Skip to main content
Sentry alerts notify you and your team when something goes wrong. You can create alerts that trigger based on issue activity or that monitor a metric over time and fire when it exceeds a threshold.

Two types of alerts

Issue alerts

Triggered by activity on an issue — when a new issue is created, an existing one regresses, or event frequency crosses a threshold. Best for reacting to specific error patterns.

Metric alerts

Triggered when an aggregate metric (error rate, transaction duration, failure rate) crosses a threshold over a time window. Best for monitoring the overall health of a service.

Issue alerts

Issue alerts fire when specific conditions are met on an issue. You define conditions, optionally add filters, and specify actions to take when the rule fires.

Conditions

Conditions determine when the rule evaluates. Available conditions:
ConditionDescription
A new issue is createdFires the first time Sentry sees a new fingerprint
The issue changes state from resolved to unresolvedFires on regressions
An issue escalatesFires when Sentry detects a significant increase in event volume for an existing issue
Sentry marks an existing issue as high priorityFires when an existing issue is escalated to high priority automatically
The issue is seen more than times in Fires when event count exceeds a threshold within a time window (1 minute to 30 days)
The issue is seen by more than users in Fires when unique user count exceeds a threshold
The issue affects more than percent of sessions in Fires when an issue impacts a percentage of total sessions
Multiple conditions can be combined with all (AND) or any (OR) logic.

Filters

Filters narrow down which issues the rule applies to, without changing when it triggers. Examples:
  • Issue is assigned to a specific user or team
  • Issue has a specific tag value (e.g. browser:Chrome)
  • Issue level is error, warning, etc.
  • Issue age is older or newer than a duration
  • The event’s attribute matches a value (e.g. server_name contains prod)

Actions

When an alert fires, Sentry executes one or more actions:
ActionDescription
Send an emailNotify a member, team, or the issue’s assignee/owner
Send a Slack messagePost to a Slack channel or DM
Send a PagerDuty notificationPage on-call via PagerDuty
Send an OpsGenie alertTrigger an OpsGenie alert
Send a notification via a webhookPOST a JSON payload to a custom URL
Create a ticketOpen a ticket in Jira, GitHub Issues, or Azure DevOps
Send a notification via an integrationRoute through a configured Sentry App

Creating an issue alert

1

Navigate to Alerts

Go to Alerts in the left sidebar, then click Create Alert.
2

Select alert type

Choose Issues when prompted to select between issue and metric alerts.
3

Configure conditions

Choose one or more conditions that determine when the rule fires. Select whether all conditions must match or any single condition is sufficient.
4

Add filters (optional)

Add filters to limit which issues trigger the alert.
5

Set actions

Add one or more actions — email, Slack, PagerDuty, webhook, etc.
6

Name and save

Give the rule a descriptive name, optionally assign an owner (team or member), and save.

Metric alerts

Metric alerts monitor aggregate data over a rolling time window. Instead of reacting to a single issue, they watch your error rates, transaction performance, or crash-free session percentages.

Alert thresholds

A metric alert has two optional threshold levels:
  • Critical — fires when the metric crosses this threshold; highest severity
  • Warning — fires at a lower threshold to give early warning before critical is reached
  • Resolved — the alert returns to resolved state when the metric drops back below the threshold

Time windows

Metric alerts evaluate data over a configurable window: 1 minute, 5 minutes, 10 minutes, 15 minutes, 30 minutes, 1 hour, 2 hours, 4 hours, 1 day, or 2 days.

Creating a metric alert

1

Navigate to Alerts

Go to Alerts in the left sidebar, then click Create Alert.
2

Select alert type

Choose Metrics when prompted.
3

Define the metric

Select the metric to monitor: error count, error rate, transaction duration (p50, p75, p95, p99), failure rate, Apdex, or crash-free session/user rate.
4

Set thresholds

Enter a critical threshold and optionally a warning threshold. Choose whether the alert fires when the value is above or below the threshold.
5

Set actions

Add notification actions for both the critical and warning triggers.
6

Name and save

Give the alert a name and save it.

Alert status

StatusMeaning
CriticalThe metric crossed the critical threshold
WarningThe metric crossed the warning threshold but not critical
ResolvedThe metric returned below all thresholds
Metric alerts require that your project is sending transactions or session data to Sentry. Error rate alerts work with error events only.

Managing alerts

You can view all active and triggered alerts from the Alerts page. The alert history shows when each alert fired, how long it was active, and when it resolved. You can mute an alert rule to temporarily suppress notifications without deleting the rule.