Administrators — Setting up Moogsoft

The following steps describe the high-level workflow for setting up Moogsoft.

  1. Install the Moogsoft Collector on your Linux and Windows servers.

    To install the collector, you download and run an auto-generated script. You can then immediately see metrics and anomalies in the UI.

  2. Set up your other data ingestions as needed:

    • If you use AWS CloudWatch to monitor your environment, set up the CloudWatch integration.

    • If you use Datadog to monitor your environment, set up the Datadog integration.

    • If you use AppDynamics to monitor your environment, set up the AppDynamics integration.

    • If you use New Relic to monitor your environment, set up the New Relic Integration.

    • If you use Zabbix to monitor your environment, set up the Zabbix Integration.

    • Set up other external monitoring tools to send metrics and events to Moogsoft.

      The Metrics API and Events API can ingest data from any external systems that can generate and send JSON objects with the required schema.

    • For external systems that do not generate data with the required schema, you can also create your own integrations that automatically translate third-party data to Moogsoft events and metrics.

  3. Enrich your raw data with information to correlate your alerts into incidents, and to help your operators analyze and troubleshoot your incidents. See Data Enrichment.

  4. Define the correlation logic to cluster your alerts into meaningful incidents.

    To define your correlations, you specify the alert fields and similarity thresholds to determine if two alerts are correlated. See Correlation Engine.

  5. Add users to the instance as needed. See Managing Moogsoft Users.

  6. If you use notification tools such as Slack and PagerDuty, you can set up outbound integrations so you get notified of new alerts or incidents. You can also send alerts to Moogsoft Enterprise and use the correlation, notification, and ticket features in that product: