Available Integrations
ISD-Argo offers integration with many CI/CD Tools. Integrations can help your team coordinate and control your CI/CD process by supporting integrations with Monitoring tools.
Available integrations are as follows:
AWS Cloudwatch
The following figure depicts the information to be supplied to add AWS CloudWatch as an integration.
Update the following information on the above screen.
Account Name: Name of the AWS Cloudwatch account to operate on
Access Key ID: The default access key used to communicate with AWS Cloudwatch
Secret Access Key: The default secret key used to communicate with AWS cloudwatch
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
AppDynamics
The following figure depicts the information to be supplied to add AppDynamics as an integration.
Update the following information on the above screen:
Account Name: Enter a name for the AppDynamics connection. This is the name you will select when you choose a Datasource provider during metrics configuration.
Controller Host: Enter the URL for your AppDynamics account for API access. For example, enter the full URL of your AppDynamics controller, such as https://opsmx-nfr.saas.appdynamics.com/
Temporary Access Token: You can generate and use the access token for API access calls into your Controller by generating the token through Administration UI. The account administrator can generate and distribute to parties/teams who need controller access. To generate the token, refer here.
Datadog
The following figure depicts the information to be supplied to add DataDog as an integration.
Update the following information on the above screen:
Account Name: Name of the Datadog account to operate on
API Key: Your organization's unique Datadog API key. Refer here.
Application Key: Your Datadog application key. Refer here.
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
Dynatrace
The following figure depicts the information to be supplied to add Dynatrace as an integration.
Update the following information on the above screen:
Account Name: Name of the Dynatrace account to operate on
URL: Dynatrace URL for the account to operate on
API Token: Your Dynatrace account access token.
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
ElasticSearch
The following figure depicts the information to be supplied to add ElasticSearch as an integration.
Update the following information on the above screen:
Account Name: Name of the Elastic account to operate on
Elastic End Point: End of the Elasticsearch URL for the account to operate on
User Name(Optional): Provider the user name for the ElasticSearch instance
Password(Optional): Provider the password for the ElasticSearch instance
Kibana End Point(Optional): Endpoint URL for the Kibana instance
Kibana User Name(Optional): Provide the username for the Kibana instance
Kibana Password(Optional): Provide the password for the Kibana instance
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
Graphite
The following figure depicts the information to be supplied to add Graphite as an integration.
Update the following information on the above screen:
Account Name: Name of the Graphite account to operate on
End Point: End of the Graphite URL for the account to operate on
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
Graylog
The following figure depicts the information to be supplied to add Graylog as an integration.
Update the following information on the above screen:
Account Name: Name of the Graylog account to operate on
End Point: End of the Graylog URL for the account to operate on
Token: Your Graylog account access token.
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
NewRelic
The following figure depicts the information to be supplied to add New Relic as an integration.
Update the following information on the above screen:
Account Name: Name of the New Relic account to operate on
API Key: Your account’s unique New Relic Insights API key. Refer here.
Application Key: Your New Relic Application key.
Account ID: Your New Relic account id. Refer here.
Query Key: Your New Relic Query key.
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
Prometheus
The following figure depicts the information to be supplied to add Prometheus as an integration.
Update the following information on the above screen:
Account Name: Name of the New Relic account to operate on
End Point: The base URL to the Prometheus server
User Name(Optional): Provide Prometheus User Name
Password(Optional): Provide Prometheus Password
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
Splunk
The following figure depicts the information to be supplied to add Splunk as an integration.
Update the following information on the above screen:
Account Name: Name of the Splunk account to operate on
Splunk URL: The base URL to the Splunk server
User Name(Optional): Provide Splunk user name
Password(Optional): Provide Splunk password
Splunk Dashboard URL(Optional): Provide URL of the Splunk dashboard
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
Stackdriver
The following figure depicts the information to be supplied to add Stackdriver as an integration.
Update the following information on the above screen:
Account Name: Name of the Stackdriver account to operate on
Encrypted Key File: A path to a Google JSON service account that has permission to publish metrics.
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
SumoLogic
The following figure depicts the information to be supplied to add SumoLogic as an integration.
Update the following information on the above screen:
Account Name: Name of the Sumologic account to operate on
Access ID: Sumoligic access Id. You can generate an Access Id (Administration > Security > Access Keys)
Access Key: Sumoligic access key. You can generate an Access Id (Administration > Security > Access Keys)
Zone: Sumoligic Zone
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
VMWare Tanzu Observability
We have extended the list of supported monitoring tools by adding support to Tanzu Observability from VMware. Now you can use OEA to perform continuous verification on Metrics from Tanzu Observability to get real-time insights and mitigate risks during continuous delivery.
The below figure depicts the information to be provided to add "VMWare Tanzu Observability" as an integration.
Update the following information on the above screen:
Account Name: Name of the VMWare Tanzu Observability account to operate on
End Point: Provide the URL of the VMWare Tanzu Observability server
Email: VMWare Tanzu Observability email id
API Token: Provide the API token for VMWare Tanzu Observability
Permissions: To restrict permissions to this account, you can select the User Groups from the dropdown and the required checkboxes. Once the permissions are configured for a User Group, the access will be restricted to all other User Groups except for Administrators. By default, all users have access to this account.
Last updated