Hi Jenzo / Team,
I'm unable to comment further on the original "Expanding Sustained Alerting" feature request. The entry appears to not be accepting my replies. I've therefore opened this follow-up request. (The main pieces of the original request are pasted below.)
To ensure false alarms are adequately ignored, it's important that the poll strategy (specifically time duration and poll count) encompass all monitors in the website monitoring tool. (Note there shouldn't be a need to break it down on a "per monitor" basis; it's more effective / easier to manage one setting applying to all monitors.)
Has it been added to the 2026 roadmap?
https://www.site24x7.com/community/expanding-sustained-alerting
Thanks,
Alan
My understanding from the Site24x7 support staff is sustained alerting for URL monitors is limited to the page response monitors (illustration below). It would be more useful to provide sustained alerting for all URL monitors (e.g.: HTTP 400 and above, DNS, socket timeout, etc.). This would allow automation to filter through valid alerts while ignoring insignificant, short term blips. I previously used a five minute sustained "observation" mode with a competitor's product. That worked quite well, ensuring only valid alerts were actioned. I'd love to see a high caliber product like Site24x7 be more helpful on this front.
To further illustrate my feature request need, here's a recent example of a 504 that lasted little over one minute and then vanished without return. I want to eliminate receiving alerts for these types of blips (false alarms) by using a five minutes sustained suppression. Anything persisting post five minutes would warrant investigation and should alert only at that point.
Hi,
Is there an update as to when this enhancement can be deployed? As much as I like Site24x7, it's frustrating that such a necessary (and basic) level of control is available only on limited basis. Multiple other monitoring tools include it as a standard function (e.g.: number of minutes before alerting or number of polling cycles / samples in a breach state before alerting).
Awaiting welcome news ...
Alan