Cynteo Alert Bridge Documentation

Connect Azure Monitor alerts to SolarWinds Service Desk automatically

Incident Fields Reference

Complete reference of what data Alert Bridge sends to SolarWinds Service Desk incidents.


Incident Structure

Every incident created by Alert Bridge includes:

Basic Fields

FieldTypeSourceExample
nameStringAzure alert rule nameAzure Alert: High CPU Usage
priorityStringSeverity mappingHigh, Medium, Low
descriptionHTMLEnriched alert dataSee Description Format
categoryObjectConfiguration{"name": "Infrastructure"}
subcategoryObjectConfiguration{"name": "Azure Monitor"}
requesterObjectConfiguration{"email": "azure@company.com"}
stateStringAlert conditionNew, In Progress, Resolved

Optional Fields

FieldTypeWhen IncludedExample
group_assigneeObjectIf configured{"name": "Cloud Ops"}
resolution_descriptionStringOn resolutionResolved automatically by Azure Monitor...

Description Format

The incident description is rich HTML containing all alert context:

Example Description

<p><strong>[ALERT] Azure Monitor Alert</strong></p>
<hr>

<p><strong>Alert Information:</strong></p>
<ul>
  <li><strong>Name:</strong> High CPU Usage</li>
  <li><strong>Severity:</strong> Sev1</li>
  <li><strong>Status:</strong> Fired</li>
  <li><strong>Signal Type:</strong> Metric</li>
  <li><strong>Monitoring Service:</strong> Platform</li>
  <li><strong>Fired At:</strong> 2025-10-29T10:00:00Z</li>
</ul>

<p><strong>Affected Resource:</strong></p>
<ul>
  <li><strong>Name:</strong> vm-prod-web-01</li>
  <li><strong>Type:</strong> Microsoft.Compute/virtualMachines</li>
  <li><strong>Resource Group:</strong> rg-production</li>
  <li><strong>Subscription:</strong> sub-12345678-abcd-...</li>
</ul>

<p><strong>Metric Details:</strong></p>
<ul>
  <li><strong>Metric:</strong> Percentage CPU</li>
  <li><strong>Condition:</strong> Average GreaterThan 80</li>
  <li><strong>Current Value:</strong> 95.5</li>
</ul>

<p><strong>Evaluation Window:</strong> PT5M</p>
<p><em>Period: 2025-10-29T09:55:00Z to 2025-10-29T10:00:00Z</em></p>

<hr>
<p><strong>Quick Actions:</strong></p>
<ul>
  <li><a href="https://portal.azure.com/#...">[VIEW] View This Alert Instance</a></li>
  <li><a href="https://portal.azure.com/#...">[CONFIGURE] Edit Alert Rule Settings</a></li>
  <li><a href="https://portal.azure.com/#...">[RESOURCE] View Affected Resource in Portal</a></li>
</ul>

Description Sections

1. Alert Information

  • Alert rule name
  • Severity (Sev0-Sev3)
  • Monitor condition (Fired/Resolved)
  • Signal type (Metric/Log/Activity Log)
  • When it fired

2. Affected Resource

  • Resource name
  • Resource type
  • Resource group
  • Subscription ID

3. Metric Details (for Metric Alerts)

  • Metric name
  • Threshold condition
  • Current value
  • Time aggregation method

4. Log Search Details (for Log Alerts)

  • Query results count
  • Search query
  • Links to log results

5. Activity Log Details (for Activity Alerts)

  • Operation name
  • Status
  • Caller

6. Alert History (if repeat occurrence)

  • Number of occurrences
  • First occurrence time
  • Pattern indicator
  • View alert in Azure Portal
  • Edit alert rule
  • View affected resource

Alert States

State Transitions

New → In Progress → Resolved
 ↑                      |
 └──────────────────────┘
    (New occurrence)

State Descriptions

StateWhenIncident Action
NewFirst time alert firesCreate incident
In ProgressAlert fires again (update)Update incident
ResolvedAlert condition clearsResolve incident

Priority Mapping

Default mapping (configurable):

