Skip to main content

Creating Alert Rules

WhiteOwl provides a flexible alerting engine that monitors your network for threshold breaches, traffic anomalies, and holistic health issues. Click + Create Alert Rule on the Alert Management page to open the alert builder.

Select Alert Type

The first step is choosing one of four alert categories. Each provides a different approach to monitoring:

TypeDescription
SNMP AlertPre-built templates for infrastructure health — CPU, memory, interface utilization, errors, and flapping. Fastest way to set up device-level monitoring.
Flow AlertPre-built templates for traffic and security — country-based anomalies, DDoS detection, traffic volume spikes, TCP retransmits, and latency.
AI AnalysisHolistic, AI-powered network review that runs periodically (every 6–24 hours). Analyzes all data sources like a senior NOC engineer reviewing the health of your infrastructure.
Custom AlertBuild from scratch with full control over metric source, thresholds, filters, and evaluation settings.

SNMP Alert Templates

Selecting SNMP Alert presents six pre-built templates with sensible default thresholds. Click a template to create the rule instantly, or customize it before saving.

TemplateDescriptionDefault Threshold
High CPU UsageAlert when any device CPU exceeds threshold.> 75%
High Memory UsageAlert when any device memory exceeds threshold.> 65%
High Interface UtilizationAlert when any interface utilization exceeds threshold.> 60%
Interface FlappingAlert when interface status changes frequently (up/down cycles).>= 3 cycles
Interface ErrorsAlert when interface error rate exceeds threshold.> 100
Interface Packet LossAlert when interface discard rate indicates packet loss.> 50

Each template creates a static threshold alert preconfigured with the appropriate metric source (SNMP), metric name, operator, and threshold value. You can modify any of these settings before clicking Create Rule.


Flow Alert Templates

Selecting Flow Alert presents seven pre-built templates focused on traffic analysis and security detection. These templates use either baseline deviation or static threshold depending on the use case.

TemplateDescriptionDefaultType
High Inbound Country TrafficAlert when traffic from a country exceeds baseline.Baseline deviation: 300%Baseline
Many Sources to One DestinationAlert when an unusual number of sources target a single destination (potential DDoS).Baseline deviation: 500%Baseline
TCP SYN SpikeAlert when TCP SYN packets exceed baseline (potential SYN flood).Baseline deviation: 400%Baseline
High Traffic Volume (Bps)Alert when overall bits per second exceeds baseline.Baseline deviation: 200%Baseline
High Traffic Volume (PPS)Alert when overall packets per second exceeds baseline.Baseline deviation: 200%Baseline
High TCP RetransmitsAlert when TCP retransmit rate indicates network issues.> 5%Static
High RTT LatencyAlert when average round-trip time exceeds threshold.> 100 msStatic

AI Analysis Templates

Selecting AI Analysis provides holistic, AI-powered network reviews. Unlike threshold-based alerts, AI Analysis runs periodically (every 6–24 hours) and examines all data sources together — SNMP metrics, flow data, synthetic test results, and device health — to identify issues, anomalies, and trends that individual threshold alerts might miss.

How AI Analysis Works

AI Analysis queries data across all monitoring sources and sends a comprehensive summary to an AI model with a domain-specific prompt. The AI acts like a senior NOC engineer reviewing the network, identifying patterns and correlations across multiple data points. Results are delivered as alert notifications with detailed narrative findings.

TemplateDescriptionRecommended Interval
Morning Network Health CheckComprehensive morning review — overnight issues, current health, capacity concerns, unusual patterns, and action items for the day shift.Every 6 hours
Midday Performance ReviewMid-day check during peak usage hours — bottlenecks, degradation vs. morning, top consumers, latency, and afternoon predictions.Every 6 hours
End of Day SummaryDaily summary and overnight preparation — day's events, open issues, trend analysis, anomalies, overnight watch items, and upcoming maintenance.Every 24 hours
Security Posture ReviewReview traffic patterns for security anomalies — unexpected source countries/ASNs, port scanning, data exfiltration, suspicious connection patterns, failed connections, and new high-volume IPs.Every 12 hours
Capacity Planning AnalysisWeekly capacity and growth analysis — resource utilization trends, growth projections, and planning recommendations.Every 24 hours
Custom AnalysisCreate your own holistic analysis query with a custom prompt.Configurable

Custom Alert Builder

Selecting Custom Alert opens the full alert builder with complete control over every parameter.

Alert Details

FieldDescription
Rule NameA descriptive name for the alert (e.g., "High CPU Usage on Core Router").
DescriptionOptional description explaining what this alert monitors and why.
SeverityThe alert severity level: Critical, Warning, or Info. Severity affects how alerts are displayed and can be used to route notifications.
Enable this rule immediatelyWhen checked, the rule starts evaluating as soon as it's created. Uncheck to create the rule in a disabled state.

