diff --git a/alert-policies/aws-network-firewall/HighRejectedPackets.yml b/alert-policies/aws-network-firewall/HighRejectedPackets.yml new file mode 100644 index 0000000000..70333b63a8 --- /dev/null +++ b/alert-policies/aws-network-firewall/HighRejectedPackets.yml @@ -0,0 +1,34 @@ +name: High Rejected Packets + +description: |+ + This alert is triggered if the number of Rejected Packets exceeds 200 for 10 minutes. + +type: STATIC +nrql: + query: "SELECT sum(`aws.networkfirewall.RejectedPackets`) as 'Query' FROM Metric" + +# Function used to aggregate the NRQL query value(s) for comparison to the terms.threshold (Default: SINGLE_VALUE) +valueFunction: SINGLE_VALUE + +# List of Critical and Warning thresholds for the condition +terms: + - priority: CRITICAL + # Operator used to compare against the threshold. + operator: ABOVE + # Value that triggers a violation + threshold: 200 + # Time in seconds; 120 - 3600 + thresholdDuration: 600 + # How many data points must be in violation for the duration + thresholdOccurrences: ALL + + # Adding a Warning threshold is optional + - priority: WARNING + operator: ABOVE + threshold: 100 + thresholdDuration: 600 + thresholdOccurrences: ALL + +# Duration after which a violation automatically closes +# Time in seconds; 300 - 2592000 (Default: 86400 [1 day]) +violationTimeLimitSeconds: 86400 diff --git a/alert-policies/aws-network-firewall/HighTLSErrors.yml b/alert-policies/aws-network-firewall/HighTLSErrors.yml new file mode 100644 index 0000000000..c2f9a78aa5 --- /dev/null +++ b/alert-policies/aws-network-firewall/HighTLSErrors.yml @@ -0,0 +1,34 @@ +name: High TLS Errors + +description: |+ + This alert is triggered if the number of TLS Errors exceeds 200 for 10 minutes. + +type: STATIC +nrql: + query: "SELECT sum(`aws.networkfirewall.TLSErrors`) as 'Query' FROM Metric" + +# Function used to aggregate the NRQL query value(s) for comparison to the terms.threshold (Default: SINGLE_VALUE) +valueFunction: SINGLE_VALUE + +# List of Critical and Warning thresholds for the condition +terms: + - priority: CRITICAL + # Operator used to compare against the threshold. + operator: ABOVE + # Value that triggers a violation + threshold: 200 + # Time in seconds; 120 - 3600 + thresholdDuration: 600 + # How many data points must be in violation for the duration + thresholdOccurrences: ALL + + # Adding a Warning threshold is optional + - priority: WARNING + operator: ABOVE + threshold: 100 + thresholdDuration: 600 + thresholdOccurrences: ALL + +# Duration after which a violation automatically closes +# Time in seconds; 300 - 2592000 (Default: 86400 [1 day]) +violationTimeLimitSeconds: 86400 diff --git a/dashboards/aws-network-firewall/aws-network-firewall.json b/dashboards/aws-network-firewall/aws-network-firewall.json new file mode 100644 index 0000000000..9757630ef3 --- /dev/null +++ b/dashboards/aws-network-firewall/aws-network-firewall.json @@ -0,0 +1,622 @@ +{ + "name": "AWS Network Firewall", + "description": null, + "pages": [ + { + "name": "AWS Network Firewall", + "description": null, + "widgets": [ + { + "title": "", + "layout": { + "column": 1, + "row": 1, + "width": 2, + "height": 3 + }, + "visualization": { + "id": "viz.markdown" + }, + "rawConfiguration": { + "text": "# AWS Network Firewall\nWhat is AWS Network Firewall? AWS Network Firewall is a stateful, managed, network firewall and intrusion detection and prevention service for your virtual private cloud (VPC) that you create in Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the perimeter of your VPC." + } + }, + { + "title": "InvalidDroppedPackets", + "layout": { + "column": 3, + "row": 1, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.InvalidDroppedPackets) AS 'InvalidDroppedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "PassedPackets", + "layout": { + "column": 7, + "row": 1, + "width": 6, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.PassedPackets) AS 'PassedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "DroppedPackets", + "layout": { + "column": 1, + "row": 4, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.DroppedPackets) AS 'DroppedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "Packets", + "layout": { + "column": 5, + "row": 4, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.Packets) AS 'Packets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "RejectedPackets", + "layout": { + "column": 9, + "row": 4, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.RejectedPackets) AS 'RejectedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "OtherDroppedPackets", + "layout": { + "column": 1, + "row": 7, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.OtherDroppedPackets) AS 'OtherDroppedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSErrors", + "layout": { + "column": 5, + "row": 7, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSErrors) AS 'TLSErrors' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "ReceivedPackets", + "layout": { + "column": 9, + "row": 7, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.ReceivedPackets) AS 'ReceivedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSDroppedPackets", + "layout": { + "column": 1, + "row": 10, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSDroppedPackets) AS 'TLSDroppedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSRevocationStatusOKConnections", + "layout": { + "column": 5, + "row": 10, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSRevocationStatusOKConnections) AS 'TLSRevocationStatusOKConnections' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "StreamExceptionPolicyPackets", + "layout": { + "column": 9, + "row": 10, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.StreamExceptionPolicyPackets) AS 'StreamExceptionPolicyPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSRejectedPackets", + "layout": { + "column": 1, + "row": 13, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSRejectedPackets) AS 'TLSRejectedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSRevocationStatusRevokedConnections", + "layout": { + "column": 5, + "row": 13, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSRevocationStatusRevokedConnections) AS 'TLSRevocationStatusRevokedConnections' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSPassedPackets", + "layout": { + "column": 9, + "row": 13, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSPassedPackets) AS 'TLSPassedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSTimedOutConnections", + "layout": { + "column": 1, + "row": 16, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSTimedOutConnections) AS 'TLSTimedOutConnections' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSReceivedPackets", + "layout": { + "column": 5, + "row": 16, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSReceivedPackets) AS 'TLSReceivedPackets' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + }, + { + "title": "TLSRevocationStatusUnknownConnections", + "layout": { + "column": 9, + "row": 16, + "width": 4, + "height": 3 + }, + "visualization": { + "id": "viz.line" + }, + "rawConfiguration": { + "facet": { + "showOtherSeries": false + }, + "legend": { + "enabled": true + }, + "nrqlQueries": [ + { + "accountId": 0, + "query": "FROM Metric SELECT sum(aws.networkfirewall.TLSRevocationStatusUnknownConnections) AS 'TLSRevocationStatusUnknownConnections' WHERE aws.Namespace = 'AWS/NetworkFirewall' FACET aws.networkfirewall.FirewallName TIMESERIES AUTO" + } + ], + "platformOptions": { + "ignoreTimeRange": false + }, + "yAxisLeft": { + "zero": true + }, + "yAxisRight": { + "zero": true + } + } + } + ] + } + ] + } \ No newline at end of file diff --git a/dashboards/aws-network-firewall/aws-network-firewall.png b/dashboards/aws-network-firewall/aws-network-firewall.png new file mode 100644 index 0000000000..83a3480538 Binary files /dev/null and b/dashboards/aws-network-firewall/aws-network-firewall.png differ diff --git a/data-sources/cribl/config.yml b/data-sources/cribl/config.yml index 8f893aff55..969989ff9b 100644 --- a/data-sources/cribl/config.yml +++ b/data-sources/cribl/config.yml @@ -5,8 +5,11 @@ description: | icon: logo.png install: primary: - link: - url: https://docs.cribl.io/docs/destinations-newrelic + nerdlet: + nerdletId: marketplace.install-data-source + nerdletState: + dataSourceId: cribl + requiresAccount: false keywords: - log - stream diff --git a/data-sources/delphix/config.yml b/data-sources/delphix/config.yml index 4439be9bc5..eab730ebef 100644 --- a/data-sources/delphix/config.yml +++ b/data-sources/delphix/config.yml @@ -5,8 +5,11 @@ description: | icon: logo.svg install: primary: - link: - url: https://github.com/delphix/dct-newrelic-integration + nerdlet: + nerdletId: marketplace.install-data-source + nerdletState: + dataSourceId: delphix + requiresAccount: false keywords: - delphix - newrelic