An incident management tool that supports alerting across multiple channels with easy custom messaging and on-call integrations. Compatible with any tool supporting webhook alerts, it's designed for modern DevOps teams to quickly respond to production incidents.
🚀 Boost Your SRE Skills with the Book: On-Call in Action.
- Features
- Getting Started
- Development
- SNS Usage
- On-call
- Configuration
- Environment Variables
- Advanced API Usage
- Template Syntax
- Template Example
- Migration Guides
- Roadmap
- Contributing
- License
- 🚨 Multi-channel Alerts: Send incident notifications to Slack, Microsoft Teams, Telegram, and Email (more channels coming!)
- 📝 Custom Templates: Define your own alert messages using Go templates
- đź”§ Easy Configuration: YAML-based configuration with environment variables support
- 📡 REST API: Simple HTTP interface to receive alerts
- 📡 On-call: On-call integrations with AWS Incident Manager and PagerDuty
docker run -p 3000:3000 \
-e SLACK_ENABLE=true \
-e SLACK_TOKEN=your_token \
-e SLACK_CHANNEL_ID=your_channel \
ghcr.io/versuscontrol/versus-incident
# Clone the repository
git clone https://github.com/VersusControl/versus-incident.git
cd versus-incident
# Build with Go
go build -o versus-incident ./cmd/main.go
chmod +x versus-incident
Create run.sh
:
#!/bin/bash
export SLACK_ENABLE=true
export SLACK_TOKEN=your_token
export SLACK_CHANNEL_ID=your_channel
./versus-incident
Create a configuration file:
mkdir -p ./config && touch config.yaml
config.yaml
:
name: versus
host: 0.0.0.0
port: 3000
alert:
slack:
enable: true
token: ${SLACK_TOKEN}
channel_id: ${SLACK_CHANNEL_ID}
template_path: "/app/config/slack_message.tmpl" # For containerized env
telegram:
enable: false
msteams:
enable: false
Slack Template
Create your Slack message template, for example config/slack_message.tmpl
:
🔥 *Critical Error in {{.ServiceName}}*
❌ Error Details:
```{{.Logs}}```
Owner <@{{.UserID}}> please investigate
Run with volume mount:
docker run -d \
-p 3000:3000 \
-v $(pwd)/config:/app/config \
-e SLACK_ENABLE=true \
-e SLACK_TOKEN=your_slack_token \
-e SLACK_CHANNEL_ID=your_channel_id \
--name versus \
ghcr.io/versuscontrol/versus-incident
To test, simply send an incident to Versus:
curl -X POST http://localhost:3000/api/incidents \
-H "Content-Type: application/json" \
-d '{
"Logs": "[ERROR] This is an error log from User Service that we can obtain using Fluent Bit.",
"ServiceName": "order-service",
"UserID": "SLACK_USER_ID"
}'
Response:
{
"status":"Incident created"
}
Result:
- How to Customize Alert Messages from Alertmanager to Slack and Telegram
- Configuring Fluent Bit to Send Error Logs to Versus Incident
- Configuring AWS CloudWatch to Send Alerts to Slack and Telegram
- How to Configure Sentry to Send Alerts to MS Teams
- How to Configure Kibana to Send Alerts to Slack and Telegram
- How to Configure Grafana to Send Alerts to Slack and Telegram
- How to Configure OpenSearch to Send Alerts to Slack and Telegram
Telegram Template
For Telegram, you can use HTML formatting. Create your Telegram message template, for example config/telegram_message.tmpl
:
🚨 <b>Critical Error Detected!</b> 🚨
📌 <b>Service:</b> {{.ServiceName}}
⚠️ <b>Error Details:</b>
{{.Logs}}
This template will be parsed with HTML tags when sending the alert to Telegram.
Email Template
Create your email message template, for example config/email_message.tmpl
:
Subject: Critical Error Alert - {{.ServiceName}}
Critical Error Detected in {{.ServiceName}}
----------------------------------------
Error Details:
{{.Logs}}
Please investigate this issue immediately.
Best regards,
Versus Incident Management System
This template supports both plain text and HTML formatting for email notifications.
