• /
  • EnglishEspañol日本語한국어Português
  • Log inStart now

Alerts overview page

On the Overview page, you'll find a consolidated view of your current alerts incidents. The Issues & activity page has views of your active issues and recent incidents.

Why it matters

The Overview and Issues & activity pages provide analytics on how your system is (or isn't) performing. You can quickly switch between the Overview, Issues and Incidents to scan for critical problems affecting your systems.

Overview page

The overview page shows a high-level view of recent and current alerts incidents. With this page, you'll get quick insight into how many critical incidents you have, how many have been closed, and which policies are creating the most incidents. This page also shows the top sources of your muted incidents.

Dashboard title

What it is

Opened incidents by priority (time series)

A time series view that counts the number of incidents opened during a time period. This chart only tracks open events. It doesn't track the open or closed state of the incident.

Opened incidents by priority (pie)

This chart uses the same data as the time series chart of the same name. It quickly shows you the breakdown between warning and critical incidents. Click the pie chart to filter the whole page by warning or critical incidents.

Closed incident durations

A distribution of how long each incident was open (duration), before being closed. Generally, it's better to have shorter durations for your incidents. If you're seeing a lot of long duration incidents, you may want to write a custom filter to investigate those more deeply.

Muted incidents

If you've written some muting rules, you'll see them here. If you're not using any muting rules, you'll see 100% “Not muted” incidents. Click this chart to filter by muted incidents to quickly see where they're coming from.

Top policies creating incidents

A chart of the top five policies generating the most incidents. Click a policy name to filter the whole page by that policy's incidents.

Top conditions creating incidents

A chart of the top five conditions generating the most incidents. Click a policy name to filter the whole page by that condition's incidents.

Top sources of incidents

A chart of the entities generating the most incidents. If available, it uses the entity name. Otherwise, it will use the event type. Click an entity to filter the whole page by that entity's incidents.

Issues

On the Issues & activity page, issues are groups of incidents that describe the underlying problem of your symptoms. When a new incident is created, incident intelligence opens an issue and evaluates other open issues for correlations. An issue will contain arrays of all the tags (metadata) from all the incidents it contains.

The issues feed includes all of your issues and can be searched and filtered using the top of page component.

By default, the issues feed is filtered to only show the active issues. You can also filter by issue priority, source, alert condition, alert policiy, entity, or issue ID.

By default, issues are sorted by most recently created issue.

Click an issue to open its issue page.

Issues feed columns

Column name

Values

State

Created, active, acknowledged, closed

Priority

Low, medium, high, critical

Issue name

The issue's name

Created

When the issue was created (in absolute or relative time)

Duration

How much time has passed since the issue was created

Entities

A list of the impacted entities. If the list is too long to be shown, mouseover the value to see the list.

Analysis summary

The machine learning module's output for the issue

Path

The Sources -> Destination path

Incidents

The number of related incidents

Incidents

On the Issues & activity page, incidents are events that describe the symptoms affecting your system over time. These symptoms are detected by your monitoring tools, which evaluate your data streams and events.

New Relic incident metadata comes from any of the following sources:

  • Inheriting all the tags from the alert condition that triggered it
  • All the facets, values, and where conditions are added as tags if the NRQL alert condition contains a facet or where condition
  • All the tags from an entity are added if the result of the NRQL alert condition can be mapped to that single entity

External incident medadata is what was received as tag.*.

The incidents feed includes all of your incidents: New Relic incident and external incidents.

You can filter the feed by source, incident state, and priority.

Default behavior

By default, the feed is sorted by last updated at the top.

Click an incident's row to see the incident's details.

Incidents feed columns

Column name

Values

State

Open, Closed

Priority

Low, Medium, High, Critical

Incident name

The incident's name

Created

When the incident was created (in absolute or relative time)

Duration

How much time has passed since the incident was created

Entities

A list of the entities impacted by the incident. If the list is too long to be displayed, mouseover the value to see the list.

Analysis summary

The machine learning module's output for the incident

Source

The source system of the incident

Events

The number of events aggregated in the incident

Copyright © 2024 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.