Skip to main content

Alert Management

Alerts are triggered when monitoring conditions are met — an anomaly is detected, a threshold is crossed, or a resource count changes unexpectedly. This page covers creating alert rules, managing severity, and handling alert lifecycle.


Alert rules

Alert rules define the conditions under which an alert is triggered. Each rule combines a signal, a condition, and a severity level.

Creating an alert rule

Navigate to Monitoring > Alerts > Create Rule.

FieldDescription
NameDescriptive label (e.g. "EC2 spend spike > 30%")
SignalThe signal to monitor (e.g. daily EC2 spend, running instance count)
ConditionWhen to trigger (e.g. value exceeds baseline by 30%, value drops below 5)
SeverityInfo, Warning, or Critical
NotificationWhere to send the alert (channels, users, or groups)
EnabledWhether the rule is active

Condition types

TypeDescriptionExample
Above thresholdSignal exceeds a fixed valueAlert when daily spend > $500
Below thresholdSignal drops below a fixed valueAlert when running EC2 count < 3
Percentage changeSignal changes by more than a percentage vs baselineAlert when spend increases > 25%
AnomalyBaseline-driven detection (automatic)Alert when any cost anomaly is detected

Alert severity levels

SeverityMeaningDefault routing
InfoInformational — no action requiredIn-app only
WarningNeeds attention — review within the dayIn-app + Slack
CriticalImmediate action requiredIn-app + Slack + Email

Severity determines the default notification routing. Admins can override routing via team policies.


Alert lifecycle

Triggered → Active → Acknowledged → Resolved
StatusDescription
TriggeredThe condition was met and the alert was created
ActiveThe alert is still ongoing (condition still true)
AcknowledgedSomeone has seen the alert and is investigating
ResolvedThe condition is no longer met, or the alert was manually resolved

Automatic resolution

Alerts are automatically resolved when:

  • The signal returns to within the configured threshold
  • The anomaly that triggered the alert resolves
  • The alert rule is disabled or deleted

Manual resolution

Click Resolve on any active alert to close it manually. Add a resolution note explaining what action was taken.


Managing alerts

Navigate to Monitoring > Alerts to see all alerts.

ViewDescription
Active alertsAll currently triggered or acknowledged alerts
Alert historyAll past alerts with their resolution status and notes
Alert rulesAll configured rules with enable/disable toggles

Filtering alerts

FilterOptions
SeverityInfo, Warning, Critical
StatusActive, Acknowledged, Resolved
Signal typeCost, Usage, Resource count
ConnectionSpecific AWS accounts
Date rangeCustom date range for history view

Routing alerts to specific channels or users

Each alert rule can specify where its alerts are delivered:

Routing optionDescription
Slack channelPost to a specific Slack channel
UserSend to a specific frugally.app user (via DM and email)
GroupSend to all members of a Group
EscalationIf not acknowledged within a time window, escalate to a higher-severity channel

Escalation rules

SettingDescription
Escalation delayHow long to wait before escalating (e.g. 30 minutes, 1 hour, 4 hours)
Escalation targetWhere to send the escalated alert (e.g. #incidents channel, on-call user)
Escalation severityOptionally raise the severity on escalation (e.g. Warning → Critical)

Best practices

  • Start broad, then refine — Create a few key alert rules and tune thresholds based on real data before adding more
  • Use severity meaningfully — Reserve Critical for issues that truly need immediate action; over-use leads to alert fatigue
  • Set escalation rules — Ensure critical alerts do not go unnoticed if the primary responder is unavailable
  • Review alert history monthly — Look for patterns that indicate the need for new rules or threshold adjustments
  • Combine with Guard — Use alerts for real-time detection and Guard Budgets for spending limits