LogDNA Alerts are an important vehicle for relaying critical real-time pieces of log data within developer and SRE workflows. From Slack to PagerDuty, these Alert integrations help users understand if something unexpected is happening or simply if their logs need attention. This allows for shorter MTTD (mean time to detection) and improved productivity.
However, logs are just one (albeit important) piece of the puzzle when it comes to monitoring and debugging. An equally critical piece of information, especially for SREs, are metrics related to the overall health of their infrastructure. Logs and metrics work hand-in-hand to help identify root error causes so engineers can begin the debugging process. That's why we are excited to announce our newest LogDNA Alert integration with Sysdig.
A long time partner of LogDNA, Sysdig is a Kubernetes and Cloud Monitoring solution built for understanding the health of your infrastructure. With this new integration, LogDNA can now trigger Sysdig Events to give insight into log data alongside system metrics health. This brings two pieces of data together in one view to help SREs understand the bigger picture of their application health, which is key to helping resolve issues more quickly.
Setting up a Sysdig Alert is as easy as creating any other LogDNA Alert. Start by selecting the Sysdig logo within the LogDNA Alerts menu.
Next, you’ll configure what type of Presence Alert you would like for your particular View — specifically the number of log lines you’d like to see in a certain time frame before getting an Alert in Sysdig.
Finally, you can configure the Severity Level shown in Sysdig. This allows for easy ranking of issue severity and provides quick insight into which Alerts need prioritized..
The Sysdig Alert integration is available for all LogDNA customers. To learn more about how to use this feature, check out our documentation.