Integrations
Dynamic variables
Updated: June 19, 2025
The use of variables in notification integrations can be done through tokens. Notification integrations contain customizable payloads where you can add, remove and change tokens and text.
The information and tokens in the payload determine what information is populated into your alert or incident. For example:
- {alert_name} was triggered at {alert_timestamp}, this populates the alert with the name you have given the alert and the time in UTC when the alert was generated: "404 alert was triggered at 21/04/2023T12:35:36".
The tables below details the different variables you can use in a payload.
Alerts
Variable Name | Description | Example | Process Type |
---|---|---|---|
alert_link | Link to the alert in the FireTail SaaS platform. | https://firetail.app/organisations/2b33ac05.../monitor-alerting/27da7c63... | Alert |
alert_uuid | Unique UUID of the alert. | bd65fefc-43d9-4c6c-9719-21ef828afa6c | Alert |
alert_name | Name of the alert. | 404 alert | Alert |
alert_timestamp | Timestamp alert was generated (UTC). | 21/04/2023T12:35:36 | Alert |
alert_operand | Operand of the alert. | < > >= <= == | Alert |
alert_nice_operand | Operand in text form. | less than | Alert |
alert_type | Type of alert. | static | anomaly | Alert |
alert_static_threshold_condition | Same as alert_operand. | < > >= <= == | Alert |
alert_static_threshold_value | Threshold value for triggering a static alert. | 1000 | Alert |
alert_static_triggered_value | Value that caused the alert to trigger. | 1001 | Alert |
alert_period | Period checked for alert breach (seconds). | 900 | Alert |
alert_throttle_enabled | If true, alert won't re-trigger during threshold period. | true | Alert |
alert_throttle_period | Mute period after alerting (seconds). | 900 | Alert |
alert_anomaly_sensitivity | Sensitivity level for anomaly detection. | 1.5 | Alert |
alert_anomaly_max_data_points | Max data points checked for anomaly breach. | 1 | Alert |
alert_anomaly_min_data_points | Min data points for anomaly check (× alert_period). | 1 | Alert |
alert_anomaly_comparison_operator | Comparison operator for anomaly threshold. | LessThanLowerOrGreaterThanUpperThreshold | Alert |
alert_message | The alert message. | — | Alert |
org_uuid | UUID of the organization. | bd65fefc-43d9-4c6c-9719-21ef828afa6c | Alert |
Incidents
Variable Name | Description | Example | Process Type |
---|---|---|---|
incident_link | Link to the incident in the FireTail SaaS platform. | https://firetail.app/.../incidents/660a1f2f... | Incident |
incident_uuid | UUID of the incident. | bd65fefc-43d9-4c6c-9719-21ef828afa6c | Incident |
Incident_title | The title of the incident. | Incident title | Incident |
incident_timestamp | Timestamp incident was generated in UTC. | 21/04/2023T12:35:36 | Incident |
incident_policy_name | Name of the policy that triggered the incident. | Incident policy name | Incident |
incident_policy_frequency | How frequently the policy is checked. | 1 day | Incident |
incident_policy_uuid | UUID of the incident policy. | bd65fefc-43d9-4c6c-9719-21ef828afa6c | Incident |
incident_policy_link | Link to the policy in FireTail SaaS. | https://firetail.app/.../incidents-policy | Incident |
incident_period | Time period checked for breach (seconds). | 900 | Incident |
incident_message | The incident message. | — | Incident |
incident_findings_info_count | Number of info-level findings. | 90 | Incident |
incident_findings_low_count | Number of low-severity findings. | 20 | Incident |
incident_findings_medium_count | Number of medium-severity findings. | 50 | Incident |
incident_findings_high_count | Number of high-severity findings. | 5 | Incident |
incident_findings_critical_count | Number of critical-severity findings. | 3 | Incident |
incident_findings_total_count | Total findings in the incident. | 128 | Incident |
org_uuid | UUID of the organization. | bd65fefc-43d9-4c6c-9719-21ef828afa6c | Incident |
Example incident message for Slack
{
"blocks": [
{
"type": "header",
"text": {
"type": "plain_text",
"text": "Incident Triggered by Policy '{incident_policy_name}'",
"emoji": true
}
},
{
"type": "section",
"fields": [
{
"type": "mrkdwn",
"text": "*Name:*\n{incident_title}"
},
{
"type": "mrkdwn",
"text": "*Trigger Time:*\n{incident_timestamp}"
}
]
},
{
"type": "header",
"text": {
"type": "plain_text",
"text": "Findings - {incident_findings_total_count}"
"emoji": true
}
},
{
"type": "section",
"fields": [
{
"type": "mrkdwn",
"text": "*Critical:*\n{incident_findings_critical_count}"
},
{
"type": "mrkdwn",
"text": "*High:*\n{incident_findings_high_count}"
},
{
"type": "mrkdwn",
"text": "*Medium:*\n{incident_findings_medium_count}"
},
{
"type": "mrkdwn",
"text": "*Low:*\n{incident_findings_low_count}"
}
]
},
{
"type": "section",
"text": {
"type": "mrkdwn",
"text": "<{incident_link}|View Incident>"
}
}
]
}