partner diff --git a/data-sources/gigamon-appinsights/config.yml b/data-sources/gigamon-appinsights/config.yml index 4de36d4c35..9be669aca6 100644 --- a/data-sources/gigamon-appinsights/config.yml +++ b/data-sources/gigamon-appinsights/config.yml @@ -5,8 +5,11 @@ description: | icon: logo.png install: primary: - link: - url: https://www.gigamon.com/partners/technology-partners.html#new-relic + nerdlet: + nerdletId: marketplace.install-data-source + nerdletState: + dataSourceId: gigamon-appinsights + requiresAccount: false keywords: - Gigamon - Gigamon Application Intelligence diff --git a/data-sources/netlify-builds/config.yml b/data-sources/netlify-builds/config.yml index 58d3d4faa7..edc0c8baa0 100644 --- a/data-sources/netlify-builds/config.yml +++ b/data-sources/netlify-builds/config.yml @@ -5,8 +5,11 @@ description: | icon: logo.png install: primary: - link: - url: https://www.npmjs.com/package/@newrelic/netlify-plugin#installation + nerdlet: + nerdletId: marketplace.install-data-source + nerdletState: + dataSourceId: netlify-builds + requiresAccount: false keywords: - infrastructure - automation diff --git a/data-sources/nvidia-dcgm/config.yml b/data-sources/nvidia-dcgm/config.yml index 19e71ce6ef..14282344e4 100644 --- a/data-sources/nvidia-dcgm/config.yml +++ b/data-sources/nvidia-dcgm/config.yml @@ -18,4 +18,3 @@ keywords: - AI Performance - GPU Optimization - AI Optimization - - NR1_addData \ No newline at end of file diff --git a/quickstarts/amazon-bedrock/config.yml b/quickstarts/amazon-bedrock/config.yml index 19f3853801..88e5ff09bd 100644 --- a/quickstarts/amazon-bedrock/config.yml +++ b/quickstarts/amazon-bedrock/config.yml @@ -42,6 +42,9 @@ keywords: - artificial intelligence - ai - generative ai + - genai + - claude + - chat - NR1_addData - NR1_sys alertPolicies: diff --git a/quickstarts/anyscale/config.yml b/quickstarts/anyscale/config.yml index c386fe594c..55bcb74fd9 100644 --- a/quickstarts/anyscale/config.yml +++ b/quickstarts/anyscale/config.yml @@ -49,6 +49,7 @@ keywords: - kubernetes - generative ai - mlops + - genai - NR1_addData - NR1_sys alertPolicies: diff --git a/quickstarts/aws/aws-network-firewall/config.yml b/quickstarts/aws/aws-network-firewall/config.yml new file mode 100644 index 0000000000..e4ea19540c --- /dev/null +++ b/quickstarts/aws/aws-network-firewall/config.yml @@ -0,0 +1,32 @@ +id: bade3b18-e7cf-4bad-a165-6666bd27f187 +slug: aws-network-firewall +description: |- + ## What is AWS Network Firewall? + AWS Network Firewall is a stateful, managed, network firewall and intrusion detection and prevention service for your virtual private cloud (VPC) that you create in Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the perimeter of your VPC. + ### Get started! + Start monitoring AWS Network Firewall by connecting Amazon Web Services (AWS) to New Relic! Take a look at our documentation for information on how to set up this integration. + ### More info + Check out the [documentation](https://docs.newrelic.com/docs/infrastructure/amazon-integrations/aws-integrations-list/aws-network-firewall-monitoring-integration/) to learn more about New Relic monitoring for AWS Network Firewall. +summary: |- + Monitor AWS Network Firewall by connecting AWS to New Relic +icon: logo.png +level: New Relic +authors: + - New Relic +title: AWS Network Firewall +documentation: + - name: AWS Network Firewall installation docs + description: | + Monitor AWS Network Firewall by connecting AWS to New Relic. + url: >- + https://docs.newrelic.com/docs/infrastructure/amazon-integrations/aws-integrations-list/aws-network-firewall-monitoring-integration/ +keywords: + - aws + - amazon web services + - aws network firewall + - network firewall + - firewall +dashboards: + - aws-network-firewall +dataSourceIds: + - amazon-cloudwatch-metric-streams diff --git a/quickstarts/aws/aws-network-firewall/logo.png b/quickstarts/aws/aws-network-firewall/logo.png new file mode 100644 index 0000000000..5b0f918791 Binary files /dev/null and b/quickstarts/aws/aws-network-firewall/logo.png differ diff --git a/quickstarts/hugging-face/config.yml b/quickstarts/hugging-face/config.yml index 9dc0f6cfb4..ff05fbe103 100644 --- a/quickstarts/hugging-face/config.yml +++ b/quickstarts/hugging-face/config.yml @@ -41,6 +41,7 @@ keywords: - artificial intelligence - ai - generative ai + - genai - NR1_addData - NR1_sys alertPolicies: diff --git a/quickstarts/jina-ai/config.yml