Alert Rules
Alert Rules define how incoming alerts are processed and when incidents should be created. This guide walks you through configuring alert rules in Harness AI SRE.
Overview
Alert rules help you:
- Create incidents from incoming alerts
- Map alert data to incident fields
- Set up automated responses
- Configure Harness AI SRE on-call notifications and paging
- Associate relevant runbooks for automated response
Configuration Steps
- Interactive Guide
- Step by Step
Follow this interactive guide to configure alert rules that automatically create incidents and page on-call teams.
Step 1: Access Alert Rules
- From the main menu, select Alerts
- Click Alert Rules
- Click New Alert Rule
Step 2: Configure Integration & Conditions
- Under Integration & Conditions, select the source integration from your connected monitoring tools
- Click New Condition to define when alerts should trigger incidents
- Select the conditions on which you want alerts to be triggered:
- Alert severity or priority
- Service or application name
- Environment
- Alert message content
- Custom alert fields
- For each condition:
- Select the field from your alert payload
- Choose the operator (equals, contains, greater than, etc.)
- Enter the value to match against
- Click Add Condition to configure multiple conditions for the alert rule
- Use AND/OR operators to combine multiple conditions as needed
Step 3: Configure Incident Creation (Optional)
- Click Create Incident to automatically create incidents from matching alerts
- Select the Incident Type that should be created
- Map alert fields to incident fields using the field mapper:
- Title: Map alert summary or message
- Description: Map detailed alert information
- Severity: Map alert severity levels
- Priority: Set incident priority based on alert data
- Service: Map affected service information
- Environment: Map environment details
- Custom fields: Map any additional alert data
Step 4: Configure On-Call Notifications
- Click Page Team to automatically page the on-call team when alerts match your conditions
- Select the checkbox to activate on-call paging
- Select the Impacted Services from your service directory
- Choose the specific service that will be impacted from the dropdown list
- Configure notification settings:
- Which teams should be notified
- Escalation policies to use
- Response time expectations
- Notification channels (email, SMS, phone, Slack, mobile app)
Step 5: Associate Runbooks (Optional)
- Click on the Runbooks tab to attach automated response procedures
- Click Attach Runbook to connect relevant runbooks to your alert rule
- Select the runbook that should be triggered when an alert or incident occurs
- Click Attach Runbook to confirm the selection
- These runbooks can be:
- Automatically triggered when an incident is created
- Suggested to responders during incident resolution
- Used as reference documentation for AI SRE
Step 6: Save and Activate
- Review all your configurations
- Click Save from the top right corner
- The alert rule will be created and available in your alert rules list
- The rule will begin processing incoming alerts based on your configured conditions
Best Practices
- Create specific rules for different types of alerts
- Use clear, descriptive names for your rules
- Test rules with sample alerts before activating
- Review and update rules as your services evolve
- Document your rule configurations for team reference