Yes! We support automatically creating incidents from many sources including:

To see if we support the source you want, try creating an alert source to see which options are available.

Can't see the source you want?
You can use our HTTP source to connect with most tools that provide webhooks.

๐Ÿ›  Setting Up

1. Connect an alert source

1โƒฃ Create an alert source to receive alerts

2โƒฃ Connect your source to receive alerts

3โƒฃ Configure your alerts

When connecting your alert sources to incident.io, you can add custom attributes to provide more context to your alerts. Examples include: team, affected customer, affected feature or environment. This allows you to pull values from your alert payload into rich data on your incidents.

These can provide helpful clues for responders when digging into the alert issue. Plus, it will be a helpful way of grouping and filtering your alerts into incidents via alert routes.

Every alert source is rate limited
We apply a rate limit of 120 events/minute for each alert source. This means that if you have two alert sources, we will process up to 240 events every minute.

When the rate limit is exceeded, we will respond with an HTTP 429 Too Many Requests.

Organisation-level limits are also applied to ensure reasonable use.


2. Create an alert route

Now that you have an alert source that's receiving alerts, you need to connect it to an alert route to start creating incidents from your alerts.

1โƒฃ Select alert sources

2โƒฃ Filter and group

3โƒฃ Configure incidents


โš™ How does it work?

Once auto-creation is switched on, incidents will be automatically created in a triage state.
We'll try our best to pull the right people into the incident channel.

When joining a triage incident, you'll be met with this:

๐Ÿ”ฅ Accept it
This will accept this triage incident as a real incident.

๐Ÿ”— Merge it into another
Was this alert caused by an incident with an existing channel that you already know about?
If so, you can merge the other incident to any open incident channel.
โ€‹
The incident that was created in triage will be declined, and the channel will be archived after a short delay.
โ€‹

โŒ Decline it
Selecting this will decline the incident, and archive the channel.
โ€‹
Declined incidents are excluded from any metrics or workflows that you have set up. It's like they never existed at all.


๐Ÿ‘ฉโ€๐Ÿ‘ฉโ€๐Ÿ‘งโ€๐Ÿ‘ง Grouping Windows

Sometimes multiple incidents or alerts in a short space of time, are caused by the same underlying problem. To avoid creating unnecessary noise, we recommend configuring a grouping window. This allows us to check in with you before we spin up new incidents automatically.
โ€‹
We'll continue to use HTTP source for our example, but the same applies to other alerts and the like:

  1. An incident is auto-created from a HTTP incident
    โ€‹

  2. A second HTTP incident is triggered within the grouping window, with a matching service
    โ€‹

  3. Instead of creating a new incident, we will post the below message in all open incidents with matching HTTP services created within the grouping window.

๐Ÿ”— Merge it into another
This will attach this HTTP incident to the existing incident.

๐Ÿ‘Ž Decline
This will reject the HTTP incident from this channel, and remove all references to it.
โ€‹
If the incident is declined in the channel from all incident channels, we'll archive the channel in 5 minutes.
โ€‹

FAQ

What does my deduplication key in my alert payload do in incident.io?

Deduplication keys are one way to indicate that some events are the same alert: If your alert events have the same deduplication key, we won't create new alerts in incident.io for them - if it's different we create a new alert.