Get started with Opsgenie as a user
Learn how to configure your profile, get notifications from Opsgenie and view on-call schedules.
The integrations framework allows Opsgenie’s alerting capability to work in conjunction with the most popular IT, operations management, and monitoring tools. Through email and API, Opsgenie can communicate with these tools and process its alerts according to the data they send. With integrations, you can extend your everyday monitoring services with a powerful alert and notification system. Opsgenie integrates with the services GitHub, New Relic, ServerGuard24, and more.
Opsgenie provides a robust framework to integrate Opsgenie with all your operations management tools. Through email and APIs, Opsgenie can communicate with your tools.
View the full list of Opsgenie integrations
You can forward events from many monitoring tools to Opsgenie for alerting purposes. Opsgenie can catch and process notification webhooks and create well-informed alerts based on the notification data. With this ability, you can let Opsgenie process any HTTP request as well as use many API-based integrations configured specifically for monitoring tools. For example, if you're a Raygun customer, you can use the Raygun Integration to let Opsgenie automatically create and close alerts according to events in Raygun.
Bidirectional integrations allow data to be sent and processed both ways between Opsgenie and the other applications. A good example is our ServiceNow integration - ServiceNow sends incident events to Opsgenie with detailed information and Opsgenie forwards alerts as incidents to ServiceNow.
The Opsgenie integrations framework has a callback capability that can notify chat applications about Opsgenie events. A good outgoing integration example is our Webhook capabilities which push information via a URL endpoint.
You can use Opsgenie email integrations to process your incoming emails for alert management. This integration accepts any kind of email and is fully customizable allowing you to control a robust alerting mechanism tailored to your inbox. Opsgenie also has specific email-based integrations for several monitoring tools, for example: Pingdom, Uptime Robot, Zenoss etc. For example, if you're a Pingdom customer, you can add Opsgenie's Pingdom integration and readily turn Pingdom events into Opsgenie alerts.
You can further make advanced settings in the integration to cover a variety of alert scenarios. These scenarios are called "actions" and they specify how and when alerts can be created, closed, acknowledged, etc. Opsgenie offers default actions for every integration, but you can customize them or add as many actions of your own as you like. For example, you can have three ‘Create alert’ actions; which means the webhook data that comes to Opsgenie is evaluated against these three scenarios in order, and if any one rule you set matches, a new alert is created.
There is a specific order in which the actions are evaluated. For example, ‘Ignore’ actions are evaluated first by design, and ‘Add note’ actions, last. This means the incoming data is evaluated against ‘Ignore’ actions and if one of them has a match, then no further actions are evaluated; only that Ignore action gets processed.
The following is the order of evaluation of actions:
Ignore > Create alert > Close alert > Acknowledge alert > Add note to alert
You can have up to 255 actions for each integration, up to 250 rules for the incoming part, and up to 50 for the outgoing.
An Ignore action means that the webhook data if it matches the action filter is ignored completely and isn’t evaluated by any other action. Ignore actions come with no default rules. These are the actions to be processed first when webhook data comes to Opsgenie.
On the integration configuration page:
Select Add rule in the Incoming section.
In the Add alert rule dialog, enter a name for the rule.
Select “Create alert” for the Rule type.
Set the filters as necessary.
Select Save.
If incoming webhook data matches the condition set of the filter, the ignore action is processed, thus, the data will be ignored. Learn more about action filters.
The “Create alert” action creates an Opsgenie alert if the condition set of its filter matches the incoming data. Specify the conditions for when an alert is created and fully customize the content of those new alerts.
On the integration configuration page:
Select Add rule in the Incoming section.
In the Add alert rule dialog, enter a name for the rule.
Select “Ignore” for the Rule type.
Set the filters as necessary.
Define the alert properties as necessary.
Select Save.
Alert filters
If the data that's sent to Opsgenie matches the condition set in this filter, the 'Create alert' action is processed to create an alert. Learn more about action filters.
Alert properties
Alert properties are data that define the content of an Opsgenie alert. You can type free text to describe the alert, set the priority, etc. You can also drag and drop the dynamic fields from the right panel. Only a few alert property fields are visible by default - select Show more properties to view them all.
Alert message: A title for the alert. You can use up to 130 characters.
Alias: The alias is a unique identifier for "open" alerts.
There can be only one open alert with the same alias in Opsgenie.
Description: A detailed description of the alert; anything that may not have fit in the Message field can be entered here.
Actions: List of actions a recipient can run to respond to an alert.
Use commas as separators for multiple actions.
Tags: Labels that are used for easier identification and categorization of alerts.
Use commas as separators for multiple tags.
Details > Extra properties: Additional properties of the alert. Enter the name of a property in the first field and its value in the second.
Entity: The name of the entity that the alert is related to.
For example, the name of the application or server.
Priority: The priority of the alert. For example, P1, P2, etc.
User: The owner of the note that is added to the alert.
Source: The source of the alert.
Note: A note to be added to the alert.
The 'Close alert' action closes an existing Opsgenie alert based on its alias if the data matches the condition set of the filter. Learn more about action filters.
Alert properties
Alias is a mandatory field for this action. When a ‘Close alert’ action is processed, Opsgenie looks for an "open" alert to close, whose alias is equal to the alias specified in this action.
Alias: The alias is a unique identifier for "open" alerts.
There can be only one open alert with the same alias in Opsgenie.
User: The owner of the note that is added to the alert.
Note: A note to be added to the alert.
The 'Acknowledge alert' action acknowledges an existing alert based on its alias if the data matches the condition set of the filter. Learn more about action filters.
Alert properties
Alias is a mandatory field for this action. When an ‘Acknowledge alert’ action is processed, Opsgenie looks for an "open" alert to acknowledge, whose alias is equal to the alias specified in this action.
Alias: The alias is a unique identifier for "open" alerts.
There can be only one open alert with the same alias in Opsgenie.
User: The owner of the note that is added to the alert.
Note: A note to be added to the alert.
The 'Add note to alert' action is used to add a comment to an existing alert according to the data Opsgenie API receives. When this action is processed, Opsgenie looks for an alert with an alias equal to the alias specified in this action to add a note to. Both Alias and Note fields are mandatory for this action.
Alias: The alias is a unique identifier of an alert.
User: The owner of the note that is added to the alert.
Note: A note to be added to the alert.
The actions of the same type also are evaluated in order and you can change it. For example, you have three 'Create alert' actions in the order of CreateAlert1, CreateAlert2, and CreateAlert3. You can just drag CreateAlert3 and move it up to change the order to CreateAlert3, CreateAlert1, and CreateAlert2. Now upon saving the rules, CreateAlert3 is evaluated before the other two against the incoming data. If the filter for CreateAlert3 has a match, CreateAlert1 and CreateAlert2 are evaluated. Remember that for one incoming request, only one action is run.
Was this helpful?