Alert History
developer/v1/alerts/historyRetrieves a paginated history of triggered alerts for your organization. Filter by alert status (pending, acknowledged, resolved), alert type, specific rule ID, and time range. Essential for incident review, post-mortem analysis, and measuring operational metrics like Mean Time to Acknowledge (MTTA) and Mean Time to Resolution (MTTR).
What It Does
Returns a paginated list of alert history entries sorted by trigger time (newest first). Each entry includes the alert type, trigger message, current lifecycle status, and timestamps for trigger, acknowledgment, and resolution. Supports comprehensive filtering: by status (pending/acknowledged/resolved), alert_type, rule_id, and time range (from/to as ISO 8601 timestamps).
Why It's Useful
Alert history is the foundation for incident management and operational improvement. Use it to conduct post-mortems (identifying what triggered, when, and how quickly it was resolved), calculate SRE metrics (MTTA, MTTR), and identify patterns that indicate systemic issues. Per Google SRE practices, regular review of alert history helps tune thresholds and reduce toil.
Use Cases
Post-Incident Review
After an outage, filter alerts by time range to see every alert that fired during the incident window for comprehensive post-mortem analysis.
Understand the full timeline and cascading effects of incidents.
MTTR Reporting
Pull resolved alerts over the past quarter to calculate Mean Time to Resolution and track improvement trends.
Measure and report on operational efficiency with concrete data.
Alert Pattern Analysis
Filter by alert_type to identify which types generate the most alerts, revealing infrastructure areas that need attention or rule threshold tuning.
Reduce alert fatigue by addressing root causes of noisy alerts.
Parameters
| Name | Type | Required | Description |
|---|---|---|---|
type | string | Optional | Filter parameters: status (pending|acknowledged|resolved), alert_type, rule_id, from (ISO 8601), to (ISO 8601), limit (1-1000), offsetExample: status=pending&alert_type=ssl_expiry&limit=50 |
Response Fields
| Field | Type | Description |
|---|---|---|
alerts | array | List of triggered alert objects |
alerts[].id | string | Alert ID |
alerts[].alert_type | string | Type of alert that triggered |
alerts[].status | string | Lifecycle status: pending, acknowledged, or resolved |
alerts[].message | string | Human-readable trigger message |
alerts[].triggered_at | string | ISO 8601 trigger timestamp |
pagination.total | number | Total alerts matching filters |
pagination.has_more | boolean | Whether more results are available |
Code Examples
curl "https://api.edgedns.dev/v1/alerts/history" \
-H "Authorization: Bearer YOUR_API_KEY"const response = await fetch(
'https://api.edgedns.dev/v1/alerts/history',
{
headers: {
'Authorization': 'Bearer YOUR_API_KEY'
}
}
);
const data = await response.json();
console.log(data);import requests
response = requests.get(
'https://api.edgedns.dev/v1/alerts/history',
headers={'Authorization': 'Bearer YOUR_API_KEY'},
params={
}
)
data = response.json()
print(data)Read the full Alert History guide
Why it matters, real-world use cases, parameters, response fields, and how to call it from Claude, ChatGPT, or Gemini via MCP.
Read the guide →Related Endpoints
External References
Learn more about the standards and protocols behind this endpoint.
Try This Endpoint
Test the Alert History endpoint live in the playground.