b/quickstarts/jina-ai/config.yml index 2321cd09bc..89b3162c66 100644 --- a/quickstarts/jina-ai/config.yml +++ b/quickstarts/jina-ai/config.yml @@ -49,6 +49,7 @@ keywords: - multimodal ai - neural search - mlops + - genai - NR1_addData - NR1_sys alertPolicies: diff --git a/quickstarts/k6-prometheus/config.yml b/quickstarts/k6-prometheus/config.yml index 25eccf329e..818aa4c9c6 100644 --- a/quickstarts/k6-prometheus/config.yml +++ b/quickstarts/k6-prometheus/config.yml @@ -41,7 +41,7 @@ documentation: description: Information on how to set up k6 to send data to New Relic, including all configuration options from k6. - name: Set up your Prometheus remote write integration url: https://docs.newrelic.com/docs/infrastructure/prometheus-integrations/install-configure-remote-write/set-your-prometheus-remote-write-integration/ - description: Information on how to set up your Prometheus remote write integration with New Relic. This will require you to set up these two environment variables `K6_PROMETHEUS_RW_SERVER_URL=https://metric-api.newrelic.com/prometheus/v1/write?prometheus_server=k6` and `K6_PROMETHEUS_RW_BEARER_TOKEN=NEW_RELIC_LICENSE_KEY` + description: Information on how to set up your Prometheus remote write integration with New Relic. dataSourceIds: - k6-prometheus diff --git a/quickstarts/mlops/langchain/config.yml b/quickstarts/mlops/langchain/config.yml index 00a64c2f74..481f86337e 100644 --- a/quickstarts/mlops/langchain/config.yml +++ b/quickstarts/mlops/langchain/config.yml @@ -51,6 +51,8 @@ keywords: - mlops - NR1_sys - generative ai + - genai + - orchestration alertPolicies: - langchain dashboards: diff --git a/quickstarts/mosaicml/config.yml b/quickstarts/mosaicml/config.yml index 49870809a4..64aa69506d 100644 --- a/quickstarts/mosaicml/config.yml +++ b/quickstarts/mosaicml/config.yml @@ -43,6 +43,7 @@ keywords: - artificial intelligence - ai - generative ai + - genai - NR1_addData - NR1_sys alertPolicies: diff --git a/quickstarts/ollama/config.yml b/quickstarts/ollama/config.yml index cb8c1c4a91..825ba2b2f3 100644 --- a/quickstarts/ollama/config.yml +++ b/quickstarts/ollama/config.yml @@ -46,6 +46,7 @@ keywords: - llm chains - generative ai - mlops + - genai - NR1_addData - NR1_sys alertPolicies: diff --git a/quickstarts/openai/config.yaml b/quickstarts/openai/config.yaml index 510f05d671..6dd8d839cd 100644 --- a/quickstarts/openai/config.yaml +++ b/quickstarts/openai/config.yaml @@ -40,6 +40,11 @@ keywords: - mlops - llm - generative ai + - chatgpt + - gpt + - chat + - genai + - open - NR1_sys dataSourceIds: diff --git a/quickstarts/openllm/config.yml b/quickstarts/openllm/config.yml index d3b7e967b8..e59f4c6a79 100644 --- a/quickstarts/openllm/config.yml +++ b/quickstarts/openllm/config.yml @@ -48,6 +48,7 @@ keywords: - distributed computing - kubernetes - generative ai + - genai - mlops - NR1_addData - NR1_sys diff --git a/quickstarts/palm-2/config.yml b/quickstarts/palm-2/config.yml index a8398e9df5..8e0cf78ac3 100644 --- a/quickstarts/palm-2/config.yml +++ b/quickstarts/palm-2/config.yml @@ -44,6 +44,7 @@ keywords: - artificial intelligence - ai - generative ai + - genai - NR1_addData - NR1_sys alertPolicies: diff --git a/quickstarts/prometheus-remote-write/config.yml b/quickstarts/prometheus-remote-write/config.yml index c3a5f62c44..33b9df208f 100644 --- a/quickstarts/prometheus-remote-write/config.yml +++ b/quickstarts/prometheus-remote-write/config.yml @@ -36,7 +36,7 @@ documentation: - name: Prometheus installation docs description: | Use Prometheus remote_write or New Relic's Prometheus OpenMetrics integration - url: https://one.newrelic.com/launcher/nr1-core.explorer?pane=eyJuZXJkbGV0SWQiOiJucjEtY29yZS5saXN0aW5nIiwiZmF2b3JpdGVzIjp7InNlbGVjdGVkIjp0cnVlLCJ2aXNpYmxlIjp0cnVlfSwibGFzdFZpZXdlZCI6eyJzZWxlY3RlZCI6ZmFsc2UsInZpc2libGUiOnRydWV9fQ==&cards[0]=eyJuZXJkbGV0SWQiOiJwcm9tZXRoZXVzLXJlbW90ZS13cml0ZS1pbnRlZ3JhdGlvbi5ob21lIiwiYWNjb3VudElkIjoyMTM2Njc5fQ==&sidebars[0]=eyJuZXJkbGV0SWQiOiJucjEtY29yZS5jYXRlZ29yaWVzIiwicm9vdE5lcmRsZXRJZCI6Im5yMS1jb3JlLmxpc3RpbmciLCJmYXZvcml0ZXMiOnsic2VsZWN0ZWQiOnRydWUsInZpc2libGUiOnRydWV9LCJsYXN0Vmlld2VkIjp7InNlbGVjdGVkIjpmYWxzZSwidmlzaWJsZSI6dHJ1ZX19&state=32a8b400-a43a-5a3d-3bc6-16621b554b08 + url: https://docs.newrelic.com/docs/infrastructure/prometheus-integrations/install-configure-remote-write/set-your-prometheus-remote-write-integration/ keywords: - open source monitoring installPlans: