HomeDocumentationRecipesChangelog
HomeRequest DemoContact
Documentation
HomeRequest DemoContact

Alerting on Incidents

This guide is part of the Getting Started Tutorial. For more information, see the Tutorial Overview.

In the previous guide, Investigating and Triaging Critical Incidents, you investigate incidents and used root cause analysis. In this guide, you will set up notification channels and rules to receive alerts when critical incidents or anomalies are detected.

Notification channels let you send messages to any communication tool or chat integration you choose, such as Slack or Microsoft Teams. The notification rules define the conditions that trigger an alert message to the configured channels. For more information, see About Notifications.

Add Notification Rules and Channel

  1. Navigate to Notifications > Rules and click + New Rule.
  2. Enter a Name for the notification rule.
  3. Define Conditions to apply to the notification rule.
    1. Select a Condition Type. Each condition type has its own configuration options. For more information, see Configuration Options for Conditions.
    2. After configuring the condition, click Add.
      You can add more than one condition to each rule. To add more conditions, repeat Steps i and ii.
    3. When you're done adding conditions, click Continue.
  4. Under Channel, configure where to send the notification.
    1. If you want to apply this rule to an existing channel, select Use existing channel, and select the channel from the list.
    2. If the channel does not exist, select Create a new channel, and configure the channel. You can choose to be alerted via one of our chat integrations, such as Slack or Microsoft Teams.

What’s Next

This Getting Started Tutorial helped you to quickly set up Validio to automatically monitor and alert on your data, enabling root cause analysis to highlight the impact of incidents so you can solve data issues faster.

You can learn about more Validio features in the product documentation.