For server monitoring and metrics and to recieve regular alerts use Mackerel.io’s services.
With the installation of a mackerel-agent, Zenduty sends new Mackerel.io alerts to the right team and notifies them based on on-call schedules via email, text messages (SMS), phone calls(Voice), Slack, Microsoft Teams and iOS & Android push notifications, and escalates alerts until the alert is acknowledged or closed. Zenduty provides your NOC, SRE and application engineers with detailed context around the Mackerel.io alert along with playbooks and a complete incident command framework to triage, remediate and resolve incidents with speed.
Whenever Mackerel.io triggers an alert based on a predefined condition, Zenduty will create an incident. When that condition goes back to normal levels, Zenduty will auto-resolve the incident.
You can also use Alert Rules to custom route specific Mackerel.io alerts to specific users, teams or escalation policies, write suppression rules, auto add notes, responders and incident tasks.
To add a new Mackerel.io integration, go to “Teams” on Zenduty and click on the “Manage” button corresponding to the team you want to add the integration to.
Next, go to “Services” and click on the “Manage” button corresponding to the relevant Service.
Go to “Integrations” and then “Add New Integration”. Give it a name and select the application “Mackerel” from the dropdown menu.
Go to “Configure” under your integrations and copy the webhooks URL generated.
Log into Mackerel.
Install the Mackerel agent.
Go to “Monitor” and create a “New monitor”.
Then go to “Channels” and create a “New Channel/Group”.
Now go to “Webhooks” and click on “Webhook”.
Then paste the copied link in the “URL” field and click on “Create”.
Mackerel is now integrated.
Looking for a better way to get real-time alerts from Mackerel.io Integration, setup a solid incident escalation and incident response pipeline and minimize response and resolution times for Mackerel.io Integration incidents?