Alert Type

Choose between two detection methods:

Static Threshold

Alerts when a metric value crosses a fixed threshold. Best for well-understood metrics with known acceptable ranges.

Example: Alert when CPU utilization is greater than 80%.

Baseline Deviation

Alerts when a metric value deviates significantly from its historical average. WhiteOwl calculates a baseline from the configured lookback period and triggers when the current value exceeds the baseline by the specified percentage. Best for metrics with variable "normal" ranges where a static threshold would cause false positives.

Example: Alert when inbound traffic from China exceeds 300% of its 7-day average.

Metric Configuration

FieldDescription
Metric SourceThe data source to monitor: SNMP, NetFlow, Synthetic Ping, Synthetic HTTP, Synthetic DNS, or Synthetic Traceroute.
MetricThe specific metric within the source. Options change based on the selected source. For SNMP: CPU Utilization, Memory Usage, Interface Utilization, Interface Errors, Interface Discards, etc. For NetFlow: Bits Per Second, Packets Per Second, Flows Per Second, Retransmit Rate, Average RTT, etc.
DeviceThe specific device to monitor (for SNMP and device-scoped metrics). Select a device from the dropdown, or leave as "All Devices" for global metrics.

Filter Conditions (Optional)

Narrow down which data triggers the alert. Click + Add condition to add filter criteria. This is useful for scoping flow-based alerts to specific traffic segments without creating per-device rules.

Example filters:

  • Source Country = CN (alert only on traffic from China)
  • Destination Port = 22 (alert only on SSH traffic)
  • Source IP in subnet 10.0.0.0/8 (alert only on internal traffic)

Threshold Configuration

For Static Threshold

FieldDescription
OperatorThe comparison operator: Greater than (>), Less than (<), Greater than or equal (>=), Less than or equal (<=), Equal (=), Not equal (≠).
ValueThe threshold value that triggers the alert (e.g., 80).
UnitThe unit of measurement: Percent (%), Bytes, Bits per second, Packets per second, Milliseconds, etc.

For Baseline Deviation

FieldDescription
Deviation PercentHow far above the baseline the current value must be to trigger (e.g., 200 means 2x the baseline).
Minimum Absolute ValueA floor value below which the alert will not trigger, even if deviation is exceeded. Prevents false alarms on low-traffic metrics where small absolute changes cause large percentage deviations.
Lookback DaysNumber of days of historical data to use for calculating the baseline average (e.g., 7 days).

Evaluation Settings

Controls how frequently and aggressively the alert engine checks for threshold breaches.

FieldDescription
Evaluation WindowThe time window (in seconds) over which the metric is aggregated for each check. For example, 300 seconds means the alert engine averages the metric over the last 5 minutes for each evaluation.
Evaluation IntervalHow frequently (in seconds) the alert engine evaluates this rule. For example, 60 means the rule is checked every minute.
Consecutive BreachesThe number of consecutive evaluations that must exceed the threshold before the alert fires. Setting this to 3 with a 60-second interval means the metric must be above the threshold for 3 consecutive minutes before alerting. This reduces false alarms from transient spikes.
Tuning Consecutive Breaches

Start with 1 for critical alerts where immediate notification is important (e.g., device down). Use 3 or higher for metrics that naturally fluctuate (e.g., CPU, traffic volume) to avoid alert fatigue from brief spikes.

Notification Channels

WhiteOwl supports multiple notification channels for alert delivery. Click + Add Channel to add one or more channels to a rule. Multiple channels can be configured on a single rule — for example, sending to both Slack and a webhook simultaneously.

Webhook

Send a raw HTTP POST request with a JSON payload to any URL. Compatible with custom integrations, PagerDuty, Opsgenie, and any system that accepts webhook callbacks.

FieldDescription
URLThe endpoint to POST to (e.g., https://webhook-endpoint.com/alerts).
Webhook Payload Builder

The webhook channel includes a powerful payload builder that lets you control exactly which data fields are included in the JSON payload sent to your endpoint.

Preset Field Groups:

Three preset buttons instantly add the most common fields for each alert type:

PresetFields Included
SNMP DefaultRule name, device name, metric, current value, threshold, timestamp, alert link.
NetFlow DefaultRule name, current value, threshold, source IP, destination IP, tag, timestamp, alert link.
Baseline DefaultRule name, current value, baseline value, deviation percent, timestamp, alert link.

