Index
- Overview
- Configuring Alerts
- Example Alert Configurations
- Editing Alerts
- Cloning an Alert
- Enabling/Disabling Alerts
- Deleting Alerts
- Syslog, Trap, and Event Data Historical Records
- Alerting Logs
Overview
Statseeker can be used as a comprehensive proactive and reactive alerting solution. Alerts can be triggered for:
- Threshold Events - thresholds can be configured against any timeseries metric monitored by Statseeker. By configuring thresholds, Statseeker can send alerts when your network is experiencing unusual or unwanted activity, such as excessive temperatures, memory/CPU load, or when a device/link is nearing capacity. For more details, see Threshold Configuration.
- Device Events - device-level events, such as ping state changes, on any devices monitored by Statseeker
- Interface Events - interface-level events, such as ifOperStatus state changes, on any interfaces monitored by Statseeker
- Syslog Events - if your network contains devices that have been configured to output messages to a remote syslog server, then these devices can send those messages to Statseeker. Statseeker can review these logs and use the content to trigger alerts relating to those events.
- SNMP Trap Events - if your network contains devices that have been configured to output SNMP trap messages to Statseeker, then Statseeker can review these messages and trigger alerts based on their content.
Alerting is achieved through:
- Targeted Emails: a range of email templates and the ability to customize content make it simple to provide the level of detail needed to respond to an issue efficiently. You will also need to configure Statseeker's mail server to send email alerts, see Email Configuration for more information.
- Syslog Messages: Statseeker events can be used to trigger an alert, which sends a syslog message to a collector/aggregator
- Custom Script: run a custom shell script in response to a specific alert trigger
- Webhook Integrations: - send an HTTP POST request to a specified URL, allowing integration with third-party systems
Once an alert configuration has been enabled, it will be triggered by every subsequently recorded event satisfying the requirements for the alert. In some instances, such as during scheduled maintenance windows, you may wish to suppress some alerts. This can be achieved by disabling those alerts, see Disabling Alerts for more. When a more targeted approach is needed, Event Management rules can be defined to discard a specific type of event from a specified device (or group of devices). For more information, see Event Management.
Configuring Alerts
To configure a new alert:
- Select Administration > Alerting / Event Management > Alerting
This will display a list of currently configured alerts.

- Click Add
- Select an alert Template
Alert Templates
There is a range of alert templates that allow varying levels of customization to both the alert configuration and alert output.
- Email (simple) - offers a single set of filters, basic alert bundling, and no email content customization
- Email with custom content (simple) - offers a single set of filters, basic alert bundling, and email content customization
- Email with custom content (advanced) - offers multiple filter sets, advanced bundling options, upstream device relationships, and email content customization
- Send syslog message - send a syslog message
- Run a custom script - an event satisfying the filters will trigger the specified custom script
- Send an HTTP Webhook - an event satisfying the filters will trigger an HTTP POST request to a specified URL, allowing integration with third-party systems:
- Microsoft Teams (simple) - a basic message template with no customization
- Microsoft Teams (advanced) - a template allowing customization of the message content
- ServiceNow - an integration with customizable content
- PagerDuty - an integration with customizable content
- Slack (simple) - a basic message template with no customization
- Slack (advanced) - a template allowing customization of the message content
- Custom - a template allowing customization of the message header and content
Note: Webhook alerting is licensed separately from the core Statseeker product. Contact Statseeker Sales for access to this feature.
Offers a single set of filters, basic alert bundling, and no email content customization
- Set Template = Email (simple)
- Refer to the table below for details on fields that may be offered when configuring an alert using this template

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts – not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an ‘on transition’ threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Bundling | Bundling policy to be used, for details see Bundling Policies |
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Email To | Specify the alert recipient. This can be:
|
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Test Email | Display a preview of the email content. This is useful when adding variables to your alert email subject line or body. |
| Send Test Email | Test mail server and alert configuration by sending a test alert email |
| Save Alert | Save the current alert configuration. |
Offers a single set of filters, basic alert bundling, and email content customization
- Set Template = Email with custom content (simple)
- Refer to the table below for details on fields that may be offered when configuring an alert using this template

