Alerts notify you or your team when something noteworthy happens to one of your AI agents — a policy violation, an anomaly, a rate limit breach, or an agent going offline. You can route alert notifications to email, Slack, or any webhook-compatible endpoint.Documentation Index
Fetch the complete documentation index at: https://docs.adrian.secureagentics.ai/llms.txt
Use this file to discover all available pages before exploring further.
Alert types
| Type | When it fires |
|---|---|
policy_violation | An event from an agent was blocked by an assigned policy. |
anomaly_detected | Secureagentics detects unusual agent behavior (high error rate, token spike, traffic anomaly). |
agent_down | An agent that was previously sending events has stopped sending them for longer than the configured threshold. |
rate_limit_exceeded | An agent hits the threshold defined in a rate_limit policy. |
A single alert rule can cover multiple alert types. For example, you can create one alert that fires on both
policy_violation and rate_limit_exceeded and sends notifications to the same Slack channel.Create an alert
- Dashboard
- API
Open the Alerts page
In the Secureagentics dashboard, navigate to Alerts. You will see a list of existing alert rules for your organization.
Choose the alert type
Select one or more alert types from the Trigger section:
policy_violation, anomaly_detected, agent_down, or rate_limit_exceeded.Optionally, scope the alert to a specific agent by selecting it from the Agent dropdown. Leave this set to All agents to monitor your entire fleet.Select the notification channel
Under Notification channel, choose Email, Slack, or Webhook.
- Email: Enter one or more recipient addresses.
- Slack: Paste your Slack incoming webhook URL. See the Slack documentation for how to create an incoming webhook.
- Webhook: Enter any HTTPS endpoint. Secureagentics will
POSTa JSON payload to this URL when the alert fires.
Save the alert
Click Save Alert. The alert is active immediately. You can test it from the Alerts list page (see Test an alert below).
Notification channels
Slack
Provide a Slack incoming webhook URL as the destination. Secureagentics posts a formatted message to the target channel including the alert type, agent ID, and a summary of the triggering event.Webhook
Provide any publicly accessible HTTPS endpoint. Secureagentics sends an HTTPPOST request to that URL with a JSON body each time the alert fires. Your endpoint must return HTTP 200 within 10 seconds, or Secureagentics retries delivery up to three times with exponential backoff.
Webhook endpoints must use HTTPS. HTTP destinations are not accepted. If your endpoint uses a self-signed certificate, contact support to arrange an exception.
Webhook alert payload format
When an alert fires and the channel iswebhook, Secureagentics sends the following JSON body to your destination URL:
| Field | Type | Description |
|---|---|---|
alert_id | string | ID of the alert rule that fired. |
alert_name | string | Human-readable name of the alert rule. |
alert_type | string | The type of alert: policy_violation, anomaly_detected, agent_down, or rate_limit_exceeded. |
agent_id | string | The ID of the agent that triggered the alert. |
timestamp | string | ISO 8601 timestamp when the alert fired. |
details | object | Context specific to the alert type. For policy_violation, includes event_id, event_type, policy_id, and reason. |
Test an alert
You can send a test notification to verify your channel is configured correctly before any real events occur.Find the alert in the Alerts list
Navigate to Alerts in the dashboard. Locate the alert rule you want to test.
Send a test notification
Click the … menu on the alert row and select Send test notification. Secureagentics immediately sends a synthetic payload to the configured destination.
Test notifications count as a delivery attempt but do not appear in the Events timeline or audit logs, since no real agent event triggered them.