Custom Field Selection:

Click + Add Field to open the field picker and add individual fields. Available fields are organized into categories:

Metrics:

FieldDescription
Metric NameWhat is being monitored (e.g., cpu_utilization, bps).
Current ValueThe latest metric value that triggered the alert.
ThresholdThe alert threshold value.
Baseline ValueThe expected baseline (for baseline deviation alerts).
Deviation %The percent deviation from baseline.

Device / Context:

FieldDescription
Device NameThe hostname of the affected device.
Device IPThe management IP address.
Interface NameThe affected interface (for interface-scoped alerts).
Site NameThe site the device belongs to.

Flow Data (NetFlow alerts):

FieldDescription
Source IPSource IP address from flow data.
Destination IPDestination IP address from flow data.
Source PortSource port.
Destination PortDestination port.
ProtocolIP protocol.
ApplicationDetected application name.
CountryGeoIP-resolved country.
ASNAutonomous System Number.

Alert Metadata:

FieldDescription
Rule NameThe alert rule name.
Rule IDThe numeric rule ID.
SeverityAlert severity (critical, warning, info).
TimestampWhen the alert fired.

Additional Options:

OptionDescription
Include alert linkAdds an alert_url field with a direct link to the alert in the WhiteOwl UI.
Include chart URLAdds a chart_url field with a link to a chart visualization of the metric at the time of the alert.

Example webhook payload:

{
"rule_name": "High CPU on Core Switch",
"severity": "critical",
"current_value": "87.5",
"threshold": "80",
"device_name": "core-sw-1",
"device_ip": "192.168.1.1",
"metric": "cpu_usage",
"timestamp": "2026-02-08T14:30:00Z",
"alert_url": "https://whiteowl.local/alerts?rule_id=42"
}
Tailoring Payloads

Different downstream systems need different data. For Slack, keep it minimal (rule name, value, device). For PagerDuty or a SIEM, include the full context with IPs, ports, and enrichment data. The payload builder lets you customize per-rule without writing any code.


Slack

Send formatted alert notifications to a Slack channel via an incoming webhook.

FieldDescription
Webhook URLThe Slack incoming webhook URL (e.g., https://hooks.slack.com/services/...). Create one in your Slack workspace under Apps → Incoming Webhooks.
ChannelThe Slack channel to post to (e.g., #channel). This overrides the default channel configured on the webhook.
Bot NameThe display name for the alert bot (e.g., Chompy Alerts).
EmojiThe emoji icon for the bot (e.g., :bell:). Use Slack emoji shortcodes.

WhiteOwl formats Slack messages with color-coded severity indicators, metric details, and device context for easy scanning in a busy channel.


Email

Send alert notifications via email to one or more recipients.

FieldDescription
RecipientsOne or more email addresses to send alerts to.
Subject TemplateCustomizable email subject line.
Email Configuration

Email notifications require SMTP settings to be configured under Settings. See the Settings documentation for SMTP server configuration.


Syslog

Forward alert notifications as syslog messages to a remote syslog server. This is useful for integrating WhiteOwl alerts into existing log management or SIEM platforms.

FieldDescription
ServerThe syslog server hostname or IP address (e.g., syslog.example.com).
PortThe syslog port (default: 514).
ProtocolTransport protocol: UDP or TCP. UDP is the standard syslog transport; TCP provides reliable delivery.
FacilityThe syslog facility code. Select from standard facilities such as local0 (16) through local7 (23). Using a localN facility makes it easy to filter WhiteOwl alerts from other syslog sources on your log server.

Alert messages are formatted as standard syslog records with the alert severity mapped to the corresponding syslog severity level.


Notification Mode

Controls when and how notifications are delivered. Select one of three modes:

ModeDescription
AutomaticSend the notification immediately when the alert fires. This is the default and recommended mode for most alerts.
Manual ApprovalHold the notification until an operator manually approves it in the WhiteOwl UI. Useful for non-urgent alerts where you want a human to review before notifying external systems.
Manual with Auto-EscalationHold for manual approval, but automatically send the notification after a configurable timeout if no one has reviewed it. Provides a human review window while ensuring critical alerts are never missed.

Alert Behavior

WhiteOwl's alerting engine includes several smart behaviors:

  • Alert Suppression — Only one active alert instance is created per rule. Duplicate alerts are not generated while an existing alert for the same rule is still active.
  • Auto Resolution — When the metric returns to within acceptable levels, the alert automatically resolves and the state changes from Firing to Resolved.
  • Acknowledgment — Active alerts can be manually acknowledged by an operator, indicating the issue is being investigated.
  • Baseline Caching — Baseline calculations are cached for 1 hour to reduce database load. Lookback period affects query performance — start with 7 days and adjust as needed.