Skip to content
  • There are no suggestions because the search field is empty.

Incidents Overview

AlertOps now supports Incidents as a distinct object from traditional Alerts, providing a clear boundary between routine system notifications and business-impacting disruptions. This distinction supports best practices in operational governance, especially for enterprises aligning with ITIL standards.

Previously, all incoming signals — from monitoring tools, systems, or manual sources — were treated as alerts. While powerful, this made it difficult to formally designate critical incidents from routine alerts. Now, Incidents elevate alert severity and visibility, aligning with formal response protocols.

ITIL-Aligned Approach

Following ITIL best practice, AlertOps requires human intervention to promote an Alert into an Incident.

  • Events and Alerts: System-generated signals from tools or monitoring platforms.
  • Incidents: Declared only by a human, based on contextual understanding of business impact, urgency, or escalation needs.

This manual step enforces accountability and ensures only truly impactful issues receive full incident treatment — including major incident workflows, escalations, and stakeholder notifications.


How Incidents Differ from Alerts

Attribute

Alert

Incident

Source

System-generated or manual

Always human-promoted

Purpose

General operational signal

Business-impacting disruption

Creation

API, Email, Manual, Chat, Monitoring Tools

Manual promotion from Alert only

Escalation

Based on original alert configuration

Customizable escalation policy at promotion

Audience

Predefined by integration

Expanded via added users, groups, topics

Visibility

Standard

Elevated, tracked, and audited, 

 

Promoting an Alert to an Incident

Steps to Promote:

  1. Navigate to Alerts
  2. Open the alert you wish to escalate

  1. Click Promote to Incident

  1. In the Incident Promotion dialog:
    • Select a new Escalation Policy
    • Add optional Topics (for pre-built messages)
    • Add additional Groups or Users


  1. Click Submit

The Alert is now classified as an Incident, which will now show up in the Incidents View from your main nav. 

What Stays the Same

  • Original alert content
  • Timeline and audit log
  • Responder actions (acknowledge, assign, close)
  • Alert Notes and linked integrations

 

Best Practices

  • Declare an Incident only after confirming impact — not just based on alert volume.
  • Use distinct escalation policies for Incident-level routing and visibility.
  • Leverage Topics for predefined messaging to execs, ITSM tools, or stakeholders.

 

Limitations

  • Incidents cannot be created via API, Email, or Integration — must originate as alerts
  • Currently there are no automatic promotion rules (human judgement required)
Escalation changes and recipient additions apply only after promotion