All Products
Search
Document Center

Application Real-Time Monitoring Service:Notification policies

Last Updated:Mar 11, 2026

When alert events fire across distributed systems, routing them to the right responders through the right channels is critical for fast resolution. Notification policies in Application Real-Time Monitoring Service (ARMS) define matching rules that filter alert events by tags, then deliver notifications to specified recipients through email, phone calls, text messages, webhooks, or chat apps such as DingTalk, Lark, and WeCom. Each policy also controls event grouping, repeat behavior, and escalation to reduce noise and prevent missed alerts.

How notification routing works

When an alert event fires, ARMS processes it through the following stages:

  1. Silence check -- If the event matches a silence policy, it is suppressed. No notification policy is evaluated.

  2. Matching rules -- The event's tags are compared against each notification policy's matching rules. A policy matches when all conditions within a rule are met (AND logic), and multiple rules within a policy use OR logic.

  3. Event grouping -- Matched events are optionally grouped by specified fields to reduce notification noise.

  4. Notification delivery -- Grouped or individual alerts are sent to the configured recipients through the selected channels.

  5. Repeat and escalation -- If an alert is not resolved, ARMS can resend notifications at a set frequency or escalate to additional recipients.

Important

Silence policies always take precedence -- a silenced event is never evaluated against notification policies.

Prerequisites

Before you begin, make sure that you have:

Create a notification policy

  1. Log on to the ARMS console. In the left-side navigation pane, choose Alert Management > Notification Policies.

  2. On the Notification Policies page, click Create Notification Policy.

  3. Enter a policy name at the top of the page.

  4. Complete the following steps to configure the policy.

Step 1: Define matching rules

Matching rules determine which alert events trigger this notification policy. Configure them in the Matching Rule section.

Important

Silence policies take precedence over notification policies. If an alert event matches a silence policy, it is silenced and is not matched by any notification policy. For details, see Silence policies.

Select a data source

OptionBehavior
Specific sourceFilters alert events from a specified integration only.
No preset sourceFilters alert events from all integrations.

Build matching rule expressions

Define expressions using tags. Use custom tags or select from existing ones:

  • Metric tags -- Tags from the metrics of an alert rule expression. For details about creating tags for Managed Service for Prometheus alert rules, see Create a Prometheus alert rule.

  • Default ARMS tags -- System-provided tags described in the following tables.

Common fields

TagDescription
alertnameAlert name.
clusternameCluster name.
severitySeverity level: P1, P2, P3, P4, or Default.
namespaceKubernetes namespace.
pod_namePod name.

System preset fields

TagDescription
_aliyun_arms_integration_nameIntegration name. The default integration reported by ARMS is ARMS-DEFAULT.
_aliyun_arms_involvedObject_idAlert object ID.
_aliyun_arms_involvedObject_nameAlert object name.
_aliyun_arms_region_idRegion ID.
_aliyun_arms_alert_rule_idAlert rule ID.
_aliyun_arms_alert_typeAlert rule type: 101 (Prometheus alert), 5 (Application Monitoring alert), or 4 (Browser Monitoring alert).

Combine conditions and rules

  • To require multiple conditions (AND logic), click Add Condition within the same rule.

  • To match any of several rules (OR logic), click Add Rule to add a separate rule.

Note

The total size of all rule descriptions in a single notification policy cannot exceed 64 KB (approximately 100 rules, depending on complexity). If you exceed this limit, create an additional notification policy for the remaining rules.

Step 2: Configure event grouping

In the Event Grouping section, choose how to handle multiple alert events, then click Next.

OptionBehavior
Do not groupEach alert event is sent as a separate notification.
Set grouping fieldsAlert events with identical values in the specified fields are aggregated into a single notification. This reduces alert noise when related events fire simultaneously.

Step 3: Set notification recipients and channels

In the Notification Objects section, configure who receives notifications and how, then click Next.

  1. Click +Add Notification Recipient and select one or more recipients.

    Notification policy - when alert is generated

    Recipient typeAvailable channels
    ContactPhone call, text message, or email
    Contact GroupPhone call, text message, or email
    On-call SchedulePhone call, text message, or email
    DingTalk/Lark/WeComChat app message
    General WebhookHTTP webhook call
  2. Choose whether to enable Send recovery notification. When enabled, ARMS notifies recipients after all related alert events are resolved and the alert status changes to Resolved.

  3. Set a notification template. For details, see Configure notification and webhook templates.

  4. Set the notification period. Notifications are sent only during this time window.

  5. (Optional) Select a ticket system to push alerts to. For details, see Integrations.

Step 4: Configure repeat, escalation, and recovery behavior

In the Repeat/Escalate/Recover Policy section, define what happens when an alert persists, then click Next.

Resend notifications

When enabled, ARMS resends the alert notification at the frequency you specify until the alert is recovered. Use this to prevent alerts from being overlooked during long-running incidents.

Escalation policy

Escalation and resend serve different purposes: resend repeats the same notification to the same recipients, while escalation routes to other notification objects based on the escalation policy after a timeout.

OptionBehavior
No escalation policyThe notification is sent once (or repeated if resend is enabled), but only to the original recipients.
Use escalation policyIf the alert is not recovered within the escalation timeout, ARMS sends notifications to additional recipients based on the escalation policy.

Enable manual recovery

When enabled, alerts are not automatically recovered even if no new alert event occurs within the automatic recovery window defined in the alert integration. Change the alert status manually instead. This is useful for alerts that require human verification before closing.

Step 5: Add action integrations (optional)

In the Action Integration section, configure actions that run automatically when an alert is triggered or recovered. For details, see Execute an alert plan using an ARMS action integration.

Step 6: Save the policy

Click Save.

Manage notification policies

After creation, all notification policies appear on the Notification Policies page.

OperationSteps
Edit a policyClick the policy name, or click Edit in the Actions column. Modify the policy and click Save.
Enable or disable a policyToggle the switch in the Status column.
Delete a policyClick Delete in the Actions column, then click Confirm in the dialog box.
Copy a policyClick Copy in the Actions column to create a duplicate.