Microsoft Teams Template
Create your Teams message template, for example config/msteams_message.tmpl
. The Microsoft Teams integration now supports rich Markdown formatting that gets converted to Adaptive Cards:
# Critical Error in {{.ServiceName}}
### Error Details:
```{{.Logs}}```
## Additional Information
- Source: {{.Source}}
- Severity: {{.Severity}}
- Incident ID: {{.IncidentID}}
Please [investigate immediately](https://your-dashboard-url.com/incidents/{{.IncidentID}})
*Alert sent by Versus Incident Management*
This template uses Markdown features that will be rendered as an Adaptive Card in Microsoft Teams:
- Headings with different levels (
#
,##
,###
) - Code blocks with triple backticks
- Unordered lists with
-
or*
- Ordered lists with
1.
,2.
, etc. - Links with
[text](url)
syntax - Bold text with
**double asterisks**
Important Note (April 2025): Versus Incident now automatically extracts a summary from your template's first heading (or first line if no heading exists) to ensure proper display in Microsoft Teams notifications. It also creates a plain text fallback version for clients that don't support Adaptive Cards.
- Create a secret for Slack:
# Create secret
kubectl create secret generic versus-secrets \
--from-literal=slack_token=$SLACK_TOKEN \
--from-literal=slack_channel_id=$SLACK_CHANNEL_ID
- Create ConfigMap for config and template file, for example
versus-config.yaml
:
apiVersion: v1
kind: ConfigMap
metadata:
name: versus-config
data:
config.yaml: |
name: versus
host: 0.0.0.0
port: 3000
alert:
slack:
enable: true
token: ${SLACK_TOKEN}
channel_id: ${SLACK_CHANNEL_ID}
template_path: "/app/config/slack_message.tmpl"
telegram:
enable: false
slack_message.tmpl: |
*Critical Error in {{.ServiceName}}*
----------
Error Details:
```
{{.Logs}}
```
----------
Owner <@{{.UserID}}> please investigate
kubectl apply -f versus-config.yaml
- Create
versus-deployment.yaml
:
apiVersion: apps/v1
kind: Deployment
metadata:
name: versus-incident
spec:
replicas: 2
selector:
matchLabels:
app: versus-incident
template:
metadata:
labels:
app: versus-incident
spec:
containers:
- name: versus-incident
image: ghcr.io/versuscontrol/versus-incident
ports:
- containerPort: 3000
livenessProbe:
httpGet:
path: /healthz
port: 3000
env:
- name: SLACK_CHANNEL_ID
valueFrom:
secretKeyRef:
name: versus-secrets
key: slack_channel_id
- name: SLACK_TOKEN
valueFrom:
secretKeyRef:
name: versus-secrets
key: slack_token
volumeMounts:
- name: versus-config
mountPath: /app/config/config.yaml
subPath: config.yaml
- name: versus-config
mountPath: /app/config/slack_message.tmpl
subPath: slack_message.tmpl
volumes:
- name: versus-config
configMap:
name: versus-config
---
apiVersion: v1
kind: Service
metadata:
name: versus-service
spec:
selector:
app: versus
ports:
- protocol: TCP
port: 3000
targetPort: 3000
- Apply:
kubectl apply -f versus-deployment.yaml
docker run -d \
-p 3000:3000 \
-e SLACK_ENABLE=true \
-e SLACK_TOKEN=your_slack_token \
-e SLACK_CHANNEL_ID=your_channel_id \
-e SNS_ENABLE=true \
-e SNS_TOPIC_ARN=$SNS_TOPIC_ARN \
-e SNS_HTTPS_ENDPOINT_SUBSCRIPTION=https://your-domain.com \
-e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY \
-e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_KEY \
--name versus \
ghcr.io/versuscontrol/versus-incident
Send test message using AWS CLI:
aws sns publish \
--topic-arn $SNS_TOPIC_ARN \
--message '{"ServiceName":"test-service","Logs":"[ERROR] Test error","UserID":"U12345"}' \
--region $AWS_REGION
A key real-world application of Amazon SNS involves integrating it with CloudWatch Alarms. This allows CloudWatch to publish messages to an SNS topic when an alarm state changes (e.g., from OK to ALARM), which can then trigger notifications to Slack, Telegram, or Email via Versus Incident with a custom template.
Versus supports On-call integrations with AWS Incident Manager and PagerDuty. Updated configuration example with on-call features:
name: versus
host: 0.0.0.0
port: 3000
public_host: https://your-ack-host.example # Required for on-call ack
# ... existing alert configurations ...
oncall:
### Enable overriding using query parameters
# /api/incidents?oncall_enable=false => Set to `true` or `false` to enable or disable on-call for a specific alert
# /api/incidents?oncall_wait_minutes=0 => Set the number of minutes to wait for acknowledgment before triggering on-call. Set to `0` to trigger immediately
enable: false
wait_minutes: 3 # If you set it to 0, it means there's no need to check for an acknowledgment, and the on-call will trigger immediately
provider: aws_incident_manager # Valid values: "aws_incident_manager" or "pagerduty"
aws_incident_manager: # Used when provider is "aws_incident_manager"
response_plan_arn: ${AWS_INCIDENT_MANAGER_RESPONSE_PLAN_ARN}
other_response_plan_arns: # Optional: Enable overriding the default response plan ARN using query parameters, eg /api/incidents?awsim_other_response_plan=prod
prod: ${AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_PROD}
dev: ${AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_DEV}
staging: ${AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_STAGING}
pagerduty: # Used when provider is "pagerduty"
routing_key: ${PAGERDUTY_ROUTING_KEY} # Integration/Routing key for Events API v2 (REQUIRED)
other_routing_keys: # Optional: Enable overriding the default routing key using query parameters, eg /api/incidents?pagerduty_other_routing_key=infra
infra: ${PAGERDUTY_OTHER_ROUTING_KEY_INFRA}
app: ${PAGERDUTY_OTHER_ROUTING_KEY_APP}
db: ${PAGERDUTY_OTHER_ROUTING_KEY_DB}
redis: # Required for on-call functionality
insecure_skip_verify: true # dev only
host: ${REDIS_HOST}
port: ${REDIS_PORT}
password: ${REDIS_PASSWORD}
db: 0
Explanation:
The oncall
section includes:
enable
: A boolean to toggle on-call functionality (default:false
).wait_minutes
: Time in minutes to wait for an acknowledgment before escalating (default:3
). Setting it to0
triggers the on-call immediately.provider
: Specifies which on-call provider to use ("aws_incident_manager" or "pagerduty").aws_incident_manager
: Configuration for AWS Incident Manager when it's the selected provider, includingresponse_plan_arn
andother_response_plan_arns
.pagerduty
: Configuration for PagerDuty when it's the selected provider, including routing keys.
The redis
section is required when oncall.enable
is true
. It configures the Redis instance used for state management or queuing, with settings like host
, port
, password
, and db
.
For detailed information on integration, please refer to the document here: On-call setup with Versus.
A sample configuration file is located at config/config.yaml
:
name: versus
host: 0.0.0.0
port: 3000
public_host: https://your-ack-host.example # Required for on-call ack
alert:
debug_body: true # Default value, will be overridden by DEBUG_BODY env var
slack:
enable: false # Default value, will be overridden by SLACK_ENABLE env var
token: ${SLACK_TOKEN} # From environment
channel_id: ${SLACK_CHANNEL_ID} # From environment
template_path: "config/slack_message.tmpl"
telegram:
enable: false # Default value, will be overridden by TELEGRAM_ENABLE env var
bot_token: ${TELEGRAM_BOT_TOKEN} # From environment
chat_id: ${TELEGRAM_CHAT_ID} # From environment
template_path: "config/telegram_message.tmpl"
email:
enable: false # Default value, will be overridden by EMAIL_ENABLE env var
smtp_host: ${SMTP_HOST} # From environment
smtp_port: ${SMTP_PORT} # From environment
username: ${SMTP_USERNAME} # From environment
password: ${SMTP_PASSWORD} # From environment
to: ${EMAIL_TO} # From environment, can contain multiple comma-separated email addresses
subject: ${EMAIL_SUBJECT} # From environment
template_path: "config/email_message.tmpl"
msteams:
enable: false # Default value, will be overridden by MSTEAMS_ENABLE env var
power_automate_url: ${MSTEAMS_POWER_AUTOMATE_URL} # Automatically works with both Power Automate workflow URLs and legacy Office 365 webhooks