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts – not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an ‘on transition’ threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Bundling | Bundling policy to be used, for details see Bundling Policies |
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Email To | Specify the alert recipient. This can be:
|
| Email Subject | Email subject line |
| Mode |
Note:
|
| Content | Specify the alert email content. This content can include text, links, images, tables, and variables.
Note:
|
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Test Email | Display a preview of the email content. This is useful when adding variables to your alert email subject line or body. |
| Send Test Email | Test mail server and alert configuration by sending a test alert email |
| Save Alert | Save the current alert configuration. |
Offers multiple filter sets, advanced bundling options, upstream device relationships, and email content customization.
- Multiple event filters: if any of the specified event filter sets are satisfied, an alert will be sent
- Bundling: set a period within which to bundle alerts (events occurring outside of this period are not bundled) and a schedule for the sending of bundled alerts
- Upstream Devices: suppress alerts for downstream devices when alerts exist for their upstream neighbors, see Upstream Device Configuration
- Set Template = Email with custom content (advanced)
- Refer to the table below for details on fields that may be offered when configuring an alert using this template

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts – not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an ‘on transition’ threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Bundling | Bundling policy to be used, for details see Bundling Policies |
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Behavior | Requires Waiting = Yes – Wait on down events over a specified periodSpecify the behavior to employ when down events are received, see Bundling Policies for details |
| Upstream Devices | Use your upstream device configurations to suppress ping/OperStatus down alerts from downstream devices when an alert exists for an upstream neighbor, see Upstream Device Configuration for details |
| Email To |
|
| Subject | Email subject line |
| Mode |
Note:
|
| Content | Specify the alert email content. This content can include text, links, images, tables, and variables.
Note:
|
| Recipient Roster File | Specify a text file detailing an email recipient roster. Each line in the roster file should contain a start date-time followed by one or more email addresses.
Recipient Roster Syntax
The format for the date-time is YYYY MM DD HH MM. The format for the roster file is: ** Ensure that there are no leading or trailing (blank) lines in the roster file ** Example: Once a date-time is reached, all future alerts generated from this configuration will be addressed to the specified email addresses. When the next date-time is reached, the recipients are replaced by those specified. |
| Subject Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the email Subject |
| Body Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the email body |
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Test Email | Display a preview of the email content. This is useful when adding variables to your alert email subject line or body. |
| Send Test Email | Test mail server and alert configuration by sending a test alert email |
| Save Alert | Save the current alert configuration. |
Send an alert containing a syslog message.

The syslog output can be in either the legacy Statseeker format or an industry-standard JSON format. The JSON format allows you to configure the message content to suit your requirements
The legacy format contains the following data:
- Message number
- Timestamp
- Facility code
- Application/Process
- Loghost
- Message
The JSON format includes all of the details from the Statseeker format and offers additional fields containing configuration data from the message source.

Sample basic syslog output for device down event:
010642 2019-08-28 15:29:51 NewYork-srv1 10.2.26.138 user.notice root: 10.124.1.1 Upstream-Neighbor-1 ping_state down,20671
Sample syslog JSON output for device down event with additional message elements selected:
010682 2019-08-28 15:32:51 NewYork-srv1 10.2.26.138 user.notice root:
{
“product”: “Statseeker”,
“version”: “5.4.5.1908280800”,
“source”: “Upstream-Neighbor-1”,
“event_type”: “ping_state”,
“state”: “down”,
“duration”: 150,
“ipaddress”: “10.124.1.1”,
“sysLocation”: “NewYork”,
“sysName”: “Upstream-Neighbor-1.example.com”,
“sysDescr”: “Cisco IOS Software, C2960 Software (C2960-LANBASEK9-M), Version 12.2(46)SE, RELEASE SOFTWARE (fc2) Copyright (c) 1986-2008 by Cisco Systems, Inc. Compiled Thu 21-Aug-08 15:59 by nachen”,
“sysObjectID”: “CISCO-PRODUCTS-MIB.catalyst2960G8TC”,
“sysContact”: “NewYork-support@example.com”,
“snmp_version”: 2,
“manual_name”: null,
“latitude”: 40.7306,
“longitude”: -73.9352,
“hostname”: null
}
| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring the device. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts – not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an ‘on transition’ threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Host | Specify the IP address of the target syslog collector\aggregator |
| Format | Specify the output syslog message format
|
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Test Email | Display a preview of the email content. This is useful when adding variables to your alert email subject line or body. |
| Save Alert | Save the current alert configuration. |
An event satisfying the filters will trigger the specified custom script.
| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts - not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an 'on transition' threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Command | The command to run when the alert is triggered.
Note: the alert process is handled by the statseeker system user account. A target script can reside on the Statseeker server or in another network location, but the statseeker account must have permission to both access and execute the script (execute the specified command).
|
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Save Alert | Save the current alert configuration. |
Send an HTTP Webhook
An event satisfying the filters will trigger an HTTP POST request to a specified URL, allowing integration with third-party systems. There are multiple message templates available:
- Microsoft Teams (Simple)
- Microsoft Teams (Advanced)
- ServiceNow
- PagerDuty
- Slack (Simple)
- Slack (Advanced)
- Custom
- Webhook Alerting Logs
Webhook Considerations
- Webhook alerting is licensed separately from the core Statseeker product. Contact Statseeker Sales for access to this feature.
- Webhook alerts will utilize an HTTP proxy if it has been configured on the Statseeker server (HTTPS proxy support will be included in a future version). An HTTP proxy can be configured via:
- The server CLI, see ssadmin Configuration Tool
- Administration, see Network Configuration
- Some services receiving webhook alerts from Statseeker place limits on the size of the message payload (refer vendor's own documentation). Be mindful of these limits when configuring custom payloads or implementing bundling policies.
This template can be used to integrate with Teams via a previously configured Teams Workflow. For assistance with configuring the target workflow in Teams, refer to Microsoft's Documentation.
This is a basic message template with no customization options.
- Set Template = Send an HTTP Webhook
- Use Filter Settings to define the alert trigger
- Specify the URL - this is the URL of the Teams Workflow that is handling incoming webhooks
- Set Webhook Template = Microsoft Teams (Simple)

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts - not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an 'on transition' threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Behavior | Requires Waiting = Yes - Wait on down events over a specified periodSpecify the behavior to employ when down events are received, see Bundling Policies for details |
| URL | The URL (including port) to which the HTTP POST request will be sent. The URL must be accessible from the Statseeker server. |
| Webhook Template | The message template to use for the alert configuration:
|
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Webhook Message | Display a preview of the message content. This is useful when adding variables to your alert message subject line or body. |
| Preview JSON Payload | Display the payload of the POST request that will be sent. This is useful when customizing or troubleshooting webhook messages. |
| Send Test Webhook | Test connectivity to webhook target and alert configuration by sending a test webhook message. |
| Save Alert | Save the current alert configuration. |
This template can be used to integrate with Teams via a previously configured Teams Workflow. For assistance with configuring the target workflow in Teams, refer to Microsoft's Documentation.
This template allows customization of the message title and content.
- Set Template = Send an HTTP Webhook
- Use Filter Settings to define the alert trigger
- Specify the URL - this is the URL of the Teams Workflow that is handling incoming webhooks
- Set Webhook Template = Microsoft Teams (Advanced)
- Configure the alert Title and Content - these fields accept both plain text and Message Variables
Note: Leaving the Title or Content fields blank will revert the field to the default content as seen in any of the (Simple) templates.

