Ingest generic REST alerts 🔗
You can use Incident Intelligence ingest endpoints to ingest alerts from various third-party sources. In Incident Intelligence you can then create on-call schedules and incident workflows to route third-party incidents to responders. Use the generic REST ingest endpoint to forward third-party alerts to Incident Intelligence for which there is not a specific ingest endpoint available.
REST ingest endpoint 🔗
To send REST alerts to the ingest endpoint, make a POST call to the endpoint for your realm.
https://ingest.<REALM>.signalfx.com/v1/incidentintelligence/generic
For steps to obtain your realm see View your realm, API endpoints, and organization.
Request header 🔗
Header |
Required |
Description |
---|---|---|
X-SF-Token |
Required |
Authentication token. See Find and copy your API access token. Ensure that the token has INGEST listed under Authorization Scopes. |
Content-Type |
Required |
application/json |
Alert fields 🔗
The following fields are transformed as part of the common information model. All other included fields are included properties object in the transformed alert.
Field |
Required |
Type |
Description |
---|---|---|---|
severity or message_type for Splunk On-call alerts |
Required |
String |
The criticality of the alert. Supported values are |
title or entity_display_name for Splunk On-call alerts |
Required |
String |
Name of the alert |
description or state_message for Splunk On-call alerts |
String |
Verbose message |
|
timestamp |
Integer |
Date-time. Send date-time in epoch format |
|
source |
String |
The alert source |
JSON payload 🔗
Refer to the following example JSON payload for the generic third-party alert to the REST endpoint.
Example JSON payload for generic third-party alert:
{
"severity":"critical",
"title":"Out of memory exception",
"description":"Failed log statement",
"timestamp": 1675704711477
}
Refer to the following example JSON payload for the generic third-party alert to the REST endpoint.
Example JSON payload for Splunk On-call alert:
{
"message_type":"critical",
"entity_display_name":"Out of memory exception",
"state_message":"Failed log statement",
"timestamp": 1675704711477
}
Using this endpoint, your alert is ingested and transformed into the common event model for alerts in Incident Intelligence. These are examples of the transformed alert data that is saved as an alert in Incident Intelligence:
Example transformed alert data for a generic third-party alert:
{
"id": "<Your alert ID>",
"eventId": "<Your event ID>",
"title": "Out of memory exception",
"description": "Failed log statement",
"severity": "critical",
"sourceType": "generic",
"orgId": "<Your org ID>",
"triggeredAt": 1675704711477,
"properties": {
"severity": "critical",
"title": "Out of memory exception",
"description": "Failed log statement",
"timestamp": 1675704711477
}
}
Example transformed alert data for a Splunk On-call alert:
{
"id": "<Your alert ID>",
"eventId": "<Your event ID>",
"title": "Out of memory exception",
"description": "Failed log statement",
"severity": "critical",
"sourceType": "generic",
"orgId": "<Your org ID>",
"triggeredAt": 1675704711477,
"properties": {
"message_type": "critical",
"entity_display_name": "Out of memory exception",
"state_message": "Failed log statement",
"timestamp": 1675704711477
}
}