• /
  • Log in
  • Free account

Get started with Incident Intelligence

As part of Applied Intelligence, Incident Intelligence helps you correlate your incidents and reduce noise in your environment. It gives you an overview of all your incidents, their sources, and related events.

If you haven't already, sign up for a New Relic account to get started.

Important

Pathways have been deprecated, and are replaced by workflows.

If you still have access to Pathways on New Relic One, reach out to your New Relic account representative and ask to be upgraded.

Set up Incident Intelligence

To enable Incident Intelligence, follow these steps. Afterwards, issues should start to appear in your issue feed.

1. Configure your environment (one-time)

To set up an environment in Incident Intelligence, you need an administrator to select a New Relic account for it. This account should be the one your team is using.

  • Who sets the environment? Only administrators, and only for accounts where they have admin privileges.
  • Can administrators set more than one environment? They can set one environment per parent account and its child accounts. More than one can be set if an administrator has privileges for more than one parent account.

Tip

Incident Intelligence is a cross-account product. This means you can send in data from any New Relic account or external source to correlate events.

2. Configure sources

After setting up your environment, determine your incident sources. These are your data inputs.

You can get data from any of the following sources:

3. Configure destinations

Now that you've set up your sources, you can configure your destinations, which are the data outputs where you view your issues.

To learn how to set up destinations and configure message templates, check the documentation on notifications.

4. Configure workflows

To learn how to set up workflows, check our workflows docs.

Create issueEdit page
Copyright © 2022 New Relic Inc.