Introduction

An Alert Escalation Policy defines how alerts are escalated within your organization until they are acknowledged, resolved, or suppressed. This ensures that no critical alert goes unattended and that the right stakeholders are notified at the right time.

OpsRamp provides flexible options to configure escalation policies, including escalation duration, user groups, notification rules, and incident rules.

Prerequisite

Both OpsQ View and OpsQ Manage permissions are required to access the Alert Escalation Policy.

A training file is required to suppress specific alerts or to snooze specific alerts. The training file must include examples of alerts that need to be suppressed.

Create Escalation policy

  1. Navigate to Setup > Account > Alert Policies to open the Command Center AIops Overview page.
  2. From the POLICIES dropdown, select Escalation. Alternatively, you can also navigate to the Escalation policy page by selecting Escalation from Policy Modes or Policy Types.


  1. On the Escalation policy page, click +ADD.
    The Add Alert Escalation Policy page is displayed.


  2. Enter the following information in the General Details section:

FieldDescriptionExample
StatusSelect the policy status.
  • ENABLED – Activate immediately.
  • RECOMMEND – The policy creates a recommendation for actions you should take on the alert, based on learned patterns in historical alerts. Includes a link to take the recommended action.
  • OBSERVED – Simulate the policy without affecting alerts. Creates an observed alert showing what actions would be taken if the policy were enabled, with a link to the original alert.
  • DISABLED – Keep inactive.
Policy NameEnter a unique name for the escalation policy.
PrecedenceSet the priority order; lower numbers are higher priority.
DescriptionProvide a short summary of the policy’s purpose.
UsersSelect users or groups who should receive escalations.
Filter Criteria – QueryDefine the conditions that alerts must meet to trigger this policy. Specify Attributes, Operators, and Values to match alerts. Example: alertType = Monitoring
  1. Under ESCALATION RULES section, enter the below information:

    FieldDescription
    Escalate alert automatically until Acknowledged, Closed, Suppressed, or TicketedEscalate an alert as a notification until an action is taken. No further level of escalation can be added since the alert escalation will end as soon as the incident is created.
    Escalate alert automatically until Acknowledged, Closed, or SuppressedEscalate an alert as notification even if an incident is created.
    Escalate to users directly as neededSelect the users who should be directly contacted on an on-demand basis. Escalating directly is a manual process. No automatic actions are taken.
    If you select Escalate directly as needed, you only select users who get notifications.
    Notification RuleDefines how and when users are notified for the escalation. See the Define Notification Rule section for more details.
    Incident RuleDefines whether an incident (ticket) should be created automatically for this escalation. See the Define Incident Rule section for more details.
  2. Review your changes.


  3. Click Add Alert Escalation Policy to create and activate the escalation policy.

Define Notification Rule

The Notification Rule section defines how and when notifications are sent to users or groups for a particular alert escalation.

To define notification rule:

  1. Click + NOTIFICATION RULE.
    The NOTIFICATION RULE page is displayed.


  2. Enter the below information:

FieldDescription
Notification TypeChoose between quick setup or detailed configuration: Basic for standard options, Advanced utilize machine learning for granular controls.
Notification TemplateSelect a predefined template for the notification message.
PriorityAssign a priority to indicate urgency: Low, Medium, High, or Critical.
SendDefine how often notifications are sent and when they stop.
RecipientsSelect at least one recipient: Users, User Groups, User Groups (DL), or Rosters.
  1. Click Add Escalation to save and apply the notification settings to the escalation policy.

Define Incident Rule

Defines how an alert is converted into an incident (ticket). When an alert is triggered, the rule determines whether an incident should be created automatically, who it should be assigned to, and how its priority is set based on the alert severity.

  1. Click + INCIDENT RULE.
    The INCIDENT RULE page is displayed.


  2. The page displays below information:

FieldDescription
StatusDisplays the current status of the incident.
Device TypeShows the device type.
SubjectEnter the incident subject. Use $ to insert field references.
DescriptionEnter the incident description. Use $ to insert field references.
Default Value / Machine LearningSpecify default or machine learning-derived values for fields such as Assignee Group, Assign To, Category / Sub Category, Business Impact, Priority, Notify Roster, Knowledge Articles, To / Cc, Dropdown-list and other fields.
UrgencySpecify urgency of the incident. Machine learning values can be applied.
Additional Users / MultiTextFields for adding additional users or partner information.
Default Input / Disable Partner UpdateControl whether partner fields can be updated or disabled.
Incident Partner Precedence OrderDefines the order of partner escalation.
Update Incident After CreatedConfigure how to update existing incident of an escalated alert. The incident gets updated every time an escalated alert repeats with a state change. Once you select the checkbox, the following options become available:
  • Update incident with the latest alert description when the alert state changes – The latest alert description is appended to the incident conversation. No change to the incident status is made based on the escalated alert state.
  • Update incident with every repeat alert's description – The incident is updated with every repeated alert's description, regardless of the alert state.
  • Update incident subject while updating the description – The incident subject can be updated when the alert state changes for an existing incident.
  • Resolve incident when alert heals – Automatically resolves unassigned incident tickets when the associated alert heals. If an incident is not assigned to any user or user group, it will be marked as resolved when the alert heals.
  • Resolve unassigned incident when alert heals – Resolves the incident only if it is unassigned when the alert heals.
  • Update incident priority – The incident priority is updated according to the rule configured for alert severity changes.
  1. Click Add Escalation to save and apply the incident settings to the escalation policy.

Notification and Incident Timing Options

The timing options control when notifications are sent or when incidents are created after an alert is triggered. You can configure these settings to ensure timely response while avoiding unnecessary repeated alerts.

  • Select Immediately on the timeline to escalate an alert as soon as the alert is generated. If the alert does not have correlation or first response policies, the algorithm moves the alert to Alert Escalation. If the alert does have correlation and first response policies, the algorithm starts the escalation process and finishes after the correlation is complete.
  • Select Wait Minutes/Hours on the timeline to escalate after the alert has elapsed and the policy conditions are met.
    • For example, if a user configured 5 minutes delay escalation and the alert is triggered at 11:00 AM, the alert must be escalated at 11:05 AM. But, based on the design, an additional processing time in between 01 second to 02 minutes is added and the alert will be escalated between 11:05:01 AM to 11:07 AM.