{"id":25029,"date":"2022-08-25T11:04:16","date_gmt":"2022-08-25T15:04:16","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=25029"},"modified":"2022-10-31T09:25:19","modified_gmt":"2022-10-31T13:25:19","slug":"monitoring-best-practices-for-alerting-new-whitepaper","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/","title":{"rendered":"AIOps in Monitoring: Best Practices for Alerting \u2013 New Whitepaper!"},"content":{"rendered":"<div class=\"inner_content\">\n<h2>Importance of Proactive Alerting<\/h2>\n<p>When evaluating a monitoring product, it is essential you fully understand its alerting capabilities. Alerting is a responsive action triggered by a change in conditions within the system being monitored. Typically, an alert can be defined by a condition to trigger the alert and an action defining what that alert should do when the trigger condition occurs. If your monitoring tools are intended to ensure high availability and performance, rather than retrospective passive analysis of metrics \u2013 you need very good proactive alerting.<\/p>\n<p style=\"margin-bottom: 15px;\">IT managers often complain about two main types of problems with monitoring and management tools, and they are both fundamentally associated with weak and inadequate alerting features:<\/p>\n<ul>\n<li>Firstly, after they install the software, they start to receive many \u201cfalse\u201d alerts. A false alert refers to a situation in which the monitoring tool indicates a problem, but the IT manager determines that there is no real problem in the network. Thousands of alerts can result in distracting IT administrators, preventing them from focusing on the genuine issues that can impact IT service quality or working on more interesting strategic projects. This is commonly referred to as \u2018noise\u2019. Alert storms are at the extreme of this spectrum.<\/li>\n<li>Secondly, to avoid false alerts, IT managers must define threshold values for the different metrics collected by the monitoring tool. A threshold is a limit set in the monitoring tool for the metric, so that if a metric crosses this value, an alert is raised. In a large enterprise, a monitoring tool that provides visibility into the different network, server, and application tiers can collect millions of metrics. Having to set thresholds manually for every single metric is a very time-consuming, monotonous exercise. As a result, many enterprises end up spending a lot of time and money having consultants calculate, assess, and tune thresholds manually or have to invest in bespoke scripting to attempt to automate parts of this tedium.<\/li>\n<\/ul>\n<h2>Modern Alerting Technologies<\/h2>\n<p>Modern monitoring platforms such as eG Enterprise simply don\u2019t have these issues as they provide out-of-the-box alerting coupled with sophisticated machine learning AIOps engines. This functionality can calculate both static and dynamic thresholds and correlate events with alerts to minimize noise, avoiding secondary symptomatic (rather than root-cause alerts) and event storms.<\/p>\n<p>Modern alerting technologies now automatically deploy and auto-scale with dynamic infrastructures and IaC (Infrastructure-as-Code) workflows and process, check and adjust thousands or even millions of metric thresholds. Crude static fixed threshold values and percentages have been replaced by systems that understand the hour-by-hour, day-of-the-week, monthly, and seasonal usage variations of systems to enable anomaly detection without problematic alert storms and false positives.<\/p>\n<div style=\"padding: 20px; border: 1px solid #ffd392; background: #fcf8ef; margin-bottom: 30px;\">In the past organizations often spent several $100k on a monitoring tool, where the administrators ended up exporting large volumes of historic metric data into excel spreadsheets or \u201cstress level\u201d calculators to try to figure out what thresholds should be. This type of crude static threshold methodology is rarely cost-effective or effective, and has become unnecessary with modern monitoring platforms.<\/div>\n<p>With newer workspace technologies such as <a href=\"https:\/\/www.eginnovations.com\/blog\/aws-cloudwatch-monitoring-2\/\" target=\"blank\" rel=\"noopener noreferrer\">Amazon WorkSpaces<\/a> and <a href=\"https:\/\/www.eginnovations.com\/blog\/azure-virtual-desktop-monitoring-avd\/\" target=\"blank\" rel=\"noopener noreferrer\">Azure Monitor for AVD leveraging both static and AI-driven dynamic thresholds,<\/a> awareness has increased of modern alerting functionality that avoids unscalable manual configuration. Many of the customer RFIs and PoCs which evaluate eG Enterprise, now specifically and explicitly assess and score thresholding and alerting capabilities. We are increasingly seeing requests for architectural details of alerting capabilities and are pleased to release a new whitepaper to satisfy this need.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-25296\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/alerting-methodology.webp?90\" alt=\"\" width=\"750\" height=\"413\" \/><\/p>\n<div class=\"img_caption\">This new whitepaper will help you understand the concepts underpinning alerting methodology to assess alerting capabilities such as window-sizing and event duration.<\/div>\n<h2>Understanding Metric Thresholds and Alerting Features<\/h2>\n<p style=\"margin-bottom: 15px;\">In this <a href=\"https:\/\/www.eginnovations.com\/white-paper\/make-it-service-monitoring-simple-and-proactive-with-aiops-powered-intelligent-thresholding-and-alerting\" target=\"blank\" rel=\"noopener noreferrer\">new white paper,<\/a> we cover the architectural qualities associated with eG Enterprise\u2019s thresholding methodologies to automate and optimize thresholding and alerting. This white paper will enable readers to evaluate and compare the thresholding capabilities of monitoring solutions for a range of use cases including APM (Application Performance Monitoring), BTM (Business Transaction Monitoring), Digital Workspace monitoring (Citrix \/ VMware) and Cloud Monitoring (Azure Monitor, Amazon CloudWatch). The capabilities discussed will cover:<\/p>\n<ul>\n<li>When to choose static vs. dynamic thresholds<\/li>\n<li>How to combine static and dynamic thresholds<\/li>\n<li>How machine learning technologies within AIOps engines have become standard to calculate and set alerting thresholds automatically for large-scale auto-scaled infrastructure<\/li>\n<li>Threshold priorities and multi-level alerting &#8211; automatically escalating the priority of alerts as metrics change, rather than triggering additional alerts<\/li>\n<li>Threshold sensitivities \u2013 how thresholds can be set to be 20% of a value or even 20% of normal usage for that metric at a particular time of day<\/li>\n<li>Threshold duration considerations \u2013 how to ensure the time duration of events is included in alerting criteria e.g., a CPU spike of 100% for 2 seconds could be ignored unless the problem continues but the failure of a hard-disk should be reported instantaneously<\/li>\n<li>Leveraging reports on alerting to set KPIs and identify optimizations and continual improvements<\/li>\n<li>How to configure alerting to handle planned maintenance<\/li>\n<li>Integrating alerts into ITSM help and service desk systems such as ServiceNow and Autotask<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/alerts-dashboard-view.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"555\" class=\"aligncenter size-full wp-image-25298\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/alerts-dashboard.webp\" alt=\"\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/alerts-dashboard.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/alerts-dashboard-300x222.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/alerts-dashboard-310x229.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/alerts-dashboard-140x104.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<div class=\"img_caption\" style=\"margin-bottom: 30px !important;\">Reports and Dashboards can be used to understand and quantify alerts and assess IT\u2019s effectiveness<\/div>\n<p><a href=\"https:\/\/www.eginnovations.com\/white-paper\/make-it-service-monitoring-simple-and-proactive-with-aiops-powered-intelligent-thresholding-and-alerting\" target=\"blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"200\" class=\"aligncenter size-full wp-image-25302\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Metrics-Whitepaper-Banner.webp\" alt=\"\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Metrics-Whitepaper-Banner.webp 850w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Metrics-Whitepaper-Banner-300x71.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Metrics-Whitepaper-Banner-768x181.webp 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Metrics-Whitepaper-Banner-800x188.webp 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Metrics-Whitepaper-Banner-310x73.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Metrics-Whitepaper-Banner-140x33.webp 140w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<h2>White paper \u2013 Understanding How Combining Static and Dynamic Thresholds Avoid False Alarms<\/h2>\n<p>The white paper guides readers through complex examples of thresholds best practice. For example \u2013 how to avoid false alarms around Citrix user sessions. A performance graph showing the number of user sessions and the auto-computed, dynamic-static thresholds used for alerting.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/static-and-dynamic-thresholds-view.jpg\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"455\" class=\"aligncenter size-full wp-image-25300\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/static-and-dynamic-thresholds.webp\" alt=\"\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/static-and-dynamic-thresholds.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/static-and-dynamic-thresholds-300x182.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/static-and-dynamic-thresholds-310x188.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/static-and-dynamic-thresholds-140x85.