Skip to content

Commit

Permalink
feat(Alerts/AI): Initial draft new intro doc
Browse files Browse the repository at this point in the history
  • Loading branch information
paperclypse committed Jan 21, 2022
1 parent 7b1adaf commit cfcc101
Showing 1 changed file with 63 additions and 71 deletions.
134 changes: 63 additions & 71 deletions src/content/docs/alerts-applied-intelligence/overview.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Alerts and Applied Intelligence
type: landingPage
title: Introduction to alerts and applied intelligence
metaDescription: "An overview of how you can use alerts and applied intelligence to monitor your systems and be notified when things go wrong, and when they're starting to go wrong."
tags:
- Alerts and Applied Intelligence
redirects:
Expand All @@ -24,85 +24,77 @@ redirects:
- /docs/alerts-applied-intelligence
---

<LandingPageHero>
<HeroContent>
Together, New Relic Alerts and Applied Intelligence form a flexible and centralized notification system that unlocks the operational potential of New Relic. Alerts is a single tool to manage alert policies and alert conditions, letting you focus on the metrics you care about most.
Alerts and applied intelligence are a suite of tools and features that proactively notify you when things go wrong in your system. And when they're starting to go wrong.

Applied Intelligence helps you find, troubleshoot, and resolve problems faster. Specifically, it's a hybrid machine learning engine that reduces alert noise, correlates incidents, automatically detects anomalies, and provides root cause analysis.
Alerts lets you define the conditions in your system you want to be notified about, letting you focus on the things you care about most.

<ButtonGroup>
Applied intelligence is a hybrid machine learning engine that reduces alert noise, correlates incidents, automatically detects anomalies, and provides root cause analysis.

![Screenshot of the Alerts and AI overview page](./images/alerts-ai-summary.png 'alerts-ai.png')

<figcaption>
**[one.newrelic.com](https://one.newrelic.com) > Alerts & AI: You can use the overview summary page to quickly review your violations, issues, and incidents.**
</figcaption>

<ButtonGroup>
<ButtonLink
role="button"
to="https://newrelic.com/signup"
variant="primary"
>
Sign up for free
</ButtonLink>
</ButtonGroup>
</ButtonGroup>
No credit card required. Already have an account? [Login](http://one.newrelic.com/).

</HeroContent>
## Analyze [#analyze]

![Screenshot of the Alerts and AI overview page](./images/alerts-ai-summary.png 'alerts-ai.png')
Use the analyze features to scan for critical problems affecting your systems, via alerts violations, issues, incidents, and anomalies.

<figcaption>
**[one.newrelic.com](https://one.newrelic.com) > Alerts & AI: You can use the overview summary page to quickly review your violations, issues, and incidents.**
</figcaption>
</LandingPageHero>

<LandingPageTileGrid>
<LandingPageTile
title="Learn about alerting in New Relic."
href="/docs/alerts/new-relic-alerts/getting-started/alerting-new-relic"
icon="fe-zap"
>
Understand the fundamental principles of policies, conditions, thresholds, notification channels, and events.
</LandingPageTile>

{' '}
<LandingPageTile
title="Follow alert policy workflow."
href="/docs/alerts/new-relic-alerts/configuring-alert-policies/alert-policy-workflow"
icon="fe-move-horizontal"
>
Learn the basic process for creating an alert policy for New Relic products.
</LandingPageTile>

{' '}
<LandingPageTile
title="Define alert conditions."
href="/docs/alerts/new-relic-alerts/configuring-alert-policies/define-alert-conditions"
icon="fe-sliders"
>
Set the necessary criteria for New Relic Alerts to create an incident. Or, use
the [REST API](/docs/alerts/new-relic-alerts/rest-api-alerts).
</LandingPageTile>

{' '}
<LandingPageTile
title="Create notification channels."
href="/docs/alerts/new-relic-alerts/managing-notification-channels/notification-channels-controlling-where-send-alerts"
icon="fe-message-circle"
>
Specify how to get notified when critical violations occur, so you can quickly
fix the issue.
</LandingPageTile>

<LandingPageTile
title="Learn about AI."
href="/docs/alerts-applied-intelligence/new-relic-alerts/get-started/introduction-applied-intelligence"
icon="fe-alert-triangle"
>

Take advantage of automatically enabled [Proactive Detection](/docs/alerts-applied-intelligence/applied-intelligence/proactive-detection/proactive-detection-new-relic-ai) to be warned about trouble brewing in your APM-monitored apps. Group similar incidents with [Incident intelligence](/docs/alerts-applied-intelligence/incident-intelligence/get-started-incident-intelligence). [Incident workflows](/docs/alerts-applied-intelligence/applied-intelligence/incident-workflows/enhance-notifications-incident-workflows) enrich your notifications with New Relic data.

