Skip to main contentWhat is an Alert Responder?
Alert responders listen for alerts and automatically start investigations pulling in context across your systems to produce a likely root cause and recommended next actions.
- It starts investigating the moment an alert arrives.
- It uses telemetry data, code, deployments, relevant runbooks, and past incidents and postmortems
- It analyzes trends and extracts insights from all historical investigations
Supported Alert Sources
TierZero can respond to alerts from:
- Slack
- Opsgenie
- PagerDuty
- FireHydrant
- Rootly
- Datadog (coming soon)
- New Relic (coming soon)
Use Cases
Accelerate Incident Response
- Challenge: Engineers lose time context‑switching, gathering telemetry, and triaging severity.
- How it works: Slack and webhook alerts trigger an immediate investigation using your runbook prompt; the details page shows a concise summary, tags (category, services), and a link to the full investigation.
- Outcome: Faster triage with pre‑populated likely causes and relevant evidence before responders join.
Reduce Alert Fatigue
- Challenge: High‑volume channels and duplicate alerts obscure what needs action.
- How it works: Configure alert responders to focus on relevant alerts, use debounce to prevent frequent repeated investigations during noisy spikes, and use alert insights to extract significant alerts and reduce noise.
- Outcome: Higher signal‑to‑noise, fewer duplicate investigations, and clearer prioritization.
Scale team knowledge
- Challenge: Investigation know‑how lives in tribal knowledge and inconsistent practices.
- How it works: Codify investigation steps in “Configure Runbook”, then iterate in Prompt Studio using real alert inputs. Every run produces a summarized, searchable history.
- Outcome: Consistent investigations across rotations and faster onboarding for new responders.
How to Set Up Alert Responders
Prerequisites
- Ensure you have the appropriate integration configured (Slack, Opsgenie, PagerDuty, FireHydrant, or Rootly).
- For webhook-based sources (Opsgenie, PagerDuty, FireHydrant, Rootly), set up webhook subscriptions in Integrations settings first.
Create the Alert Responder
- Go to Alert Responders and click “Create Alert Responder”.
- Choose a source: Slack, Opsgenie, PagerDuty, FireHydrant, or Rootly (only active integrations are shown).
- Slack:
- Channel: Slack Channel ID to monitor.
- Sender ID (Optional): Slack bot, app, or user ID.
- Text Matches: Text to match against, for example, alert name or monitor ID
- Webhooks (Opsgenie, PagerDuty, FireHydrant, Rootly):
- Webhook Subscription: One or more webhooks in the specific integration
- Text Matches: Text to match against, for example, alert name or monitor ID
- Once the alert responder is created, click “Configure Runbook” on the alert responder page.
- Provide instructions that TierZero should follow in ‘Investigation Prompt’.
- Use Prompt Studio to test and refine with real alert inputs.
Review results
- See a 30‑day trigger chart, plus a timeline of investigations with summaries, tags, and links to deep‑dive.
Best Practices
1. Configure Alert Runbooks
- Custom runbooks will instruct the agent to focus on what matters and produce consistent results.
- Begin with alerts that already have documented steps or predictable diagnostics.
2. Leverage Prompt Studio to Iterate on Runbooks
- Test prompts against real alert inputs, compare versions, and refine quickly.
- Save improved prompts back to the responder once satisfied.
Example Runbooks
Alert Responder Runbooks