Alert configuration
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
3 hours ago
I have a 20 alerts with different descriptions for the same node. I created one alert rule and, in the alert filter, I added those descriptions using OR conditions ( a-description OR b-description OR c-description) for that node. Is this the correct configuration? If not, what is the correct approach? Please let me know the best practice?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
3 hours ago
Hi @umar5
Your configuration will work, but it is not considered best practice, especially when you already have many alerts and the list may grow or change over time.
Using multiple OR conditions on the description field is fragile because descriptions are free text and can change with tool updates or minor wording differences.
Recommended best practice in ServiceNow Event Management
- Avoid filtering by description when possible
Try to base the alert rule on stable attributes such as source, node, metric name, event type, resource, object, class, or severity. These fields are far less likely to change than description text. - Use patterns instead of many OR conditions
If the alerts share a common keyword or structure, use contains, starts with, or regex rather than listing every description individually. - Normalize alerts at ingestion
A better long term approach is to normalize the alerts when they are ingested, for example by mapping them to a derived field like alert category or signature. Then your alert rule can filter on that normalized field. - Split rules only when behavior differs
Use separate rules only if the alerts require different actions such as different routing, severity, priority, or remediation. If the behavior is the same, keep one rule and improve the filter logic.
Rule of thumb
If the only difference between the alerts is the description, normalize or pattern match.
If the alerts require different handling, create separate rules.
Hope this helps.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
2 hours ago
If I use source, node, metric name, and event type, it will create incidents for secondary alerts as well? Is it recommended to create incidents for secondary alerts?
Secondary alerts also have different descriptions. So far, in the alert filter I have added descriptions only for primary alerts. We are newly integrating monitoring tools with ServiceNow.
