logo

CALLGOOSE

Google Cloud Network Intelligence Center

Overview

This document provides a detailed guide to integrating Google Cloud Network Intelligence Center with Callgoose SQIBS for real-time Incident Management, Incident Auto Remediation, Event-Driven Automation, and other automation purposes. The integration enables automatic creation, updating, and resolution of incidents in Callgoose SQIBS based on alerts triggered in Google Cloud Network Intelligence Center. The guide includes steps for setting up alerts in the Network Intelligence Center, configuring webhook notifications, creating API filters in Callgoose SQIBS, and troubleshooting.


1. Obtain API Token and Endpoint Details

To integrate with Callgoose SQIBS, you first need to obtain an API token and find the API endpoint details.

  1. Generate an API Token:
  1. Find the API Endpoint:

2. Debugging and Troubleshooting

You can enable debugging in the API tokens used with Google Cloud Network Intelligence Center notifications for troubleshooting purposes.

  • Enable Debugging:
  • You can update the debug value when adding or updating an API token.
  • When API tracking is enabled, logs are stored in the API log section for your review. The debugging option will automatically disable after 48 hours.
  • When API tracking is turned off, no logs are saved in the API log.
  • Using API Log for Troubleshooting:
  • The API log provides detailed information on all API calls made to Callgoose SQIBS.
  • You can check the JSON values in each API log entry for troubleshooting purposes.
  • Use the information in the API log to create or refine API filters to ensure incidents are created correctly based on the API payloads received.
  • Callgoose SQIBS creates incidents according to your API filter configuration, giving you full control over how alerts from different services trigger incidents and alerts for your support team or automation processes.

3. Configuring Google Cloud Network Intelligence Center to Send JSON Payloads

To configure Google Cloud Network Intelligence Center to generate the JSON payloads similar to the examples provided, follow the steps outlined below. These steps will guide you through setting up the necessary alerts and webhook notifications within Network Intelligence Center to ensure that the JSON payloads match those expected by Callgoose SQIBS.

3.1 Setting Up Alerts in Google Cloud Network Intelligence Center

To generate the required JSON payloads, you first need to set up alerts within Network Intelligence Center.

  1. Log in to the Google Cloud Console:
  • Access the Google Cloud Console using your account credentials.
  1. Navigate to the Network Intelligence Center:
  • In the Google Cloud Console, go to Network Intelligence Center > Connectivity Tests or any relevant service under Network Intelligence Center.
  1. Create a New Alert:
  • Click on Create Alert to set up a new alert policy.
  • Specify Alert Conditions: Define the conditions that will trigger the alert, such as connectivity failures, latency issues, or specific performance thresholds.
  1. Configure the Notification Method:
  • Choose Webhook as the notification method to send data to a webhook.
  • Webhook URL: Enter the webhook URL provided by Callgoose SQIBS.

3.2 Configuring the Webhook Notification

To ensure that the JSON payload sent matches the examples provided, follow these steps when configuring the webhook:

  1. Add Webhook URL:
  • In the Webhook URL field, enter the endpoint provided by Callgoose SQIBS.
  • Ensure the protocol is HTTPS for secure data transmission.
  1. Customize Payload Format:
  • Ensure that the payload includes key fields like "status", "event", "severity", "description", "timestamp", and others as shown in the example payloads.
  • Example Payload Setup:
json

{
  "event": {
    "id": "$EVENT_ID",
    "status": "$STATUS",
    "severity": "$SEVERITY",
    "description": "$DESCRIPTION",
    "source": "$SOURCE",
    "timestamp": "$TIMESTAMP"
  }
}
  • Placeholder Explanation:
  • "$STATUS": Replaces with the status of the event (e.g., OK, CRITICAL).
  • "$EVENT_ID": A unique identifier for the event.
  • "$SEVERITY": The level of urgency.
  • "$DESCRIPTION": A descriptive message of the event.
  • "$SOURCE": The source of the event (e.g., network test, latency monitor).
  • "$TIMESTAMP": The time the event occurred.
  1. Test the Webhook Configuration:
  • Before activating the webhook, perform a test to ensure that the JSON payload is correctly formatted and is being sent to the Callgoose SQIBS API endpoint as expected.
  • Review the payload in Callgoose SQIBS to confirm that it matches the expected structure.

3.3 Finalizing and Testing

  1. Save and Activate the Alert:
  • Once the alert and webhook are correctly configured, save the alert configuration and activate it.
  1. Validate the Integration:
  • Trigger the alert condition manually if possible to verify that the correct JSON payload is sent to Callgoose SQIBS.
  • Resolve the alert to ensure the resolved state payload is also correctly sent and processed.

4. Configuring Callgoose SQIBS

4.1 Create API Filters in Callgoose SQIBS

To correctly map incidents from the Network Intelligence Center alerts, you need to create API filters based on the JSON payloads received.