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts - not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an 'on transition' threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Behavior | Requires Waiting = Yes - Wait on down events over a specified periodSpecify the behavior to employ when down events are received, see Bundling Policies for details |
| URL | The URL (including port) to which the HTTP POST request will be sent. The URL must be accessible from the Statseeker server. |
| Webhook Template | The message template to use for the alert configuration:
|
| Title | Message title |
| Content | Specify the message content. This content can include text and variables.
Note:
|
| Title Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the webhook Title |
| Body Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the email body |
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Webhook Message | Display a preview of the message content. This is useful when adding variables to your alert message subject line or body. |
| Preview JSON Payload | Display the payload of the POST request that will be sent. This is useful when customizing or troubleshooting webhook messages. |
| Send Test Webhook | Test connectivity to webhook target and alert configuration by sending a test webhook message. |
| Save Alert | Save the current alert configuration. |
The ServiceNow integration requires:
- Installation of ServiceNow's Event Management Core plugin - webhooks generated by Statseeker will create ServiceNow events
- Creation of a user account with the evt_mgmt_integration role
- The account's User ID and password will be referenced in the Statseeker alert configuration
- ServiceNow workflows and tables to manage events generated by Statseeker webhook messages
Refer to ServiceNow's Documentation for assistance.
- Set Template = Send an HTTP Webhook
- Use Filter Settings to define the alert trigger
- Update the pre-filled URL to target the specific instance of your ServiceNow service, replacing <instancename> with your ServiceNow instance name
- Set Webhook Template = ServiceNow
- Set Username and Password for an account with:
- Access to the specified service endpoint (URL)
- The evt_mgmt_integration role
- Typically, the default values for Node, Resource, Description, and Type will provide the data most suited to those values. These values can be altered with basic text and Message Variables.
- Optionally, assign a Message Key
Note: A Message Key can be used to group alerts to prevent alert 'spamming'. ServiceNow treats subsequent events with the same Message Key as updates to the initial event, rather than as new events.
By default, Message Keys are in effect for 4 hours. This value can be modified by updating theevt_mgmt.active_intervalsystem property within ServiceNow.
Suggested values for Message Key are the Node (typically, device name {{event.general.device}}) or a combination of Node and Resource. - Set the Severity for the alert
- Optionally, set Metric Name to assist with incident categorization and reporting within your ServiceNow environment
Note: Metric Name is a free-text field, analogous to a label or tag. Consider standardizing these values across your environment to assist incident reporting and analysis.
- Optionally, set Additional Info fields.
These can be used to provide additional information regarding the incident through Message Variables, or include troubleshooting resources such as runbook links.

