Once you've configured AppNeta alarm rules to identify specific network events or performance issues, the alarms send structured logs to Cloud Logging. You can then create log-based alert policies in Google Cloud to act on these logs.
These alerts and notifications help you proactively respond to network incidents before customers start to call in, understand where and when troublespots developer, and surface hidden issues in your network.
Cloud Network Insights alerting is based on logs received from AppNeta's alarms. A log entry of structured data is sent from AppNeta to Cloud Logging.
Once received by Cloud Logging, logs are evaluated by log-based alert policies that filter logs for specific alarms. When a log matches an alert policy, an incident is created. After an incident is created, Google Cloud can send notifications through selected notification channels (email, Slack, PagerDuty, or Pub/Sub) when an incident occurs.
Cloud Network Insights provides alert policy templates for common alerting scenarios, such as when a Monitoring Point is offline or if there's an outage on a monitored network path, to simplify your alert policy setup. If you want to alert on incidents beyond the predefined templates, create an alert in Cloud Logging.
Before you begin
- You must be granted one of the following roles in the project in which
Cloud Network Insights is enabled:
- Cloud Network Insights Editor
(
roles/networkmanagement.CloudNetworkInsightsEditor) - Cloud Network Insights Viewer
(
roles/networkmanagement.CloudNetworkInsightsViewer)
- Cloud Network Insights Editor
(
- To add a notification channel to an alert policy, you must also be granted the
following role in that project:
- Monitoring NotificationChannel Editor
(
roles/monitoring.notificationChannelEditor)
- Monitoring NotificationChannel Editor
(
- Alerts and notifications are only triggered when both logging
is set up in AppNeta and Cloud Logging receives alarm logs
(
insights_alarm) or event logs (insights_event).
Create log-based alert policies
Once you have Alarm Rules configured in AppNeta, create alert policies in Google Cloud to receive notifications.
Use predefined templates
You can create alert policies using the predefined templates in Cloud Network Insights.
-
Open the Google Cloud console and navigate to Network Intelligence > Cloud Network Insights > Alert Policies.
-
Click Create alert policy.
-
Select an alert policy template.
-
Optionally, customize the alert policy.
- Click View more actionsand select Customize alert policyto change which logs are included in the alert or the notification frequency and autoclose duration.
- Click show optionsand modify the notification frequency and autoclose duration.
-
Optionally choose where to receive notifications. If you don't have notification channels set up, see Create and manage notification channels .
-
Click Create.
Use the Logs Explorer
You can also create log-based alerts in Logs Explorer using the Logging query language .
Cloud Network Insights logs use one of the following for logName
:
- Alarm logs -
networkmanagement.googleapis.com/insights_alarm - Event logs -
networkmanagement.googleapis.com/insights_event
The following is an example query that identifies when a critical alarm is raised on a specific path. This query is entered in the Logs Explorer Querypane.
logName="projects/PROJECT_ID/logs/networkmanagement.googleapis.com/insights_alarm"
resource.labels.path_id="np-abcdef"
jsonPayload.severity="CRITICAL"
jsonPayload.state="RAISED"
For more information, see Build and save queries by using the Logging query language and Create a log-based alerting policy by using the Logs Explorer .

