Back to top icon

New Relic Applied Intelligence Features

Does it take you too long to detect and respond to incidents? New Relic Applied Intelligence simplifies and accelerates your incident response workflow & makes it easy to get started with AIOps.

Request a demo
New Relic Applied Intelligence Features

New Relic Applied Intelligence helps you detect potential problems earlier, reduce alert fatigue, and diagnose and respond to incidents faster. It includes:

Proactive detection

Continuously evaluate your telemetry data for potential issues and get proactive notifications in your collaboration tools with explanations so you can act quickly and prevent larger problems.

Applied Intelligence Slack Alerts

Incident intelligence

Reduce alert noise and increase context, making the alerts you receive more meaningful and actionable so you can find and fix issues faster and with more confidence.

Incident intelligence with New Relic

Proactive Detection Features

Real-time failure warnings

Get immediate insights about anomalies in your production system. Real-time failure warnings notify you when an anomaly is detected based on key golden signals such as throughput, response time, and errors. When the anomaly goes back to normal, a recovery message is sent.

Real-time failure warnings in Slack with New Relic

Mute notifications

Temporarily or permanently mute warnings for a particular application or all applications monitored in New Relic. This is useful during times of scheduled maintenance or testing.

Learn more here.

See all anomalies in a single view

Gain a window into what’s happening across your environment with the Anomaly overview page. All detected anomalies are listed, with the ability to instantly view more details for each one.

Learn more here.

Real-time failure warnings in Slack with New Relic

Dig deeper by analyzing anomalies

See critical details about anomalies, including attributes that caused spikes, related signals to investigate root cause by looking at what happened around the anomaly, and see upstream and downstream dependencies.

Learn more here.

Proactive detection with New Relic AI

Integration with Slack and custom notification channels

Send anomaly notifications into your preferred Slack channels where your on-call teams collaborate on incidents, or send detected anomalies to your tools of choice by utilizing webhooks to trigger notifications. Check out our documentation to find out more.

Incident Intelligence Features

Connect data from any source

Easily connect your preferred incident management and monitoring tools with minimal configuration required, and ingest alerts, incidents and event data from any source. New Relic Applied Intelligence normalizes your data, establishes relationships between incidents, and groups related ones.

Check out our documentation to learn more.

Connect faster with existing data sources in New Relic Applied Intelligence

View an intelligent feed of all incidents

New Relic Applied Intelligence includes an intelligent feed of incident information that displays everything you need to troubleshoot and respond to problems. You can see all issues, including their duration, number of raw incidents correlated, and filter based on issue state, priority and the originating source.

Intelligent feed with New Relic Applied Intelligence

See correlated incidents via issue pages

New Relic uses industry-standard knowledge and global decisions based on your data as well as human-generated logic to automatically correlate related incidents and suppress low-priority alerts. Within the issue page for each correlated issue, you can view a full issue log to track its progress over time, details about why the incident was correlated, and a related activity section to get information about previous issues that may have a similar cause or affected components to the issue you’re currently troubleshooting.

See correlated incidents via issue pages

Access to alert analysis at your fingertips

Dig deeper into the details around an alert with automatic alert analysis that provides context and explanation about violations in a structured view to help you troubleshoot even faster.

See correlated incidents via issue pages

Get transparency into why alerts are correlated

See why alerts were correlated and give feedback to increase accuracy in the future. You can view the specific rule logic that informed the correlation, which can be helpful for gaining greater insight into the problem as a whole. For example, if a decision involves comparing application names for similarity, you know that a specific application may be affected by a particular issue.

AIOps Transparency

Build custom decision logic to tune correlations

New Relic Applied Intelligence gives you the flexibility and control to tune the correlation engine with your own logic and preview it’s effectiveness based on your historical data. An intuitive decisions builder lets you tell us what data you want to compare, how you want to correlate the data, and the time period and minimum number of alerts to use as a threshold.

Learn more here.

Build custom decision logic

Receive suggested decisions based on your data

Based on analysis of your alerting data, New Relic Applied Intelligence automatically creates tailored correlation decisions and previews their potential impact, which you can then choose to enable.

Suggested Decisions based on your data

Reduce alert noise with grace periods and auto-close inactive issues

New Relic Applied Intelligence provides a configurable set of filters to specify a grace period for each issue priority, which tells the system how long to wait before surfacing a new incident. During this time, Applied Intelligence will evaluate if the incident is correlated with other incoming incidents, if it’s flapping, or if it’s auto-resolving. You can also configure an option to auto-close inactive issues.

Reduce alert noise with applied intelligence

Measure your rate of noise reduction

Get insights into your rate of total incidents correlated, total correlated issues, your rate of noise reduction, and the most common reasons why incidents are correlated.

Measure your rate of noise reduction

Get context and enrichment on incidents

Incidents are automatically classified based on SRE golden signals such as latency, errors, saturation and traffic, so you can get to probable root cause faster. In addition, you can view related components affected to isolate the problem, and get guidance on who should respond so you can route incident data more efficiently.

Get context with New Relic Applied Intelligence

View correlated, enriched incidents in your tools of choice

New Relic Applied Intelligence surfaces correlated incidents and enrichment in your destination tools of choice -- including PagerDuty, OpsGenie, ServiceNow, VictorOps and more -- so you don’t need to reinvent the way you respond to incidents.

No changes to your workflow

Choose how and where to escalate incidents with pathways

Easily choose which correlated issues get sent to where with the help of pathways, which are logical routes for sending correlated, enriched incidents to specific destinations. For example, you can specify that all incidents with a particular application name get sent to that app team’s dedicated PagerDuty service.

choose how and where to escalate incidents

Increased accuracy over time

New Relic Applied Intelligence builds system specific knowledge and gets smarter over time. You can provide thumbs up or down feedback on the quality of issue correlations to tune the system in real-time and help it adjust, learn and provide even more relevant insights.