template_path: "config/msteams_message.tmpl"
other_power_urls: # Optional: Define additional Power Automate URLs for multiple MS Teams channels
qc: ${MSTEAMS_OTHER_POWER_URL_QC} # Power Automate URL for QC team
ops: ${MSTEAMS_OTHER_POWER_URL_OPS} # Power Automate URL for Ops team
dev: ${MSTEAMS_OTHER_POWER_URL_DEV} # Power Automate URL for Dev team
queue:
enable: true
debug_body: true
# AWS SNS
sns:
enable: false
https_endpoint_subscription_path: /sns # URI to receive SNS messages, e.g. ${host}:${port}/sns or ${https_endpoint_subscription}/sns
# Options If you want to automatically create an sns subscription
https_endpoint_subscription: ${SNS_HTTPS_ENDPOINT_SUBSCRIPTION} # If the user configures an HTTPS endpoint, then an SNS subscription will be automatically created, e.g. https://your-domain.com
topic_arn: ${SNS_TOPIC_ARN}
# AWS SQS
sqs:
enable: false
queue_url: ${SQS_QUEUE_URL}
# GCP Pub Sub
pubsub:
enable: false
# Azure Event Bus
azbus:
enable: false
oncall:
### Enable overriding using query parameters
# /api/incidents?oncall_enable=false => Set to `true` or `false` to enable or disable on-call for a specific alert
# /api/incidents?oncall_wait_minutes=0 => Set the number of minutes to wait for acknowledgment before triggering on-call. Set to `0` to trigger immediately
enable: false
wait_minutes: 3 # If you set it to 0, it means there's no need to check for an acknowledgment, and the on-call will trigger immediately
provider: aws_incident_manager # Valid values: "aws_incident_manager" or "pagerduty"
aws_incident_manager: # Used when provider is "aws_incident_manager"
response_plan_arn: ${AWS_INCIDENT_MANAGER_RESPONSE_PLAN_ARN}
other_response_plan_arns: # Optional: Enable overriding the default response plan ARN using query parameters, eg /api/incidents?awsim_other_response_plan=prod
prod: ${AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_PROD}
dev: ${AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_DEV}
staging: ${AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_STAGING}
pagerduty: # Used when provider is "pagerduty"
routing_key: ${PAGERDUTY_ROUTING_KEY} # Integration/Routing key for Events API v2 (REQUIRED)
other_routing_keys: # Optional: Enable overriding the default routing key using query parameters, eg /api/incidents?pagerduty_other_routing_key=infra
infra: ${PAGERDUTY_OTHER_ROUTING_KEY_INFRA}
app: ${PAGERDUTY_OTHER_ROUTING_KEY_APP}
db: ${PAGERDUTY_OTHER_ROUTING_KEY_DB}
redis: # Required for on-call functionality
insecure_skip_verify: true # dev only
host: ${REDIS_HOST}
port: ${REDIS_PORT}
password: ${REDIS_PASSWORD}
db: 0
The application relies on several environment variables to configure alerting services. Below is an explanation of each variable:
Variable | Description |
---|---|
DEBUG_BODY |
Set to true to enable print body send to Versus Incident. |
Variable | Description |
---|---|
SLACK_ENABLE |
Set to true to enable Slack notifications. |
SLACK_TOKEN |
The authentication token for your Slack bot. |
SLACK_CHANNEL_ID |
The ID of the Slack channel where alerts will be sent. |
Variable | Description |
---|---|
TELEGRAM_ENABLE |
Set to true to enable Telegram notifications. |
TELEGRAM_BOT_TOKEN |
The authentication token for your Telegram bot. |
TELEGRAM_CHAT_ID |
The chat ID where alerts will be sent. |
Variable | Description |
---|---|
EMAIL_ENABLE |
Set to true to enable email notifications. |
SMTP_HOST |
The SMTP server hostname (e.g., smtp.gmail.com). |
SMTP_PORT |
The SMTP server port (e.g., 587 for TLS). |
SMTP_USERNAME |
The username/email for SMTP authentication. |
SMTP_PASSWORD |
The password or app-specific password for SMTP authentication. |
EMAIL_TO |
The recipient email address(es) for incident notifications. Can be multiple addresses separated by commas. |
EMAIL_SUBJECT |
The subject line for email notifications. |
Variable | Description |
---|---|
MSTEAMS_ENABLE |
Set to true to enable Microsoft Teams notifications. |
MSTEAMS_POWER_AUTOMATE_URL |
Automatically works with both Power Automate workflow URLs and legacy Office 365 webhooks. |
MSTEAMS_OTHER_POWER_URL_QC |
(Optional) Power Automate URL for the QC team channel. |
