Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Daily release/sep 3 2024 8 49 #18550

Merged
merged 24 commits into from
Sep 3, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
ce0ec97
fix(K8s): Updating Alerts inside K8s
nbaenam Aug 21, 2024
2d4152e
fix(K8s): Updating Alerts inside K8s
nbaenam Aug 21, 2024
344ff08
fix(K8s): Updating Alerts inside K8s
nbaenam Aug 21, 2024
fb510ca
fix(K8s): Updating Alerts inside K8s
nbaenam Aug 21, 2024
e0e5027
fix(K8s): Updating Alerts inside K8s
nbaenam Aug 21, 2024
d5ae057
fix(K8s): Updating navigation and links
nbaenam Aug 22, 2024
e71be52
fix(K8s): Fixed conflicts with i18n files
nbaenam Aug 22, 2024
318e943
Merge branch 'develop' into nb-k8s-alerts-NR-266828
nbaenam Aug 22, 2024
27d47f0
feat(K8s): Added the create K8s alerts page
nbaenam Aug 22, 2024
b577533
Merge branch 'nb-k8s-alerts-NR-266828' of https://github.com/newrelic…
nbaenam Aug 22, 2024
d3a2216
fix(K8s): Fixed issue with DNT tag
nbaenam Aug 22, 2024
5ccc237
feat(K8s): Added more info to the create K8s alerts page
nbaenam Aug 23, 2024
d518217
fix(K8s): Added modifications on the install, create, and prebuilt pages
nbaenam Aug 23, 2024
057cd9d
feat(K8s): Added SMEs comments
nbaenam Aug 26, 2024
692f7ee
Add files via upload
kimberlyburns Aug 28, 2024
8564ca6
Add files via upload
kimberlyburns Aug 28, 2024
eec31c6
Merge branch 'develop' into pr/18509
rhetoric101 Aug 29, 2024
8d64f47
fix(What's new): initial editing suggestions
rhetoric101 Aug 29, 2024
9aba8c1
fix(What's new): Push up SME feedback
rhetoric101 Aug 29, 2024
48c1349
fix(What's new): Implement PMM feedback
rhetoric101 Aug 30, 2024
27f040f
fix(What's new): Add paragraph break
rhetoric101 Aug 30, 2024
4c1c5f0
fix(What's new): Move image lead-in
rhetoric101 Aug 30, 2024
482ceb8
Merge pull request #18441 from newrelic/nb-k8s-alerts-NR-266828
nbaenam Sep 2, 2024
8b4c274
Merge pull request #18509 from kimberlyburns/whats-new-09-03-loss-of-…
ally-sassman Sep 3, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -148,7 +148,7 @@ Each issue preference option has its own advantages. You can select any preferen
</tbody>
</table>

## One issue per policy (default) [#preference-policy]
### One issue per policy (default) [#preference-policy]

Choose the <DNT>**One issue per policy**</DNT> preference if your policy and its conditions have a focused scope, like monitoring one entity.

Expand All @@ -166,7 +166,7 @@ If additional conditions open incidents after the issue opens, the incidents are
When you select the default option <DNT>**One issue per policy**</DNT> as your issue preference, it will group all incidents opened by any condition on that policy into the same issue.
</figcaption>

## One issue per condition [#preference-condition]
### One issue per condition [#preference-condition]

Choose the <DNT>**One issue per condition**</DNT> option when you want an individual issue record to focus on a specific condition. If the policy has multiple conditions, you will see separate issue records for each condition on your <DNT>**Issues & activity**</DNT> page. Learn more about [your issue creation preferences](/docs/new-relic-solutions/best-practices-guides/alerts-applied-intelligence/alerts-best-practices/#issue-creation).

