Documentation Index
Fetch the complete documentation index at: https://docs.easyalert.io/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Escalation Routing allows you to automatically direct incoming alerts to specific escalation policies based on their attributes. Instead of using a single default policy for all incidents, you can create rules that match alert properties like severity, host, service, or custom tags to ensure the right team gets notified.Smart Routing
Priority-Based
Flexible Conditions
Delayed Escalation
How Escalation Routing Works
- Rules are evaluated in priority order (lower number = evaluated first)
- The first matching rule determines the escalation policy
- If no rules match, the tenant’s default escalation policy is used
- Inactive rules can still match but will suppress notifications
Viewing Routing Rules
The Escalation Routing page displays all your configured rules:| Column | Description |
|---|---|
| Rule | Name and description |
| Priority | Evaluation order (lower = first) |
| Conditions | Number of conditions and logic type (AND/OR) |
| Policy | Target escalation policy |
| Delay | Initial delay before escalation starts |
| Status | Active or Inactive |
Creating Routing Rules
Enter Basic Info
- Name — Descriptive rule name
- Description — Explain what this rule does and when it should match
Configure Conditions
- Select a field (event property or custom tag)
- Choose an operator (equals, contains, regex, etc.)
- Enter the value to match
- Add more conditions as needed
- Select AND or OR logic
Select Escalation Policy
Set Priority and Status
- Priority — Lower values evaluate first (default: 100)
- Status — Active or Inactive
Understanding Conditions
Conditions determine when a routing rule triggers. Each condition compares an event field against a value using an operator.Available Fields
- Event Fields
- Source Fields
- Custom Fields
| Field | Description |
|---|---|
event.severity | Alert severity level |
event.priority | Alert priority (P1-P5) |
event.host | Affected hostname |
event.hostIp | Host IP address |
event.service | Service or application name |
event.environment | Environment (production, staging, etc.) |
event.region | Geographic region |
event.title | Alert title |
event.description | Alert description |
Condition Operators
| Operator | Description | Example |
|---|---|---|
equals | Exact match (case-insensitive) | event.severity equals "critical" |
not_equals | Does not match | event.environment not_equals "development" |
contains | Contains substring | event.title contains "database" |
not_contains | Does not contain | event.host not_contains "test" |
starts_with | Starts with prefix | event.host starts_with "prod-" |
ends_with | Ends with suffix | event.service ends_with "-api" |
in | Value in list | event.severity in "critical,high" |
not_in | Value not in list | event.environment not_in "dev,test,staging" |
regex | Regex pattern match | event.host regex "^web-[0-9]+$" |
exists | Field exists | tags.customer exists |
not_exists | Field does not exist | tags.team not_exists |
greater_than | Numeric greater than | extra.errorCount greater_than 100 |
less_than | Numeric less than | extra.responseTime less_than 5000 |
Condition Logic
- AND Logic
- OR Logic
Initial Escalation Delay
The initial delay feature allows you to pause before starting escalation, giving alerts time to auto-resolve.How It Works
- Alert matches a routing rule with initial delay configured
- Incident is created but escalation is not started immediately
- During the delay period:
- If the alert auto-resolves → Incident closes, no escalation occurs
- If the delay expires → Escalation begins normally
Delay Configuration
| Setting | Description |
|---|---|
| 0 seconds | Immediate escalation (default) |
| 30+ seconds | Minimum delay (values 1-29 auto-correct to 30) |
| Variance | Actual delay may vary by ±15 seconds |
Use Cases
- Flapping alerts — Alerts that trigger and resolve rapidly
- Self-healing systems — Infrastructure with auto-remediation
- Transient issues — Network blips, temporary resource spikes
Rule Priority
Rules are evaluated in priority order (lower number = higher priority):| Priority | Evaluation Order | Typical Use |
|---|---|---|
| 1-10 | First | Critical routing, VIP customers |
| 11-50 | Second | High-priority specific matches |
| 51-100 | Third | Standard routing rules |
| 101-500 | Fourth | General category rules |
| 501+ | Last | Catch-all rules |