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<p>An auto-static combination threshold is applied to this metric. In the morning hours, a static threshold is applied because the dynamic threshold is lower. The static value ensures that alerts are not generated as long as the number of sessions stays below 10. During the day (8am onwards), the automatic threshold takes over. The blue line in the figure denotes the metric\u2019s value over time. The yellow lines represent the upper threshold values. Notice that from 4pm to 8am, the threshold is static \u2013 with the minor value at 10 sessions and the major value at 15 sessions. Since the automatically computed value is less than both thresholds, the statically set threshold values apply in this case. As in the case with the maximum thresholds, if a static minimum and an automatic minimum threshold are specified, then eG Enterprise will generate alarms only when the current value falls below the lower of the two threshold settings.<\/p>\n<p>After reading our white paper you should be left in a position to understand all common thresholding methodologies, algorithms and features available from modern monitoring platforms. Enjoy!<\/p>\n<h3>Further Information:<\/h3>\n<ul>\n<li>To learn about how to understand, evaluate and leverage AIOps features, see <a href=\"https:\/\/www.eginnovations.com\/ebooks\/aiops-solutions-strategies\" target=\"blank\" rel=\"noopener noreferrer\">AIOps Solutions and Strategies for IT Management | eG Innovations<\/a><\/li>\n<li>eG Enterprise can be deployed on-premises, in a cloud of your choice or via ready-to-go SaaS (Software as a Service), for those looking to explore the benefits of static and dynamic thresholds and combine them a free trial on our SaaS option may be the best choice: <a href=\"https:\/\/www.eginnovations.com\/blog\/deployment-choices-saas-on-prem\/\" target=\"blank\" rel=\"noopener noreferrer\">How to Deploy eG Enterprise \u2013 Choices and Models | eG Innovations<\/a><\/li>\n<li>Static or Dynamic Thresholds? Which is best and when? See: <a href=\"https:\/\/www.eginnovations.com\/blog\/static-vs-dynamic-alert-thresholds-for-monitoring\/\" target=\"blank\" rel=\"noopener noreferrer\">Static vs Dynamic Alert Thresholds for Monitoring | eG Innovations<\/a><\/li>\n<li>TechTarget has several articles on the benefits of static vs dynamic alerts, including: <a href=\"https:\/\/www.techtarget.com\/searchitoperations\/tip\/Monitoring-thresholds-determine-IT-performance-alerts\" target=\"blank\" rel=\"noopener noreferrer\">Monitoring thresholds determine IT performance alerts (techtarget.com)<\/a> and <a href=\"https:\/\/www.techtarget.com\/searchitoperations\/essentialguide\/How-AIOps-monitoring-eases-modern-IT-challenges\" target=\"blank\" rel=\"noopener noreferrer\">How AIOps monitoring eases modern IT challenges (techtarget.com)<\/a><\/li>\n<li>Read about integrating alerts with help and service desk tools such as Slack, ServiceNow, Autotask, JIRA, and others: <a href=\"https:\/\/www.eginnovations.com\/blog\/service-help-desk-automation\/\" target=\"blank\" rel=\"noopener noreferrer\">Service and Help Desk Automation Strategies<\/a><\/li>\n<li>We have <a href=\"https:\/\/www.youtube.com\/watch?v=mzhDMcfWF3I&amp;list=PL8QsLiuaAeDm8XCvM3gw5P6IJ2y3plTuQ\" target=\"blank\" rel=\"noopener noreferrer\">a series of short (2-3 min) videos<\/a> covering the eG Enterprise interface including many aspects of alerting and thresholding, including: <a href=\"https:\/\/www.youtube.com\/watch?v=UToekds2Hzo&amp;list=PL8QsLiuaAeDm8XCvM3gw5P6IJ2y3plTuQ&amp;index=6\" target=\"blank\" rel=\"noopener noreferrer\">How to Review and Interpret Alarms,<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=oOEVTA3V4ZQ&amp;list=PL8QsLiuaAeDm8XCvM3gw5P6IJ2y3plTuQ&amp;index=9\" target=\"blank\" rel=\"noopener noreferrer\">Understanding and Modifying Thresholds,<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=qOK7ye6FFrI&amp;list=PL8QsLiuaAeDm8XCvM3gw5P6IJ2y3plTuQ&amp;index=18\" target=\"blank\" rel=\"noopener noreferrer\">Understanding and Modifying Alarm Policies,<\/a> and <a href=\"https:\/\/www.youtube.com\/watch?v=4PnZYmg1aS4&amp;list=PL8QsLiuaAeDm8XCvM3gw5P6IJ2y3plTuQ&amp;index=21\" target=\"blank\" rel=\"noopener noreferrer\">Creating Group Thresholds<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Importance of Proactive Alerting When evaluating a monitoring product, it is essential you fully understand its alerting capabilities. Alerting is a responsive action triggered by a change in conditions within the system being monitored. Typically, an alert can be defined by a condition to trigger the alert and an action defining what that alert should [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":25295,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[366,383,393],"tags":[1524,1168,416,1173,1174,1175,1172,1169,1171,1170,746,1561,1152,1167,400,1165,636,1166,747],"class_list":["post-25029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-end-to-end-monitoring-e2e","category-it-infrastructure-monitoring","category-msp-monitoring","tag-ai-operations","tag-ai-ops","tag-aiops","tag-aiops-alert","tag-aiops-alerting","tag-aiops-discovery","tag-aiops-monitoring-tool","tag-aiops-tool","tag-aiops-tooling","tag-aiops-toolset","tag-alerting","tag-artificial-intelligence-for-it-operations","tag-datadog","tag-gartner-aiops","tag-it-monitoring","tag-logicmonitor-aiops","tag-observability","tag-sciencelogic","tag-trusted-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Monitoring