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts - not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an 'on transition' threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Behavior | Requires Waiting = Yes - Wait on down events over a specified periodSpecify the behavior to employ when down events are received, see Bundling Policies for details |
| URL | The URL (including port) to which the HTTP POST request will be sent. The URL must be accessible from the Statseeker server. |
| Webhook Template | The message template to use for the alert configuration:
|
| Username | The username of an account with access to the specified service endpoint (URL) |
| Password | The password for the specified Username |
| Node |
Default = {{event.general.device}} The name of the device associated with the event |
| Resource |
Default = {{event.general.entity}} The entity triggering the alert. For ping or SNMP availability, this will be the poller (the Statseeker server or a deployed Observability Appliance) monitoring the device. For interface events, this will be the interface itself. |
| Description |
Default = {{event.general.text}} The event description |
| Type |
Default = {{event.general.entity_type}} The type of entity (device, port, etc.) triggering the event |
| Metric Name | A label or tag applied to the alert record to assist reporting and analysis |
| Message Key |
An identifier used to group alerts, preventing alert 'spamming'. By default, Message Keys are in effect for 4 hours. ServiceNow treats subsequent events with the same Message Key as updates to the initial event, rather than as new events. Suggested values for Message Key are the Node (typically, device name {{event.general.device}}) or a combination of Node and Resource. |
| Severity | The severity of the event triggering the alert, used to assist prioritization when managing alerts |
| Additional Info | Use key:value pairs to include any additional information that may be relevant to the event, or assist in alert management |
| Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the message |
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview JSON Payload | Display the payload of the POST request that will be sent. This is useful when customizing or troubleshooting webhook messages. |
| Send Test Webhook | Test connectivity to webhook target and alert configuration by sending a test webhook message. |
| Save Alert | Save the current alert configuration. |
The PagerDuty template requires a previously configured Events API V2 integration within your PagerDuty instance, refer to PagerDuty's Documentation for details.
This template allows customization of the message title and content.
- Set Template = Send an HTTP Webhook
- Use Filter Settings to define the alert trigger
- Do not update the URL - the pre-filled URL (https://events.pagerduty.com/v2/enqueue) is required
- Set Webhook Template = PagerDuty
- Set Routing Key (also referred to as Integration Key) for the specific PagerDuty service that will receive the alert
- Set the Severity for the alert
- Typically, the default values for Summary, Source, and Component will provide the data most suited to those values. These values can be altered with basic text and Message Variables.
- Optionally, assign a De-duplication Key
Note: A De-duplication Key can be used to group alerts to prevent alert 'spamming'. PagerDuty treats subsequent events with the same De-duplication Key as updates to the initial event, rather than as new events.
De-duplication Keys are in effect for as long as the initial incident remains in an open state (triggered or acknowledged) within PagerDuty.
Suggested values for De-duplication Key are the Source (typically, device name {{event.general.device}}) or a combination of Source and Component. - Optionally, set Group and Class values to assist with incident categorization and reporting within your PagerDuty environment
Note: Group and Class are free-text fields, analogous to metadata or tags. Consider standardizing these values across your PagerDuty environment to assist incident reporting and analysis.
- Optionally, set Custom Details fields.
These can be used to provide additional information regarding the incident through Message Variables, or include troubleshooting resources such as runbook links.

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts - not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an 'on transition' threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Behavior | Requires Waiting = Yes - Wait on down events over a specified periodSpecify the behavior to employ when down events are received, see Bundling Policies for details |
| URL | The URL (including port) to which the HTTP POST request will be sent. The URL must be accessible from the Statseeker server. |
| Webhook Template | The message template to use for the alert configuration:
|
| Routing Key | An identifier (also referred to as Integration Key) for the specific PagerDuty service that will receive the alert |
| Summary |
Default = {{event.general.text}} The event description |
| Severity | The severity of the event triggering the alert, used to assist prioritization when managing alerts |
| Source |
Default = {{event.general.device}} The name of the device associated with the event |
| Component |
Default = {{event.general.entity_type}} The type of entity (device, port, etc.) triggering the event |
| De-duplication Key |
An identifier used to group alerts, preventing alert 'spamming'. PagerDuty treats subsequent events with the same De-duplication Key as updates to the initial event, rather than as new events. De-duplication Keys are in effect for as long as the initial incident remains in an open state (triggered or acknowledged) within PagerDuty. Suggested values for De-duplication Key are the Source (typically, device name {{event.general.device}}) or a combination of Source and Component. |
| Group | A label or tag applied to the alert record to assist reporting and analysis |
| Class | A label or tag applied to the alert record to assist reporting and analysis |
| Custom Details | Use key:value pairs to include any additional information that may be relevant to the event, or assist in alert management |
| Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the message |
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview JSON Payload | Display the payload of the POST request that will be sent. This is useful when customizing or troubleshooting webhook messages. |
| Send Test Webhook | Test connectivity to webhook target and alert configuration by sending a test webhook message. |
| Save Alert | Save the current alert configuration. |
Use of this template requires:
- A pre-configured Slack App with Incoming Webhooks enabled
- A workspace to contain the app
- The Webhook URL for the workspace will be referenced in the Statseeker alert configuration
- A channel assigned to receive messages from the app
Refer to Slack's Documentation for assistance.
This is a basic message template with no customization.
- Set Template = Send an HTTP Webhook
- Use Filter Settings to define the alert trigger
- Specify the URL - the Webhook URL for the target workspace containing your Slack app
- Set Webhook Template = Slack (Simple)

