Alerts & Rules
Breeze has a built-in alert system that monitors your devices and notifies the right people when something goes wrong. Alerts are triggered by rules you define, routed through notification channels you configure, and managed from the Alerts page in the dashboard.
Viewing Alerts
Section titled “Viewing Alerts”Open Alerts from the left sidebar to see all active alerts across your organization. The page has three main sections:
- Summary bar — counts of active alerts grouped by severity, with trend indicators showing whether alert volume is rising or falling.
- Filter bar — narrow the list by severity, status, device, or date range.
- Alert list — every alert with its severity badge, title, affected device, triggering rule, and timestamp.
Click any alert to open its detail view, which shows:
- Full alert message and context data
- The device that triggered it (with a link to the device page)
- The rule that fired (with a link to the rule editor)
- Status timeline (when it was triggered, acknowledged, resolved)
- Notification delivery history (which channels were notified and whether delivery succeeded)
Severity Levels
Section titled “Severity Levels”Every alert has a severity that controls how it appears in the dashboard and how notification routing handles it:
| Severity | Use for | Color |
|---|---|---|
| Critical | Service-down conditions, security events, data loss risk | Red |
| High | Degraded performance, failed backups, disk nearly full | Orange |
| Medium | Threshold warnings, unusual patterns | Yellow |
| Low | Informational issues that may need attention | Blue |
| Info | Audit events, status changes, non-actionable notices | Gray |
Alert Statuses
Section titled “Alert Statuses”Alerts move through a lifecycle:
| Status | Meaning |
|---|---|
| Active | The condition is still true and no one has responded yet |
| Acknowledged | A technician has seen the alert and is investigating |
| Resolved | The issue is fixed (manually or auto-resolved by the rule) |
| Suppressed | Temporarily silenced until a specified time |
Responding to Alerts
Section titled “Responding to Alerts”Acknowledge an Alert
Section titled “Acknowledge an Alert”Acknowledging tells the team you are aware and working on it. From the alert list or detail page, click Acknowledge. The alert moves to “acknowledged” status and records who acknowledged it and when.
Resolve an Alert
Section titled “Resolve an Alert”Once the underlying issue is fixed, click Resolve. You can optionally add a resolution note describing what was done. Resolving an alert sets a cooldown period (configured on the rule) to prevent the same condition from immediately re-firing.
Suppress an Alert
Section titled “Suppress an Alert”If you need to silence a noisy alert during planned maintenance, click Suppress and pick a date/time. The alert moves to “suppressed” status until that time, then returns to active if the condition is still true.
Bulk Actions
Section titled “Bulk Actions”Select multiple alerts using the checkboxes, then choose Acknowledge Selected or Resolve Selected from the bulk action menu. You can act on up to 100 alerts at once.
Alert Correlation
Section titled “Alert Correlation”When multiple related alerts fire at once (for example, a network outage causing many devices to go offline), Breeze automatically groups them using alert correlation. The correlation view shows:
- Root cause — the alert most likely to be the underlying problem, with a confidence score
- Related alerts — child alerts classified as causal, symptom, or duplicate
- Timeline — chronological view of when each related alert fired
Open the correlation view from the alert detail page when the “Related Alerts” badge appears.
Creating Alert Rules
Section titled “Creating Alert Rules”Alert rules define what conditions to watch for and which devices to monitor.
-
Navigate to Alerts > Rules and click Create Rule (or open a Configuration Policy and go to the Alert Rules tab).
-
Give the rule a name and choose a severity level.
-
Add one or more conditions. Each condition specifies:
- Type — metric threshold, status change, or custom condition
- Metric — CPU, memory, disk, or network usage
- Operator — greater than, less than, equals, etc.
- Threshold value — the numeric value that triggers the alert
- Duration — how long the condition must persist before firing
-
Choose the target scope:
- All Devices — applies to every device in the organization
- Specific Sites — applies to all devices at selected sites
- Specific Groups — applies to devices in selected device groups
- Specific Devices — applies to individually selected devices
-
Select one or more notification channels to route the alert through.
-
Set the cooldown (1—1440 minutes) to prevent rapid re-firing after resolution.
-
Optionally enable auto-resolve so the alert resolves itself when the condition clears.
-
Click Save.
Testing a Rule
Section titled “Testing a Rule”Before deploying a rule to production, you can test it against a specific device. From the rule list, click the Test button, select a target device, and Breeze will simulate condition evaluation and show you whether the rule would trigger.
Notification Channels
Section titled “Notification Channels”Notification channels are the delivery endpoints where alert notifications are sent. Each channel belongs to an organization.
Supported Channel Types
Section titled “Supported Channel Types”| Type | Configuration Required |
|---|---|
| Recipient email addresses | |
| Slack | Incoming webhook URL |
| Microsoft Teams | Incoming webhook URL |
| Webhook | URL, HTTP method, headers, payload template |
| PagerDuty | Service/integration key |
| SMS | Phone numbers (requires Twilio configuration) |
Setting Up a Channel
Section titled “Setting Up a Channel”-
Go to Alerts > Channels and click Add Channel.
-
Enter a name (e.g., “Ops Team Slack”) and select the channel type.
-
Fill in the type-specific configuration (webhook URL, email addresses, etc.).
-
Click Save.
-
Click Test on the newly created channel to send a test notification and verify delivery.
Notification Routing Rules
Section titled “Notification Routing Rules”Routing rules let you control which channels receive which alerts, based on conditions like severity, alert type, device tags, or site.
-
On the Alerts > Channels page, expand the Routing Rules section.
-
Click Add Routing Rule.
-
Set a name and priority (lower number = higher priority; rules are evaluated in order).
-
Define conditions:
- Severities — only route alerts of these severity levels
- Condition types — only route alerts triggered by these condition types
- Device tags — only route alerts from devices with these tags
- Site IDs — only route alerts from devices at these sites
-
Select one or more notification channels to deliver to.
-
Enable or disable the rule, then click Save.
Routing rules are evaluated from lowest priority number to highest. The first matching rule determines where the notification is sent.
Escalation Policies
Section titled “Escalation Policies”For critical alerts that need a guaranteed response, create escalation policies that notify progressively broader audiences if no one acknowledges within a given time.
-
Go to Alerts > Policies and click Create Policy.
-
Give the policy a name and define escalation steps. Each step specifies:
- Which notification channels to contact
- How long to wait before escalating to the next step
-
Attach the policy to alert rules by selecting it in the rule’s Escalation Policy field.
For infrastructure-level alerting (monitoring the Breeze platform itself with Prometheus and Alertmanager), see Infrastructure Alerts.