Expand All @@ -186,7 +186,7 @@ Choose the <DNT>**One issue per condition**</DNT> option when you want an indivi
When you select the option <DNT>**One issue per condition**</DNT> as your issue preference, it will group all incidents by any signal for a specific condition into separate issues.
</figcaption>

## One issue per condition and signal [#preference-signal]
### One issue per condition and signal [#preference-signal]

The <DNT>**One issue per condition and signal**</DNT> option is the most granular level for creating issue records. Choose this issue preference when you want to closely monitor anything that is occurring anywhere across your infrastructure.
Learn more about [your issue creation preferences](/docs/new-relic-solutions/best-practices-guides/alerts-applied-intelligence/alerts-best-practices/#issue-creation).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ Here are some tips to avoid being placed on our suppression list:
</td>

<td>
In general, email isnt the most reliable way to receive notifications. For your most important alerts, set up [alternate means of communication](/docs/alerts/new-relic-alerts/managing-notification-channels/notification-channels-control-where-send-alerts#channel-types) as a backup.
In general, email isn't the most reliable way to receive notifications. For your most important alerts, set up [alternate means of communication](/docs/apis/nerdgraph/examples/nerdgraph-api-notifications-channels/) as a backup.
</td>
</tr>
</tbody>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ tags:
- Notification Channels
metaDescription: 'For New Relic alerts: how you can list, create, update, and delete channels with our NerdGraph API.'
redirects:
- /docs/alerts/new-relic-alerts/managing-notification-channels/notification-channels-control-where-send-alerts
freshnessValidatedDate: never
---

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -160,6 +160,6 @@ To learn more about exploring your Kubernetes data, check out these docs:

<DocTile
title="Set alerts on Kubernetes"
path="/docs/kubernetes-pixie/kubernetes-integration/advanced-configuration/kubernetes-integration-predefined-alert-policy"
path="/docs/kubernetes-pixie/kubernetes-integration/installation/create-alerts"
/>
</DocTiles>
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Take a look at what you can do with New Relic:

* Scrape Prometheus metrics from any workload in the cluster thanks to the service discovery provided by the [Prometheus Agent](/docs/infrastructure/prometheus-integrations/get-started/send-prometheus-metric-data-new-relic/#Agent).

* Create [alert policies](/docs/alerts-applied-intelligence/new-relic-alerts/alert-policies/create-edit-or-find-alert-policy/) and [alert conditions](/docs/alerts-applied-intelligence/new-relic-alerts/alert-conditions/alert-conditions/#create-alert-condition) based on your Kubernetes data, or extend the [predefined alert conditions](/docs/integrations/kubernetes-integration/kubernetes-events/kubernetes-integration-predefined-alert-policy).
* The integration includes a set of [predefined alert conditions](/docs/kubernetes-pixie/kubernetes-integration/installation/predefined-alert-policy), but you can [create and modify your Kubernetes alerts](/docs/kubernetes-pixie/kubernetes-integration/installation/create-alerts) based on your Kubernetes data, or add a set of [recommended alert policy](/docs/kubernetes-pixie/kubernetes-integration/installation/recommended-alert-policy).

* Check out all your Kubernetes events. The [Kubernetes events integration](/docs/integrations/kubernetes-integration/kubernetes-events/install-kubernetes-events-integration) watches for events happening in your Kubernetes clusters and sends those events to New Relic. You can then visualize the event data in the cluster explorer. It's installed by default after [installing the New Relic Kubernetes integration](/docs/kubernetes-pixie/kubernetes-integration/installation/kubernetes-integration-install-configure/).

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,140 @@
---
title: 'Create and modify Kubernetes alerts'
tags:
- Integrations
- Kubernetes integration
- Alerts
freshnessValidatedDate: 2024-09-02
---

With New Relic, you can stay informed about Kubernetes issues by defining the specific data you want to monitor, setting customizable [thresholds](/docs/alerts/create-alert/set-thresholds/set-thresholds-alert-condition/), and configuring the [notifications](/docs/alerts/get-notified/intro-notifications/) you want to receive. You can add a set of [recommended alert policies](/docs/kubernetes-pixie/kubernetes-integration/installation/recommended-alert-policies) that you can tailor to your needs, or you can create completely custom <InlinePopover type="alerts"/>, policies, and [workflows](/docs/alerts/get-notified/incident-workflows/) to suit your environment.

<Callout variant="tip">
Check out [Alerting concepts and terms](/docs/alerts/overview/#concepts-terms) for more information about how alerts work.
</Callout>


## Create a Kubernetes alert condition [#create-k8s-alert-condition]

1. Go to <DNT>**[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Infrastructure**</DNT> and click <DNT>**Alerts**</DNT> on the left navigation pane.