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts - not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an 'on transition' threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Behavior | Requires Waiting = Yes - Wait on down events over a specified periodSpecify the behavior to employ when down events are received, see Bundling Policies for details |
| URL | The URL (including port) to which the HTTP POST request will be sent. The URL must be accessible from the Statseeker server. |
| Webhook Template | The message template to use for the alert configuration:
|
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Webhook Message | Display a preview of the message content. This is useful when adding variables to your alert message subject line or body. |
| Preview JSON Payload | Display the payload of the POST request that will be sent. This is useful when customizing or troubleshooting webhook messages. |
| Send Test Webhook | Test connectivity to webhook target and alert configuration by sending a test webhook message. |
| Save Alert | Save the current alert configuration. |
Use of this template requires:
- A pre-configured Slack App with Incoming Webhooks enabled
- A workspace to contain the app
- The Webhook URL for the workspace will be referenced in the Statseeker alert configuration
- A channel assigned to receive messages from the app
Refer to Slack's Documentation for assistance.
This is a template allowing customization of the message title and content.
- Set Template = Send an HTTP Webhook
- Use Filter Settings to define the alert trigger
- Specify the URL - the Incoming Webhook URL for the target channel in your Slack app
- Set Webhook Template = Slack (Advanced)
- Configure the alert Title and Content - these fields accept both plain text and Message Variables
Note: Leaving the Title or Content fields blank will revert the field to the default content as seen in any of the (Simple) templates.

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts - not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an 'on transition' threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Behavior | Requires Waiting = Yes - Wait on down events over a specified periodSpecify the behavior to employ when down events are received, see Bundling Policies for details |
| URL | The URL (including port) to which the HTTP POST request will be sent. The URL must be accessible from the Statseeker server. |
| Webhook Template | The message template to use for the alert configuration:
|
| Title | Message title |
| Content | Specify the message content. This content can include text and variables.
Note:
|
| Title Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the webhook Title |
| Body Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the email body |
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Webhook Message | Display a preview of the message content. This is useful when adding variables to your alert message subject line or body. |
| Preview JSON Payload | Display the payload of the POST request that will be sent. This is useful when customizing or troubleshooting webhook messages. |
| Send Test Webhook | Test connectivity to webhook target and alert configuration by sending a test webhook message. |
| Save Alert | Save the current alert configuration. |
A template requiring that you manually create the message payload.
- Set Template = Send an HTTP Webhook
- Use Filter Settings to define the alert trigger
- Specify the URL to which the HTTP POST request will be sent
- Set Webhook Template = Custom
- Specify the Auth Method (none, bearer token, basic, custom header) and configure the authentication header
- Configure the HTTP POST Content (payload)
Note:
- The Content is sent as the body of the HTTP POST request and must be valid JSON
- The Content can include variables as described in Message Variables
- The Preview JSON Payload option will validate and preview the payload