with Alerting - Best Practices &amp; Solutions \u2014 Whitepaper<\/title>\n<meta name=\"description\" content=\"Detect issues in your infrastructure with proper IT alerting. Learn about best practices for automated alerting for IT operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Monitoring with Alerting - Best Practices &amp; Solutions \u2014 Whitepaper\" \/>\n<meta property=\"og:description\" content=\"Detect issues in your infrastructure with proper IT alerting. Learn about best practices for automated alerting for IT operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T15:04:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-31T13:25:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Best-Practices-for-Alerting-Whitpaper-SocialBanner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Barry Schiffer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Best-Practices-for-Alerting-Whitpaper-SocialBanner.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/barryschiffer\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Barry Schiffer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Monitoring with Alerting - Best Practices & Solutions \u2014 Whitepaper","description":"Detect issues in your infrastructure with proper IT alerting. Learn about best practices for automated alerting for IT operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/","og_locale":"en_US","og_type":"article","og_title":"IT Monitoring with Alerting - Best Practices & Solutions \u2014 Whitepaper","og_description":"Detect issues in your infrastructure with proper IT alerting. Learn about best practices for automated alerting for IT operations.","og_url":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2022-08-25T15:04:16+00:00","article_modified_time":"2022-10-31T13:25:19+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Best-Practices-for-Alerting-Whitpaper-SocialBanner.jpg","type":"image\/jpeg"}],"author":"Barry Schiffer","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Best-Practices-for-Alerting-Whitpaper-SocialBanner.jpg","twitter_creator":"@https:\/\/twitter.com\/barryschiffer","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Barry Schiffer","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/"},"author":{"name":"Barry Schiffer","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/d0b5be68886ce1638c348381565b7067"},"headline":"AIOps in Monitoring: Best Practices for Alerting \u2013 New Whitepaper!","datePublished":"2022-08-25T15:04:16+00:00","dateModified":"2022-10-31T13:25:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/"},"wordCount":1284,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Best-Practices-for-Alerting-Whitpaper-Thumbnail.jpg","keywords":["ai operations","ai ops","AIOps","aiops alert","aiops alerting","aiops discovery","aiops monitoring tool","aiops tool","aiops tooling","aiops toolset","alerting","artificial intelligence for it operations","datadog","gartner aiops","IT Monitoring","logicmonitor aiops","observability","sciencelogic","trusted alerts"],"articleSection":["End-to-End Monitoring (E2E)","IT Infrastructure Monitoring","MSP Monitoring"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/","url":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/","name":"IT Monitoring with Alerting - Best Practices & Solutions \u2014 Whitepaper","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Best-Practices-for-Alerting-Whitpaper-Thumbnail.jpg","datePublished":"2022-08-25T15:04:16+00:00","dateModified":"2022-10-31T13:25:19+00:00","description":"Detect issues in your infrastructure with proper IT alerting. Learn about best practices for automated alerting for IT operations.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Best-Practices-for-Alerting-Whitpaper-Thumbnail.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/08\/Best-Practices-for-Alerting-Whitpaper-Thumbnail.jpg","width":362,"height":235},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/monitoring-best-practices-for-alerting-new-whitepaper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"AIOps in Monitoring: Best Practices for Alerting \u2013 New Whitepaper!"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/d0b5be68886ce1638c348381565b7067","name":"Barry Schiffer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/88a13576c4dc5f917425311b63f4cb22?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88a13576c4dc5f917425311b63f4cb22?s=96&d=mm&r=g","caption":"Barry Schiffer"},"sameAs":["https:\/\/x.com\/https:\/\/twitter.com\/barryschiffer"],"url":"https:\/\/www.eginnovations.com\/blog\/author\/barry-schiffer\/"}]}},"modified_by":"Review eG","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/25029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=25029"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/25029\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/25295"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=25029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=25029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=25029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}