2. Click <DNT>**+ New Alert Condition**</DNT>.

<img
title="Kubernetes - new alert condition"
alt="Add Kubernetes alerts"
src="/images/kubernetes_screenshot-crop_new-alert-condition-button.webp"
/>

3. Choose <DNT>**Kubernetes**</DNT> as an alert type and define your thresholds.

<img
title="Kubernetes - new alert condition"
alt="Add Kubernetes alerts"
src="/images/kubernetes_screenshot-crop_create_alert_condition.webp"
/>

4. Define your [thresholds](/docs/alerts/create-alert/set-thresholds/set-thresholds-alert-condition/).

5. Configure your [alert policy](/docs/alerts/organize-alerts/create-edit-or-find-alert-policy/). You can create a new policy or add this condition to an existing policy.

6. Set the condition status of the condition.

7. (Optional) Add a [runbook URL](/docs/alerts/create-alert/condition-details/provide-runbook-instructions-alert-activity).

8. Click <DNT>**Create**</DNT>.


<Callout variant="tip">
You can also create Kubernetes alerts using a [NRQL alert condition](/docs/alerts/create-alert/create-alert-condition/create-nrql-alert-conditions/).
</Callout>


## Create a Kubernetes alert policy [#create-k8s-alert-condition]

1. Go to <DNT>**[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Infrastructure**</DNT> and click <DNT>**Alerts**</DNT> on the left navigation pane.

2. Click <DNT>**+ New alert policy**</DNT>.

<img
title="Kubernetes - new alert condition"
alt="Add Kubernetes alerts"
src="/images/kubernetes_screenshot-crop_new-alert-policy-button.webp"
/>

3. Enter a [meaningful name](/docs/alerts/organize-alerts/create-edit-or-find-alert-policy/#best-practices-policies) for the policy (maximum 64 characters).

4. Choose the way you want to [group the incidents](/docs/alerts/organize-alerts/specify-when-alerts-create-incidents/#preference-options) from this policy.

5. (Optional) Check the box <DNT>**Suppress noise with machine learning correlation**</DNT> to enable [correlation](/docs/alerts/organize-alerts/change-applied-intelligence-correlation-logic-decisions/) for the alert policy.

<img
width="40%;"
title="Kubernetes - new alert condition"
alt="Add Kubernetes alerts"
src="/images/kubernetes_screenshot-crop_create_alert_policy.webp"
/>

6. Click <DNT>**Set up notifications**</DNT>.


## Kubernetes alert notifications [#alert-notifications]

Once you've configured your alert conditions, policies, and [workflows](/docs/alerts/get-notified/incident-workflows/), you'll begin to receive notifications when the threshold configured in an alert condition is triggered. You have these options:

* [View the incident](/docs/alerts/incident-management/view-event-details-incidents/)

* [Acknowledge the incident](/docs/alerts/get-notified/acknowledge-alert-incidents/)

* Go to a chart of the incident data by selecting the name of the identifier. The entity identifier that triggered the alert appears near the top of the notification message. The format of the identifier depends on the alert type:

* <DNT>**Available pods are less than desired pods**</DNT> alerts:

```
K8s:CLUSTER_NAME:PARENT_NAMESPACE:replicaset:REPLICASET_NAME
```

* <DNT>**CPU or memory usage**</DNT> alerts:

```
K8s:CLUSTER_NAME:PARENT_NAMESPACE:POD_NAME:container:CONTAINER_NAME
```

Here are some examples.

<CollapserGroup>
<Collapser
id="pod-alerts"
title="Pod alert notification example"
>
For <DNT>**Available pods are less than desired pods**</DNT> alerts, the ID of the `ReplicaSet` triggering the issue might look like this:

```
k8s:beam-production:default:replicaset:nginx-deployment-1623441481
```

This identifier contains the following information:

* Cluster name: `beam-production`
* Parent namespace: `default`
* `ReplicaSet` name: `nginx-deployment-1623441481`
</Collapser>

<Collapser
id="container-resource"
title="Container resource notification example"
>
For container CPU or memory usage alerts, the entity might look like this:

```
k8s:beam-production:kube-system:kube-state-metrics-797bb87c75-zncwn:container:kube-state-metrics
```

This identifier contains this information:

* Cluster name: `beam-production`
* Parent namespace: `kube-system`
* Pod namespace: `kube-state-metrics-797bb87c75-zncwn`
* Container name: `kube-state-metrics`
</Collapser>
</CollapserGroup>
Loading
Loading