Skip to content

Commit

Permalink
apply suggestions from code review
Browse files Browse the repository at this point in the history
Co-authored-by: Arianna Laudazzi <[email protected]>
  • Loading branch information
colleenmcginnis and alaudazzi authored Jan 10, 2025
1 parent dfd7b49 commit e47ba19
Showing 1 changed file with 10 additions and 10 deletions.
20 changes: 10 additions & 10 deletions docs/en/observability/synthetics-uptime-tls-alert.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -42,8 +42,8 @@ The *Rule schedule* defines how often to evaluate the condition.
You can also set *Advanced options* such as the number of consecutive runs that must meet the rule conditions before
an alert occurs.

In this example, the conditions will be met when any of the TLS certificates on sites we’re monitoring
is expiring within 30 days or is older than 730 days. These conditions will be evaluated every 6 hours,
In this example, the conditions are met when any of the TLS certificates on sites we’re monitoring
is expiring within 30 days or is older than 730 days. These conditions are evaluated every 6 hours,
and you will only receive an alert when the conditions are met three times consecutively.

[role="screenshot"]
Expand Down Expand Up @@ -102,15 +102,15 @@ You an also specify {kibana-ref}/rule-action-variables.html[variables common to
`context.labels`:: Labels associated with the monitor.
`context.lastErrorMessage`:: Monitor last error message.
`context.lastErrorStack`:: Monitor last error stack trace.
`context.locationId`:: Location id from which the check is performed.
`context.locationId`:: Location ID from which the check is performed.
`context.locationName`:: Location name from which the check is performed.
`context.locationNames`:: Location names from which the checks are performed.
`context.monitorType`:: Type (e.g. HTTP/TCP) of the monitor.
`context.monitorType`:: Type (for example, HTTP/TCP) of the monitor.
`context.monitorUrl`:: URL of the monitor.
`context.reason`:: A concise description of the reason for the alert
`context.recoveryReason`:: A concise description of the reason for the recovery
`context.reason`:: A concise description of the reason for the alert.
`context.recoveryReason`:: A concise description of the reason for the recovery.
`context.serviceName`:: Service name associated with the monitor.
`context.status`:: Monitor status (e.g "down").
`context.status`:: Monitor status (for example, "down").
`context.viewInAppUrl`:: Open alert details and context in Synthetics app.

[discrete]
Expand Down Expand Up @@ -146,8 +146,8 @@ about certificates that are approaching expiration dates.
that have been valid for too long.
|===

In this example, the conditions will be met when any of the TLS certificates on sites we’re monitoring
is expiring within 30 days or is older than 730 days. These conditions will be evaluated every 6 hours,
In this example, the conditions are met when any of the TLS certificates on sites we’re monitoring
is expiring within 30 days or is older than 730 days. These conditions are evaluated every 6 hours,
and you will only receive an alert when the conditions are met three times consecutively.

[role="screenshot"]
Expand Down Expand Up @@ -207,7 +207,7 @@ You an also specify {kibana-ref}/rule-action-variables.html[variables common to

`context.agingCommonNameAndDate`:: The common names and expiration date/time of the detected certs.
`context.agingCount`:: The number of detected certs that are becoming too old.
`context.alertDetailsUrl`:: Link to the alert troubleshooting view for further context and details. This will be an empty string if the server.publicBaseUrl is not configured.
`context.alertDetailsUrl`:: Link to the alert troubleshooting view for further context and details. This will be an empty string if the `server.publicBaseUrl` is not configured.
`context.count`:: The number of certs detected by the alert executor.
`context.currentTriggerStarted`:: Timestamp indicating when the current trigger state began, if alert is triggered.
`context.expiringCommonNameAndDate`:: The common names and expiration date/time of the detected certs.
Expand Down

0 comments on commit e47ba19

Please sign in to comment.