How alerting works
When an incident is confirmed, DevHelm evaluates your notification policies to decide what to do:- All matching policies run — there is no “first match wins” behavior
- Priority controls evaluation order — higher priority policies are evaluated first
- Escalation chains execute independently — each matching policy runs its own chain
The two layers
Alert channels
An alert channel is a configured destination — a Slack webhook, a PagerDuty routing key, an email address, or any of the seven supported integrations. Channels are reusable; you create them once and reference them from multiple notification policies.Notification policies
A notification policy defines:- Match rules — which incidents trigger this policy (by severity, monitor, region, etc.)
- Escalation chain — the ordered sequence of alert steps to execute
- Priority — the evaluation order relative to other policies
Alert flow example
Imagine a setup with two notification policies: Policy A (priority 10) — “Critical alerts”- Match: severity
DOWN - Escalation: Step 1 → Slack (immediate), Step 2 → PagerDuty (after 5 minutes, require ack)
- Match: catch-all (no rules)
- Escalation: Step 1 → Email (immediate)
DOWN incident is confirmed:
- Policy A matches — Slack is notified immediately, PagerDuty after 5 minutes
- Policy B matches — Email is sent immediately
DEGRADED incident is confirmed:
- Policy A does not match (severity is not DOWN)
- Policy B matches — Email is sent
Suppression
Alerts are suppressed in two cases, regardless of policy configuration:- Maintenance windows — Active windows suppress all notifications for covered monitors
- Resource group suppression — Group-level incidents suppress member-level alerts
Notification dispatches
Every notification sent by DevHelm is tracked as a dispatch. Dispatches record the channel, delivery status, and acknowledgment state. Use them for audit trails and debugging delivery issues.Next steps
Alert channels
Configure Slack, PagerDuty, email, and other destinations.
Notification policies
Route alerts based on severity, monitor, and region.
Escalation chains
Build multi-step escalation with delays and acknowledgment.
Alert suppression
Suppress alerts during maintenance and via resource groups.