MSTEAMS_OTHER_POWER_URL_OPS |
(Optional) Power Automate URL for the Ops team channel. |
MSTEAMS_OTHER_POWER_URL_DEV |
(Optional) Power Automate URL for the Dev team channel. |
Variable | Description |
---|---|
SNS_ENABLE |
Set to true to enable receive Alert Messages from SNS. |
SNS_HTTPS_ENDPOINT_SUBSCRIPTION |
This specifies the HTTPS endpoint to which SNS sends messages. When an HTTPS endpoint is configured, an SNS subscription is automatically created. If no endpoint is configured, you must create the SNS subscription manually using the CLI or AWS Console. E.g. https://your-domain.com . |
SNS_TOPIC_ARN |
AWS ARN of the SNS topic to subscribe to. |
SQS_ENABLE |
Set to true to enable receive Alert Messages from AWS SQS. |
SQS_QUEUE_URL |
URL of the AWS SQS queue to receive messages from. |
Variable | Description |
---|---|
ONCALL_ENABLE |
Set to true to enable on-call functionality. |
ONCALL_PROVIDER |
Specify the on-call provider to use ("aws_incident_manager" or "pagerduty"). |
AWS_INCIDENT_MANAGER_RESPONSE_PLAN_ARN |
The ARN of the AWS Incident Manager response plan to use for on-call escalations. Required if on-call provider is "aws_incident_manager". |
AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_PROD |
(Optional) AWS Incident Manager response plan ARN for production environment. |
AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_DEV |
(Optional) AWS Incident Manager response plan ARN for development environment. |
AWS_INCIDENT_MANAGER_OTHER_RESPONSE_PLAN_ARN_STAGING |
(Optional) AWS Incident Manager response plan ARN for staging environment. |
PAGERDUTY_ROUTING_KEY |
Integration/Routing key for PagerDuty Events API v2. Required if on-call provider is "pagerduty". |
PAGERDUTY_OTHER_ROUTING_KEY_INFRA |
(Optional) PagerDuty routing key for infrastructure team. |
PAGERDUTY_OTHER_ROUTING_KEY_APP |
(Optional) PagerDuty routing key for application team. |
PAGERDUTY_OTHER_ROUTING_KEY_DB |
(Optional) PagerDuty routing key for database team. |
Variable | Description |
---|---|
REDIS_HOST |
The hostname or IP address of the Redis server. Required if on-call is enabled. |
REDIS_PORT |
The port number of the Redis server. Required if on-call is enabled. |
REDIS_PASSWORD |
The password for authenticating with the Redis server. Required if on-call is enabled and Redis requires authentication. |
Ensure these environment variables are properly set before running the application.
We provide a way to overwrite configuration values using query parameters, allowing you to send alerts to different channel IDs based on the service.
Query | Description |
---|---|
slack_channel_id |
The ID of the Slack channel where alerts will be sent. Use: /api/incidents?slack_channel_id=<your_vaule> . |
email_to |
Overrides the default recipient email address for email notifications. Use: /api/incidents?email_to=<recipient_email> . |
email_subject |
Overrides the default subject line for email notifications. Use: /api/incidents?email_subject=<custom_subject> . |
msteams_other_power_url |
(Optional) Overrides the default Microsoft Teams Power Automate flow by specifying an alternative key (e.g., qc, ops, dev). Use: /api/incidents?msteams_other_power_url=qc . |
oncall_enable |
Set to true or false to enable or disable on-call for a specific alert. Use: /api/incidents?oncall_enable=false . |
oncall_wait_minutes |
Set the number of minutes to wait for acknowledgment before triggering on-call. Set to 0 to trigger immediately. Use: /api/incidents?oncall_wait_minutes=0 . |
awsim_other_response_plan |
Overrides the default AWS Incident Manager response plan by specifying an alternative key (e.g., prod, dev, staging). Use: /api/incidents?awsim_other_response_plan=prod . |
pagerduty_other_routing_key |
Overrides the default PagerDuty routing key by specifying an alternative key (e.g., infra, app, db). Use: /api/incidents?pagerduty_other_routing_key=infra . |
Optional: Define additional Power Automate URLs for multiple MS Teams channels
name: versus
host: 0.0.0.0
port: 3000
alert:
debug_body: true # Default value, will be overridden by DEBUG_BODY env var
slack:
