For server monitoring and metrics and to recieve regular alerts use Mackerel.io’s services.
With the installation of a mackerel-agent, Zenduty sends new Mackerel.io alerts to the right team and notifies them based on on-call schedules via email, text messages(SMS), phone calls(Voice), Slack, Microsoft Teams and iOS & Android push notifications, and escalates alerts until the alert is acknowledged or closed. Zenduty provides your NOC, SRE and application engineers with detailed context around the Mackerel.io alert along with playbooks and a complete incident command framework to triage, remediate and resolve incidents with speed.
Whenever Mackerel.io triggers an alert based on a predefined condition, Zenduty will create an incident. When that condition goes back to normal levels, Zenduty will auto-resolve the incident.
You can also use Alert Rules to custom route specific Mackerel.io alerts to specific users, teams or escalation policies, write suppression rules, auto add notes, responders and incident tasks.
To add a new Mackerel.io integration, go to Teams on Zenduty and click on the team you want to add the integration to.
Next, go to Services and click on the relevant Service.
Go to Integrations and then Add New Integration. Give it a name and select the application Mackerel from the dropdown menu.
Go to Configure under your Integrations and copy the Webhook URL generated.
Log into Mackerel.
Install the Mackerel agent.
Go to Monitor and create a New monitor.
Then go to Channels and create a New Channel/Group.
Now go to Webhooks and click on Webhook.
Then paste the copied link in the URL field and click on Create.
Mackerel is now integrated.
Looking for a better way to get real-time alerts from Mackerel.io Integration, setup a solid incident escalation and incident response pipeline and minimize response and resolution times for Mackerel.io Integration incidents?