New Relic Alerts is a flexible and centralized notification system that unlocks the operational potential of New Relic. You now have a single tool to manage alert policies and alert conditions that focus on the metrics you care about most. This includes:
- Applications monitored by New Relic APM
- Client-side metrics monitored by New Relic Browser
- New Relic Mobile, including external services
- Hosts monitored by New Relic Infrastructure
- Key transactions monitored by New Relic APM and New Relic Browser
- Plugins from New Relic's Plugin Central
- Monitors from New Relic Synthetics
To understand the differences between New Relic Alerts and basic alerting, see Alerting in New Relic.
Compatibility and requirements
Access to this feature depends on your subscription level.
New Relic Alerts (alerts.newrelic.com) is also available with New Relic's Android app version 1.9.1 or higher and iOS app version 3.20 or higher.
Good alerts are about notifying individuals or teams about changes in the systems for which they are responsible. With New Relic Alerts (alerts.newrelic.com), you can follow an alert from the initial warning to its final resolution, and examine patterns to help avoid alertable situations in the future.
With New Relic Alerts, take advantage of these features:
- You decide what
Whether your architecture has few components or many, New Relic Alerts provides configurable alerting solutions. This easily allows you to adjust alerting to selected entities within your environment and scale with the growth of your organization.
- You decide who
- Mobile push notifications to the New Relic iOS app version 3.20 or higher and the New Relic Android app version 1.9.1 or higher
Personnel involved in resolving the problem can have direct access to your runbook procedures for this type of incident. Also, if they are in different geographic locations, they can easily communicate by referring to an incident's UTC time, or switch the own time zone.
- You decide when
By setting your policies' incident preference, you can control how many notifications you will receive by choosing how the violations group together. You can also decide whether to set a Critical level for alert notifications, or set both Warning and Critical thresholds. You can also define an
INFOlevel for webhooks.
New Relic Alerts provides detailed views of incidents while they are in progress. You can review the event log while an incident is open and after it closes.
- You decide how
Using New Relic Alerts' intuitive user interface at alerts.newrelic.com, you can associate resources in many New Relic products with alert policies and conditions. And, by reviewing events across products, you can easily identify potential problem patterns, and evaluate how to adjust your alerting policies as needed. This powerful flexibility makes it even easier to organize your alerting configuration and reduce redundancy.
New Relic Alerts features
|alerts.newrelic.com||What is new in New Relic Alerts?|
|Centralized UI||A dedicated user interface is now available for alert configuration and incident management across New Relic products.|
|Alerting on more metrics||You can alert on many more metrics, including response time, throughput, external services, custom metrics, etc.|
|Flexible policies||A single resource (entity) can be included in many policies and many conditions, allowing for very flexible alerting to suit your needs. For limits on the number of conditions and policies, see the minimum and maximum values documentation.|
|Flexible conditions||There are more options in the condition configuration for alert policies. You can also include a runbook URL, making remediation actions and docs easily accessible to the incident responder.|
|More integration channels||VictorOps, OpsGenie, and Slack have been added to the notification channel options, with more to come soon.|
|New webhooks||Webhooks are now extremely customizable. You can define custom headers, basic auth, and custom payloads in your webhooks.|
|Incident scoping and rollups||Every alert policy can be configured to use one of three violation grouping strategies to control the number of alerts (incidents) to create or send.|
|Cross-product events||A dedicated Events page in New Relic Alerts shows operational events across all New Relic products, including Browser, Infrastructure, and Mobile.|
|Alert information from the New Relic product||
You can also view alert information directly from the selected entity (alert target) from its New Relic product, including:
For more help
Additional documentation resources include:
- Alerts glossary (definitions for common terminology used with New Relic Alerts)
- Best practices for alert policies (defining policies based on your architecture or your staffing requirements, deciding how many alert policies and conditions you may need, selecting effective channels for alert notifications)
- Alert policy workflow (overview of how to create an alert policy, including the targets it identifies, the conditions and thresholds that trigger the alert, the notification channels to use, and the incident preference to roll up policy violations)
- Access to New Relic Alerts (information about how to access the existing alerting system or New Relic Alerts, and a summary of some differences between the two separate alerting systems)