Priority Example
Common Use Cases
Route by Customer Tier
Route by Customer Tier
Route by Severity
Route by Severity
Route by Service
Route by Service
Route by Region
Route by Region
- Condition:
event.region equals "eu-west-1" - Policy: EU Support Team
- Condition:
event.region equals "us-east-1" - Policy: US East Support Team
- Condition:
event.region equals "ap-southeast-1" - Policy: APAC Support Team
Route by Integration Source
Route by Integration Source
Delayed Escalation for Flapping Alerts
Delayed Escalation for Flapping Alerts
Suppress Non-Production Alerts
Suppress Non-Production Alerts
Testing Rules
Before activating a rule, you can test how it would evaluate against sample data:- Use the test endpoint to evaluate your rules
- Send sample event data matching expected alerts
- Review which rule matched and why
- Adjust conditions or priorities as needed
Managing Rules
Editing Rules
- Click the three-dot menu (⋮) on a rule
- Select Edit
- Modify conditions, policy, or settings
- Save changes
Duplicating Rules
Create a copy of an existing rule:- Click the three-dot menu
- Select Duplicate
- Modify the copy as needed
- Save as a new rule
Activating/Deactivating Rules
Toggle rule status without deleting:- Active — Rule is evaluated and routes to its policy
- Inactive — Rule still matches but suppresses notifications (useful for testing or maintenance)
Deleting Rules
- Click the three-dot menu
- Select Delete
- Confirm deletion
Best Practices
Start with Specific Rules
Start with Specific Rules
Use Meaningful Priorities
Use Meaningful Priorities
Document Your Rules
Document Your Rules
Test Before Activating
Test Before Activating
Use Tags for Flexibility
Use Tags for Flexibility
Review Rules Periodically
Review Rules Periodically
Avoid Overlapping Rules
Avoid Overlapping Rules
Troubleshooting
Rule not matching expected alerts
Rule not matching expected alerts
- Verify rule is Active
- Check condition field names match your alert data exactly
- Test with sample data to see actual field values
- Check if a higher-priority rule is matching first
- Verify condition logic (AND vs OR)
Wrong policy being used
Wrong policy being used
- Check rule priorities — lower numbers evaluate first
- Look for other rules that might match the same alerts
- Verify the correct policy is selected in the rule
- Test to see which rule actually matches
Alerts going to default policy
Alerts going to default policy
- Verify at least one rule should match the alert
- Check all conditions in matching rule are satisfied
- Ensure rule is active
- Review actual alert field values in webhook samples
Notifications not being sent
Notifications not being sent
- Check if matched rule is Inactive (suppresses notifications)
- Verify the escalation policy has active targets
- Check if initial delay is still pending
- Review escalation policy configuration
Delay not working as expected
Delay not working as expected
- Verify initialDelaySeconds is set correctly
- Remember values 1-29 auto-correct to 30
- Actual delay may vary by ±15 seconds
- Check if alert resolved before delay expired
Regex conditions not matching
Regex conditions not matching
- Test regex pattern separately
- Patterns are case-insensitive
- Escape special characters properly
- Check for leading/trailing whitespace in values
Quick Reference
Condition Operators
| Operator | Type | Description |
|---|---|---|
equals | String | Exact match |
not_equals | String | Not equal |
contains | String | Substring match |
not_contains | String | No substring |
starts_with | String | Prefix match |
ends_with | String | Suffix match |
in | List | Value in list |
not_in | List | Value not in list |
regex | Regex | Pattern match |
exists | Boolean | Field exists |
not_exists | Boolean | Field missing |
greater_than | Numeric | Greater than |
less_than | Numeric | Less than |
Event Fields
| Field | Source |
|---|---|
event.severity | Alert severity |
event.priority | Alert priority |
event.host | Hostname |
event.hostIp | IP address |
event.service | Service name |
event.environment | Environment |
event.region | Region |
event.title | Alert title |
event.description | Alert description |
source.type | Integration type |
source.id | Integration ID |
tags.* | Any tag value |
Priority Guidelines
| Range | Use Case |
|---|---|
| 1-10 | VIP/Premium routing |
| 11-50 | Critical overrides |
| 51-100 | Standard routing |
| 101-500 | General categories |
| 501+ | Catch-all rules |

