As the digital world continues to grow more tangled and complex, it's easy for DevOps teams to feel overwhelmed. There are so many new data points, dashboards, entities, and alerts that it can be hard for on-call teams to know what's happening, where it's happening, and what to do about it. Alerts allow you to define the conditions in your system you want to know about, letting you focus on the things you care about most. Applied intelligence is a machine-learning engine that proactively notifies your team about potential problems by identifying anomalous behavior, correlating any relevant incidents, alerting your team of active issues, and providing a root cause analysis.
New Relic's alerts and applied intelligence were designed for busy DevOps teams to end response fatigue: you can detect and diagnose incidents and prioritize them for immediate action.
To get started using alerts:
- Sign up to New Relic for free if you haven't already
- Use our agents and integrations to begin ingesting data into New Relic
- Set up your alerts from the Alerts & AI page to begin monitoring your data right away
In the New Relic UI, alerts and applied intelligence are divided into several sections, each unlocking different features. Check out the section explanations below to learn how these features can meet your needs.
If you want to monitor latency for your most recent deployment, you can set a static alert condition to create an incident if behavior deviates beyond the threshold that you set. This means that no matter what, your team will know if latency exceeds your static threshold. Static alerts are dependable and completely customizable for your specific needs.
Anomalies take alerting one step further and use machine learning to monitor patterns and trends in your data. Anomalies identify any deviation from expected behavior and notify your team instantly. You can decide what level of anomaly works best for each situation. Our automatic anomaly detection is easy to use and implement, while customizable anomaly detection offers your team the ability to create alerts that are just right for you. We also have self-adjusting monitoring which uses anomaly alert conditions to allow you to create intelligent, self-adjusting conditions.
After you've detected any irregular behavior in your system, applied intelligence's correlation logic, known as decisions, reviews all incoming events and compares them based on signals like time, context, or source. If multiple issues are discovered to be related, instead of creating many, redundant alerts, applied intelligence's correlation logic will group these issues together to create a single, relevant alert. This saves your team time and energy and allows you to get to the heart of the problem faster.
Once you've used our anomaly detection to identify irregular behavior and correlation logic to group all your relevant issues together, it's important to notify the right people on your team of any potential problems. New Relic created workflows so you can control when and where you want to receive notifications about issues which allow you to funnel the right information to the relevant person or team. Workflows also give you the opportunity to enrich your notifications with additional New Relic data.
To learn how to set up workflows, follow our step by step guide by in our workflows docs.
Pathways have been replaced by workflows. If you still have access to pathways, reach out to your New Relic account representative and ask to be upgraded.
After you've created a workflow that connects your team with the information they need, you need to configure your destinations. Destinations are where we send notifications about your New Relic data. A destination is a unique identifier for a third-party system that you use. Destination settings contain the connection details to integrate with third-party systems and can be used across a variety of tools in New Relic.
To learn how to set up destinations and configure message templates, explore our notification documentation.
Note: During a service interruption, Alerts may be unavailable.
Use our GraphQL NerdGraph API to interact with alerts. We recommend the NerdGraph API over the REST API because it has the latest features.
Use the REST API to return information about your alert settings or to create alert policies and conditions. We recommend you start with the NerdGraph API to see if it has the options you need.
New Relic's incident intelligence service is performed solely in the United States. By using New Relic incident intelligence, you agree that New Relic may move your data to, and process your data in, the US region. This applies whether you store your data in New Relic's US region data center or in our EU region data center. If you elect to use the suggested responder feature and manage EU-based individuals, you may need to confirm that an appropriate data processing agreement is in place.
Ready to try New Relic for yourself? Sign up for your free New Relic account and follow our quick launch guide so you can start maximizing your data today! If you need any help, check out our tutorial series on creating alerts to get started.
Do you use Datadog to monitor your logs but want to try out New Relic observability features for free? See our guide for migrating from Datadog.