This article walks you through creating an alert rule in PulseAPI. Alert rules define when PulseAPI creates an incident and sends notifications.
Prerequisites: At least one notification channel must exist before you can assign it to a rule. See Setting Up Email Notifications if you haven't created one yet.
Enter a Rule Name that clearly describes what it detects. Examples:
Add an optional Description if you want to record more context about when and why this rule fires.
Select a Condition Type and configure the threshold:
Triggers when the response status code matches (or doesn't match) a value.
200, 503)Use this to catch failures (!= 200) or to alert on unexpected redirects (== 301).
Triggers when the response takes longer than a threshold.
2000 for 2 seconds)Triggers when uptime over a time window drops below a threshold.
99.9)Triggers when the SSL certificate will expire within a certain number of days.
14 for a two-week warning, 7 for an urgent warning)Choose which monitors this rule applies to:
Select one or more Notification Channels to receive alerts when this rule fires. You can assign email, Slack, and webhook channels to the same rule.
If no channels appear in the dropdown, create one first in Alerts → Notification Channels.
Cooldown Period How long to wait before this rule can fire again after it last triggered. Prevents repeated notifications for the same ongoing failure. Recommended starting values:
Priority Sets the severity of incidents created by this rule: Critical, High, Medium, or Low.
The rule is immediately active and will be evaluated on the next check cycle.
After saving, click Test Rule to simulate the rule against current data and see what it would trigger. This does not create a real incident — it's a dry run.
Still have questions? Contact support.