enable: false # Default value, will be overridden by SLACK_ENABLE env var
msteams:
enable: false # Default value, will be overridden by MSTEAMS_ENABLE env var
power_automate_url: ${MSTEAMS_POWER_AUTOMATE_URL} # Automatically works with both Power Automate workflow URLs and legacy Office 365 webhooks
template_path: "config/msteams_message.tmpl"
other_power_urls: # Optional: Define additional Power Automate URLs for multiple MS Teams channels
qc: ${MSTEAMS_OTHER_POWER_URL_QC} # Power Automate URL for QC team
ops: ${MSTEAMS_OTHER_POWER_URL_OPS} # Power Automate URL for Ops team
dev: ${MSTEAMS_OTHER_POWER_URL_DEV} # Power Automate URL for Dev team
Microsoft Teams Configuration
Variable | Description |
---|---|
MSTEAMS_POWER_AUTOMATE_URL |
Automatically works with both Power Automate workflow URLs and legacy Office 365 webhooks. |
MSTEAMS_OTHER_POWER_URL_QC |
(Optional) Power Automate URL for the QC team channel. |
MSTEAMS_OTHER_POWER_URL_OPS |
(Optional) Power Automate URL for the Ops team channel. |
MSTEAMS_OTHER_POWER_URL_DEV |
(Optional) Power Automate URL for the Dev team channel. |
Notes: The MSTEAMS_POWER_AUTOMATE_URL
is the primary Power Automate URL, while the MSTEAMS_OTHER_POWER_URL_*
variables are optional and allow routing alerts to specific Teams channels based on the msteams_other_power_url query parameter.
Example MS Teams:
To send an alert to the QC team's Microsoft Teams channel:
curl -X POST http://localhost:3000/api/incidents?msteams_other_power_url=qc \
-H "Content-Type: application/json" \
-d '{
"Logs": "[ERROR] Quality check failed.",
"ServiceName": "qa-service",
"UserID": "U12345"
}'
Example Email:
To send an email alert to a specific recipient with a custom subject:
curl -X POST "http://localhost:3000/api/[email protected]&email_subject=Urgent%20Incident%20Notification" \
-H "Content-Type: application/json" \
-d '{
"Logs": "[ERROR] Critical system failure.",
"ServiceName": "core-service",
"UserID": "U12345"
}'
Example On-call:
To disable on-call for a specific alert:
curl -X POST http://localhost:3000/api/incidents?oncall_enable=false \
-H "Content-Type: application/json" \
-d '{
"Logs": "[ERROR] This is a test error.",
"ServiceName": "test-service",
"UserID": "U12345"
}'
To trigger on-call immediately without waiting:
curl -X POST http://localhost:3000/api/incidents?oncall_wait_minutes=0 \
-H "Content-Type: application/json" \
-d '{
"Logs": "[ERROR] Urgent issue detected.",
"ServiceName": "urgent-service",
"UserID": "U12345"
}'
To use a specific AWS Incident Manager response plan for the production environment:
curl -X POST "http://localhost:3000/api/incidents?awsim_other_response_plan=prod" \
-H "Content-Type: application/json" \
-d '{
"Logs": "[ERROR] Production issue detected.",
"ServiceName": "prod-service",
"UserID": "U12345"
}'
To use a specific PagerDuty routing key for the infrastructure team:
curl -X POST "http://localhost:3000/api/incidents?pagerduty_other_routing_key=infra" \
-H "Content-Type: application/json" \
-d '{
"Logs": "[ERROR] Server load balancer failure.",
"ServiceName": "lb-service",
"UserID": "U12345"
}'
Version 1.2.0 introduces enhanced Microsoft Teams integration using Power Automate.
For complete migration instructions, please see our detailed migration guide.
Version 1.3.0 introduces a new integration with PagerDuty.
For complete migration instructions, please see our detailed migration guide.
- Add Telegram support
- Add Email support
- Add SNS subscription
- Add MS Team support
- Add Viber support
- Add Lark support
- Add support for queue listeners (AWS SQS, GCP Cloud Pub/Sub, Azure Service Bus)
- Support multiple templates
- API Server for Incident Management
- Web UI
- On-call integrations (AWS Incident Manager, PagerDuty)
- Prometheus metrics
Complete Project Diagram
We welcome contributions! Please follow these steps:
- Fork the repository
- Create your feature branch (
git checkout -b feature/amazing-feature
) - Commit your changes (
git commit -m 'Add some amazing feature'
) - Push to the branch (
git push origin feature/amazing-feature
) - Open a Pull Request
Distributed under the MIT License. See LICENSE
for more information.