrics": {

"tt_firstbyte": {

"type": "I",

"data": 2,

"unit": "milliseconds"

},

"duration": {

"type": "I",

"data": 2,

"unit": "milliseconds"

},

"bytes": {

"type": "i",

"data": 17,

"unit": "bytes"

},

"tt_connect": {

"type": "I",

"data": 0,

"unit": "milliseconds"

},

"code": {

"type": "s",

"data": "200",

"unit": "unknown"

}

},

"state": "WARNING",

"status": "warn.",

"txn_id": "sometransaction",

"collector_address_v4": "127.0.0.1",

"collector_address_v6": null,

"observations": [

{

"monitoring_zone_id": "mzOne",

"state": "WARNING",

"status": "warn.",

"timestamp": 1326905540481,

"collectorState": "UP"

}

]

},

"entity": {

"id": "enOne",

"label": "entity one",

"ip_addresses": {

"default": "127.0.0.1"

},

"metadata": null,

"managed": false,

"uri": null,

"agent_id": null,

"created_at": 1326905540481,

"updated_at": 1326905540481

},

"check": {

"id": "chOne",

"label": "ch a",

"type": "remote.http",

"details": {

"url": "http://www.foo.com",

"body": "b",

"method": "GET",

"follow_redirects": true,

"include_body": false

},

"monitoring_zones_poll": [

"mzOne"

],

"timeout": 30,

"period": 60,

"target_alias": "default",

"target_hostname": "",

"target_resolver": "",

"disabled": false,

"metadata": null,

"confd_name": null,

"confd_hash": null,

"active_suppressions": null,

"scheduled_suppressions": null,

"created_at": 1326905540481,

"updated_at": 1326905540481

},

"alarm": {

"id": "alOne",

"label": "Alarm 1",

"check_id": "chOne",

"entity_id": "enOne",

"criteria": "if (metric[\"t\"] >= 2.1) { return WARNING } return WARNING",

"disabled": false,

"notification_plan_id": "npOne",

"metadata": null,

"confd_name": null,

"confd_hash": null,

"active_suppressions": null,

"scheduled_suppressions": null,

"created_at": 1326905540481,

"updated_at": 1326905540481

},

"tenant_id": "91111"

}

The following fields within the payload should be present:

Click here and here to view documentation on notifications using webhooks and here on triggers and alarms.

Alert Triggering Information

AlertOps will automatically create an incident when a new alert is received from Rackspace with an IncidentStatus status of “CRITICAL,” “ERROR,” or “PROBLEM.”

If an alert with status “CRITICAL,” “ERROR,” or “PROBLEM” matches an existing Open Alert, AlertOps will recognize the new alert as a duplicate and ignore the alert. The alert will be recorded in the Inbound Messages table as “Mapped Appended.”

AlertOps will automatically close the same incident when an alert with an IncidentStatus status “OK” or “RESOLVED” is received.

Testing and Troubleshooting

Click here to read about Web API Testing and Troubleshooting. 

Did this answer your question?