Azure SeveritySolarWinds PriorityTypical Use
Sev0HighCritical outages, data loss
Sev1HighMajor functionality impaired
Sev2MediumPerformance degradation
Sev3LowInformational, capacity planning

Customize: See Priority Mapping Guide


Category and Subcategory

Default Values

  • Category: Infrastructure
  • Subcategory: Azure Monitor

Auto-Detection

Alert Bridge automatically detects category based on resource type:

Resource TypeCategory
Virtual MachinesInfrastructure
App ServiceApplication
SQL DatabaseDatabase
Storage AccountStorage
Virtual NetworkNetwork
Key VaultSecurity
KubernetesPlatform

Override: Configure during deployment


Comments

When Comments Are Added

Comments update existing incidents instead of creating new ones:

Conditions for adding comment:

  1. Alert fires again on same resource
  2. Time since last update > 5 minutes (configurable)
  3. OR metric value changed > 10%

Comment includes:

  • Current time
  • Monitor condition
  • Current metric value
  • Change from last value
  • Occurrence number
  • Links to Azure Portal

Example Comment

[UPDATE] Alert Status Update

• Monitor Condition: Fired
• Time: 2025-10-29T10:15:00Z
• Current Value: 92.3 (+2.1 from last)
• Occurrence: #3
• Pattern: Recurring issue (3 occurrences)

Alert continues to fire. Monitoring situation.

[View Alert] | [Edit Rule]

Smart Deduplication

To prevent comment spam:

  • Minimum 5 minutes between comments (configurable)
  • Only comment if metric changed significantly
  • Resolution uses resolution_description instead

Resolution Fields

When alert resolves:

Incident Updates

{
  "state": "Resolved",
  "resolution_description": "Resolved automatically by Azure Monitor. Alert condition returned to normal."
}

Resolution Description Includes

  • Resolution time
  • Total duration
  • Total occurrences
  • Automatic resolution note

Example

[RESOLVED] Alert Cleared by Azure Monitor

• Resolution Time: 2025-10-29T10:30:00Z
• Total Duration: 30 minutes
• Total Occurrences: 3
• Alert automatically cleared - condition returned to normal

This incident has been automatically resolved.

[View Alert Details]

Requester Email

The requester is the “who created this incident” field in SolarWinds.

Requirements

  • Must be valid email
  • Should exist in SolarWinds as a user OR
  • SolarWinds auto-creates user (if enabled)

Best Practices

Option A: Service Account

azure-monitor@company.com

Option B: Team Inbox

cloudops@company.com

Option C: Shared Account

itsm-automation@company.com

Not recommended:

  • Individual personal emails
  • Distribution lists (unless they’re users in SolarWinds)

Field Limits

Character Limits

FieldMax LengthTruncation
name255 chars... added
description32,000 charsRare, full alerts fit
category100 charsError if exceeded
priority20 charsPredefined values

Array Limits

FieldMax Items
alertTargetIDs100 resources
configurationItems100 items

Data Not Included

Alert Bridge does NOT send:

  • ❌ Azure subscription credentials
  • ❌ Resource access keys
  • ❌ Connection strings
  • ❌ Secrets from Key Vault
  • ❌ VM passwords
  • ❌ Storage account keys

Only metadata and metrics are sent to SolarWinds.


Custom Fields (Coming Soon)

Future versions will support:

  • Custom incident fields
  • Additional tags
  • Custom descriptions
  • Field mapping rules

View Roadmap


Example: Full Incident Payload

What Alert Bridge sends to SolarWinds API:

{
  "incident": {
    "name": "Azure Alert: High CPU Usage",
    "priority": "High",
    "description": "<p><strong>[ALERT] Azure Monitor Alert</strong></p>...",
    "category": {
      "name": "Infrastructure"
    },
    "subcategory": {
      "name": "Azure Monitor"
    },
    "requester": {
      "email": "azure-monitor@company.com"
    },
    "group_assignee": {
      "name": "Cloud Operations"
    }
  }
}

See Also


Questions? Contact support@cynteocloud.com