</LandingPageTile>

<LandingPageTile
title="Resolve an issue."
href="/docs/alerts/new-relic-alerts/reviewing-alert-incidents"
icon="fe-tool"
>
[Acknowledge an incident](/docs/alerts/new-relic-alerts/reviewing-alert-incidents/acknowledge-alert-incidents) after it occurs, or [close a violation manually](/docs/alerts/new-relic-alerts/reviewing-alert-incidents/close-violations-manually) as needed.
</LandingPageTile>
</LandingPageTileGrid>
The [overview page](/docs/alerts-applied-intelligence/new-relic-alerts/get-started/alerts-ai-overview-page) shows your most recent open, closed, and muted violations.

The **Issues & activity** page shows your most recent [issues](/docs/alerts-applied-intelligence/new-relic-alerts/get-started/alerts-ai-overview-page/#issues), [incidents](/docs/alerts-applied-intelligence/new-relic-alerts/get-started/alerts-ai-overview-page/#incidents), and [anomalies](/docs/alerts-applied-intelligence/new-relic-alerts/get-started/alerts-ai-overview-page/#anomalies).

## Detect [#detect]

Use the detect features to define the conditions in your system you want to be notified about, as well as configuring how anomalies are detected.

The [alert conditions (policies) page](/docs/alerts-applied-intelligence/new-relic-alerts/alert-policies/create-edit-or-find-alert-policy/) lists the policies where your conditions are created and organized. Create new policies here.

The [anomaly detection page](/docs/alerts-applied-intelligence/applied-intelligence/proactive-detection/expanded-anomaly-detection/) lists your expanded anomaly detection configurations. An anomaly is a behavioral trend that doesn't match the historical data for your system. You can add or edit the configurations here.

## Correlate [#correlate]

Use the correlate features to define your data sources and review and configure the logic grouping your incidents together.

The [sources page](/docs/alerts-applied-intelligence/applied-intelligence/incident-intelligence/get-started-incident-intelligence/#1-configure-sources) shows the data input sources you've chosen to analyze and be notified about. You can add new sources or configure existing ones. Sources include New Relic sources, such as alerts conditions and detected anomalies, as well as third-party sources like AWS Cloudwatch Alarms and PagerDuty.

The [decisions page](/docs/alerts-applied-intelligence/applied-intelligence/incident-intelligence/change-applied-intelligence-correlation-logic-decisions/) shows your correlated incidents. You can review, edit, and add decisions.

## Enrich & notify [#enrich]

Use the enrich and notify features to add additional metadata to your notifications, schedule when you don't want to be notified, and configure where your notifications get sent.

Use the [muting rules page](/docs/alerts-applied-intelligence/new-relic-alerts/alert-notifications/muting-rules-suppress-notifications/) to temporarily stop your alerts violation notifications.

Use [workflows](/docs/alerts-applied-intelligence/applied-intelligence/incident-workflows/incident-workflows/) to add more data to your alerts notifications.

Use [destinations](/docs/alerts-applied-intelligence/applied-intelligence/incident-intelligence/get-started-incident-intelligence/#2-configure-destinations) to configure where your applied intelligence notifications get sent.

Use [pathways](/docs/alerts-applied-intelligence/applied-intelligence/incident-intelligence/get-started-incident-intelligence/#3-configure-pathways) to configure where your correlated issues get sent.

Use [incident workflows](/docs/alerts-applied-intelligence/applied-intelligence/incident-workflows/incident-workflows/) to automate common problems and actions related to your alerts policies.

Use [incident destinations](/docs/alerts-applied-intelligence/applied-intelligence/incident-intelligence/incident-intelligence-destination-examples/) to add and configure third-party services for your incidents.

## Settings [#settings]

Use the settings page to review and manage your current incident intelligence usage.

## Alerts (classic) [#alerts]

Alerts (classic) lets you manage events, incidents, and notification channels with the UI you're used to using.

Use the [events and incidents pages](/docs/alerts-applied-intelligence/new-relic-alerts/alert-incidents/view-violation-event-details-incidents/) to review alerts violations and other events.

Use the [channels page](/docs/alerts-applied-intelligence/new-relic-alerts/alert-notifications/notification-channels-control-where-send-alerts/) for a list of your alerts notification channels and to create new channels.

0 comments on commit cfcc101

Please sign in to comment.