Documentation is now available for the Fall 2020 Update release!

Creating Alert Escalation Policy

Describes how to create an alert escalation policy.

Leave Feedback

Introduction

An alert escalation policy can be created to support operational requirements. For example, a policy can be created to escalate critical network issues to a network engineer.

Alert escalation policies are created by:

  1. Defining the name and scope.
  2. Selecting the resources where the alert matches this policy.
  3. Defining alert conditions.
  4. Defining the escalation rules.

Prerequisite

Both OpsQ View and OpsQ Manage permissions are required to access the Alert Escalation Policy.

Step 1: Define name and scope

To define the name and scope:

  1. From All Clients, select the client.
  2. Go to Setup > Alert Management > Alert Escalation.
  3. Click the Add button and provide Name and Description.
  4. Select the required mode from the Mode drop-down list.
  5. Choose the organization whose users from the organization who will receive the escalations from this policy.
    For example: If you choose a partner organization, only partner users can receive alert escalations.
  6. Select Next: Select Resources.
Define Name and Scope

Define Name and Scope

Step 2: Select resources

Select the resources where alerts match a policy:

  1. Select resources for the escalation policy.
    • Resources can be selected from one or more clients.
    • Add up to 25 resources.
    • To escalate alerts for users of a specific client, add only resources from that client.
  2. (Optional) Filter the resources by:
    • Resource Name
    • Resource Type
    • Service Group
    • Device Group
    • Site
  3. Select Next: Define Alert Conditions.
Select Resources

Select Resources

Step 3: Define alert and resource conditions

Filter the type of alerts which occur on the selected resources.

To define the alert conditions:

  1. Add conditions for an alert based on the alert properties listed.
  2. Click Add to add multiple conditions.
  3. Choose if Any or All conditions should be applied to filter the alerts.
  4. Click Next: Define Escalation Rules.

The alert property Client: Service Name is applicable only to the partner scope policy. As an example, to escalate alerts of a service named Windows Maintenance Support, add the condition Client: Service Name:

Define Alert and Resource Conditions

Define Alert and Resource Conditions

Step 4: Define escalation rules

Escalation rules are actions to be taken when an alert is not acknowledged within a desired time period.

List of escalation rules along with the description:

Escalation ruleDescription
Escalate directly as neededSelect the users who should be directly contacted on an on-demand basis. Note: Escalating directly is a manual process. No automatic actions are taken.
Escalate alert automatically until it is acknowledged, closed, suppressed, or ticketedEscalate an alert as notification until an action is taken. No further level of escalation can be added since the alert escalation will end as soon as the incident is created.
Escalate alert automatically until it is acknowledged, closed, or suppressedEscalate an alert as notification even if an incident is created.
To configure escalation rules:
  1. Alert Elapsed Timeline: Configure the time interval to escalate an alert after it is generated
    • Select Immediately on the timeline to escalate an alert as soon as the alert is generated.

      Note: If the alert does not have correlation or first response policies, the algorithm immediately moves the alert to Alert Escalation. If the alert does have correlation and first response policies, the algorithm starts the escalation process and finishes after the correlation is complete.

    • Select Wait Minutes/Hours on the timeline to escalate after the alert has elapsed and the policy conditions have been met.

  2. Escalate as Notification: Select to send continuous notifications until an action (acknowledge, suppress, close or create Incident) is taken on the alert.

    For example, if an alert arrives at 10:00 AM, a notification is sent to the user. If the user does not acknowledge the alert, another notification is sent after 5 minutes (10:05 AM). Notifications will be continuously sent every 5 minutes. When the user acknowledges the alert at 10:20 AM, no further notifications will be sent.

  3. Escalate as Incident: Select to escalate the alert as an incident. The escalation stops immediately and no more escalations are sent.

Escalate as notification

  1. Select Escalate As Notifications to send periodic notifications to users to make sure that an alert is acknowledged.
  2. Send Alert Notifications to: Configure the users who be sent the notifications.
    To select the users, click Select Users.
  3. Notification Priority: An escalation notification carries a priority to determine which channel for delivery of notifications.
    As an example, policy P1 is configured to send Normal priority notifications for all the matching alerts to user A. User A can specify that all normal notifications will be received via email (and not via SMS or Voice).
  4. Send Notifications:
    • Repeat Notification Frequency: Configure repeat notification frequency for selected users. The repeat notification is sent to the user as Set Repeat Frequency even if an alert is escalated to a higher level. The user will no longer receive notifications after a certain number of repeated notifications.
      • The default repeat frequency is 15 minutes and the number of notifications is 2.
      • The minimum number of notifications is 2 and maximum is 10.
    • Alert State Transition: Alerts can be escalated based on the alert state transition which allows notifications on selected alert state change. For example, user can escalate alerts as a notification when alert state changes from warning to critical. The notification is a one-time notification sent at the time of the state transition.
  5. Add Escalation: Adding escalation levels will escalate the alert to the next level if it is not acknowledged at a prior level.
    • A policy can have multiple escalation notifications.
    • When a level 2 escalation is added to notify users, level 1 and level 2 users receive repeated notification according to the repeat notification frequency.

Escalate as incident

  1. Select Escalate As Incident to automatically create an incident from an alert and assign it to the desired user.

    1. For New Incidents: Configure the properties of the incident that will be created when an alert’s condition matches this policy.
    • A new incident is created for an alert if there is no open incident existing for the alert.
    • The incident property tokens available in the auto incident form can be used to customize the subject and description of the incident.
    • Enable Continous Learning to automatically escalate incidents to appropriate groups, priority or category using machine learning.
    1. For Created Incidents: If an open incident (an incident in any state other than Closed) is available for the alert, the incident is updated instead of creating a new incident.
    • Update Incident: Configure how to update existing incident of an escalated alert. The incident gets updated every time an escalated alert repeats with a state change.
      • Update incident with latest alert description when alert state change: The latest alert description is appended to the conversation of the incident. No change to the status of the incident is made based on escalated alert’s state.
      • Resolve incident when an alert heals: The latest alert description is appended to the conversation of the incident. The incident status is changed to Resolved when an escalated alert’s state changes to OK.
      • Update incident priority based on these rules: The priority of an incident is updated according to the rule configured for the alert severity change.
    • Notify: Configure which updates to an incident should be notified to users.
      • For every alert update: Send an incident notification when any update of an escalated alert is appended to the incident.
      • Only when the alert state changed: Send incident notification only when escalated alert heals and the update is appended to the incident.

Review - alert escalation policy

A summary of all sections of the escalate alert policy is available for review and editing:

Review Alert Escalation Policy

Review Alert Escalation Policy