4.1.1 Example JSON Payloads from Network Intelligence Center

Alarm Triggered (status: "CRITICAL")

json

{
  "event": {
    "id": "event123",
    "status": "CRITICAL",
    "severity": "high",
    "description": "Connectivity issue detected between region us-central1 and europe-west1",
    "source": "connectivity-test",
    "timestamp": "2024-08-05T12:00:00.000Z"
  }
}

Alarm Resolved (status: "OK")

json

{
  "event": {
    "id": "event123",
    "status": "OK",
    "severity": "low",
    "description": "Connectivity issue resolved between region us-central1 and europe-west1",
    "source": "connectivity-test",
    "timestamp": "2024-08-05T12:30:00.000Z"
  }
}

4.2 Configuring API Filters

4.2.1 Integration Templates

If you see a Network Intelligence Center integration template in the "Select Integration Template" dropdown in the API filter settings, you can use it to automatically add the necessary Trigger and Resolve filters along with other values. The values added by the template can be modified to customize the integration according to your requirements.

4.2.2 Manually Add/Edit the Filter

There are two filters that you can manually edit: Trigger and Resolve.

  • Trigger Filter (For Creating Incidents):
  • Payload JSON Key: "event.status"
  • Key Value Contains: [CRITICAL]
  • Map Incident With: "event.id"
  • This corresponds to the unique id from the Network Intelligence Center payload.
  • Incident Title From: "event.description"
  • This will use the event description as the incident title in Callgoose SQIBS.
  • Incident Description From: Leave this empty unless you want to use a specific key-value from the JSON payload. If a key is entered, only the value for that key will be used as the Incident Description instead of the full JSON. By default, the Incident Description will include the full JSON values.
  • Example: If you use the "event.description" key in the Incident Description From field, the incident description will be the value of the "event.description" key. In the example JSON payload provided earlier, this would result in a description like "Connectivity issue detected between region us-central1 and europe-west1".
  • Resolve Filter (For Resolving Incidents):
  • Payload JSON Key: "event.status"
  • Key Value Contains: [OK]
  • Incident Mapped With: "event.id"
  • This ensures the incident tied to the specific id is resolved when the alert status returns to normal.

Refer to the API Filter Instructions and FAQ for more details.


4.3 Finalizing Setup

  1. Save the API Filters:
  • Ensure that the filters are correctly configured and saved in Callgoose SQIBS.
  • Double-check that all key mappings, incident titles, and descriptions are correctly aligned with the payload structure sent by Network Intelligence Center.
  1. Test the Integration:
  • Manually Trigger an Alert:
  • Create a condition in Google Cloud Network Intelligence Center that would trigger an alert, such as a connectivity failure between regions or increased latency.
  • Verify Incident Creation:
  • Check Callgoose SQIBS to see if the incident is created with the correct title, description, and severity based on the API filter configuration.
  • Resolve the Alert:
  • Simulate resolving the issue in Network Intelligence Center (e.g., the connectivity issue is fixed).
  • Verify Incident Resolution:
  • Confirm that the corresponding incident in Callgoose SQIBS is marked as resolved based on the payload from Network Intelligence Center.

5. Testing and Validation

5.1 Triggering Alerts

  1. Simulate a Monitoring Alert:
  • Create a test condition in Network Intelligence Center to trigger an alert.
  • Ensure that an incident is created in Callgoose SQIBS with the correct information based on the API filters set.

5.2 Resolving Alerts

  1. Acknowledge and Resolve the Alert:
  • Once the condition is resolved in Network Intelligence Center, ensure that the incident in Callgoose SQIBS is automatically marked as resolved.

6. Security Considerations

  • API Security: Ensure that the Callgoose SQIBS API endpoint is correctly configured, and that the API token is securely stored and used.
  • Google Cloud Permissions: Confirm that the webhook in Google Cloud has appropriate permissions to send alerts and data to Callgoose SQIBS.
  • Data Encryption: Ensure that the transmission of data between Network Intelligence Center and Callgoose SQIBS is encrypted, especially if sensitive information is involved.

7. Troubleshooting

  • No Incident Created:
  • Verify that the webhook URL in Network Intelligence Center is correct and that the JSON payload structure matches the API filters configured in Callgoose SQIBS.
  • Incident Not Resolved:
  • Ensure that the resolve filter in Callgoose SQIBS is correctly configured and that the JSON payload sent by Network Intelligence Center matches the expected structure.

8. Conclusion

This guide provides a comprehensive overview of how to integrate Google Cloud Network Intelligence Center with Callgoose SQIBS for effective incident management. By following the steps outlined, you can ensure that alerts from Network Intelligence Center are automatically reflected as incidents in Callgoose SQIBS, with proper resolution tracking when the issues are resolved.

For further customization or advanced use cases, refer to the official documentation for both Google Cloud Network Intelligence Center and Callgoose SQIBS:

This documentation will guide you through the integration process, ensuring that your incidents are managed effectively within Callgoose SQIBS based on real-time alerts from Google Cloud Network Intelligence Center.

CALLGOOSE
SQIBS

Advanced Automation platform with effective On-Call schedule, real-time Incident Management and Incident Response capabilities that keep your organization more resilient, reliable, and always on

Callgoose SQIBS can Integrate with any applications or tools you use. It can be monitoring, ticketing, ITSM, log management, error tracking, ChatOps, collaboration tools or any applications

Callgoose providing the Plans with Unique features and advanced features for every business needs at the most affordable price.



Unique Features

  • 30+ languages supported
  • IVR for Phone call notifications
  • Dedicated caller id
  • Advanced API & Email filter
  • Tag based maintenance mode

Signup for a freemium plan today &
Experience the results.

No credit card required