| Field | Description |
| Template | Alert template to use, for details on templates see Alert Templates
Note: the available templates can be edited from within Administration:
The allowed templates can be specified as a space\tab separated list with values of:
Example: |
| Name | Name of the alert configuration |
| Status |
|
| Time Zone | Used in conjunction with the time filter |
| Enable Logging | Only enable logging when troubleshooting alerting issues |
| Filter Settings > Name | (Optional) Specify a name for the filter |
| Filter Settings > Enabled |
|
| Filter Settings > Hide | Collapses the filter |
| Filter Settings > Delete | Deletes the filter |
| Alert Type | What will trigger the alert:
Note: Statseeker allows for multiple ping pollers to be distributed throughout your network (see Observability Appliances for details). When multiple pollers are available, each device has a designated default poller and can have any number of additional pollers monitoring it. When:
|
| Data Type | Requires Alert Type = Event; Syslog; Trap Select the data type the alert will be configured against. This is a filtered list only displaying those data types currently being monitored by your server. |
| Threshold | Requires Alert Type = Threshold Select the threshold the alert will be configured against |
| Field | Requires Data TypeSelect a state field associated with the selected Data Type |
| States | Requires Field or Alert Type = ThresholdSelect the states that will trigger the alert |
| Regex | Requires Alert Type = Syslog; TrapSpecify a RegEx to filter Syslog\Trap message records by content. Receipt of a message that satisfies the filter will result in the alert being triggered. |
| Entity/Group Filter | Only events originating from the specified device or group can trigger alerts - not all entities are presented at once, begin typing to filter the list |
| Time Filter | Matching events that occur within the specified time period will generate alerts. For more information on generating these, see Time Filters |
| Time Filter Mode | Determines if the alert is triggered by events in effect at the beginning of the alerting period. Example: You have an alert that references an 'on transition' threshold. If at the start of the alerting period (as specified by the Time Filter), the threshold is in breach.
|
| Waiting | Requires Field = Ping State, SNMP State, or ifOperStatusSpecify the action to be taken when device ping/SNMP, or interface ifOperStatus down events are received, see Waiting Policies for details |
| Behavior | Requires Waiting = Yes - Wait on down events over a specified periodSpecify the behavior to employ when down events are received, see Bundling Policies for details |
| URL | The URL (including port) to which the HTTP POST request will be sent. The URL must be accessible from the Statseeker server. |
| Webhook Template | The message template to use for the alert configuration:
|
| Auth Method | Authentication method that will be used. One of:
|
| Bearer Token | (Requires Auth Method = Bearer Token)
Authentication token. When specified, it will include a valid header in the webhook POST request. Authorization: Bearer <token> |
| Username | (Requires Auth Method = Basic Auth)
Username to use when generating the authorization header of the webhook POST request. |
| Password | (Requires Auth Method = Basic Auth)
Password to use when generating the authorization header of the webhook POST request. |
| Custom Header | (Requires Auth Method = Custom Header)
Key-value pairs to be included in the webhook POST request header. This is useful when the target service requires custom headers for authentication. |
| Content |
Note: Must be valid JSON
Specify the HTTP POST payload. Note:
|
| Title Date Format | Select an alternate date-time format to be used for event times when a date-time variable is included in the webhook Title |
| Check Event Filters | Runs the alert configuration against the Events database and returns recent events that would trigger the alert. |
| Preview Webhook Message | Display a preview of the message content. This is useful when adding variables to your alert message subject line or body. |
| Preview JSON Payload | Display the payload of the POST request that will be sent. This is useful when customizing or troubleshooting webhook messages. |
| Send Test Webhook | Test connectivity to webhook target and alert configuration by sending a test webhook message. |
| Save Alert | Save the current alert configuration. |
Webhook Alerting Logs
All outgoing webhook alert messages are detailed in the Python Log. These logs can assist in troubleshooting webhook configuration issues, detailing when the webhook was sent and the message outcome.
For details on accessing Statseeker logs, see Log Viewer.
Bundling Policy
Bundling refers to holding onto alerts for a specified period of time and then sending all alerts generated over that period in a single alert email. This allows for a more efficient handling of events where several alerts are raised in a very short period of time, often in response to a single cause. Each alert configuration contains a bundling policy specific to that alert configuration; consequently, only alerts generated by that configuration are bundled according to that bundling policy.
Basic bundling options are available for the Email (simple) and Email with custom content (simple) templates. These options are:
- No - no bundling occurs, and an alert is sent for each event
- Yes - bundle the alerts for a specified duration
- The duration of the bundling period
Once an event occurs and an alert is generated, Statseeker will hold onto the alert and collect any other alerts generated from the same alert configuration until the specified bundling period is complete. At that time, a single alert email is sent detailing every alert collected over the bundling period.
Advanced bundling options are available for the Email with custom content (advanced) template. The bundling options available here are:
- No - no bundling occurs, and an alert is sent for each event
- Yes, with a duration - as per the bundling options offered with the simple templates
- Yes, choose bundle times
When the bundle times option is selected, the following fields are made available:
- Bundle from - the time of day to begin bundling
- Send email at - the time of day and days of the week, to stop bundling and send an alert email






